Professional Documents
Culture Documents
ucsdusdsdsugangstalkinghumantrafficking
You Tube Organized Stalking -GangStalking and Universities-Look at how many responses you get and what the responses are describing
And make sure you cross reference Organized Stalking or GangStalking to Remote Neural Monitoring to see these Techknowlogies are used in these expeditions Loook at the Amount of the responses you’ll get
The Informer Report 5-6-2012 Leslie Williams OGS And Technological Harassment
Housing Authoritys and Housing Assaociations and City Housing Inspectors and Land Lords and Property Owners are Huge Huge Players in this Crime
Learning Disabled Woman describes the San Diego Connection to 2006 Stalking
Now what we have to UnderStand Here is that Research is all over the Manifesto that is Pasted Below so whatever is On this post You dont understand –( UNDERSTAND ) Human Research is Within these expeditions becvcause its in Part How their Controlling the Victims and How
their Exploiting them –( Neurally )-and How their selling the Results of the resaerch -The Brain mapping and Pysiological and CNS Mappings-I STRONGLY Suggest two Things-
( 1 ) Look at ALL OF THE RESEARCH THAT IS HAPPINING AT UCSD-THEN TWO CLOSLEY OBSERVE THE OLDER VERSIONS OF THE PASTED PDF LINKS RIGHT HERE- Now Understand Social Service’s Workers and lawyers are Clearly Mentioned in the First PDF link
right below these Words
*(1) Remote Neural Monitoring: Civil Action by John St. Clair Akwei h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf (h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf)
*3) Bio-electromagnetic Weapons by Harlan Girard, Managing Director, International Commi�ee on Offensive Microwave Weapons (ICOMW)
h�p://www.freedomfchs.com/bioelectromagneticweapons2.pdf (h�p://www.freedomfchs.com/bioelectromagneticweapons2.pdf)
Gang Stalking Targets Speak at Presidential Hearings in NYC on May 18, 2011
Advertisements
REPORT THIS AD
Gang Stalking Victim, COINTELPRO. Termination of my property through lies and deception
h�p://www.youtube.com/watch?v=SQA6n0lJh-4 (h�p://www.youtube.com/watch?v=SQA6n0lJh-4)
Taff Housing Association Appears to be located in the UK So its Not understood yet –But a Program that is Called Agenda 21 is Co-Opting Peopls property and their Tackiling it on EVERY Front in over 15 Countries right Know Including America and their diffinitly it to Single woman
I heard about how they did it towards and Single Woman in Connecticut neir New haven But its happing all over they Stole Leslie Williams Rent to make her Homeless their Into Multiple differnet types of Racketeering Schemes-So she came back to San Diego Wheir its happining
towards her again-
And these are the mechanisms they a�empt to steer her into Enviroments for Explotation
h�p://www.sandiego.gov/police/ (h�p://www.sandiego.gov/police/)
h�p://www.sdcounty.ca.gov/hhsa/ (h�p://www.sdcounty.ca.gov/hhsa/)
This is The Manifesto of a Manager of Organized Stalking Crews Look at Who their Connected to-( The Entire Manifesto is enclosed at the very Bo�om of this Post )
h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers/message/62392 (h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers/message/62392)
___________________________________________________________________________________________
Now it highley Highly Appearsthey Have Go�on ahold of Sylvia L Moorelos Her Old You Tibe Video’s are Closed down and Her Blogs have been taken Offline
Sylvia L Moorelos Has Disapeared and All of her old Blogs and You Tube Video’s have Been removed –They Got her in one Form or Another
h�p://www.ipetitions.com/petition/synergy/signatures/page/27 (h�p://www.ipetitions.com/petition/synergy/signatures/page/27)
h�p://www.sylmor1974.blogspot.com/ (h�p://www.sylmor1974.blogspot.com/)
h�p://peacepink.ning.com/forum/topics/victims-stories (h�p://peacepink.ning.com/forum/topics/victims-stories)
www.ipetitions.com/petition/synergy/signatures/page/27
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego (h�p://www.gangstalkinginsandiego)-sylviamorelos.webs.com … Comments: h�p://www.sylmor1974.blogspot.com
(h�p://www.sylmor1974.blogspot.com) …
//
1. 1301 (h�p://www.ipetitions.com/petition/synergy/signatures/page/27#sub-1301)
Name: Sylvia Morelos on Nov 21, 2011
Are you a Targeted Individual: YES
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com (h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com)
Country: United States
Flag
2. 1302 (h�p://www.ipetitions.com/petition/synergy/signatures/page/27#sub-1302)
1 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
www.change.org/petitions/stop-nonlethal-microwave-weapons-a�acks…
My name is Sylvia Morelos. You can read my blog at h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego (h�p://www.gangstalkinginsandiego)-sylviamorelos.webs.com. Thank You.
◦ Quam Porto-Rico – Free People Check with News, Pictures & Links … (http://www.yasni.com/quam+porto-rico/check+people)
www.yasni.com/quam+porto-rico/check+people
Comments: h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) and h�p://www.gangstalkinginsandiego (h�p://www.gangstalkinginsandiego) … Name: Quam PORTO-RICO
www.experienceproject.com/stories/Am-Being-Gang-Stalked/201561
Please read my post www.gangstalkinginsandiego-sylviamorelos.webs.com and h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com). Same experience. Sylvia Morelos
gangstalking.wordpress.com/about
Hello world. This blog is going to be about my adventures with gang stalking. I really didn’t choose this adventure, it choose me about six years or so ago. I didn …
◦ //
www.ipetitions.com/petition/synergy/signatures/page/26
Comments: Please read my blog at h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com). I am being gangstalked … My website is www.gangstalkinginsandiego-sylviamorelos.webs.com
peacepink.ning.com/forum/topics/victims-stories
Sylvia Morelos h�p://h�p://www.sylmor1974.blogspot.com (h�p://www.sylmor1974.blogspot.com) h�p://www.gangstalkinginsandiego-sylviamorelos.webs.com. T. Target Elephant h�p://www…
______________________________________________________________________________________
leaarningdisabledwomanprovessandiegopolicecorrupti.wordpress.co…
You +1′d this publicly. Undo (h�p://www.google.com/#)
Mar 3, 2012 – Also rememeber this Very Important Fact Sylvia L Moorelos … we do many things -In Organized Stalking–(Gang Stalking) Expeditions they …
Including goin after people on Disablity to take over their Checks to exploit the Medicare to Exploit them Sexually and For Research
Advertisements
REPORT THIS AD
Its a Manifesto of a Manager of Organized Gangstalking Crews —It’s Organized Crime within the System
-Mortage Co-Opting and Eviction’s for Multiple Motivations To make Targets Homelsss For explotation-Human Trafficking
__________________________________________________________________________________________
Notice here erica Gillmore How they tryed to suck her into Prostitution and when They do of Victims they take Pictures of it to then Dupe teh Commnunity -( Groups) to harrass her based on the Slandeer that weir trying to run her out of town-( but what their doin in this Section is
Trying to do two Things
-(1)- To break her Down Motive with the Added methods of Additional Non Stop Harrassment-
(2)- Top get this harrassment Acheived thru Cost Effective means by exciting the personality of the Group their soliciting the Slander to-( Example if its a Anti gay Group they will approach them and tell them this Woman is a Prostitue who hates gays-Read the manifesto below and
how they lie to people to get them to do it is shown here
Listen to a Stranger
h�p://www.freedomfchs.com/ericagilmore.pdf (h�p://www.freedomfchs.com/ericagilmore.pdf)
Erica Gilmore
I, Erica Deann Gilmore state on August 6
th, 2011 that the events below are true and factual regarding being a victim of Organized Group Stalking from 1999 to current date.
My name is Erica Deann Gilmore; I am an African America female and have been a victim of Organized Group Stalking since 1999. My stalking began in Ventura, California and has continued in Santa Barbara, California. From 1991-1999 my daughter and I lived in a downstairs
apartment in the Garden Estates apartments in Ventura, Ca. The property owners were named Martha and Bill Spriggs (Spriggs and Company Management). In 1998 my bathroom ceiling was flooded by the upstairs unit. For one year no repairs were made on the water damage. I was
receiving housing assistance through the San Buena Ventura Housing Authority. The unit was failed during an inspection in 1998. I continued to pay my rent but no repairs were made. The bathroom ceiling and walls began to rot from mold and mildew and became inhabitable.
In 1999 I was given a 30-day notice to move by Spriggs and didn’t think it was fair considering the circumstances. I went to the Housing Authority and spoke to my worker Laura Hogan and requested copies of the 1998 inspection report. I needed the paper work because I was going to
sue the management company for back rent. A few days later I was told by Laura Hogan that the paper work in my files were “accidentally destroyed.” I had no proof that there was a pre-existing condition. I believe that Laura Hogan (Jehovah’s Witness) deliberately destroyed my
paperwork to discredit me. I bring up her religion in parenthesis because I have received harassment from some of these people. I contacted the City of Ventura and they came and did an inspection and deemed it un-livable. Afterwards, I could not find a place to live or a job
(blacklisted). Every landlord and management company refused my application. One landlord told me he rejected my application because “you didn’t move when they gave you the 30-day notice.” A property management company told me they didn’t want to get involved and
returned my $30 application fee. Eventually, I found a really nice Mexican husband and wife couple who were going to rent to me. The place was on Ramona Street in Ventura and they had done extensive repairs. The place had new flooring and kitchen appliances and was beautiful. I
was ready to move in and sign a contract when The Gas Company slapped a violation on the unit and we could not move in. I realized then that we were deliberately being made homeless. I lived in Motel 6 and would
spend $50 per night for a room to stay out of the cold and to get a break from the homeless shelters.
The harassment continued with the Ventura police department. A man named Graham Jeffries falsified a police report stating that I accused The Hell’s Angels Ventura, California Chapter members of stealing my laundry. I contacted and met with two police supervisors who refused to
amend the false report. I wrote a 5-page complaint and sent copies to the mayor, more supervisors of the police department and outside agencies. Afterwards, the Ventura police constantly harassed me and it escalated with two female members of the Ventura Sheriff’s Department
ge�ing involved. I made complaints to their supervisors, mayor’s office, FBI, and politicians. At 10pm one evening in Motel 6 the Ventura Police knocked on the door claiming they got a call regarding a domestic dispute between a man and woman. I explained that only my daughter
and I were in the room. The police threatened to arrest me if I did not open the door. The police claimed that the Motel 6 a�endant told them my room number. I contact the front desk during this chaos and was told that the police came into the office and request a list of the rooms. A
woman in a room next door told the police that it was a downstairs couple who got in an argument. Still they insisted that I open the door or be arrested. I did not open the door and eventually they left. Prior to all of this happening I never had any problem with the police and sheriff’s
department. No one would help me get the harassment stopped. I also had strangers in the community harassing me and yelling stuff at me from their cars, giving me dirty looks, and laughing at me as a walked down the street. I use to own a white Dodge hatch back and I believe that
there were tracking devices placed on my vehicle.
In addition, a “death mark” was put on both me and my daughter who was 8yrs old at the time. Their plan for my daughter was to have her taken away from me and sold into sexual slavery, abused in foster care, and or shot with a gun in public. I discovered that false allegations of
child abuse and neglect were made against me to Ventura, CA and Santa Barbara, CA Child Welfare Services. I love my daughter very much and they were trying to turn me against my own child by making it difficult for me to provide for her. I believe the group stalkers wanted me to
see my daughter as a burden and abandon her. I never did that! I have spend many days and nights crying, depressed, and scared wondering why someone would want to kill me and my daughter. Since I have been a victim only 2 people have had the decency to tell me what they
knew about my situation. The group stalkers are human personifications of evil. Since I could not find a place to live, was blacklisted, and being harassed I left Ventura, California.
