You are on page 1of 95


finite Difference/Time Domain
PulsON Technology
LT-PMS-1 (Magnetic audio device)
 Unknown to most of the world, satellites can perform astonishing
and often menacing feats. This should come as no surprise when
one reflects on the massive effort poured into satellite technology
since the Soviet satellite Sputnik, launched in 1957, caused panic
in the U.S. A spy satellite can monitor a person's every movement,
even when the "target" is indoors or deep in the interior of a
building or traveling rapidly down the highway in a car, in any kind
of weather (cloudy, rainy, stormy). There is no place to hide on
the face of the earth.
 It takes just three satellites to blanket the world with detection
capacity. Besides tracking a person's every action and relaying the
data to a computer screen on earth, amazing powers of satellites
include reading a person's mind, monitoring conversations,
manipulating electronic instruments and physically assaulting
someone with a laser beam. Remote reading of someone's mind
through satellite technology is quite bizarre, yet it is being done; it
is a reality at present, not a chimera from a futuristic dystopia! To
those who might disbelieve my description of satellite surveillance,
I'd simply cite a tried-and-true Roman proverb: Time reveals all
things (tempus omnia revelat)...
 Title lll of the omnibus Crime Control and Safe Streets Act 18 U.S.C.
2510-2520, authorizes the use of electronic surveillance for classes of
crimes carefully specified in 18 U.S.C. 2516. Such surveillance is subject
to prior court order. 18 U.S.C. 2518 sets forth the detailed and
particularized application necessary to obtain such an order, as well as
carefully circumscribed conditions for its use. The Act represents a
comprehensive attempt by Congress to promote more effective control of
crime while protecting the privacy of individual thought and expression.
Much of Title lll has been drawn to meet constitutional requirements for
electronic surveillance. The most basic function of any government is to
provide for the security of the individual and his property. And unless
government safeguards its own capacity to function and to preserve the
security of its people, society itself may become so disordered that all
rights and liberties are endangered. Civil liberties, as guaranteed by the
U.S. Constitution, imply the existence of an organized society maintaining
public order without which liberty itself is lost in the excesses of
unrestrained abuses.
The Foreign Intelligence Surveillance Act
 ("FISA" Pub.L. 95-511, 92 Stat. 1783,
enacted 1978-10-25, 50 U.S.C. ch.36) is
an Act of Congress which prescribes
procedures for the physical and electronic
surveillance and collection of "foreign
intelligence information" between "foreign
powers" and "agents of foreign powers"
(which may include American citizens and
permanent residents suspected of
being engaged in espionage and
violating U.S. law on territory under
United States control.[1]
1073 The Foreign Intelligence Surveillance Act (FISA) --
50 U.S.C. § 1809

 Congress has enacted comprehensive legislation governing electronic surveillance. In
1968, Congress passed Title III of the Omnibus Crime Control and Safe Streets Act
of 1968, 18 U.S.C. § 2510 et seq. In 1978, the Foreign Intelligence Surveillance Act
of 1978 ("FISA"), 50 U.S.C. § 1801 et seq., was enacted. In 1986, Congress passed
the Electronic Communications Privacy Act of 1986 ("1986 Act"), Public Law No. 99-
508, which substantially revised Title III to provide coverage for the technological
advances developed in the area of electronic communications since the passage of
the original act. Minor amendments have since been made to the 1986 Act.
 These statutes share several common characteristics. Both Title III and FISA
prescribe authorization procedures which must be followed before electronic
surveillance can be conducted. Compare 18 U.S.C. §§ 2516 to 2517 with 50 U.S.C.
§§ 1802 to 1805. These procedures include judicial approval of surveillance
applications; minimization of interceptions by surveilling officials; and limitations on
the use of intercepted information. Moreover, both statutes impose civil and criminal
sanctions on unauthorized surveillance activities. Compare 18 U.S.C. §§ 2511
(criminal penalties) and 2520 (civil sanctions) with 50 U.S.C. §§ 1809 (criminal
penalties) and 1810 (civil sanctions). On the other hand, one court has distinguished
between these regimes, holding that "FISA regulates both aural and visual electronic
surveillance conducted for foreign intelligence purposes, and [Title III] regulates
aural electronic surveillance conducted for domestic purposes." United States v.
Koyomejian, 970 F.2d 536, 540 (9th Cir.) (en banc), cert. denied, 506 U.S. 1005
§ 1802. Electronic surveillance authorization without court order;
certification by Attorney General; reports to Congressional committees;
transmittal under seal; duties and compensation of communication
common carrier; applications; jurisdiction of court
• (1) Notwithstanding any other law, the President, through the Attorney General,
may authorize electronic surveillance without a court order under this chapter to
acquire foreign intelligence information for periods of up to one year if the
Attorney General certifies in writing under oath that -
 (A) the electronic surveillance is solely directed at -

• (i) the acquisition of the contents of communications transmitted by
means of communications used exclusively between or among foreign
powers, as defined in section 1801(a)(1), (2), or (3) of this title; or
• (ii) the acquisition of technical intelligence, other than the spoken
communications of individuals, from property or premises under the
open and exclusive control of a foreign power, as defined in section
1801(a)(1), (2), or (3) of this title;
 (B) there is no substantial likelihood that the surveillance will acquire the

contents of any communication to which a United States person is a party;
 (C) the proposed minimization procedures with respect to such surveillance

meet the definition of minimization procedures under section 1801 (h) of
this title; and if the Attorney General reports such minimization procedures
and any changes thereto to the House Permanent Select Committee on
Intelligence and the Senate Select Committee on Intelligence at least thirty
days prior to their effective date, unless the Attorney General determines
immediate action is required and notifies the committees immediately of
such minimization procedures and the reason for their becoming effective
 (b) Applications for a court order under this
chapter are authorized if the President has, by
written authorization, empowered the Attorney
General to approve applications to the court
having jurisdiction under section 1803 of this
title, and a judge to whom an application is made
may, notwithstanding any other law, grant an
order, in conformity with section 1805 of this
title, approving electronic surveillance of a foreign
power or an agent of a foreign power for the
purpose of obtaining foreign intelligence
information, except that the court shall not have
jurisdiction to grant any order approving
electronic surveillance directed solely as
described in paragraph (1)(A) of subsection (a) of
this section unless such surveillance may involve
the acquisition of communications of any United
States person.
(2) An electronic surveillance authorized by this subsection may be conducted only
in accordance with the Attorney General's certification and the minimization
procedures adopted by him. The Attorney General shall assess compliance with
such procedures and shall report such assessments to the House Permanent
Select Committee on Intelligence and the Senate Select Committee on
Intelligence under the provisions of section 1808 (a) of this title.
• (3) The Attorney General shall immediately transmit under seal to the court
established under section 1803 (a) of this title a copy of his certification. Such
certification shall be maintained under security measures established by the
Chief Justice with the concurrence of the Attorney General, in consultation with
the Director of Central Intelligence, and shall remain sealed unless -
 (A) an application for a court order with respect to the surveillance is made

under sections 1801 (h)(4) and 1804 of this title; or
 (B) the certification is necessary to determine the legality of the surveillance

under section 1806 (f) of this title.
• (4) With respect to electronic surveillance authorized by this subsection, the
Attorney General may direct a specified communication common carrier to -
 (A) furnish all information, facilities, or technical assistance necessary to

accomplish the electronic surveillance in such a manner as will protect its
secrecy and produce a minimum of interference with the services that such
carrier is providing its customers; and
 (B) maintain under security procedures approved by the Attorney General

and the Director of Central Intelligence any records concerning the
surveillance or the aid furnished which such carrier wishes to retain. The
Government shall compensate, at the prevailing rate, such carrier for
furnishing such aid.
Title 28 Electronic Surveillance
 28 Electronic Surveillance -- Title III Applications
• The Application should meet the following requirements:
 It must be prepared by an applicant identified as a law
enforcement or investigative officer. The application must be in
writing, signed by the United States Attorney, an Assistant United
States Attorney, and made under oath. It must be presented to a
Federal district court or court of appeals judge and be
accompanied by the Department's authorization memorandum
signed by an appropriate Department of Justice official. The
application may not be presented to a magistrate. See 18
U.S.C. §§ 2510(9) and 2516(1); see also In re United States of
America, 10 F.3d 931 (2d Cir. 1993), cert. denied, 115 S. Ct. 64
 It must identify the type of communications to be intercepted.
"Wire communications" include "aural transfers" (involving the
human voice) that are transmitted, at least in part by wire,
between the point of origin and the point of reception, i.e.,
telephone calls. 18 U.S.C. § 2510(1). This includes cellular phones,
cordless phones, voice mail, and voice pagers, as well as
traditional landline telephones. "Oral communications" are
communications between people who are together under
circumstances where the parties enjoy a reasonable expectation of
privacy. 18 U.S.C. § 2510(2). An "electronic communication" most
commonly involves digital-display paging devices or fax machines,
but also includes electronic mail, computer transmissions, and, in
some cases, satellite transmissions. It does not include tone-only
paging devices, tracking devices (as defined by 18 U.S.C. 3117),
or electronic funds transfer information. 18 U.S.C. § 2510(12).
 It must identify the specific Federal offenses for which there is
probable cause to believe are being committed. The offenses that
may be the predicate for a wire or oral interception order are
limited to only those set forth in 18 U.S.C. § 2516(1). In the case
of electronic communications, a request for interception may be
based on any Federal felony, pursuant to 18 U.S.C. § 2516(3).
 It must provide a particular description of the nature and location
of the facilities from which, or the place where, the interception is
to occur. An exception to this is the roving interception provision
set forth in 18 U.S.C. § 2518(11)(a) and (b). The specific
requirements of the roving provision are discussed in
USAM 9-7.111. Briefly, in the case of a roving oral interception,
the application must show, and the court order must indicate, that
it is impractical to specify the location(s) where oral
communications of a particular named subject are to be
intercepted. 18 U.S.C. § 2518(11)(a)(ii) and (iii). In the case of a
roving wire or electronic interception, the application must state,
and the court order must indicate, that a particular named subject
is using various and changing facilities for the purpose of thwarting
electronic surveillance. 18 U.S.C. § 2518(11)(b)(ii) and (iii). The
accompanying DOJ document authorizing the roving interception
must be signed by an official at the level of an Assistant Attorney
General (including Acting AAG) or higher. 18 U.S.C. §
2518(11)(a)(i) and (b)(i).
 It must identify, with specificity, those persons known to be
committing the offenses and whose communications are to be
intercepted. In United States v. Donovan, 429 U.S. 413 (1977),
the Supreme Court stated that 18 U.S.C. § 2518(1)(b)(iv) requires
the government to name all individuals whom it has probable
cause to believe are engaged in the offenses under investigation,
and whose conversations it expects to intercept over or from within
the targeted facilities. It is the Department's policy to name as
potential subjects all persons whose involvement in the alleged
offenses is indicated. See United States v. Ambrosio, 898 F. Supp.
177 (S.D.N.Y. 1995); United States v. Marcy, 777 F. Supp. 1400
(N.D. Ill. 1991); United States v. Martin, 599 F.2d 880 (9th Cir.),
cert. denied, 441 U.S. 962 (1979).
 It must contain a statement affirming that normal investigative
procedures have been tried and failed, are reasonably unlikely to
succeed if tried, or are too dangerous to employ. 18 U.S.C. §
2518(1)(c). The applicant may then state that a complete
discussion of attempted alternative investigative techniques is set
forth in the accompanying affidavit.
 It must contain a statement affirming that the affidavit contains a
complete statement of the facts--to the extent known to the
applicant and the official approving the application--concerning all
previous applications that have been made to intercept the oral,
wire, or electronic communications of any of the named subjects or
involving the target facility or location. 18 U.S.C. § 2518(1)(e).
United States Attorney manual

• 9-7.110 Format for the Authorization Request
• When Justice Department review and approval of a proposed application for
electronic surveillance is required, the Electronic Surveillance Unit of the
Criminal Division's Office of Enforcement Operations will conduct the initial
review of the necessary pleadings, which include: A. The affidavit of an
"investigative or law enforcement officer" of the United States who is
empowered by law to conduct investigations of, or to make arrests for, offenses
enumerated in 18 U.S.C. § 2516(1) or (3) (which, for any application involving
the interception of electronic communications, includes any Federal felony
offense), with such affidavit setting forth the facts of the investigation that
establish the basis for those probable cause (and other) statements required by
Title III to be included in the application;
• B. The application by any United States Attorney or his/her Assistant, or any
other attorney authorized by law to prosecute or participate in the prosecution
of offenses enumerated in 18 U.S.C. § 2516(1) or (3) that provides the basis for
the court's jurisdiction to sign an order authorizing the requested interception of
wire, oral, and/or electronic communications; and
• C. A set of orders to be signed by the court authorizing the government to
intercept, or approving the interception of, the wire, oral, and/or electronic
communications that are the subject of the application, including appropriate
redacted orders to be served on any relevant providers of "electronic
communication service" (as defined in 18 U.S.C. § 2510(15)).
United States Attorney manual
• 9-7.111 Roving Interception
• Pursuant to 18 U.S.C. § 2518(11)(a) and (b), the government may obtain
authorization to intercept wire, oral, and electronic communications of
specifically named subjects without specifying with particularity the premises
within, or the facilities over which, the communications will be intercepted.
(Such authorization is commonly referred to as "roving" authorization.) As to the
interception of oral communications, the government may seek authorization
without specifying the location(s) of the interception when it can be shown that
it is not practical to do so. See United States v. Bianco, 998 F.2d 1112 (2d Cir.
1993), cert. denied, 114 S. Ct. 1644 (1994); United States v. Orena, 883 F.
Supp. 849 (E.D.N.Y. 1995). An application for the interception of wire and
electronic communications of specifically named subjects may be made without
specifying the facility or facilities over which the communications will be
intercepted when it can be shown that the subject or subjects of the interception
have demonstrated a purpose to thwart interception by changing facilities. See
United States v. Gaytan, 74 F.3d 545 (5th Cir. 1996); United States v. Petti, 973
F.2d 1441 (9th Cir. 1992), cert. denied, 113 S.Ct. 1859 (1993); United States v.
Villegas, 1993 WL 535013 (S.D.N.Y. December 22, 1993).

• When the government seeks authorization for roving interception, the
Department's authorization must be made by the Attorney General, the Deputy
Attorney General, the Associate Attorney General, an Assistant Attorney
General, or an Acting Assistant Attorney General. See 18 U.S.C. §
2518(11)(a)(i) and (b)(i).
United States Attorney Manual
• 9-7.112 Emergency Interception
• Title III contains a provision which allows for the warrantless, emergency interception of wire,
oral, and/or electronic communications. Specifically, under 18 U.S.C. § 2518(7), the Attorney
General (AG), the Deputy Attorney General (DAG), or the Associate Attorney General
(AssocAG) may specially designate a law enforcement or investigative officer to determine
whether an emergency situation exists that requires the interception of wire, oral, and/or
electronic communications before a court order authorizing such interception can, with due
diligence, be obtained. As defined by 18 U.S.C. § 2518(7), an emergency situation involves
either: (1) immediate danger of death or serious bodily injury to any person; (2) conspiratorial
activities threatening the national security interest; or (3) conspiratorial activities characteristic
of organized crime. The only situations which will likely constitute an emergency are those
involving an imminent threat to life, i.e., a kidnapping or hostage taking. See United States v.
Crouch, 666 F. Supp. 1414 (N.D. Cal. 1987)(wiretap evidence suppressed because there was
no imminent threat of death or serious injury); Nabozny v. Marshall, 781 F.2d 83 (6th
Cir.)(kidnapping and extortion scenario constituted an emergency situation), cert. denied, 476
U.S. 1161 (1986). The emergency provision also requires that grounds must exist under which
an order could be entered (viz., probable cause, necessity, specificity of target location/facility)
to authorize the interception. Once the AG, the DAG, or the AssocAG authorizes the law
enforcement agency to proceed with the emergency Title III, the government then has forty-
eight (48) hours, from the time the authorization was granted, to obtain a court order
approving the emergency interception. 18 U.S.C. § 2518(7). The affidavit supporting the
application for the order must contain only those facts known to the AG, the DAG, or the
AssocAG at the time his or her approval was given, and must be accompanied by a written
verification from the requesting agency noting the date and time of the authorization. Failure to
obtain the court order within the forty-eight-hour period will render any interceptions obtained
during the emergency illegal.