In 2001 when I moved to Santa Barbara, California the harassment continued. My daughter and I lived in homeless shelters. When I tried to find a place to live in to I was told “we don’t rent to people with children.” I heard this over and over again. The blacklisting continued and I
could only find work through temporary agencies once in a while. No ma�er where I went I went in Santa Barbara I would get street theater, followed and harassed. My main harassment comes from White males, White females, Mexican males, and Mexican females. However, there
are other races involved too but these two races are the most aggressive. I believe some of the people are racist. In 2002 we moved into the Coronell Apartments in Santa Barbara. A short time after signing the lease the on-site manager informed me that different people in Santa Barbara
were telling him not to rent to me. When I asked who these people were he would not tell me. During my stay there the apartment had been illegally entered into several times. I found an apartment through Radis Property Management in 2003. As time went on that unit was illegally
entered with items being misplaced from different rooms. I also believe that there were listening devices and cameras in the apartment. In the corner of the bathroom ceiling, my bedroom and another room I discovered drill holes that were not there before. I had a strange feeling that
something was not right in that apartment. I felt like someone had been in there when we were gone. I also got the feeling we were being watched.
When we were homeless from 1999 to 2002 the group stalkers were always following us and I knew that someone wanted to kill me. A black limousine with the California license plate
LINK 17 followed me in Ventura, California and when I moved to Santa Barbara, California as well. The only person I saw in that limousine was an older white male with gray hair in a suit after he followed me to where my daughter went to elementary school in Santa Barbara. I don’t
know who this man was but I got a bad feeling about him and he just kept staring at me as I walked in a different direction.
Since the targeting I have been blacklisted and they tried to turn me into a prostitute. In the beginning stages of my stalking the men in the stalking groups would approach me out in public; and ask me if I wanted to have sex in exchange for money. The theme of my targeting is the
2 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
Advertisements
REPORT THIS AD
Now read this and see how the Gangstalking Work Hand in Hand with eventual Entrainment for prostitution Gansgtalking
to break you Down for Casual Entrainment for Neural Encoding for Neural identification then Enslavemenet with Remote Neural Monitoring -Which is used to Stmualate whats entrained
And Before you read this File Listen to this Video carefully–
John Hall – Satellite Terrorism, Surveillance Technology – 1 April 2010 part 2/6
This is a Old illustration but it Give’s you a Vidual representation of What is Listed in the Pdf Link in this Section
Microwave Hearing
h�p://www.freedomfchs.com/remotebehavioralinfltech.pdf (h�p://www.freedomfchs.com/remotebehavioralinfltech.pdf)
MICROWAVE HEARING
The first American[7][8] to publish on the microwave hearing effect was Allan H. Frey in 1962,
[9] yet radar technicians had anecdotes of microwave perception in World War II[10]. Deaf
and normal subjects, even with earplugs, can hear appropriately pulsed microwaves at least
producing the effect result in a severe buffeting of the head with dizziness and nausea, while
parameters below the effect induce a pins and needles sensation. Peak power is the major
determinant of loudness, though there is some dependence on pulse width. Pulse modulation
appears to influence pitch and timbre. The effect “is the most easily and reliably replicated of
low power density (microwave) illumination.”[12]. Review of human and animal microwave
hearing confirmation by independent investigators of the effect establishes validity. [13] [14]
Advertisements
REPORT THIS AD
[15][16] [17] Designs for scaring birds away from aircraft or other hazards by microwave
While working for the Advanced Research Projects Agency at Walter Reed Army Institute of
Research, Sharp and Grove discovered “receiverless” and “wireless” voice transmission. [22]
Their method was simple: the negative deflections of voiceprints from recorded spoken
numbers were caused to trigger microwave pulses. Upon illumination by such verbally
modulated energy, the words were understood remotely. The discovery”s applications are
A Defense Intelligence Agency review of Communist literature affirmed microwave sound and
indicated voice transmission. The report states, “Sounds and possibly even words which
appear to be originating intracranially (within the head) can be induced by signal modulation
at very low average power densities.”[24] Among microwave weapon implications are “great
potential for development into a system for disorientating or disrupting the behavior pa�erns
decoy, and deception operations.”[25] “One decoy and deception concept presently being
considered is to remotely create noise in the heads of personnel by exposing them to low
Advertisements
REPORT THIS AD
The Brunkan Patent # 4877027 “Hearing system” is a device capable of verbal microwave
hearing.[26] The invention converts speech for remote introduction into the head by parabolic
antenna with indication of direct microwave influence on neural activity. The microwave
spectrum granted is broad: 100-10,000 MHz (0.1-10 GHz.) Pulse characteristics are essential
to perception. Bursts of narrowly grouped, evenly spaced pulses determine sound intensity by
their amount per unit time. Although a wide spectrum is patented, with ranges of pulse and
burst duration, preferred operation has burst duration at 2 microseconds, and pulse duration
at 100 nanoseconds. Operation is at 1000 MHz, which is the frequency of optimal tissue
way that the burst frequencies are at least virtually equal to the sound frequencies of the
sounds picked up by the microphone,” though the transducer here is not remote.[28]
3 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
Stocklin Patent # 4858612 “Hearing device” 7 affirms the microwave hearing effect. Stocklin
gives exposition to the concept that a microwave component is part of neurophysiology and
absorbed by nerve cell membrane proteins. Microwaves generally excite the brain[30]
perhaps by influencing calcium,[31] a central ion in nerve firing.[32] Stocklin represents the
auditory cortex as normally producing microwave energy, which the device simulates, thus
eliciting sound sensation. Each acoustic tone is weighted for several microwave frequencies
by a formula called the mode matrix, which is used to calculate best perception requirements.
Advertisements
REPORT THIS AD
Observation of EEG desynchronization, delta waves, and brain wave amplitudes helps
calibrate the device.[33] The lowest frequency for hearing is estimated by the cephalic index.
Microwave speech transmission in this patent is unremote with the antenna over and sized for
the auditory cortex. Other patents have non-remote transducers of radiowave elicited hearing.
[34][35]
Descriptions in the above patents a�ribute microwave hearing to direct neural influence.
likely inducing bone conducted hearing. The cochlea does appear to be involved, but not the
US exposure standards are based on thermal effects, yet there are effects very difficult to
explain by thermodynamics.13[36] All accept thermal effects at some level, yet the thermal
only school is rather dogmatic related to liability issues of commercial[37] and national
security concern.[38] It must be said that the open literature regarding microwave hearing
“Communicating Via the Microwave Auditory Effect.” is the title of a small business contract
for the Department of Defense. Communication initial results are: “The feasibility of the
concept has been established” using both low and high power systems.[39] A Freedom of
Information Act (FOIA) request as to the project”s outcome met with denial on the part of the
Air Force, on the grounds that disclosure “could reasonably be expected to cause damage to
national security.”[40] Though the Air Force denied the FOIA disclosure, such a contract”s
Advertisements
REPORT THIS AD
purpose is elaborated by the Air Force”s “New World Vistas” report: “It would also appear
possible to create high fidelity speech in the human body, raising the possibility of covert
create an internal acoustic field in the 5-15 kiloher� range, which is audible. Thus it may be
them.”[41] Robert Becker, whose eminence was enough to have been twice nominated for
the Nobel Prize in biological electromagnetic fields research, is more explicit: “Such a device
has obvious applications in covert operations designed to drive a target crazy with “voices” or
The above Army efforts had results. A microwave voice transmission non-lethal weapon is
referenced in the thesaurus of the Center for Army Lessons Learned, which is a military
instruction website.18 The military thesaurus entry lists analogous devices using “silent
sound.”[43][44]
Internal voice capability, without discernment by others nearby. is also evident in ultrasoundbased
sound using ultrasonic sound as a carrier” clearly focuses on non-lethal weapon application
voice with loss of the directional quality of sound perception. “Since most cultures a�ribute
inner voices either as a sign of madness, or as messages from spirits or demons, both of
which . . . evoke powerful emotional reactions”, quotes the Lowrey patent”s effect on people.
Replaying speech, with a delay impedes talking and causes stu�ering. Normal brain wave
pa�erns can be changed (or entrained), which “may cause temporary incapacitation, intense
and apparatus for inducing desired states of consciousness”, with license to Interstate
Industries and involves an auditory replication of brainwave pa�erns to entrain the EEG as
desired.[46]
Norris Patent # 5889870 “Acoustic heterodyne device and method”, directionally produces
sound on interference (or heterodyning) of two ultrasound beams.[47] The cancellation leaves
the carried audible sound perceivable. The effect becomes apparent particularly within
cavities such as the ear canal. An individual readily understands communication across a
noisy crowed room without nearby discernment. Sound can also be produced from mid-air or
American Technology Corporation, which licensed this patent, has an acoustic non-lethal
weapons technology,[48] a cooperative agreement with the Army Research & Development
corporation”s Long Range Acoustic Devices (LRADTM) account for 60% of military sales, and
have integration into the Navy”s situational awareness & radar surveillance systems[51] with
deployment on naval vessels and fleet harbors.[52] A popular magazine writer describes the
device”s inner nature of sound perception.[53] From separate references, non-lethal weapons
treatments affirm sound localization and individual ultrasound effect limitation[54] with obvious
4 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
lack of nearby discernment;[55] the la�er by a non-lethal weapons program director. A similar
ultrasound method of limiting sound to one person, Audio Spotlight is marketed, with
exhibition at Boston”s Museum of Science and the Smithsonian National Air & Space
Museum.[56] Both the American Technology device and Audio Spotlight are discussed in an
article with some history of ultrasound acoustics, which has origins in sonar.[57] Other
The maintenance of effects on people requires obstacle penetration and target tracking.
These internal voice capable energy forms penetrate obstruction and can be localized. Sound
intensity carrier wave is unnoticed. Solid defect inspection is one use of ultrasound, which is
being developed to discern movement through walls.[60] Common technology utilizes the
microwave hearing spectrum, which partly or completely encompasses cell phone,[61][62] TV,
and radar frequencies.[63] Commercial signals are not perceived, since the hearing effect
requires pulsation within the limits that elicit perception. A variety of antennae localize the
“compatible for mobile platforms with DEWs,” (Directed Energy Weapons) includes a modified
Hablov Patent # 5448501 “Electronic life detection system” is for microwave radar within the
hearing spectrum that finds and distinguishes individuals through obstruction.[67] Therein is
frequency analysis . . . forms a type of “electronic fingerprint” of the living being with
Though this patent has use in trapped victim rescue, another Hablov et. al. Patent # 5530429
The Hablov et. al. patents discern people thru structures by vital organ motion, but others
offer more detailed imaging. Fullerton et. al. Patent # 6400307 “System and method for
intrusion detection using a time domain radar array” is such a design,[70] and is commercially
available as RadarVision by Time Domain.[71] Further designs for imaging within structures
International Society for Optical Engineering.[73][74] Software for displaying radar detection
Rowan Patent # 4893815 “Interactive transector device commercial and military grade”
describes the acquisition, locking onto, and tracking of human targets.[76] Stated therein:
individuals within a group without affecting other members of the group” is stated. Laser,
radar, infrared, and acoustic sensor fusion is utilized to identify, seek, and locate targets.
Locking illumination upon the target until weapons engagement accomplishes tracking.
Another target tracking system is the Manportable Surveillance and Target Acquisition Radar
by Systems & Electronics, Inc., which is capable of tracking moving targets including
personnel. This system has an auto target track feature, and lists moving target detection as
A track initiation processor acquires a target, while a data association filter maintains a
tracking lock on the target.[78] An original method for target tracking is the Kalman filter.