• Prior to the agency's contact with the AG, the DAG, or the Associate AG, oral approval to make
the request must first be obtained from the Assistant Attorney General (AAG) or a Deputy
Assistant Attorney General (DAAG) of the Criminal Division. This approval is facilitated by the
Office of Enforcement Operation's Electronic Surveillance Unit, which is the initial contact for
the requesting United States Attorney's Office and the requesting agency. Once the Electronic
Surveillance Unit attorney briefs and obtains oral approval from the AAG or the DAAG, the
attorney notifies the agency representative and the Assistant United States Attorney that the
Criminal Division recommends that the emergency authorization proceed. The agency then
contacts the AG, the DAG, or the AssocAG and seeks permission to proceed with the
emergency Title III.
47 C.F.R. section 15.9
 § 15.9 Prohibition against eavesdropping.
 Except for the operations of law enforcement
 officers conducted under
 lawful authority, no person shall use,
 either directly or indirectly, a device
 operated pursuant to the provisions of
 this part for the purpose of overhearing
 or recording the private conversations
 of others unless such use is authorized
 by all of the parties engaging in the
 conversation.
Penal Code Section 630
 630. The legislature hereby declares that
advances in science and technology have
led to the development of new devices and
techniques for the purpose of
eavesdropping upon private
communications and that the invasion of
privacy resulting from the continual and
increasing use of such devices and
techniques has created a serious threat in
a free civilized society.
 The Legislature by this chapter intends to
protect the right of privacy of the people
of this state.
PENAL CODE 646.9 (g)
 (g) For the purpose of this section, “Credible threat” means
a verbal or written threat, including that performed through
the use of an electronic communication device, or a
threat implied by a pattern of conduct or a combination of
verbal, written, or electronically communicated
statements and conduct, made with the intent to place
that person that is the target of the threat in reasonable
fear for his or her safety or the safety of his or her family,
and made with the apparent ability to carry out the threat
so as to cause the person who is the target of the threat to
reasonably fear for his or safety of his or her family. It is
not necessary to prove that the defendant had the intent to
actually carry out the threat.
 (h) For the purpose of this section, the term “electronic
communication device” includes, but is not limited to ,
telephones, cellar phones, computers, video recorders, fax
machines, or pagers. “Electronic communications” has the
same meaning as the term described in Subsection 12 of
Section 2510 of Title 18 of the United States Code.
California Penal Code Section

California Penal Code § 653m (2001) - Obscene, Threatening or Annoying
 (a) Every person who, with intent to annoy, makes contact by means of an
electronic communication device with another and addresses to or about the other
person any obscene language or addresses to the other person any threat to inflict
injury to the person or property of the person addressed or any member of his or
her family, is guilty of a misdemeanor.
 (b) Every person who makes repeated contact by means of an electronic
communication device with intent to annoy another person at his or her residence,
is, whether or not conversation ensues from electronic contact, IS guilty of a
(c) Every person who makes contact by means of an electronic communication
device with the intent to annoy another person at his or her place of work is guilty
of a misdemeanor punishable by a fine of not more than one thousand dollars ($
1,000), or by imprisonment in a county jail for not more than one year, or by both
that fine and imprisonment.
 (1) There is a temporary restraining order, an injunction, or any other court order,
or any combination of these court orders, in effect prohibiting the behavior
described in this section.
 HISTORY: Added Stats 1963 ch 801 § 1. Amended Stats 1978 ch 1022 § 1.
Amended Stats 1990 ch 383 § 1 (AB 3437);
Stats 1992 ch 1136 § 7 (SB 1541); Stats 1993 ch 589 § 116 (AB 2211);
Stats 1998 ch 825 § 5 (SB 1796), ch 826 § 2 (AB 2351);
Stats 1999 ch 83 § 147 (SB 966).
 For the purpose of this Convention, the term “Torture” means
any act by which severe pain or suffering, whether physical or
mental, is intentionally inflicted on a person for such purposes
as obtaining from him or a third person information or a
confession, or punishing him for an act he or a third person has
committed or is suspected of having committed, or
intimidating or coercing him or a third person, or at the
instigation of or with the consent or acquiescence of a public
4. No exceptional circumstances whatsoever, whether a state of
war or a threat of war, internal political in stability or any other
public emergency, may be invoked as a justification of torture.
5. An order from a superior officer or a public authority may not
be invoked as a justification of torture,
18 U.S.C. 2512 Manufacture Distribution, Possession, and
advertising of wire, oral or electronic communication
intercepting devices prohibited
(1) Except as otherwise specifically provided in this chapter, any person who intentionally—
(a) sends through the mail, or sends or carries in interstate or foreign commerce, any electronic,
mechanical, or other device, knowing or having reason to know that the design of such device
renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or
electronic communications;
(b) manufactures, assembles, possesses, or sells any electronic, mechanical, or other device,
knowing or having reason to know that the design of such device renders it primarily useful for the
purpose of the surreptitious interception of wire, oral, or electronic communications, and that such
device or any component thereof has been or will be sent through the mail or transported in
interstate or foreign commerce; or
(c) places in any newspaper, magazine, handbill, or other publication or disseminates by
electronic means any advertisement of—
(i) any electronic, mechanical, or other device knowing or having reason to know that the design
of such device renders it primarily useful for the purpose of the surreptitious interception of wire,
oral, or electronic communications; or
(ii) any other electronic, mechanical, or other device, where such advertisement promotes the
use of such device for the purpose of the surreptitious interception of wire, oral, or electronic
knowing the content of the advertisement and knowing or having reason to know that such
advertisement will be sent through the mail or transported in interstate or foreign commerce,
shall be fined under this title or imprisoned not more than five years, or both.
(Added June 19, 1968, P.L. 90-351, Title III, § 802, 82 Stat. 214; Oct. 21, 1986, P.L. 99-508, Title I, §
101(c)(1), (7), (f)(2), 100 Stat. 1851.)
(As amended Sept. 13, 1994, P.L. 103-322, Title XXXIII, §§ 330016(1)(L), 330022, 108 Stat. 2147,
2150; Oct. 11, 1996, P.L. 104-294, Title VI, § 604(b)(45), 110 Stat. 3509; Nov. 21, 1997, P.L. 105-112,
§ 2, 111 Stat. 2273; Nov. 25, 2002, P.L. 107-296, Title II, Subtitle C, § 225(f), 116 Stat. 2158.)
18 U.S.C. 2513 Confiscation of wire,
oral or electronic communication

intercepting devices
Any electronic, mechanical, or other device used, sent, carried, manufactured,
assembled, possessed, sold, or advertised in violation of section 2511 or section
2512 of this chapter may be seized and forfeited to the United States. All provisions
of law relating to (1) the seizure, summary and judicial forfeiture, and
condemnation of vessels, vehicles, merchandise, and baggage for violations of the
customs laws contained in title 19 of the United States Code, (2) the disposition of
such vessels, vehicles, merchandise, and baggage or the proceeds from the sale
thereof, (3) the remission or mitigation of such forfeiture, (4) the compromise of
claims, and (5) the award of compensation to informers in respect of such
forfeitures, shall apply to seizures and forfeitures incurred, or alleged to have been
incurred, under the provisions of this section, insofar as applicable and not
inconsistent with the provisions of this section; except that such duties as are
imposed upon the collector of customs or any other person with respect to the
seizure and forfeiture of vessels, vehicles, merchandise, and baggage under the
provisions of the customs laws contained in title 19 of the United States Code shall
be performed with respect to seizure and forfeiture of electronic, mechanical, or
other intercepting devices under this section by such officers, agents, or other
persons as may be authorized or
designated for that purpose by the Attorney General.
(Added June 19, 1968, P.L. 90-351, Title III, § 802, 82 Stat. 215; Oct. 21, 1986,
P.L. 99-508, Title I, § 101(c), 100 Stat. 1851.)

Deprivation of Rights Under Color of Law
 This statute makes it a crime for any person acting under color of law, statute,
ordinance, regulation, or custom to willfully deprive or cause to be deprived from any
person those rights, privileges, or immunities secured or protected by the Constitution
and laws of the U.S.
This law further prohibits a person acting under color of law, statute, ordinance,
regulation or custom to willfully subject or cause to be subjected any person to
different punishments, pains, or penalties, than those prescribed for punishment of
citizens on account of such person being an alien or by reason of his/her color or race.
Acts under "color of any law" include acts not only done by federal, state, or local
officials within the bounds or limits of their lawful authority, but also acts done without
and beyond the bounds of their lawful authority; provided that, in order for unlawful
acts of any official to be done under "color of any law," the unlawful acts must be done
while such official is purporting or pretending to act in the performance of his/her
official duties. This definition includes, in addition to law enforcement officials,
individuals such as Mayors, Council persons, Judges, Nursing Home Proprietors,
Security Guards, etc., persons who are bound by laws, statutes ordinances, or
Punishment varies from a fine or imprisonment of up to one year, or both, and if
bodily injury results or if such acts include the use, attempted use, or threatened use
of a dangerous weapon, explosives, or fire shall be fined or imprisoned up to ten years
or both, and if death results, or if such acts include kidnapping or an attempt to
kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or
an attempt to kill, shall be fined under this title, or imprisoned for any term of years or
for life, or both, or may be sentenced to death.
(June 25, 1948, ch 645, § 1, 62 Stat. 696; April 11, 1968, P.L. 90-284, Title I, § 103(b),
82 Stat. 75; Nov. 18, 1988, P.L. 100-690, Title VII, Subtitle B, § 7019, 102 Stat. 4396.)
(As amended Sept. 13, 1994, P.L. 103-322, Title VI, § 60006(b), Title XXXII, Subtitle A, §
320103(b), Subtitle B, § 320201(b), Title XXXIII, § 330016(1)(H), 108 Stat. 1970, 2109, 2113,
2147; Oct. 11, 1996, P.L. 104-294, Title VI, §§ 604(b)(14)(B), 607(a), 110 Stat. 3507, 3511.)
 TITLE 18 > PART I > CHAPTER 13 > § 241§ Conspiracy
against RIGHTS IF two or more persons conspire to injure,
oppress, threaten, or intimidate any person in any State, Territory,
Commonwealth, Possession, or District in the free exercise or
enjoyment of any right or privilege secured to him by the
Constitution or laws of the United States, or because of his having
so exercised the same; or If two or more persons go in disguise on
the highway, or on the premises of another, with intent to prevent
or hinder his free exercise or enjoyment of any right or privilege so
secured— They shall be fined under this title or imprisoned not
more than ten years, or both; and if death results from the acts
committed in violation of this section or if such acts include
kidnapping or an attempt to kidnap, aggravated sexual abuse or
an attempt to commit aggravated sexual abuse, or an attempt to
kill, they shall be fined under this title or imprisoned for any term
of years or for life, or both, or may be sentenced to death.
(June 25, 1948, ch 645, § 1, 62 Stat. 696; April 11, 1968, P.L. 90-284, Title I, §
103(a), 82 Stat. 75; Nov. 18, 1988, P.L. 100-690, Title VII, Subtitle B, § 7018(a),
(b)(1), 102 Stat. 4396.)
(As amended Sept. 13, 1994, P.L. 103-322, Title VI, § 60006(a), Title XXXII,
Subtitle A, § 320103(a), Subtitle B, § 320201(a), Title XXXIII, § 330016(1)(L),
108 Stat. 1970, 2109, 2113, 2147; Oct. 11, 1996, P.L. 104-294, Title VI, §§
604(b)(14)(A), 607(a), 110 Stat. 3507, 3511.)
 An aggrieved person, other than a foreign power or an agent of a
foreign power, as defined in section 1801(a) or (b)(1)(A) of this
title, respectively, who has been subjected to an electronic
surveillance or about whom information obtained by electronic
surveillance of such person has been disclosed or used in violation
of section 1809 of this title shall have a cause of action against
any person who committed such violation and shall be entitled to
recover -
 (a) actual damages, but not less than liquidated damages of
$1,000 or $100 per day for each day gf violation, whichever is
 (b) punitive damages; and
 (c) reasonable attorney's fees and other investigation and
litigation costs reasonably incurred
(a) Prohibited activities
 A person is guilty of an offense if he intentionally -
• (1) engages in electronic surveillance under color of law except as authorized by
statute; or
• (2) discloses or uses information obtained under color of law by electronic
surveillance, knowing or having reason to know that the information was
obtained through electronic surveillance not authorized by statute.
 (b) Defense
 It is a defense to a prosecution under subsection (a) of this section that the
defendant was a law enforcement or investigative officer engaged in the course of
his official duties and the electronic surveillance was authorized by and conducted
pursuant to a search warrant or court order of a court of competent jurisdiction.
 (c) Penalties
 An offense described in this section is punishable by a fine of not more than $10,000
or imprisonment for not more than five years, or both.
 (d) Federal jurisdiction
 There is Federal jurisdiction over an offense under this section if the person
committing the offense was an officer or employee of the United States at the time
the offense was committed.
 You are being warned of a massive attack of U.S. citizens
that is going on at this moment all across the country.
Evidence of the activity has been discovered through
technical research proving that this is in fact true.
 For approximately six years there have been reports from
people throughout this country claiming that they have
been under attack in their homes from radio frequency
weapons that cause effects that decrease the immune
system, also these reports include that many of these
people are implanted with covert devices causing extreme
pain are also being reported.
 You and your family members may also be victims of this
same activity, some of the initial symptoms are very
common such as insomnia, acid reflux and many others,
the radio frequency energy also causes physiological
changes that cause syndromes and disease of all kinds
including heart attack because the techniques of attack is
radio frequency. This means you or your family members
could have symptoms or be sick from this same widespread
covert activity.
 It sounds impossible that attacks on citizens are
occurring. From millionaires to ordinary
housewives and husbands even children are
under attack from directed energy and covertly
implanted with harmful and deadly devices.
Directed energy purposefully pointed at them for
what has been proven to be multiple purposes.
Such purposes are human experiment, population
management reduction, behavioral manipulation,
political reasons, economic business sabotage,
reduction of retirement benefits, increasing
medical profits, law enforcement investigations
designed to pad their budgets, motives of rape,
to make money from programs offering use of
such equipment, used as a revenge technology
tool by corrupt operatives and worst of all but
relevant that there are quotas for operatives to
 I would like to draw your attention to some
extreme and horrendous criminality being
conducted with the involvement of United
States Government-related Agencies and
the complicity, if not participation, of many
other governments and agencies. I am a
victim of torture and abuse using Directed
Energy and Neurological Weapons
technology. There is massive ignorance
and secrecy regarding this, and victims
such as I are being subjected to
uncontrolled and unacknowledged torture
and mental and physical destruction. This
has remained completely unreported and
undiscussed publicly.
I have been a victim of directed energy
weapons, remote harassment, and organized
stalking since 2002. The phenomenon is real. It
includes psychological harassment to induce
Psychosis, Isolation, Depression, and suicide;
physical and emotional manipulation; and
devastation of financial and social resources .
Nobody is above the law, yet some groups or
agencies out there believes themselves to be.
This is not right.
The use of directed energy weapons, remote
harassment, and organized stalking are quite
plainly unlawful, criminal acts, and indeed cruel
and unusual punishment.
I refuse to surrender my freedom and I demand
justice, not just us and fuck you !!!!!!!
I can confirm the following technical abilities
and powers as follow:
1.That they can place a human subject under continuous
surveillance, no matter where he/she is from remote
2. That they can monitor a human brain from remote locations
including thought, reaction, motor command, auditory event
and visual image reading.
3.They can continuously input directly into a human brain from
remote locations, including the ability to override, control
and alter consciousness, and to induce voices, noises,other
disturbances, images, and “dreams” into the brain.
4. That they can directly interfere with abuse , torture and hit
your body with invisible beams from remote locations.
5. That they can interfere with alter, insert, etc. data files,
communications and legal evidence from remote locations-
even during transmission.
 These Advances in Scientific Technology and Techniques
are done many different ways ranging from Satellite to the
different types of towers located through out each city,
county, and state and the United States………….
 They can be done from remote locations ranging from your
local police agency, police car, and from other command
 They can use a computer from these location to lap tops
and even hand held computers.

 In this next example it is showing you how easily
and on the fly as they call it can be done.

RFID : Radio Frequency
IDentification Devices
 RFID “Powder”
 The world’s smallest and
thinnest RFID tags are
manufactured by Hitachi.
 These RFID chips (Radio
Frequency IDentification
chips) measure just 0.4x
0.4 millimeters.
 The new RFID chips have a
128 bit ROM for storing a
unique 38 digit number
 They can also use
Communication and
Identification with passive
 Figure 11 An image of a typical medical
telesensor developed at ORNL [179].