Numerous weapons guidance examples utilize similar processes and illuminate targets for
tracking. Laser illumination is also used for non-human targets.[79] Other examples utilize
tracking systems have nanosecond to microsecond response times. Such responses do not
require a wide scan area to lock illumination upon persons at achievable speeds. At 90 miles
[edit] DISCUSSION
microwave hearing literature. Internal voice non-lethal weapon applications are discussed in
many of the citations. There are examples of either existence or sales of non-lethal weapons
based on both technologies. Numerous designs involving human location, identification, and
Advertisements
REPORT THIS AD
tracking methods, have long demonstrated the feasibility of constructing devices capable of
Many people who report experiencing remote behavioral influence also perceive mind
reading. Thought reading capacity, or brain wave analysis word recognition, is seriously
5 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
reported. Publications by a Stanford group support and report recognition of specific words
publications lack reference to a 1975 US government technical report of prior results from
Stanford comparable to the recent articles,[88] and an apparent Russian report of specific
syllables of “a content of category which the testee wishes to speak” quotes Kiyuna et. al.
Patent # 5785653 “System and method for predicting internal condition of live body.”[90] A
stated use: “the present invention may be use (sic) to detect the internal condition of
surveillance in criminal investigation” by EEG. NEC Corporation licensed this patent. Remote
EEG communication with Armed Forces or clandestine application are the cited uses for
Mardirossian Patent # 6011991 “Communication system and method including brain wave
analysis and/or use of brain activity.”[91] This patent affirms EEG word recognition, proposes
transmi�er capable skin implants, utilizes neural networks (artificial intelligence), and is
Activation of brain cell assemblies provides a theoretical framework[92] for the above word
differentiation. These differentiation reports themselves are consistent with specific word
recognition, since their basis is by visual analysis of averaged categories, without the use of
sophisticated computer programs as are essential for specific word recognition. Based on
EEG/MEG responses, words can be differentiated as to length,[93] and visual nouns can be
names from common nouns,[99] animal names from numerals,[100] or content from function
words.[101][102][103][104] Face, arm, or leg action verbs are reported distinguished by brain
Some of these word category differentiation reports are consistent with both the specific
actual movement are detectable by EEG. [116][117] EEG movement signals have been used
to move a cursor left or right,[118] and just the imagination of movement is sufficiently
robots through simulated rooms by EEG detection of imagining the spinning of cubes or arm
reaching robot arm control has been achieved by signals from implanted brain electrodes in
monkeys without body arm movement.[124] A number of groups have developed procedures
to detect deception based on the P300 (positive @ 300 millisec.) event related potential
[131] which includes analysis of a late negative ERP potential and frequency analysis in
addition to the P300, even asserts 100% accuracy over five separate studies.[132] [133] [134]
[135] [136][137]
Functional magnetic resonance imaging (fMRI) studies also report differentiation of cognitive
states. Different fMRI brain activation loci for face, natural and manufactured object
categories for fish, four legged animals, trees, flowers, fruits, vegetables, family members,
occupations, tools, kitchen items, dwellings, and building parts is reported.[139] Distinguishing
truthful from deceptive responses by fMRI is also reported.[140] [141] [142] [143] The ability
to discern the state of romantic love towards an individual by fMRI has report as well.[144]
The research arm of agencies with missions to covertly acquire information would certainly
develop to operational capability any technologic thought reading potential. Assertions that
such development has progressed are multiple, and two are confirmed by details of the 1975
government EEG specific word recognition report, which itself is evidence of development
synopsis states EEG computer mind reading development by Lawrence Pinneo in 1974 at
Manpower, Health, and Public Affairs, Robert L. Gilliat in 1976 affirmed brain wave reading by
Operations Forces (SOF) article: “One day, SOF commandos may be capable of
and psychic warfare” Although contemplated in future context, the availability of a technology
In 1976, the Malech Patent # 3951134 “Apparatus and method for remotely monitoring and
altering brain waves” was granted.[148] Example of operation is at 100 and 210 MHz;
frequencies penetrating obstruction. “The individual components of the system for monitoring
and controlling brain wave activity may be of conventional type commonly employed in radar”;
and “The system permits medical diagnosis of patients, inaccessible to physicians, from
remote stations” are quotes indicating remote capacity. License is to Dorne & Margolin Inc.,
but now protection is expired with public domain. The Malech patent utilizes interference of
6 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
210 and 100 MHz frequencies resulting in a 110 MHz return signal, which is demodulated to
ultrashort pulses, which are not part of the Malech patent.[149] Ultrashort pulses are currently
defined in the range of 10-12 to 10-15 second. Considering that EEG word elicited potentials
are comparatively long (hundreds of milliseconds), indicates that remote radar EEG capture is
adequate to word recognition, with ultrashort pulses allowing some 109 or more radar
contemplated.143 The above patent can alter brain waves as well as detect them. Microwave
The above EEG telemetry patent and ultrashort pulse method are by active radar probe. Yet a
passive field extends as far as 12 feet from man as detected by a cryogenic antenna.[152] A
technical article maintains this device as entirely adaptable to clandestine applications, and
pointedly comments on the disappearance of physiological remote sensing literature since the
1970″s for animals and humans, while all other categories of remote sensing research greatly
expanded.[153]
[edit] DISCUSSION
in the face of complaints, as has been the dismissal of internal voice capacity. Considerable
capacity to detect and differentiate mental states is evident from literature reports particularly
by EEG. The fact that EEG movement imagination signals are detected for robot guidance on
a voluntary unprompted basis[121] [122] [123] suggests a similar capacity is feasible for
specific EEG word identification, which has only been reported for word prompted responses.
Though references to remote EEG are less, they provide plausibly exploitable mechanisms,
TECHNOLOGIES
Disarmament affirm the reality of microwave weapon nervous system effects.[154] European
Parliament passage of resolutions calling for conventions regulating non-lethal weapons and
the banning of “weapons which might enable any form of manipulation of human
Frequency Active Auroral Research Project, which has environmental consequences, and
although utilizing high frequency, ionospheric extra low frequencies (ELF) emanation results.
Since ELF is within brain wave frequencies the project has capacity to influence whole
government panel about the potential for thought reading and such a remote capacity.[160]
An American draft law prohibiting land, sea, or space-based weapons using electromagnetic,
targeted populations for the purpose of information war, mood management, or mind control”
has not yet passed.[161] Russian electromagnetic standards are nearly 1000 times lower
than the West, so their weapon law forbidding electromagnetic weapons exceeding Health
Department parameters is strict.[162] The Russian draft law explicitly references behavioral
The microwave irradiation of the American Embassy in Moscow received li�le publicity until
the winter of 1976 instillation of protective screening, but irradiation was known since 1953.34
Original frequencies were 2.56-4.1 GHz with additional intermi�ent 0.6-9.5 GHz signals being
permanent by 1975 in a wide band frequency hopping[h] consistent pa�ern with one signal
pulsating. The irradiation was directional from nearby buildings and modulated. Complaint to
the Soviets had no avail, but the signals disappeared in January 1979 “reportedly as a result
of a fire in one or more of the buildings.”[165] A 9-11 GHz signal recurred in 1988.[166]
Observed frequencies are basically within the microwave hearing spectrum, and pulsation is
required. Psychiatric cases occurred during the exposure period, though no epidemiologic
relationship was revealed with fully a quarter of the medical records unavailable, and
comparison with other Soviet Bloc posts.159 The CIA had Dr. Milton Zaret review medical
Soviet microwave literature to determine the purpose of the irradiation. He concluded the
Russians “believed the beam would modify the behavior of the personnel.”[167] In 1976 the
The most documented citizen microwave irradiation was of peace protesters at Greenham
Common American Air Force Base in Berkshire England, who prompted investigation of
experience up to a hundred times the background level, and rose sharply on protests nearer
the base.160 Symptoms became pronounced on cruise missile transport, a protest focus.160
Recorded were wide ranging complaints: skin burns; “severe” headaches; drowsiness;
postmenopausal menstruation. The symptom complex fits well with electromagnetic exposure
7 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
syndrome 160 It has also been reported that some of the women “heard voices.”[169] The
Criminal directed energy weapon use has been reported in Germany.[170] In a number of
cases there is similarity of circumstances, complaints, and symptoms. In at least one case
microwave fields have been measured with exclusion of the usual sources (cell phone towers,
etc.)[171] Plans for construction of a crude device from a microwave oven are sold.[170]
[172] The intensity ranged from 7 mV in an adjacent room to 35 mV next to the head. The
victim suffered from multiple personality disorder a�ributed to ritual abuse, and claimed an
Ultrasound behavioral influence technology use in Northern Ireland is cited [173] The device
could focus on one person; and utilized ultrasound cancellation like those patented. It was
employed in Vietnam by the Americans, and is known as the squawk box. Mentioned
infrasound frequency (ultrasound carrier directed) is like Loos 1/25/00 patent, with
“When the two frequencies mix in the human ear they become intolerable. Some people
exposed to the device are said to feel giddy or nauseous and in extreme cases they faint.
Most people are intensely annoyed by the device and have a compelling wish to be
somewhere else.” [174] British police inventories list the specific device, though a spokesman
denied use.[166]
prominent. This is a largely classified employee victim study with internal voice transmission
avowal.[175]
CONCLUSION
The logic in the prediction by Brzezinski[176] of the appearance of a more controlled and
directed society dominated by a power elite willing to use the latest modern techniques for
Potential behavioral influence targets are multiple. Since those supposedly expert regard a
victim”s perceptions as psychotic, all complaints are disregarded, not to mention capability to
bear witness. Targets may include anyone worth neutralization: domestic adversaries;[177]
security risks, which may only comprise classified disclosures; persons witnessing serious
which can be sealed, and this prerogative is only accountable to co-equal branches of
government as is now the case with terrorism suspects. Internal voice technology is most
applicable within the same language and culture. Space here limits more than mention of
remote EEG influence capacity, hypnosis, and footnoting remote subliminal technique.
[178] Remote behavioral influence research has long been funded by the US,39 with
national security grounds project results37 and foreign literature analyses.[179] Some thirty
awareness ensures effective neutralization of the afflicted. Not all those affected are
The medical community has long heard either identical or similar complaint[184] to that above
delineated as known internal voice technology from numerous victims. This fact indicts the
major psychosis other than “voices.” [185] All of society should be disturbed at the prospect of
technologic induction of voice, since the unaware subject would perceive such voices as his
It is difficult to deny the level of substantiation for the possibility that a thought reading
capacity exists, even with references that support a remote basis. The logic that in the thirty
years since the Pinneo work started, this capability has had full development is too sound to
dismiss victim corroboration. It would have to be admi�ed that funding for projects by the
defense and security agencies is considerably greater than for open science, and that thought
reading would be a priority area. Educated democracies should not be complacent at this
prospect, given the potential for political control, and existence of a remote EEG method in
Acknowledgements: Thanks are given to God for inspiration, and a benefactor of Christians
Against Mental Slavery for financial support. There is gratitude also to Dr. Paul Canner, and
Each is free
Pinneo LR and Hall DJ. “Feasibility Study for Design of a Biocybernetic Communication
8 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
[edit] References
Phone- 410-539-5140.
2. ↑ Financial contribution to this article was made by fellow members of Christians Against
Mental Slavery.
3. ↑ Citizens Against Human Rights Abuse, Director, Cheryl Welsh, – 915 Zaragoza Street,
welsh@dcn.davis.ca.us
Chirkovoi, Korpus 1006, Kvrtira 363, Moscow Zelenograd, Russia 103575. Website at
6. ↑ International Movement for the Ban of Manipulation of the Human Nervous System by
Technologic Means, Founder, Mojmir Babacek, P. O. Box 52, 51101 Turnov, Czech Republic,
Email is mbabacek@iol.cz
7. ↑ American discovery may not be the first. Soviet and East European electromagnetic
bioeffect literature is prior, more extensive, and transparent. A translated Russian treatment is
the next text reference, which refers to F. Cazzamalli, an Italian, who mentioned
8. ↑ Presman AS. Electromagnetic Fields and Life Plenum, New York-London, 1970.
Presman mentions Cazzimalli and another English reference to this Italian work is at
10. ↑ Stocklin PL. Patent #4858612 “Hearing device” USPTO granted 8/22/89.