 Another area of interest at ORNL is the
development of medical telesensors, which
 being used by military troops in combat
zones to provide information on vital
 to remote recorders. An array of chips has
been developed to collectively monitor
 bodily functions. These chips are attached at
various points on a person using a
 adhesive and can send physiological data by
wireless transmission to an
 intelligent monitor on another person’s
helmet. The monitor can also be used to
 and transmit global satellite positioning data
to help medical staff locate a wounded
 soldier. Figure 11 shows a 2 × 2-millimeter
silicon chip attached to the skin. The chip
 contains a temperature sensor in an
integrated circuit, a lithium thin-film battery
 supplies the very low level of power required
by the circuit and signal processing and
 transmission electronics, and an antenna that
sends the data by radio signals
 transmission) to a monitor when the chip is
VeriChip is the first Food and Drug Administration
(FDA)-approved human-implantable RFID microchip.
VeriChip received United States FDA approval in 2004.
 VeriChip is the first Food and Drug Administration (FDA)-
approved human-implantable RFID microchip. VeriChip
received United States FDA approval in 2004. About twice
the length of a grain of rice, the device is typically
implanted above the triceps area of an individual’s right
arm. Once scanned at the proper frequency, the VeriChip
responds with a unique 16-digit number which can
correlate the user to information stored on a database for
identity verification, medical records access and other uses.
The insertion procedure is performed under local anesthetic
in a physician's office and once inserted, is invisible to the
naked eye. As an implanted device used for identification
by a third party, it has generated controversy and debate.
 Double click on the YouTube and watch the video make
sure you are on the large screen on the bottom left above
the word DRAW these three buttons push the one that
looks like a goblet
 The Frequency’s used for these devices are 125/134.2 KHZ
and 13.56 MHZ.
 YouTube - Verichip

Implants are without a doubt
the most invasive form of
 Electronic implants consist of
transmitters, ESF generators,
transceivers, tracking devices
and other micro sized devices
designed to cause harassment
by tracking or controlling
movement and thought.
 It consists of a unit that is
powered by bodily fluids and
is capable of transmitting
voice signals, high voltage
pulses, emitting a small
tracking beacon signal, or
other unspecified uses (mind
 Implant types: transponder,
transceiver, micro-
nuerophonic transceivers,
 The ID-100 TROVAN
implantable transponder was
previously approved on
February 15, 1996.
unique transponder delivery
device which consists of a tiny
container shaped like a bullet,
which tapers to a sharp point.
Inside is an ID-100A
 The ZIPQUILL does not make
an incision, or cut, in the skin
as a syringe would. Rather it
pierces the skin, allowing for
rapid closure of the opening
after penetration of the
minimizing tissue damage and
 Once inserted into a human,
the device can be tracked by
Global Positioning Satellite
technology and the
information relayed to the
 The “Right to Privacy” may be inferred from the language of the First, Fourth, Fifth, and Ninth
Amendments. It has also been established through common law precedents. As early as 1891,
Justice Gray of the U.S. Supreme Court indicated that”[n]o right is held more sacred, or is
more carefully guarded, by the common law, than the right of every individual to possession
and control of his own person, free from all restraint or interference of others, unless by clear
and unquestionable authority of law. Similar sentiments have been echoed by Justice Cardozo
in his famous statement that “[e]very human being of adult years and sound mind has a right
to determine what shall be done with his own body” The right to privacy defined by Justices
Gray and Cardozo is a right to bodily integrity.
 Also it is recognized that an individual has the right to prevent intrusions into his own body
under “Property Law”, and he can invoke the Fourteenth Amendment protection.
 Implantation of microchips concern an internal property interest in the self because placement
of the device involves breaking the skin to place a foreign object within the body permanently.
 Fourth Amendment claims can be applied to microchip implants. The clearest application will
be to the embodiment of the device that can read-write and track. Still, read only and read-
write devices implicate Fourth Amendment principles because, once installed, either could be
scanned by police to obtain information about the individual. Scanning of the microchip would
be considered as a Search………………….
 The Fifth-Amendment could be applied to the use of microchips implants because it could be a
form of self-incrimination as the device has scanning and tracking capabilities
 Futhermore, the implantation of the device is illegal as can be seen in Senate Bill 362 and Civil
Code 52.7
 Futhermore in the case of any of the embodiments, an individual has a expectation of privacy
and a right as to the information on the microchip that has been implanted illegally.
 Introduced by Senator Simitian
 February 20, 2007
 An act to add Section 52.7 to the Civil Code, relating to identification
 devices.
 legislative counsel’s digest
 SB 362, as amended, Simitian. Identification devices: subcutaneous
 implanting.
 Existing law accords every person the right of protection from bodily
 restraint or harm, from personal insult, from defamation, and from injury
 to his or her personal relations, subject to the qualifications and
 restrictions provided by law.
 This bill would prohibit a person from requiring, coercing, or
 compelling any other individual to undergo the subcutaneous implanting
 of an identification device, as defined. The bill would provide for the
 assessment of civil penalties for a violation thereof, as specified, and
 would allow an aggrieved party to bring an action against a violator for
 damages and injunctive relief, subject to a 3-year statute of limitation,
 or as otherwise provided. The bill would also allow an interested party
 to petition the court on behalf of an incompetent or minor upon specified
 circumstances.
 Vote: majority. Appropriation: no. Fiscal committee: no.
 State-mandated local program: no.
 95
 “Gentleman! We have called you together to inform you that we
are going to overthrow the United States government” So begins
a statement being delivered by Gen. Carl W. Steiner, former
Commander-in-chief, U.S. Special Operations Command.
 At least the voice sounds amazingly like him.
 But it is not Steiner. It is the result of voice “morphing”
technology developed at Los Almos National Laboratory in New
 By taking just a few seconds a digital recording of Steiner’s voice
scientist George Papcun is able, in real time, to clone speech
patterns and develop an accurate facsimile.
 With this technology they can become your friends voice, a cop, a
parole office or your mate as “voices in the air” to harass and
stalk you…………………and talk to you 24/7 a day for years.
 Digital morphing-voice, video, and photo has come of age, and
used as psychological operations (PSYOPS) to seek and exploit
human vulnerabilities on citizens, parolees, and homeless, in our
city's, states, in the U.S..
 What is analyzed is silent ,or sub-auditory speech, such as
follows as when a person silently reads or talks to himself.
 Biological signals arise when reading or speaking to oneself
with or without actual lip or facial movement.
 A person using the subvocal system thinks of phrases and
talks to himself so quietly, it cannot be heard, but the
tongue and vocal cords do receive speech signals from the
 After, the signals are amplified, computer software reads
the signals to recognize word or sound.
 This site and technology can be found on the computer at
Silent Computerized Subvocal Speech, which is being
used by Law Enforcement and other agencies and people.
A Voice Only You Can Hear:
DARPA's Sonic Projector
 Imagine a weapon that creates sound that only you can hear. Science
fiction? No, this is one area that has a very solid basis in reality. The Air
Force has experimented with microwaves that create sounds in people's
head (which they've called a possible psychological warfare tool), and
American Technologies can "beam" sounds to specific targets with their pate
(and yes, I've heard/seen them demonstrate the speakers, and they are
shockingly effective).
 Now the Defense Advanced Research Projects Agency is jumping on the
bandwagon with their new "Sonic Projector" program:
 The goal of the Sonic Projector program is to provide Special Forces with a
method of surreptitious audio communication at distances over 1 km.
Sonic Projector technology is based on the non-linear interaction of sound
in air translating an ultrasonic signal into audible sound. The Sonic
Projector will be designed to be a man-deployable system, using high
power acoustic transducer technology and signal processing algorithms
which result in no, or unintelligible, sound everywhere but at the intended
target. The Sonic Projector system could be used to conceal
communications for special operations forces and hostage rescue
missions, and to disrupt enemy activities.
 The Voice of God weapon -- a device that projects voices into your head to make you think God is speaking
to you -- is the military's equivalent of an urban myth. Meaning, it's mentioned periodically at defense
workshops (ironically, I first heard about it at the same defense conference where I first met Noah), and
typically someone whispers about it actually being used. Now Steven Corman, writing at the COMOPS journal,
describes his own encounter with this urban myth:
 At a government workshop some time ago I head someone describe a new tool that was described as the
“voice of Allah.” This was said to be a device that would operate at a distance and would deliver a message that
only a single person could hear. The story was that it was tested in a conflict situation in Iraq and pointed at
one insurgent in a group, who whipped around looking in all directions, and began a heated conversation with
his compatriots, who did not hear the message. At the time I greeted this story with some skepticism.
 Is there any basis to this technology? Well, Holosonic Research Labs and
American Technology Corporation both have versions of directed sound, which can allow a single person to
hear a message that others around don't hear. DARPA appears to be working on its own sonic projector.
Intriguingly, Strategy Page reports that troops are using the Long Range Acoustic Device as a modified
Voice of God weapon:
 It appears that some of the troops in Iraq are using "spoken" (as opposed to "screeching") LRAD to mess with
enemy fighters. Islamic terrorists tend to be superstitious and, of course, very religious. LRAD can put the
"word of God" into their heads. If God, in the form of a voice that only you can hear, tells you to surrender, or
run away, what are you gonna do?
 And as Corman also notes, CNET recently wrote about an advertisement in New York for A&E's TV show
Paranormal State, which uses some of this technology. Beyond directed sound, it's long been known that
microwaves at certain frequencies can produce an auditory effect that sounds like it's coming from
within someone's head (and there's the nagging question of classified microwave work at Brooks Air Force
Base, that the Air Force stubbornly refuses to talk about).
 That brings us back to the Voice of God/Allah Weapon. Is it real or bogus? In one version -- related to me by
another defense reporter -- it's not just Allah's voice -- but an entire holographic image projected above (um,
who decides what Allah looks like?).
 Does it exist? I'm not sure, but it's funny that when you hear it brought up at defense conferences, no one ever
asks the obvious question: does anybody think this thing will actually convince people God is speaking to them?
I'm thinking, not.

 Hearing Voices- The experience of “Artificial Telepathy” is really not that
extraordinary. It’s as simple as receiving a cell-phone call in one’s head.
Satellites link the sender and the receiver. A computer “multiplexer” routes
the voice signal of the sender through microwave towers to a very
specifically defined location or cell. The “receiver” is located and tracked
with pinpoint accuracy, to within a few feet of actual location. But, the
receiver is not a cell phone. It’s a human brain. Out of nowhere, a voice
suddenly blooms in the mind of the target……………. The problem is that
artificial telepathy provides the perfect weapon for mental torture and
information theft. It provides an extremely powerful means for exploiting,
harassing, controlling, and raping the mind of any person. Artificial
telepathy also offers an ideal means for complete invasion of privacy. If all
thoughts can be read then Passwords, Pin numbers, one cannot be alone
in the bathroom or shower. Sleep can be disturbed, dreams can be
invaded and altered, thoughts derailed or block or twisted, Private
moments with a mate is invaded, evidence is collected to try and blackmail
you. And you find yourself hunted, stalked, harassed and abused by a
person (s) 24/7 a day who refuse to give there names. And they get
delight in the perverse and sadistic torture of there targets and
commenting on everything you think, and comment they are
demonstrating there is nothing you can do about it, and prove it and they
say they can not get busted as they are police, parole and other
 The hearing of microwave pulses is a unique exception to
the airborne or bone conducted sound energy normally
encountered in human auditory perception. The hearing
apparatus responds to acoustic or sound pressure waves in
the audible frequency range, but the hearing of microwave
pulses involves electromagnetic waves whose frequency
ranges from hundreds of megahertz (MHZ) to tens of
gigahertz (GHZ). Since electromagnetic waves (e.g., light)
are seen but not heard, the report of auditory perception of
microwave pulses was at once astonishing and intriguing.
Moreover, it stood in sharp contrast to the responses
associated with continiuos wave (CW) microwave radiation.
Intially, it had been interperted to imply direct microwave
interaction with the neurophysiological system………………..
 The thermocelastic theory for hearing microwave pulses
was developed on the basis of bulk absorption of pulsed
microwave energy in the brain, which was assumed to be
sperical, for analytically clarity and simplicity. Recently. A
numerical analysis was presented using the Finite-
Difference/Time-Domain computational
formulation, which is capable of detailed anatomic
modeling of the brain and head structure. Aside from
confirming the characteristic of the induced acoustic waves
such as sound frequency and pressure amplitude-
previously obtained using a homogeneous spericaal head,
the numerical computation graphically illustrates the
sequence of pressure wave propagation inside the head,
following absorption of pulsed microwave energy. The
pressure wave reverberated, and then focused near the
center of the head.
 Among the several transduction mechanisms suggested that
involve mechanical displacement, the thermoelastic expansion has
emerged as the most effective mechanism. The pressure waves
generated by thermolestic stress in the brain tissue are found to
be one to three orders of magnitude greater than any other
candidate mechanism. A detailed mathematical analysis has
shown that the minuscule (10-6 oC) but rapid rise in temperature
in the head of animals and humans as a result of the absorption of
pulsed microwave energy creates a thermoelastic expansion of
tissue matter, which then launches an acoustic wave of pressure
that travels to the cochlea and is detected by the hair cells there.
The thermoelastic theory of auditory preception of pulsed
microwaves describes the acoustic waves (frequency, pressure
and displacement) generated in the head as functions of head size
and characteristics of impinging and absorbed microwave engeries
"Synthetic Telepathy"
 In 1975, researcher A. W. Guy stated that "one of the most widely
observed and accepted biologic effects of low average power
electromagnetic energy is the auditory sensation evoked in man when
exposed to pulsed microwaves."
 He concluded that at frequencies where the auditory effect can be easily
detected, microwaves penetrate deep into the tissues of the head, causing
rapid thermal expansion (at the microscopic level only) that produces
strains in the brain tissue.
 An acoustic stress wave is then conducted through the skull to the
cochlea, and from there, it proceeds in the same manner as in
conventional hearing. It is obvious that receiver-less radio has not been
adequately publicized or explained because of national security concerns.
 Today, the ability to remotely transmit microwave voices inside a
target's head is known inside the Pentagon as "Synthetic Telepathy."
According to Dr. Robert Becker, "Synthetic Telepathy has applications in
covert operations designed to drive a target crazy with voices or deliver
undetected instructions to a programmed assassin."
 This technology may have contributed to the deaths of 25 defense
scientists variously employed by Marconi Underwater and Defense
Systems, Easems and GEC. Most of the scientists worked on highly
sensitive electronic warfare programs for NATO, including the Strategic
Defense Initiative. It is claimed that directed energy weapons might have
been used to literally drive these men to suicide and 291accidents.
Thought Readings:
 Thought reading is an enhanced version of computer speech recognition,
with EEG waves being substituted for sound waves. The easiest
"thought" reading is actually remote picking up of the electro-magnetic
activity of the speech-control muscles.
 When we say words to ourselves, silently, or, read a book, we can
actually feel the slight sensations of those words in our vocal muscles -
all that is absent is the passage of air. Coordinated speech signals are
relatively strong and relatively consistent.
 We are "fed" hypnotic signals to force consistent "neutral" content
(but of different character than prior to becoming test subjects) in
dreams. These forced, neutral content ("bland" content) dreams occur
every single night and may represent the experimenters' efforts to have
our experiences portray themselves in such dreams, in effect, mining our
 confirms the ability of current
unclassified technology to actually see what a living animal sees,
electronically. It is therefore extremely likely that these forced dreams
can be displayed on the experimenters' screens in an adjacent
apartment or adjacent house, (which are made obvious to the
involuntary experimentee).
Silent Subliminal Presentation
 This is the BAD BOY they use
and piggyback with other
devices on carrier frequency’s
to elicit all sorts of other
 Audible sound is transmitted
directly into the target’s skull,
or through a target’s wall, of
course this can drive the
through-the-wall target crazy,
and if the target complains,
the target will be immediately
diagnosed as mentally ill.
 Patent 5159703
 This also can be put on a
carrier frequency and
transmitted through cell
phone towers, AND OTHER
 Taken from patent 5159703 this technology is subliminally, a
much more powerful technology is at work
 A sophisticated electronic system to speak directly to the mind of
the listener, to alter and entrain brainwaves, to manipulate his
brains electroencephalographically (EEG) patterns and artificially
implant negative emotional states-feelings of fear anxiety, despair
and hopelessness………….
 The subliminal system don't just tell a person to feel an emotion,
it makes them feel it, it implants that emotion in their minds………
 There appear to be two methods of delivery with the system.
 One is direct microwave induction into the brain of the subject,
limited to short-range operations.
 The other, as described above, utilizes ordinary radio (AM-FM)
and television (UHF-VHF)………..
 Surveillance Systems: Although technically
these devices are not imaging systems, for
regulatory purposes they will be treated in
the same way as through-wall imaging and
will be permitted to operate in the frequency
band 1.99-10.6 GHz. Surveillance systems
operate as "security fences" by establishing
a stationary RF perimeter field and detecting
the intrusion of persons or objects in that
field. Operation is limited to law
enforcement, fire and rescue organizations,
to public utilities and to industrial entities.
 Also in these RF fields they can hear and
 They can also track and locate individuals.
GPSit Tracking & Monitoring
Global Positioning Satellite
International Technologies
 GPSit: has a secure computer
online tracking service for virtually any
cell phone in the nation and you can
find and see a persons location with
the same wireless solution that law
enforcement agencies across the
nation uses every day this is the most
complete and comprehensive solution
for digital mapping and 24/7 tracking .
 The exclusive Find and See Locator
tracking software and interactive
website allows the end user 24/7 easy
access to the location of their vehicles,
packages or people in less than 30
 GPSit has created management tools
to facilitate the simultaneous locating
or tracking of persons, Retrive, files or
print instant history reports on
persons locations.