11. ↑ Frey AH and Messenger R. “Human Perception of Illumination with Pulsed Ultrahigh-
12. ↑ Eichert ES and Frey AH. “Human Auditory System Response to Lower Power Density
13. ↑ Michaelson SM. “Sensation and Perception of Microwave Energy” In: Michaelson SM,
Miller MW, Magin R, and Carstensen EL (eds.) Fundamental and Applied Aspects of
15. ↑ Hermann DM and Hossman K-A. “Neurological effects of microwave exposure related
(ed.) Advances in Electromagnetic Fields in Living Systems vol 1, Plenum, N Y & London, p
27-80, 1994.
17. ↑ Elder JA and Chou CK. “Auditory Responses to Pulsed Radiofrequency Energy”
18. ↑ Kreithen ML. Patent #5774088 “Method and system for warning birds of hazards”
19. ↑ Lenhadt ML and Ochs AL. Patent #6250255 “Methods and apparatus for alerting
20. ↑ Nordwall BD. “Radar Warns Birds of Impending Aircraft” Aviation Wk Space Technol
h�p://call.army.mil/products//thesaur/00016275.htm (h�p://call.army.mil/products//thesaur/00016275.htm)
22. ↑ Justesen DR. “Microwaves and Behavior” Am Psychologist, 392(Mar): 391-401, 1975.
23. ↑ Lin JC. Microwave Auditory Effects and Applications Thomas, Springfield Ill, p 176,
1978.
24. ↑ “Surveillance Technology, 1976: policy and implications, an analysis and compendium
the Judiciary. United States Senate, Ninety-fourth Congress, second session, p 1280, US
25. ↑ Oskar KJ. “Effects of low power microwaves on the local cerebral blood flow of
conscious rats” Army Mobility Equipment Command Report,. # AD-A090426, 1980. Available
26. ↑ Brunkan WB. Patent #4877027 “Hearing system” USPTO granted 10/31/89.
27. ↑ Frey AH. “Behavioral Biophysics” Psychol Bull 63(5): 322-37, 1965.
29. ↑ Stocklin PL and Stocklin BF. “Possible Microwave Mechanisms of the Mammalian
31. ↑ Adey WR. “Biological Effects of Low Energy Electromagnetic Fields On the Central
Nervous System” NATO Advanced Study Institute on Advances in Biological Effects and
9 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
Dosimetry of Low Energy Electromagnetic Fields Erice Italy, Plenum, p 359-391, 1981.
32. ↑ Shepherd GM. Neurobiology 2nd ed. Oxford Univ. Press, New York-Oxford, p146-7,
1988.
34. ↑ Puharich HK and Lawrence JL. Patent #3629521″Hearing systems” USPTO granted
12/21/71.
35. ↑ Flanagan GP. Patent #3393279 “Nervous System Excitation Device” USPTO granted
7/16/68.
36. ↑ Frolich H. “The Biological Effects of Microwaves and Related Quiestions” Adv
37. ↑ Steneck NH. The Microwave Debate MIT Press Cambridge, Mass, London Eng, 1984.
38. ↑ Becker RO. Cross Currents Jeremy P. Tarcher, Inc, Los Angeles, St Martin”s Press, p
39. ↑ Kohn B. “Communicating Via the Microwave Auditory Effect” Defense Department
htm
usafletr.jpg
41. ↑ Castelli CJ. “Questions Linger about Health Effects of DOD”s “Non-Lethal Ray” Inside
42. ↑ Becker RO and Selden G. The Body Electric: Electromagnetism and the Foundation of
Life Quill William Morrow, New York, p 319 & 320, 1985.
43. ↑ Also called S-quad, Silent Sounds, Inc. licensed Lowery Patent #5159703 “Silent
subliminal presentation system”, and has advanced brain wave entrainment technology (vide
44. ↑ Lowery OM. Patent #5159703 “Silent subliminal presentation system” USPTO granted
10/27/92.
45. ↑ Lowrey A. Patent #6052336 “Apparatus and method of broadcasting audible sound
46. ↑ Monroe RA. Patent #5356368 Method of and apparatus for inducing desired states of
47. ↑ Norris EG. Patent #5889870 “Acoustic Heterodyne device and method” USPTO
granted 3/20/99.
49. ↑ American Technology Corporation Shareholder Alert, press release of 4/23/03 at h�p://
h�p://www.atcsd.com/PressReleases/04_23_03.html (h�p://www.atcsd.com/PressReleases/04_23_03.html)
h�p://www.atcsd.com/PressReleases/05_30_03.html (h�p://www.atcsd.com/PressReleases/05_30_03.html)
51. ↑ American Technology Corporation Awarded Key Military Contract to Deliver Modified
Long Range Acoustic Devices (LRADTM) press release of 10/21/03 at h�p://www.atcsd.com/ (h�p://www.atcsd.com/)
PressReleases/10_21_03.html
53. ↑ Sparrow D. “Best of What”s New Grand Award Winner: Hypersonic Sound” Popular
h�p://www.popsci.com/popsci/bown/article/0,16106,388134,00.html (h�p://www.popsci.com/popsci/bown/article/0,16106,388134,00.html)
54. ↑ Bunker RJ (ed.) Less-than-lethal Weapons: Reference Guidebook Los Angles Calif
{National Law Enforcemnt and Corrections Technology, Western Region}, 2000. Similar
treatment is Bunker RJ (ed.) “Nonlethal Weapons Terms and References” INSS Occasional
Paper 15, USAF Institute for National Security Studies, USAF Academy, Colorodo at
55. ↑ Alexander JB. Future War: Non-Lethal Weapons in Twenty-First-Century Warfare, St.
56. ↑ Audio Spotlight, Holosonic Research Labs, 51 Water Street Watertown, MA 02472 at
h�p://www.holosonics.com/ (h�p://www.holosonics.com/)
57. ↑ Lawton G. “They are playing my tune” New Scientist 9 Sept. p 38-42, 2000.
58. ↑ Loos Patent # 6017302 “Subliminal acoustic manipulation of nervous system” can
frequency near ” Hz used. The effects of the 2.5 Hz resonance include slowing of certain
59. ↑ Loos HG. Patent #6017302 “Subliminal acoustic manipulation of nervous systems”
61. ↑ Frey AH. “Headaches from Cellular Telephones: Are They Real and What Are the
62. ↑ Lin JC, “Cellular Telephones and Their Effect on the Human Brain” Mob Comput and
h�p://www.eecs.uic.edu/eecspeople/lin_acm3.htm (h�p://www.eecs.uic.edu/eecspeople/lin_acm3.htm)
63. ↑ Nolan PJ, Fundaments of College Physics Wm. C. Brown: Dubuque, Iowa, Melbourne,
10 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
64. ↑ Reits BJ. Patent #5736966 “Adjustable microwave antenna” USPTO granted 4/7/98.
65. ↑ Maier G and Harrison D. Patent #5825554 “Lenses with a variable refraction index”
67. ↑ Hablov DV, Fisun OI, Lupichev LN, Osipov VV, Schestiperov VA, and Schimko R.
68. ↑ Hablov DV, Fisun OI, Lupichev LN, Osipov VV, Schestiperov VA, and Schimko R.
69. ↑ Giori FA and Winterberger AR. “Remote Physiological Monitoring Using a Microwave
70. ↑ Fullerton LW and Richards JI. Patent #6400307 “System and method for intrusion
71. ↑ Time Domain Corporation, Cummings Research Park, 7057 Old Madison Pike, Suite
h�p://www.timedomain.com/ (h�p://www.timedomain.com/)
73. ↑ Ferris DD. “Microwave and millimeter-wave systems for wall penetration” SPIE
74. ↑ Frazier LM. “Surveillance through walls and other opaque materials” SPIE Proceedings
76. ↑ Rowan L. Patent #4893815 “Interactive transector device commercial and military
77. ↑ Systems & Electronics Inc., 201 Evans Ave., St. Louis MO 63121, Manportable
78. ↑ Brookner E. Tracking and Kalman Filtering Made Easy Wiley, New York, 1998.
79. ↑ Tisdale GE and Lindemann HB. Patent #4497065 “Target recognition system
80. ↑ Peralta EA and Rei� KM. Patent #4562439 “Imaging radar seeker” USPTO granted
12/31/85.
81. ↑ Ahlstrom LGW. Patent #4796834 “Method for combating of targets and projectile or
82. ↑ Suppes P, Lu Z, and Han B. “Brain wave recognition of words” Proc Natl Acad Sci 94:
h�p://www.pnas.org/cgi/content/full/94/26/14965 (h�p://www.pnas.org/cgi/content/full/94/26/14965)
83. ↑ Suppes P, Han B, and Lu Z. “Brain-wave recognition of sentences” Proc Natl Acad Sci
h�p://www.pnas.org/cgi/content/full/95/26/15861 (h�p://www.pnas.org/cgi/content/full/95/26/15861)
simple visual images and their names” Proc Natl Acad Sci 96: 14658-63, 1999. Printable free
85. ↑ Suppes P, Han B, Epelboim J, and Lu ZL. “Invariance between subjects of brain wave
representations of language” Proc Natl Acad Sci 96(22): 12953-8, 1999. Printable free online
sine waves” Proc Natl Acad Sci 97: 8738-43, 2000. Printable free online thru Pubmed or at
h�p://www.pnas.org/cgi/content/full/97/15/8738 (h�p://www.pnas.org/cgi/content/full/97/15/8738)
Neuromagnetic Brain Activity” In: Wermter S, Austin J, and Willahaw D (eds.) Lecture Notes in
h�p://www.his.sunderland.ac.uk/durhamab/ramin.doc (h�p://www.his.sunderland.ac.uk/durhamab/ramin.doc)
88. ↑ Pinneo LR and Hall DJ. “Feasibility Study for Design of a Biocybernetic
Prepared for the Advanced Research Projects Agency Order #2034, Program Code #2D20,
89. ↑ Selden G. “Machines That Read Minds” Sci Digest Oct 89: 60-6, 1981. Also at
h�p://www.datafilter.com/mc/machinesThatReadMinds.html (h�p://www.datafilter.com/mc/machinesThatReadMinds.html)
90. ↑ Kiyuna T, Tanigawa T, and Yamazaki T. Patent #5785653 “System and method for
91. ↑ Mardirossian A. Patent #6011991 “Communication system and method including brain
92. ↑ Pulvermuller F. “Words in the brain”s language” Behav Brain Sci 22: 253-336, 1999.
distinguish between nouns and verbs” Neurosci Le� 197: 81-3, 1995.
determines word-class specific activity in the human brain?” Neurosci Le� 275: 81-4, 1999.
96. ↑ Pulvermuller F, Lu�enberger W, and Preissl H. “Nouns and Verbs in the Intact Brain:
11 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
98. ↑ Kellenbach ML, Wijers AA, Hovius M, Mulder J, and Mulder G. “Neural Differentiation
spoken nouns, proper names and one”s own name” Neuroreport 8: 221-5, 1996.
101. ↑ Neville HJ, Mills D, and Lawson DS. “Fractionating Language: Different Neural
103. ↑ Mohr B, Pulvermuller F, and Zaidel E. “Lexical Decision After Left, Right, and Bilateral
104. ↑ Munte TF, Wieringa BM, Weyerts H, Szentkuti A, Ma�ke M, and Johannes S.
“Differences in brain potentials to open and closed class words: class and frequency effects”
Neruophysiological Correlates of Action Verb Processing” Brain Lang 78: 143-68, 2001.
107. ↑ Kounios J and Holcomb PJ. “Concreteness Effects in Semantic Processing: ERP
108. ↑ Federmeier KD, Segal JB, Lombrozo T, and Kutas M. “Brain responses to nouns,
109. ↑ Krause CM, Korpilahti P, Porn B, Joskim J, and Lang HA. “Automatic auditory word
1998.
110. ↑ Diesch E, Biermann S, and Luce T. “The magnetic mismatch field elicited by words
distinct pa�erns of 30-Hz EEG responses” Neurosci Le� 176: 115-18, 1994.
potentials during picture and word categorization” Mem Cog 29(1): 100-16, 2001.
114. ↑ Skrandies W and Chiu MJ. “Dimensions of affective meaning ” behavioral evoked
115. ↑ Pa�on RE. Patent #6292688 “Method and apparatus for analyzing neurological
supplementary motor area and motor cortex” Ciba Found Symp 182:132-231, 1987.
117. ↑ Chen R. and Halle� M. “The Time Course of Changes in Motor Cortex Excitability
Associated with Voluntary Movement” Can J Neurol Sci 26(3): 163-9, 1999.
118. ↑ Pfurtscheller G, Kalcher J, Neuper CH, Flo�inger D, and Pregenzer M. “On-line EEG
119. ↑ Birch GE. “Initial On-Line Evaluations of the LF-ASD Brain-Computer Interface With
Able Bodied and Spinal-Cord Subjects Using Imagined Voluntary Motor Potentials” IEEE
Brain-Computer Interface (BCI)” In: B”hler C and Knops H (eds.) Assistive Technology
121. ↑ 121.0 121.1 Millan JR. “Adaptive Brain Interfaces” Communications of the ACM 46(3):
122. ↑ 122.0 122.1 Millan JR and Mourifio J. “Asynchronous BCI and Local Neural
Classifiers: An Overview of the Adaptive Brain Interface Project” IEEE Transactions on Neural
123. ↑ 123.0 123.1 Millan JR, Renkens F, Mourifio J, and Gerstner W. “Non-Invasive Brain-
Actuated Control of a Mobile Robot” Proceedings of the 18th Joint International Conference
ftp://ftp.idiap.ch/pub/reports/2003/millan_2003_ijcai.pdf
124. ↑ Carmens JM, Lebedev MA, Crist RE, O”Doherty JE, Santucci DM, Dimitrov DF, Patil
PG, Henriques CS, and Nicolelis MAL. “Learning to Control a Brain-Machine Interface for
Reaching and Grasping by Primates” Public Library of Science, Biology Oct 1(1). 2003 at
125. ↑ Farwell LA and Donchin E. “The Truth Will Out: Interrogative Polygraphy (“Lie
detection in the laboratory II. Utilization of non-selective activation of relevant knowledge” Int J
12 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
127. ↑ Rosenfeld JP, Ellwanger J, and Sweet J. “Detecting simulated amnesia with eventrelated
128. ↑ Allen JJB and Iacono WG. “A Comparison of methods for the analysis of event-related
129. ↑ Lorenz J, Kunze K, and Bromm B. “Differentiation of conversive sensory loss and
130. ↑ Tardif HP, Barry RJ, and Johnstone SJ. ” Event-related potentials reveal processing
differences in honest vs. malingered memory performance” Int J Psychophysiol 46: 147-58,
2002.
131. ↑ Brain Fingerprinting Laboratories, Inc., 108 West Palm Drive, Fairfield, IA 52556 at
h�p://www.brainwavescience.com/ (h�p://www.brainwavescience.com/)
132. ↑ Farwell LA and Smith SS. “Using Brain MERMER Testing to Detect Knowledge
133. ↑ Farwell LA. “Two new twists on the truth detector: brain-wave detection of
134. ↑ Farwell LA. Patent #5363858 “Method and apparatus for multifaceted
135. ↑ Farwell LA and Conte FL. Patent #5406956 “Method and apparatus for truth detection”
136. ↑ Farwell LA and Conte FL. Patent #5467777 “Method for electroencephalographic
137. ↑ Referred to, but unavailable, however are a CIA Office of Technology Assessment
recognition: A critical review and meta-analysis” Cog Affect Behav Neurosci 1(2): 119-36,
2001.
139. ↑ Mitchell TM, Hutchinson R, Just MA, Niculescu RS, Percira F, and Wang X.
“Classifying Instantaneous Cognitive States from fMRI Data” Am Med Informatics Assoc
140. ↑ Spence SA, Farrow TF, Herford AE, Wilkinson ID, Zheng Y, and Woodruff PW.
2001.
141. ↑ Lee TM, Liu HL, Tan LH, Chan CC, Mahankali S, Feng CM, Hou J, Fox PT, and Gao
JH. “Lie detection by functional magnetic resonance imgaging” Hum Brain Mapp 15(3):
157-64, 2002.
142. ↑ Langleben DD, Schrneder L, Maldjian JA, Gur RC, McDonald S, Ragland JD, O”Brien
CP, and Childress AR. “Brain activity during simulated deception: an event-related functional
143. ↑ Ganis G, Kosslyn SM, Stose S, Thompson WL, and Yurgelun-Todd DA. “Neural
correlates of different types of deception: an fMRI investigation” Cereb Cortex 13(8): 830-6,
2003.
144. ↑ Bartels A and Zeki S. “The neural basis of romantic love” Neuroreport 11(17): 3829-34,
2000.
Commi�ee of the Red Cross Symposium: The Medical Profession and the Effects of
Weapons, ICRC publication ref. 06681996 (The paper is available from the Health Division of
146. ↑ Brodeur, P. The Zapping of America Norton, New York, p 299 & 105, 1977.
148. ↑ Malech RG. Patent #3951134 “Apparatus and method for remotely monitoring and
149. ↑ Department of the Army, USAF Scientific Advisory Board. “New World Vistas: air and
space for the 21st century” 14 vol. (Ancillary Volume) p 89-90, 1996. Also at
h�p://www.azstarnet.com/~freetht/biologic.htm (h�p://www.azstarnet.com/~freetht/biologic.htm)
150. ↑ Morehouse DA. Nonlethal Weapons: War without Death Praeger, p 20, 1996.
151. ↑ Dando M. A New Form of Warfare: The Rise of Non-Lethal Weapons Brassey”s,
152. ↑ Taff BE and Stoller KP. Patent #49400558 “Cryogenic remote sensing physiograph”
153. ↑ Stoller KP and Taff BE. “Remote Physiological Sensing: Historical Perspective,
154. ↑ Soviet Union Draft Agreement on the Prohibition of the Development and Manufacture
of New Types of Weapons of Mass Destruction and New Systems of Such Weapons. UN
h�p://www.dcn.davis.ca.us/~welsh/9.htm (h�p://www.dcn.davis.ca.us/~welsh/9.htm)
155. ↑ European Parliament, 28.1.99 Enviroment, security, and foreign affairs , A4-0005/99
EP1159, resolutions 23, 24, & 27, January 28, 1999 . Limited excerpts at
h�p://www.raven1.net/europar.htm (h�p://www.raven1.net/europar.htm)
Role in the Mass Production of Torture, Cruel, Inhumane & Degrading Treatment. Presented
to The Expert Seminar On Security Equipment & The Prevention of Torture 25-26 October
2002 London, UK and The 16th ISODARCO Winter Course On “The Surge in Non-State
Violence: Roots Impacts & Countermeasures” 9 – 16 February, 2003, Andalo, Trento, Italy.
h�p://www.isodarco.it/html/andalo03-wright.html (h�p://www.isodarco.it/html/andalo03-wright.html)
13 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
157. ↑ Begich N and Manning J. Angels Don”t Play This HAARP: Advances in Telsa
158. ↑ Persinger MA. “On te Possibility of Directly Accessing Every Human Brain By
1995.
159. ↑ Viking Press, New York, p 57 & 252, 1970. Article also at h�p://www.bariumblues.com/ (h�p://www.bariumblues.com/)
persinger.htm
160. ↑ Butler D. “Advances in neuroscience “may threaten human rights”” Nature 22 January
161. ↑ Space Preservation Act of 2001 (Introduced in the House) HR 2977 IH, 107th
h�p://www.raven1.net/govptron.htm (h�p://www.raven1.net/govptron.htm)
162. ↑ Federal Law “About Weapons” Federal Laws of the Russian Federation from 21.07.98
[1998] No. 117-F3, from 31.07.98 [“98] No. 156-F3 , from 17.12.98 [“98] No. 187-F3, from
19.11.99 [“99] No. 194-F3, from 10.04.2000 [“00] No. 52-F3, from 26.07.01 [“01] ISBN
163. ↑ Gurov AI. Federal Assembly”Parliament of the Russian Assembly, Govermental Duma,
Commi�ee on Safety, “Resolution: Regarding the draft of the Federal Law “About the
Sumission of addendum to Article 6 of the Federal Law “About Weapons” No 28/3 Nov. 30,
164. ↑ General Assembly. International Union of Radio Science “USRI Resolution on Criminal
Activities Using Electromagnetic Tools” In: Records of the USRI General Assembly, Toronto,
165. ↑ Microwave irradiation of the U.S. Embassy in Moscow: review of its history and
studies to determine whether or not related health defects were experienced by employees
166. ↑ 166.0 166.1 Smith CW and Best S. Electromagnetic Man J.M. Dent & Sons Ltd.,
167. ↑ Smith CW and Best S. Electromagnetic Man J.M. Dent & Sons Ltd., London p 211,
168. ↑ Parry G. “Doctors investigating claims of Greenham radiation cases: Peace women
169. ↑ Ramsay R. “ELF: from Mind Control to Mind Wars” Lobster 19: 23, 1990.
170. ↑ 170.0 170.1 Munzert R. “High-Tech Waffe Mikrowelle – Kriminelle Anwendungen von
h�p://www.grn.es/electropolucio/munzert6902.doc (h�p://www.grn.es/electropolucio/munzert6902.doc)
172. ↑ Gillin LM and Gillin L. “Subtle Energies, Intentionality and the Healing of Traumatically
Melborne, Australia, Sept 12-14, 2003. Internet availability of victim field measurements are
Strategies and Technologies for 21st-Century Conflict Zed Books, London & New Jersey, p
62, 1997.
174. ↑ Rodwell R. defense correspondent report “Army tests new riot weapon” New Scientist
177. ↑ Lamb C, and Swe� C. Department of Defense Directive, Non-Lethal Weapons Policy
paragraph of p 7 onto p 8.
179. ↑ Cheryl Welsh Freedom of Information Act request reply for review of Soviet literature,
180. ↑ Lopatin VN, and Tsygankov VD. Psychotronic War and the Security of Russia
h�p://www.raven1.net/russtran.htm (h�p://www.raven1.net/russtran.htm)
181. ↑ Smith C. “On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind
h�p://www.btinternet.com/~psycho_social/Vol3/JPSS-CS2.html (h�p://www.btinternet.com/~psycho_social/Vol3/JPSS-CS2.html)
182. ↑ American Psychiatric Association DSM-IV Task Force. Diagnostic and Statistical
2000.
183. ↑ Flaum M and Schul� SK. “The Core Symptoms of Schizophrenia” Ann Med 28(6):
525-31, 1996.
184. ↑ Isselbacher, KJ, Adams RD, Brunwald E, Petersdorf RG, and Wilson JD. Harrison”s
Principles of Internal Medicine Ninth Ed., McGraw-Hill, New York, p 150, 1980.
185. ↑ McMurtrey JJ. “Microwave Bioeffect Congruence with Schizophrenia” In press, 2003.
Microwav.rtf
14 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
__________________________________________________________________________________________
h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf (h�p://www.freedomfchs.com/remoteneuralmonitoring2.pdf)
vs.
Blanket coverage of all electronic communication in the U.S. and the world to ensure national
security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since
the early 1960’s. NSA technology is developed and implemented in secret from private
The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves
in the environment for wirelessly tapping into computers and tracking persons with the electrical
currents in their bodies. Signals Intelligence is based on the fact that everything in the environment
with an electric current in it has a magnetic flux around it which gives off EMF waves. The
NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all
The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might
be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by
executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist
surveillance network in place. This surveillance network is completely disguised and hidden from
the public.
Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s
electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of
thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective
operations costs.