 TM-UWB Time Modulated
Ultra Wideband is used by
Law Enforcement officers
and they use these cell-
phone towers to conduct
secret surveillance and
 communications since the
communication are on the
low frequency ultra-
wideband they are only
detected as background
noises by other devices.
 CDMA-Code Division Multiplex Access
 COFDM- Coded Orthogonal Frequency
Division Multiplexing
 FDMA-Frequency Division Multiplexing Access
 OFDM- Orthogonal Frequency Division
 TDMA- Time Division Multiplexing Access
 WCDMA- Wideband Code Division
Multiplexing Access
 SDMA- Spatial Division Multiplexing
 TM-UWB- Time Modulation Ultra Wideband
 RF Towers- Radio Frequency
 Microwave towers
Device and method for detecting localization,
monitoring, and identification of living organisms in

 Document Type and Number:
 United States Patent 7057516

 A device and method for detecting the presence of living
organisms in a structure or behind a wall or partition utilizes a
microwave or radio-frequency one or more transceivers which
generate separate and distinct interrogating signals and receives
separate and distinct signals reflected from a structure and living
organisms within it. The reflected signals received by each of the
transceivers are processed, for instance by a microprocessor, so
as to provide output signals that indicate the presence or absence
of a living organism in the structure or behind wall or partition.
The microprocessor distinguishes and differentiate signals from
different living organisms and from false indication of the
presence of living organisms, thereby enabling the detection of
living organisms despite the existence of motion signals caused by
non-living organism motion. Similarly, the device can distinguish
between the biological characteristics, such as respiration rates, of
targets to determine if the targets are of the type sought, for
example, human targets as opposed to pets or insects.
Steering of directional sound
 Steering of directional sound beams
 Document Type and Number:
 United States Patent 7146011
 Link to this page:
 Abstract:
 Apparatus is disclosed for steering a directional audio beam that is self-demodulated
from an ultrasound carrier. The apparatus includes means for modulating a carrier
signal with an audio signal and means for adjusting the amplitude and phase of at
least one of the audio signal and/or the carrier signal to steer the audio beam to a
desired direction. The apparatus also includes means for generating an ultrasound
beam in the desired direction driven by the modulated carrier signal. The apparatus
may include means for weighting the audio and/or carrier signal by a zeroth order
Bessel function to synthesize a Bessel distribution source. A corresponding method
for steering a directional audio beam is also disclosed. A harmonic generator may be
used to generate harmonics of low frequencies in the audio signal. The harmonics
may provide (upon demodulation) a psycho-acoustic impression of improved
perception of low frequencies. Further, a modulated ultrasonic signal or an
unmodulated audio signal may be band-passed into two or more different band-
limited signals. The band-limited signals may be amplified and transmitted by
ultrasonic transducers having mechanical resonance frequencies substantially equal
to a characteristic frequency of the band-limited signals. Ultrasonic processing of the
audio signal may include square root methods without generating large numbers of
Filigree electrode pattern apparatus for steering parametric mode
acoustic beams
Document Type and Number:
United States Patent 6661739
A piezoelectric embedded monolithic active surface for transmitting a directed
acoustic beam comprising a monolithic active surface, a plurality of
piezoelectric elements embedded on the surface forming an array comprising,
a plurality of coupled frequency pairs comprising, a first primary frequency row
extending in a frequency steered direction the first primary frequency row
enabled to accept a first primary frequency signal, and a second primary
frequency row extending in the frequency steered direction and located
adjacent to the first primary frequency row the second primary frequency row
enabled to accept a second primary frequency signal, wherein the plurality of
coupled frequency pairs repeat in a delay-steered direction and wherein each
of the coupled frequency pairs are enabled to accept a time delayed copy of
the first and second primary frequency signals.
 This device projects
sound at a object and
you think it’s coming
from there.
 This is an old type
form of directed
acoustics now there is
Phraselator Magnetic
Los Angeles County
Sheriffs Department
 Magnetic Audio Device
 It can project a focused beam of
voice or sound over a distance of
two (2) miles.
• This device can go through walls
and buildings.
• This device based on frequency
and tonal pattern can
disorientate a target or
 This device can be used instead of
the CDMA or TM-UWB towers.
 These devices can be used to talk to
individuals or targets in the RF
Perimeter fields.
 Cop Tech 2010
Stink bombs, pain beams,
spy drones—this is the
future of law enforcement,
brought to you by the Los
Angeles Sheriff's
 LT-PMS-1 is used by
the Los Angeles
County Sheriff’s
Department and other
Law enforcement
 Long Range Acoustical
 This device is used by Law
Enforcement Agencies for
crowd control and in
hostage situations
supposedly but it has been
misused, for Electronic
Harassment and Stalking
of homeless, parolees and
 LRAD has a range of 1,000
 Sound Saber:
 Products are superior to horn
devices used as Mass Notification
System as the clarity CIS=0.95)
and directionality. It achieves its
acoustic charteristics with a total
harmonic distortion (THD) of less
than 1.5 % @ 70 % power
(1KHZ. Sine wave).
 The physics of its flat transducers
lend themselves to the creation of
BEAMS to send the
announcement where it is
 The Mass Notification System is
the Early Warning Operation
System or Emergency Alert
System (EAS) is used instead of
air raid sirens.
American Technology
 HSS: HyperSonic Speakers a
listener can stand anywhere and
it emits a ultrasonic sound in a
highly controlled narrow beam
so that can only be heard if you
are “in the beam” For example,
you can direct the ultrasonic
emitter toward a hard surface
such as a wall and the listener
perceives the sound coming
from that spot.
 Or you can point it at one
person and nobody else can
hear it.
 Or police officers have them
mounted in there grill in there
police car and line up on target
or individuals.
then find (requires)
selection speed: 56K/300K
choose one and watch video.

 Los Angeles County Sheriff’s, Glendora P.D. and
Azusa P.D. law enforcement agencies and
individuals in the public are using devices with
highly directional beams which are capable of
controlling people with pain and then vexing and
making them angry and attack people.
 YouTube - Mind Control Microchip Verichip Wel
YOU TUBE above
VIDEO !!!!
 Form your own
opinion !!!!!
 Intended for Law
• Produces a power
field of ultrasonic
shock wave energy.
 140+ db Matrix
 12VDC Internal
Batteries or External
 6” x 6” x 4” Size
 This device can also
be seen or
purchased at
 Miniature electronic device
intended for personal
protection or field
 Complex sonic shock
waves are internally
adjustable for
maximizing on target
• 125 db Directional sonic
shock waves
• 4”x3” shirt pocket size
• Operates on a 9 volt
• This devices can be
seen or purchased at
 Experimental Device
can be used on animals or
 Unit is fully adjustable for
maximizing effect on
target subjects.
• 130 db of directional
sonic shock waves
• 3 ½” x 5” Barrel
Houses Transducers
and Electronics
• Butt Section Houses 8
AA Batteries
• External Sweep and
Frequency Controls.
• This device can be seen
or purchased at
 ADS is a focused, speed-of-light
milli-meter wave energy beam
that creates intense heat.
 Active Denial Technology uses a
transmitter producing
electromagnetic radiation at a
frequency of 95 GHZ. And an
antenna to direct a focused,
invisible beam towards a designed
subject traveling at the speed of
light, the energy reaches the
subject and penetrates the skin to
a depth of less than 1/64 of an
 The waves excite water molecules
in the epidermis skin to around
130 degrees Fahrenheit causing
an intensely painful burning
 This model is for use by LAW
 This device has a 3.2 mile
 A device that can
translate and
broadcast voices
and talk to you in
50 languages.
 This device is also
used by law
 Engine disabling weapon - Patent 5952600
 A non-lethal weapon for disabling an engine such as that of
a fleeing car by means of a high voltage discharge that
perturbs or destroys the electrical ... - 44k - Cached
- Similar pages
 Remote vehicle disabling system - Patent 5293527
 A compact transportable electromagnetic pulse (EMP)
generating system for generating and transmitting EMPs at
a target vehicle to disrupt electronics ... - 59k - Cached
- Similar pages
 This video is over 5
years old.
Disorientation Device
 Experimental device uses moderate powered magnetic
pulses believed to disorientate many fauna from their
normal life styles of migration, mating instincts, etc..
Theory is currently being tested for ridding areas of
bothersome animals and insects. Increased energy fields
have long been known to confuse humans. We now offer a
special portable laboratory pulser intended for use by
qualified R&D personnel to study this phenomena.
 Variable 1-25 Pulses Per Sec.
 Pulse Energy Up to 10 Joules
 12 VDC/115 VAC/Battery Operation
 Cylindrical PVC Enclosure
 Higher Powered Units on Request
 Easily hidden circuit
produces a high pitch
sound that causes
nausea and
disorientation in a
perimeter field where
the device is located
and the target has to
get away from.
 Operates on a 9 volt
 This device can be
seen or purchased at
The Neurophone
 Dr. Patrick Flanagan invented the neurophone in 1958 when he was 14
years old. Portrayed in "New Alchemy" as a boy genius who invented
(among many other things) a better ICBM launch detector in elementary
school, Flanagan received a good deal of media attention even then.
Unable to get a patent on the device until 1967 because the patent office
didn't believe him, they eventually recanted when, according to Flanagan,
the neurophone allowed a deaf patent office employee to hear. On the
strength of his demonstration, and with his attorney present, the patent
was issued immediately.
 Flanagan later worked on human/dolphin communication at Tufts
University, where he incorporated the neurophone into his work. The
device enabled researchers to reduce high-frequency sounds to the audible
range, and a small-vocabulary language was developed.
 Soon after, Flanagan filed a patent for a digital version of the neurophone
which was not immediately issued. Instead, he says, the Defense
Intelligence Agency slapped a secrecy order on the project that would last
five years - during which he was unable to work on the project or discuss
it with anyone. According to Begich, Flanagan wasn't alone - by 1968, over
750,000 patents had been stolen from the public by such means.
Build Long Range Laser Window Bounce
and Optical Voice Communication Systems
 Remarkable concept where you listen to sounds picked up
from a reflecting surface illuminated by a laser. These light
reflections, or scatter, are reproduced back to the original
sound by our special optical receiver.
 Assembled laser and receiver modules may be placed on video
tripods and temporarily aligned for limited performance
demonstration systems. They may also be enclosed as shown in
the instructions for use as a field worthy device with a potential
range of up to 500 feet. May be used as a long range laser voice
communicator with a range usable to 10 miles line of sight. Low
cost audio surveillance science project or useful device for
listening to power line faults, over pressured pipes, etc.
 Plans show 3 systems ranging from a low cost science project to a
long range infra red surveillance system. Includes LVC1 long
range optical voice communication system.
Filigree electrode pattern apparatus for steering parametric mode ...
United States Patent 6661739. Link to this page:. Abstract:. A piezoelectric embedded
monolithic active ... - 41k - Cached - Similar pages
Phased beam transducer - US Patent 6108275
Phased beam transducer - US Patent 6108275 from Patent Storm. A phased-beam
transducer is disclosed for transmitting and receiving steered acoustic beam ... - 16k - Cached - Similar pages