NSA personnel serve in Quasi-public positions in their communities and run cover businesses and
legitimate businesses that can inform the intelligence community of persons they would want to
track. N.S.A. personnel in the community usually have cover identities such as social workers,
NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using
the NSA’s domestic intelligence network and cover businesses. The operations independently run
by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of
thousands of unwi�ing citizens by NSA operatives is likely to happen. NSA Domint has the ability
to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects
As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research
breakthroughs with these computers were kept for the NSA. At the present time the NSA has
The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use
artificial intelligence to screen all communications, irregardless of medium, for key words that should
be brought to the a�ention of NSA agents/cryptologists. These computers monitor all communications
at the transmi�ing and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s
The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can
monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the
With this technology NSA personnel can non-obtrusively tap into any communication device in
existence. This includes computers, telephones, radio and video-based devices, printers, car electronics,
and even the minute electrical fields in humans (for tracking individuals).
The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the
The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while
filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards
contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC
circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any
Radio and Television signals can be substituted at the receiving end with special EMF equipment.
Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence
(SIGINT) mission.
15 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.
With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs).
These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored
from a distance.
NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning
network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA
NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and
Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra
program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF)
and bioelectric research and development. The resulting secret technology is categorized at the
emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”
Signals Intelligence implemented and kept this technology secret in the same manner as other
electronic warfare programs of the U.S. government. The NSA monitors available information about
this technology and withholds scientific research from the public. There are also international
The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a
distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in
the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands
of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military
For electronic surveillance purposes electrical activity in the speech center of the brain can be
translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory
cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can
use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid
schizophrenia.
Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from
the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA
operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM
can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can
use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for
brain-programming purposes.
There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in
place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor
audio-visual information in their brain. This is all done with no physical contact with the subject. RNM
is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal
audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be
sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.
Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence
community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.
NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.
The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor
information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwa�
Neuronal activity in the brain creates a shifting electrical pa�ern that has a shifting magnetic flux. This
magnetic flux puts out a constant 30-50 hz, .5 milliwa� electromagnetic (EMF) wave. Contained in the
electromagnetic emission from the brain are spikes and pa�erns called “evoked potentials.”
Every thought, reaction, motor command, auditory event, and visual image in the brain has a
corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can
be decoded into the current thoughts, images and sounds in the subject’s brain.
information (as well as nervous system messages) to intelligence agents and also to transmit to the
EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to
trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s
neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.
Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while
transmi�ing sound to the auditory cortex (bypassing the ears) and transmi�ing faint images to the
visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the
brain).
Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA
personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the
human brain) has become the ultimate surveillance system. It is used by a limited number of agents in
RNM requires decoding the resonance frequency of each specific brain area. That frequency is then
modulated in order to impose information in That specific brain area. The frequency to which the
various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates
16 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
Resonance
Frequency
Information Induced
Through Modulation
This modulated information can be put into the brain at varying intensities from subliminal to
perceptible.
Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio
information to a person’s brain at the frequency of another person’s auditory cortex would result in that
The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the
NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to
5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM
to a�empt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their
The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also
brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time
ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against
Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere
in the country.
A system for inexpensive implementation of these operations allows for thousands of persons in every
a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for
tracking individuals and can send messages through the nervous system to affect their performance.
c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment
is on a network and is used for domestic intelligence operations, government security, and military
place spies (sometimes unwi�ingly) following and checking on subjects who have been identified
b) Agents working out of offices can be in constant communication with Spo�ers who are keeping
c) NSA Agents in remote offices can instantly identify (using RNM) any individual spo�ed in
a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the
delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA
pharmapsychology.
Fixed network of special EMF equipment that can read EEGs in human brains and identify/track
individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal
EMF equipment that gathers information from PC circuit boards by deciphering RF emissions
thereby gaining wireless modem-style entry into any personal computer in the country.
All equipment hidden, all technology secret, all scientific research unreported (as in electronic
warfare research).
Not known to the public at all, yet complete and thorough implementation of this method of
Resources
These publications have only been discovered since December 1991, after Plaintiff had already notified
authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was
taken against the NSA employees I researched the Intelligence Community electronic surveillance
technology involved and discovered the following publications: The Body Electric
“Remote computer tampering using the RF emissions from the logic board.”
p. 27/93. Driving brain electrical activity with external E-M, Magnetophosphenes, Delgado.
17 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
Molecule Computers
p. 258, EEG Systems Inc., decoding brain E-M emanations, tracking thoughts on a computer.
Psychiatry and the C.I.A.: Victims of Mind Control by Harvey M. Weinstein. M.D.
Journey Into Madness: Ihe True Story of Secret CIA Mind Control and Medical Abuse, by Gordon
Thomas
p. 127/276/116, 168-69. Intelligence R & D. Delgado. Psychic driving with radio telemetry.
___________________________________________________________________________________________
Now read this and see how the Gangstalking Work Hand in Hand with eventual Entrainment for prostitution Gansgtalking
to break you Down causl Entrainment for neural identification then Enslavemenet with Remote Neural Monitoring / Influenicng
h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers2 (h�p://groups.yahoo.com/group/NewWorldOrderWhistleBlowers2)
18 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
via rr (links at the end)GANG STALKING TECH … EVERYTHING YOU NEED TO KNOW!!!!!!!
“I was eventually offered a place in the syndicate. The syndicate was presented to me as a kind of fraternity, a masonic-like mutual profit organization with strong police- like overtones. I was told that I was helping to build a be�er society. However, I have never been given any of the advancement opportunities
I was promised.The “advancement system” of the syndicate is a slippery slope. They make you give up your security priveliges, so eventually all of your communications are watched (which is why I composed this email offline where they can’t see me, and sent it via an internet cafe) and you have to a�end
meeting after meeting of mind-numbing pledges and chants. The premise is that if you sign contracts giving up personal liberties for the group, and you are genuinely innocent, then you will be promoted. I have only been promoted once, to the rank of manager, and I don’t feel as if it is a rewarding experience.
Worse, you are never allowed to leave because they think you will give away secrets. Leaving is only permissible with a special contract that permits the syndicate to destroy your credibility (usually they make sure that the most a�ention any secrets that you reveal get is from crackpot UFO magazines, or
diagnose you with schizophrenia).
There are other problems. If you have children, you have to send them to education in syndicate owned schools. If you have a wife, you have to report on her, allow her to be spied upon, and be prepared to target her if they decide to turn her into a TI. The official “compensation” policy is that you will get to keep
the children if she lodges a divorce. However, you won’t get to keep most of her material goods. They only want her to lose in the divorce proceedings so she gets nothing, not so the husband gets anything, so the syndicate takes it back as a tithe.
I suppose I should introduce the syndicate in a li�le more detail. I’m still not sure precisely what it is trying to do. [Blog Author note: It depends on the person selected and who initiated the campaign. In my case, CR is a Psychopath who likes to abuse women and this is the method he employs to do it. There are
also different groups doing this that are not necessarily connected and whose motivations are different.] To everyday citizens, it presents itself as a group trying to monitor terrorists (or any other kind of flavour-of-the-month undesirables like gays/communists/witches) and drive them out. To other people, its a
rotary club/chamber of commerce type operation. To others still, the most twisted conspiratorial minds, it is an organization that pulls the strings behind everything. To the puritan, it is a cleansing force. To the deviant, it is a gang of other deviants where everything is permissible. It’s the syndicate to everyone,
though. I
don’t know the extent of what it owns.
I do, however, know a great deal about the targeting process. When we get targets, we divide them into four categories: mercenary, practice, planning, and enemy. Mercenary targets are bought by outside parties. We advertise under a range of guises, from ads by “individuals” claiming to be able to kidnap
people, to practical jokers. Some groups, like big corporations and some governments (the government of Xxxxxx pays us to keep some people busy, so do the Xxxxxxs when they have too many people protesting whaling) know fully well what sort of services we do, so we don’t really hide them. [Blog Author
note: Certain unethical PI firms are actively involved. I know of two. One has become a national firm simply because they were rewarded by CR for participating in his campaign against me and the other is a large multi-national firm where CR has very high level connections. He has also spawned another firm
involved in online “identity theft protection”. –
Ironic given his predilection for stealing and abusing people’s identities.]
We get a lot of money from them, but we can still muster up a fair bit if worst comes to worst. I’m not sure so much about the NWO theory. Maybe the Xxxxxxx count, but you’d be surprised at how much money we can get from crime. [Blog Author note: CR agrees. He was responsible for two major thefts
ne�ing him 1.3 million dollars each. One was an Art Theft and the other a Jewellery Theft (from close friends).] I don’t mean that we go out robbing people, but we can outsource money from biker gangs/skinheads/drug dealers pre�y easily. [Blog Author note: And from Government Grants when one is
connected as well as CR.] Our syndicate gets a lot of support from people in rough areas like Xxxxxx and Xxxx’s Xxxx. Because there are areas with a lot of people in genuine need, who would leap at the thought of fighting back at the criminals, we can always find allies to pressure the criminal portions of
society. Of course, they are only pressuring them into giving
us money, but it’s a pre�y cozy arrangement. [Blog Author note: Sure it’s cozy. It’s called blackmail but what are the criminals going to do? Report it to the police?]
The second type of target is the practice target. We use them to train mobs. The targets don’t actually change, because we don’t want TOO many people fighting back at us. But we do rotate trainees between practice targets. This stops the person seeing the same people every time there’s a street show.
Then there are planning targets. These are selected by the syndicate for some reason or rather but aren’t paid for by mercenaries. You can usually tell the difference between planning and practice targets because they send people with experience after them. They’re still chosen by the same people though. The
practice ones are of course chosen for their timidity. I don’t know how the planning ones are chosen.
Enemy targets are people that decide they’ve had enough and turn against us. Since they protest and try to foil our plans (which, considering that our jobs are already nervy, is a real pain in the arse), we try to really give them hell. The best way, of course, is through the psychs. My supervisor used to say that
the Soviets had it right with Sluggishly Progressing Schizophrenia. [Blog Author note: CR figured this out in 1958 through his “friendly” (if that’s even possible) association with Dr. Ewan Cameron of MKUltra fame and his use of this strategy against his earlier victim GG who I believe ended up an
MKUltra victim.]
Some people up-top are proposing that we just kill them and have them declared Natural Causes or Accidental by the coroner. It isn’t likely to happen, though. [Blog Author note: CR has killed at least three people who got in his way. So some people at the top are in fact doing this. Of course, CR doesn’t hire
“syndicates”. He is his own syndicate and has put together his own organization for this purpose. His targets are innocent women associated with controversial figures. In only one case has he violated this rule and in this case the woman was as guilty as the man – of course he’s not obsessing over the man…
he’s too gutless to do that. And the people who were killed were all men who got in the way of his hate campaign against a woman he targeted. My guess is that he kills them when he loses control over them because he’s basically afraid of men.]
Anyway, I should introduce the main branches of the syndicate. Each branch recruits its own (everybody is a member of one of the branches) instead of people just joining a common pool. This keeps the work separate and stops people from finding stuff out that they shouldn’t.
My branch is the Scripting, Observation, and Execution Bureau (or “The Theatre” as it is popularly known). By execution, I mean the execution of orders, not the other kind. We do the work that the majority of people with any knowledge of gang stalking will be familiar with: pestering and scripting minor
incidents.
The Theatre is actually divided into two sub-branches: Scripting Orchestration Officers (or “playwrights” as they call themselves) and Field Officers (or “thespians” as we call ourselves).
We have the most variety in our recruits. Popular sources are the police, the fire department, the zoo, and technicians of any kind. But we recruit from all places. Most members are neighborhood watch types (not official Neighborhood Watch, but “concerned people”). Ironically, we make sure that we do a lot of
good, just to get some credibility. [Blog Author note: CR likes to “help” vulnerable people like abused women, women with cancer, mentally ill people, victimized minorities, etc. then recruit them for his hate campaigns. If a person is a key person (like a friend of the target) he will often victimize the person
himself to “soften” them up, claim that the target did it and then use that to recruit them.]