 Compact, lightweight, steerable, high-power microwave antenna ...
 United States Patent 6559807. Link to this page:. Abstract:. A compact,
lightweight, steerable, high-power, ... - 39k - Cached - Similar pages
 Communication system and method including brain wave analysis and ...
 Abstract:. A system
and method for enabling human beings to communicate by way of their
monitored brain ... - 52k - Cached - Similar pages
 Ultrafast time hopping CDMA-RF communications: code-as-carrier ...
 United States Patent 5610907. Link to this page:. Abstract:. An
ultrashort pulse time hopping ... - 60k - Cached - Similar pages
 Shared-carrier frequency hopping - US Patent 5301188
 Shared-carrier frequency hopping - US Patent 5301188 from Patent Storm.
In a TDMA cellular network, there is provided a mechanism for shared-
carrier ... - 15k - Cached - Similar pages
 Modulated retroreflection system for secure communication and ...
 Modulated retroreflection system for secure communication and
identification - US Patent 5819164 from Patent Storm. A modulated
retroreflection system for ... - 18k - Cached - Similar pages
 Ultrawide-band communication system and method - US Patent 5677927
 Ultrawide-band communication system and method - US Patent 5677927
from Patent Storm. An impulse radio communications system using one or
more subcarriers ... - 16k - Cached - Similar pages
 Old Medical Device With Harassment Potential
 U.S. patent #3773049, covering the technology used in the LIDA machine.
... It is covered by U.S. Patent # 3773049. In addition to the pulsed RF
field, ... - 8k - Cached - Similar pages
[ More results from ]
System and method for intrusion detection using a time domain ...
System and method for intrusion detection using a time domain radar
array - US Patent 6400307 from Patent Storm. A system and method
for highly selective ... - 21k - Cached -
Similar pages
Virtually steerable parametric acoustic array - US Patent 4703462
Virtually steerable parametric acoustic array - US Patent 4703462 from Patent Storm.
The invention concerns an application of linear system parameter ... - 16k - Cached - Similar pages
 Hearing system - Patent 4877027
 Sound is induced in the head of a person by radiating the head with
microwaves in the range of 100 megahertz to 10000 megahertz that are
modulated with a ... - 30k - Cached - Similar pages
 United States Patent: 5159703
 United States Patent, 5159703. Lowery, October 27, 1992. Silent
subliminal presentation system. Abstract. A silent communications system in
which nonaural ... - 27k - Cached - Similar pages
 Frequency hopping code division multiple access system and method ...
 Frequency hopping code division multiple access system and method - US
Patent 5657343 from Patent Storm. A frequency-hopping-communications
system, ... - 18k - Cached - Similar pages
 Stress is a psychological and physiological response to events that
upset our personal balance in some way. Stress affects the mind,
body, and behavior and can cause DEATH. …………
 Chronic Stress: is “unrelenting demands and pressures for
seemingly interminable periods of time” Chronic stress is stress
that wears you down day after day and year after year, with no
visible escape. It grinds away at both mental and physical health,
leading to breakdown or DEATH. …..........
 Instead of leveling off once the crisis has passed your stress
hormones, heart rate, and blood pressure remain elevated.
Extended or repeated activation of the stress response takes a
heavy toll on the body. The physical wear and tear it causes
includes damage to the cardiovascular system and immune
system suppression.
 Health problems linked to stress are HEART ATTACK,

 GO TO :911Mysteries - Demolitions

Re-Cut (High ... 1 hr 30 min - Sep ...

Watch video - 90 min -
An example of EMF Brain
Brain Area Bioelectric

Frequency Information Induced
Through Modulation

Motor Control Cortex 10 HZ Motor Impulse Co-ordination

 Auditory Cortex 15 HZ Sound which bypasses the ears

Visual Cortex 25 HZ Images in the brain, bypassing the

 Somatosensory Cortex 09 HZ Phantom Touch Sense

 Thought Center 20 HZ Imposed Subconscious Thoughts
Voices in the Head
Washington Post on Electronic Harassment
 Technologies
"An academic paper written for the Air Force in the mid-1990s mentions the
idea of a weapon that would use sound waves to send words into a person's
head. "The signal can be a 'message from God' that can warn the enemy of
impending doom, or encourage the enemy to surrender." In 2002, the Air
Force Research Laboratory patented precisely such a technology: using
microwaves to send words into someone's head. The patent was based on
human experimentation in October 1994 at the Air Force lab, where
scientists were able to transmit phrases into the heads of human subjects..."

-- Washington Post article on electronic harassment and voices in the head,
 It's quite fascinating how many people immediately discount anyone who talks about
mind control. Government mind control programs have been reported
numerous times in the major media and have been the subject of intense
Congressional investigations which revealed widespread abuses. Below is yet
another major media article on this key topic, this one revealing that some people
who hear voices in their heads may actually be the subject of electronic harassment.
As these articles and thousands of pages of declassified government documents
make clear, mind control has been secretly studied for many decades.
 If you are unaware of this important field of study, there are many reliable, verifiable
resources which give much more information than the article below. For informative
major media news articles on electronic harassment weapons, click here. For a brief,
excellent summary of these weapons, click here. For a concise two-page
summary of government mind control programs based on 18,000 pages of
released government documents, click here. Though this information may be
disturbing, we feel it is better to be informed than to close our eyes. By spreading
 "It's undeniable that the technology exists," Girard says, "but if
you go to the police and say, 'I'm hearing voices,' they're going to
lock you up for psychiatric evaluation."
 In response to a Freedom of Information Act request filed for this
article, the Air Force released unclassified documents surrounding
that 2002 patent -- records that note that the patent was based on
human experimentation in October 1994 at the Air Force lab,
where scientists were able to transmit phrases into the heads of
human subjects, albeit with marginal intelligibility. Research
appeared to continue at least through 2002. Where this work has
gone since is unclear -- the research laboratory, citing
classification, refused to discuss it or release other materials.
 PYSOPS may be an unfamiliar term to you, yet it is of crucial importance.
PSYOPS, or psychological operations, is a term used in military and
government intelligence networks to "exploit human vulnerabilities in
enemy governments, militaries and populations to pursue national and
battlefield objectives," as quoted from the Washington Post article below
(link provided). Stated more simply, PSYOPS is a means of
intentionally deceiving targeted individuals and populations
through a variety of sophisticated methods for specified objectives
 A US State Department report suggested it was possible to induce a heart
attack in a person from a distance with radar. [79] MC 172