Then there is the Bureau of Authority (“The Moneybags”). They don’t actually control the syndicate, but they have all the right jobs and connections. So, a judge might have control over the judicial process, but he will answer to a superior in the syndicate. Psychiatrists belong here too.
The Moneybags are so-called because they raise a lot of the money. It would be suspicious if big corporations funded groups like this, but they can invest money into front- groups. [Blog Author note: Like government funded “anti-hate” networks which they use to actually incite hate. CR set one up in 2007 in
my community.] And the majority of the syndicate’s work is done through completely legitimate fronts. We can tap phone lines and access people’s records from behind government agencies. [Blog Author note: CR has done this to me using high level corporate, government, police and intelligence connections.]
Usually, these are the guys that go after Enemy Targets. Normally, harrassment is organized under several “action policies”. If a target isn’t an enemy, a standard policy is enforced. Low level organizers (the aforementioned “playwrights”) play around with the target for a while and rotate crews. [Blog Author
note: While the individuals change
certain other things do not so it’s easy to identify these “crews”.]
When a target is an “enemy”, the policy doesn’t immediately change, but orders filter down from high-level organizers (usually the Supreme Council) which direct ‘Thespians’ to provoke the target or a similar action, and Moneybags to crack down on them once they get in the way of the system. This is called
Mincing, because the thespians lure the “meat” (by making it complain or fight back) into the “mincer”. [Blog Author note: This is what CR is doing to me right now. I receive negligent medical care because he is paying people to tamper with my lab results. In some cases they indicate perfect results where I
actually do have issues and in other cases where I don’t have issues I’m ge�ing positive results. See my comments on the mammogram issues. There is no lump in breast and a birth mark appeared where mammogram detected something. The Doctor is aware of this and yet continues to force the issue by
insisting on ridiculously frequent testing on this.
despite the visible birth mark. I complain about this and refuse to act on the positive results but want action on the negative results (which I have actually proven concretely are wrong. See my comments on my blood sugar). The Doctor is told that I’m complaining , the complaints are exaggerated and law suits
are mentioned. This is intended to and does make the Doctor get defensive. The Doctor is encouraged to a�ribute this to my medical issues all “being in my head”. The next step will be the Doctor fabricating some reason to involve a psychiatrist.]
The Bureau also protects members of the syndicate. Normally, in a court case/psych examination or similar situation where a syndicate member is at the mercy of a moneybag, a special order arrives from above telling the moneybag to take it easy on the guy and let him off sco� free. The order is always printed
in blue, on fancy cherry-blossom paper, but in a very official border/font. [Blog Author note: I know of several cases where the person was caught doing something illegal (the intent being to frame me) and in all cases, with the exception of one, neither the news media reported nor was any action taken. This one
case was not done in the commission of a frame up against me, but it involved one of CRs paid skanks. The news media picked it up, and the person was not charged under the most bizarre justification imaginable. He commi�ed a hit and run killing the person. There was suspicion that he was drunk but since
he had left the scene this couldn’t
be proven. His story was that road was slippery and he couldn’t stop. There was no evidence that he even tried to stop. He was not charged on the grounds that he was a new immigrant (Filipino) and he wasn’t used to driving in the snow. Frankly I have never heard of anything so ridiculous.]
“Cherrying” is the name for this secret process. The Bureau of Authority has a very organized system of lawyers, judges, medical officers, etc. Whenever you’re commi�ing a crime for the good of the syndicate, you must always report your location. Then they send Cousin Nancy (this is an affectionate term for
the police in the employment of the syndicate that they send to arrest you instead of non- syndicate cops, so you can go straight through the appropriate channels without anything suspicious being seen) to tail you and “arrest” you the moment somebody calls 911.
They all follow a minimalist strategy though. For example, the mayor of Xxxxx isn’t a member of the syndicate. But several of his advisors and aides are. This way we can get laws passed in a discreet manner, and if a high-profile figure is targeted, our hold on an organization doesn’t loosen. We try to arrange
elections of mayors that aren’t too headstrong. Though the governement is mainly used as a minor nuisance. We prefer the courts for most activities. [Blog Author note: Watch the current Mayoralty race in Toronto for an example of this in action. Except that CR wants a candidate he can control directly. The
media golden boy in this race is that candidate.]
The Bureau of Technology (Field), BoT(F) is the group in charge of the electrical equipment. They work alongside us thespians and “gaffer” the targets by giving them the usual fatigue/headaches/medical problems. They can also destroy equipment, screw up televisions, the works. I think they are particuarly
sadistic.
Different crews use different Techs, but they’re all unpleasant. The incapacitators come in a lot of different forms. There are ones that come as a lightbulb that slowly gives people eye-strain and makes them tired. You can fit some in computer/TV monitors and the glare irritates people.
I’ve heard they’re even building fridge magnets with electronic devices in them. That isn’t the extent of the BoT(F)’s machinery.
They manufacture pills that can cause deformities in the womb, as well as miscarriage and give them to women in their food. They can fake HIV/AIDS so the test shows up positive the first time, but subsequent tests show that it was a false positive. This faux-HIV can be put in the target’s food. They usually
give the target a few health scares, but they don’t like to physically hurt anyone. [Blog author note: Not true in the case of CR but then we know he’s more extreme than your average since he’s a sexually sadistic Psychopath. His intent is to create real health problems and ensure they aren’t looked after. or
misdiagnose health problems where the treatment itself will damage the health of a healthy person. See my comments on my mammogram fiasco and recent rumors that my other health problems “are in my head” (an excuse to justify involving a shrink). CR has recently funded an Alzheimer’s clinic and has
made a new contact, a well known psychiatrist,
who specialized in the mental health of older adults. (I’m in my 50s). He’s also been spreading ugly rumors about me to dentists (and I suspect offering bribes and favors). As a result every dentist I’ve gone to has done serious damage to my teeth to the point where my face is changing and my bite is so messed
up now that I can’t eat without biting my lips or the inside of my mouth. In some cases (most) these dentists have engaged in deliberate fraud which has been covered up by the Dental Insurance company which has another paid skank of CR’s on the BOD, Lorna M. The last dentist deliberately drilled too deep
to force a root canal which I would have had to pay for. Previously my co-workers were se�ing the stage that the coverage only covered “certain types of root canals”. Of course this is a fabrication which would have been backed by the Insurance Company simply to ensure that I had to pay out of pocket. Since
CR has wiped me out financially and
uses his connections to violate my privacy by accessing my bank and other financial records through various illegal means, he’s well aware that I can’t afford this and as a result the work won’t get done and my teeth will deteriorate further.]
One Field Tech I knew had a penchant for giving people Syphillis. They could treat it easily enough with pennicillin (and the syndicate always made sure that it would be diagnosed on time), but it showed up on the targets’ permanent records for medical treatment. They also conduct extensive testing without
the target’s knowledge. [Blog Author note: I believe this was done to me when I contracted Trichomoniasis a couple of years ago, which I also believe was improperly treated by the Doctor I was seeing at the time. I believe she is one of CRs paid skanks and related to a Sikh terrorist who claimed to be a CSIS
informant but conveniently never gave CSIS any useful information that would have resulted in the conviction of the Air India terrorists. (another of CRs paid skanks). I also believe the person who transmi�ed it to me did so unknowingly and was deliberately infected by someone else. The Doctor felt it
necessary to report this (not normally done
because it’s so common) and improper treatment can result in the Protozoa going into one’s organs (liver and kidney) and damaging them permanently. Since I’m a kidney donor and only have one kidney this is particularly pernicious assault on me by CR amongst many other assaults intended to do damage
to and weaken my single remaining kidney. Something in the drug treatment I was provided also resulted in my face swelling and hooded eyelids.]
One TI we were monitoring was found to have a malignant tumor in his head (not our doing). He wasn’t experiencing any of the symptoms, so we gave him some through the incapacitators and had a few of his friends warn him about cancer. He had a test done, and just for fun, we had the doctor tell him how
dangerous it could be and how he could die soon. We gave him a six month waiting period and told him that by then the tumor could progress so far that it could never be removed. That’s a lie, of course. Our BoT(F) had it out in a jiffy by sending one of their brain surgeons to do the job, but it’s the fear that
counts. [Blog Author note: CR would have gone further and had the Brain Surgeon do deliberate damage. Enough to cause problems but not enough to put the person out of commission. This is the difference between how a Psychopath and a non-Psychopath function.]
The Bureau of Technology (Communications) monitors the target’s phone calls, emails, and absolutely everything else. They tend to recruit from the national archives, census takers office, records office, credit card companies, medicare, insurance, etc. They are the logistics branch. As I said, most of the
syndicate’s work is done from within legitimate areas.
What the BoT(C) does (very often) is send a “receptionist applicant” over to a credit card company or government agency pretending she knows nothing about hacking computers or accessing records. We pull a few strings and she’s in. She then steals information while nobody is looking. A few old-timers like
to have 100% control over the “records farm” but most prefer the minimalist approach. This is the bureau that gives out information and orders to everybody else, and also acts as a communications post for the whole syndicate.
The Supreme Council delivers orders through them. Outside orders are also taken in through the BoT(C), which advertises as a mercenary group through certain channels.
The Bureau of Alliances, or “trading partners” handles our allies. As far as I know, the syndicate is Xxxxxxan only. The only other gang stalking group in this country is a West Xxxxxxxxan organization called the confederacy. Very often they try to move into the xxxxx xxxxx so we have to hold them back,
diplomatically or otherwise. However, we have contracts with Xxxxxxan groups whereby we handle their targets when they move into Xxxxxx. The same with the Xxxxan groups and the confederacy. The other groups pay for their targets to be “handled” while they travel here. We make millions of dollars this
way.
Finally, the Supreme Council controls the entire operation. I have no idea who they are, except that they have a fancy name instead of being a Bureau. They do not recruit their own men. They promote from the other departments.
Most of them seem to be wealthy individuals with inheritances that manage to maintain their fortunes from investments. Not one is a CEO, Judge, or Politician. They are all just old money family types that live in the Xxxxxx Xxxxx and seem unusually lucky with their money (no doubt through insider
trading).
Despite this, they have a lot of spiffy technology. They have a kind of reverse incapacitator that improves their health and increases their performance. Most of them look incredibly young for their age. We don’t see them much, though. Often, an audience with one of them is a kind of reward for good service.
There are also ranks in our syndicate. The lowest members are pawns. They’re not technically members, because there’s no permanent service contract and they don’t know they’re working for us. They take orders from us but they’re not expected to a�end meetings. We call our pawns “concerned citizens”, the
Authority bureau has “office boys” or “secretaries”, the BoT(F) has “lab rats” (who very often are paid volunteers for experiments, or people who don’t know what they’re testing), the BoT(C) has “spelunkers”, the BoA has “travel agents”.
Unfortunately, we’re not obligated to give protection to any of these people. So, we can give a vet an order to put down a dog, without telling him that it isn’t consented to by the owner, and he will do the job and get sued without us giving him legal protection. A lot of our street theater is done by people that
don’t even know they’re part of a syndicate. They think they’re a grass roots movement and don’t know that there are other people harrassing the target.
The BoT(C) recruits people that think they’re joining l33t hacker groups on the internet, or people that think that they’re just following orders from the archives. The BoT(F) does 80% of its research at legitimate agencies like Xxxxxx’s XXXXX and its drug companies. The task of pawns is to think that what
they’re doing is either normal and routine, or criminal in an individual isolated manner.
Recruits, however, are aware of a conspiracy. However, they still remain at a misinformed level. We simultaneously maintain teams of “religious” actors and “punk” actors. A person might join us thinking he’s going to clean up the community. Another person might join us thinking he’s going to cause
trouble and anarchy. And they can go about their merry ways.
We even deliver information to them in different ways. To the religious ones, it’s wrapped up in prophecy and revelation. To the punks, it’s given a communist candy coating. However, they’re all aware that the group is large.
They’re also aware of a mutual benefit aspect to the operation. Only greedy un-idealistic people get beyond the recruit rank.
All the Bureaus wrap themselves up in different colours. The Moneybags pretend to be a secret club for the elite (and many of them are indeed quite powerful and wealthy, second only to the Supreme Council). The BoT(F) claims to be a “humane” research agency, or a means by which scientists can resist
19 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
corporate greed, though it still a�racts deviants. The BoT(C) is conspiratorially minded, and pretends to be a group searching for the ‘secrets of the illuminati’ or the illuminati themselves. The BoA claims to be a contract agency, traveller’s club, or accounting firm.
Recruits perform tasks that they know are illegal, or immoral, but they still generally believe that they’re doing it for a reason.
Managers like me come above the recruits and do some actual organization, whether leading a crew to a street theater match or planning an a�ack. Generally, managers know everything about the syndicate except what its goal is. Most are greedy enough to accept that it isn’t a morally motivated group. We
also engage in communication with other Bureaus to co-ordinate our activites.
The Theater has “Playwrights” and “Leading Roles”. The moneybags have “Success Stories”. The BoT(F) has “Research Directors”. The BoT(C) has “Information Awareness Officers”. The BoA has “Arrangers”.
Contract: A TI or Target. This is the official term. Used as “Enemy Contract” or “Planning Contract”. Enemy contract is often referred to as “hostile contract”.
THE EFFECT: the fact that greedy and sadistic recruits are selected for managing jobs more readily than anybody with integrity.
FBG (fertile breeding ground): a crew of nipple-kissers, based on the idea that they are a fertile breeding ground for future managers.
XXXXXX XXXXX SYNDROME: having a target so socially unpredictable and badly-off that you can’t really think of many ways to make their life much worse.
RAINBOW SHOCK: the fact that you have to act nice to the rest of the public immediately after you’ve stopped defacing a contract.
BREAK-A-LEG JOB: a particuarly hostile a�ack against a contract, or a plan which involves appoaching the target and talking to them.
SAKURAKAI: a crew that is particuarly overt in its stalking and gets caught too often. In other words, it has to be cherried all the time.
CREW: A unit of recruits and pawns under a single MO. In other words, a group of gang stalkers.
XXXXXXX XXXXX: rhyming slang. for big mistake, roughly means “we shouldn’t have used this method”.
COVERED: A member of the public that is under the control of the syndicate (as a pawn).
LOMOSEXUAL: a syndicate member with a knack for photography. (“There’s a lomo in every crew!”)
NYUNKIA: (Not Your Usual Nipple-Kissing Incapacitator Asshole), the “yu” is pronounced as the “oo” in ‘moon’. refers to a particuarly sadistic or deviant BoT(F) member.
YELLOW MEAT: criminals, as opposed to “concerned citizens”. refers to criminals recruited into the syndicate.
XXXXXXXX (verb): to Xxxxxx somebody is to run them over or chase them with a car.
GIGOLO-BOP: to make sexual advances to an una�ractive target, term mainly used by “nipple kisser” deviants.
HANG-JOB: the experience of having a target that one has enjoyed tormenting suddenly commit suicide. Term used mainly by nipple kissers/nyunkias.
COUSIN NANCY: a police unit sent to tail a crew and arrest them before an unchained police unit can do it.
XXXXXX NECKTIE: a death threat made with no intention of it being carried out.
GENERAL LEEING: randomly chasing after a target and threatning to rape them before immediately running away.
XXXX’S LAW: a police department that is thoroughly under the syndicate’s control.
DEJA VOOOO: doing the same skit over and over again.
I hope this glossary is of help. If you have any questions, please reply.
Xxxxxxxx”
—
LEGAL JUDICIAL POLITICAL RESISTANCE
Sponsored Content
ראה את העלויות כפרי פרישה | מודעות חיפוש: | בתי האבות הטובים בישראלSponsored עורכי דין | מודעות חיפוש.? ראה את רשימת השכר עכשיו2023 | כמה מרוויחים עורכי דין בשנתS Cardiologists: Too Much belly fat? Do This Before Bed getfi�oday.online | Sponsored
(h�ps://trck.tracking505.com/b324c6cb-5383-40b7-928a- ponsored (h�ps://trackbtg.com/view/O9dbJkQIKC1XE2tqXajWcXcJkK37psULpLC79vzci6vyJY?c=39997&
2d14d16eb1be?campaign_id=00e44a6e12cfa0db0f2b3a7ff6bc30403c&publisher_id=$publisher_id$& (h�ps://trck.tracking505.com/9a9b033e-dbc9-4f9f- pid=4443&tid=$ob_click_id$&ob_marketer=MKA_Wap5&ob_publisher_id=$publisher_id$&
publisher_name=$publisher_name$&ad_id=0072cf42790b7e9004dd510aee4466da6f&ad_title=%D7%91 83c6-54c755a1b632?campaign_id=0095ecdeda4db91c22dbd3987277dccd3b& ob_section_id=$section_id$&ob_ad_id=007f0863313b45c4fc0c9823d8c22df946&
%D7%AA%D7%99+%D7%94%D7%90%D7%91%D7%95%D7%AA+%D7%94%D7%98%D7%95%D7%91 publisher_id=$publisher_id$&publisher_name=$publisher_name$& ob_timestamp=$time_stamp$&ob_platform=WEB&
%D7%99%D7%9D+%D7%91%D7%99%D7%A9%D7%A8%D7%90%D7%9C%3A+%D7%A8%D7 ad_id=00bd87534bf08e5d091295c05075cb56dc&ad_title=%D7%9B%D7%9E ob_campaign_id=007a2�20a9df35af3234cec3d8e243a3f&
%90%D7%94+%D7%90%D7%AA+%D7%94%D7%A2%D7%9C%D7%95%D7%99%D7%95%D7%AA& %D7%94+%D7%9E%D7%A8%D7%95%D7%95%D7%99%D7%97%D7%99 ob_doc_title=Burn+Unwanted+Belly+Fat+Fast+with+This+Simple+10-
section_id=$section_id$§ion_name=$section_name$&req_id=$req_id$& %D7%9D+%D7%A2%D7%95%D7%A8%D7%9B%D7%99+%D7%93%D7%99 Second+%27Hack%27+%28WATCH%29&
promoted_link_id=0072cf42790b7e9004dd510aee4466da6f&time_stamp=$time_stamp$&cpc=$cpc$& %D7%9F+%D7%91%D7%A9%D7%A0%D7%AA+2023%3F+%D7%A8%D7%90 site=DietWWAllJava_$publisher_name$_$section_name$_007f0863313b45c4fc0c9823d8c22df946&
ob_click_id=$ob_click_id$&obOrigUrl=true) %D7%94+%D7%90%D7%AA+%D7%A8%D7%A9%D7%99%D7%9E%D7%AA+ mavcid=39997&ob_marketer_id=00dc7db6d834f949531eb0ccdc70c32bd9&ob_cpc=$cpc$&
%D7%94%D7%A9%D7%9B%D7%A8+%D7%A2%D7%9B%D7%A9%D7%99 obOrigUrl=true)
%D7%95.§ion_id=$section_id$§ion_name=$section_name$&
req_id=$req_id$&promoted_link_id=00bd87534bf08e5d091295c05075cb56dc&
time_stamp=$time_stamp$&cpc=$cpc$&ob_click_id=$ob_click_id$&
obOrigUrl=true)
Israel Doctors Suprised: Passive Weight Loss Method Taking Petah Tikva by Storm tech4-you.com | ʺ מנקה ריאותʺ כובש את ישראל בסערהgetairphysio.io | Sponsored כמעט כל אחד זכאי לדרכון אירופאי דרכון זר | מודעות חיפוש- | בעקבות חוק חדשSponsored
Sponsored (h�ps://deals.getairphysio.io/8T2FWPJ/22XQKHP/?uid=1316&gulang=he& (h�ps://8cacf1.zbrjtstrclnm.com?subid1=00ddac350315d88aad3bf59aa564944169&
(h�ps://trackbrk.com obOrigUrl=true) subid2=$publisher_id$&subid3=$section_id$|00ec2d2253cd0a4e1eba14958cac0ff22f&subid4=is-
/view/bDwD94R1in27vuizgOsULpaWYiZX5Wkyas0sULpkwmBsULp7aPAU?c=37681&pid=4443& he-ob-d-foreignpassport&network=outbrain&OutbrainClickId=$ob_click_id$&adtitle=%D7%91
tid=$ob_click_id$&ob_marketer=ZMav_wap&ob_publisher_id=$publisher_id$& %D7%A2%D7%A7%D7%91%D7%95%D7%AA+%D7%97%D7%95%D7%A7+%D7%97%D7%93
ob_section_id=$section_id$&ob_ad_id=001922a45f0b2fed8dc6d0557dc47f5133& %D7%A9+-+%D7%9B%D7%9E%D7%A2%D7%98+%D7%9B%D7%9C+%D7%90%D7%97
ob_timestamp=$time_stamp$&ob_platform=WEB& %D7%93+%D7%96%D7%9B%D7%90%D7%99+%D7%9C%D7%93%D7%A8%D7%9B%D7%95
ob_campaign_id=00ca7fc8bcb9402f6a447cb269e449e336&ob_doc_title=Best- %D7%9F+%D7%90%D7%99%D7%A8%D7%95%D7%A4%D7%90%D7%99&
seller+Japanese+Patches+Now+Back+In+Stock& site=$publisher_name$&obOrigUrl=true)
site=NuubuWWWeb1CPA_$publisher_name$_$section_name$_001922a45f0b2fed8dc6d0557dc47f5133&
mavcid=37681&ob_marketer_id=00ca0c63d47dfa4c2f357280bb93df3b73&ob_cpc=$cpc$&
obOrigUrl=true)
| לגור בבית אבות יכול להיות מדהים )תסתכל על המחירים( כפרי פרישה | מודעות חיפושSponsored ( מנקה ליחה וריר )למצבי קוצר בנשימה ולזרימת אויר חלקה, מכשיר לחיזוק הריאות:חדש בישראל 30+ הגאדגʹטים המקוריים ביותר שכדאי לקנות בבלאק פריידיTrending Boom | Sponsored
(h�ps://trck.tracking505.com/50bfe9ed-a888-4e1f- lifetechadviser.com | Sponsored (h�ps://trendingboom.com/top-gadgets-he-bf-new-2/?obOrigUrl=true)
a289-097209�c40d?campaign_id=0096e03ae7af552dc25bf88ae82b4b30ae& (h�ps://lifetechadviser.com/airphysio-he/?obOrigUrl=true)
publisher_id=$publisher_id$&publisher_name=$publisher_name$&
ad_id=00018cbdcbb4ee022f9dd9da51715d1357&ad_title=%D7%9C%D7%92%D7%95%D7%A8+%D7%91
%D7%91%D7%99%D7%AA+%D7%90%D7%91%D7%95%D7%AA+%D7%99%D7%9B%D7%95
%D7%9C+%D7%9C%D7%94%D7%99%D7%95%D7%AA+%D7%9E%D7%93%D7%94%D7%99
%D7%9D+%28%D7%AA%D7%A1%D7%AA%D7%9B%D7%9C+%D7%A2%D7%9C+%D7%94%D7
%9E%D7%97%D7%99%D7%A8%D7%99%D7%9D%29§ion_id=$section_id$&
section_name=$section_name$&req_id=$req_id$&
promoted_link_id=00018cbdcbb4ee022f9dd9da51715d1357&time_stamp=$time_stamp$&cpc=$cpc$&
ob_click_id=$ob_click_id$&obOrigUrl=true)
Bookmark the permalink.
Leave a comment
20 of 21 2/20/2023, 5:19 AM
UCSD–USD— SDSU-Universitie’s GangStalking & Human Trafficking Ring... https://ucsdsdsuusdgangstalkinghumantraffickinh.wordpress.com/2012/08/31...
Advertisements
REPORT THIS AD
21 of 21 2/20/2023, 5:19 AM