“ELECTRONIC SURVEILLANCE STALKING AND HARASSMENT”

finite Difference/Time Domain PulsON Technology GPSit “ TELEPATHY” “RADIO FREQUENCY PERIMETER FIELDS” “MAGNETIC AUDIO DEVICES” LT-PMS-1 (Magnetic audio device) “IMPLANTS” “SPY SATELLITES”

Unknown to most of the world, satellites can perform astonishing and often menacing feats. This should come as no surprise when one reflects on the massive effort poured into satellite technology since the Soviet satellite Sputnik, launched in 1957, caused panic in the U.S. A spy satellite can monitor a person's every movement, even when the "target" is indoors or deep in the interior of a building or traveling rapidly down the highway in a car, in any kind of weather (cloudy, rainy, stormy). There is no place to hide on the face of the earth. It takes just three satellites to blanket the world with detection capacity. Besides tracking a person's every action and relaying the data to a computer screen on earth, amazing powers of satellites include reading a person's mind, monitoring conversations, manipulating electronic instruments and physically assaulting someone with a laser beam. Remote reading of someone's mind through satellite technology is quite bizarre, yet it is being done; it is a reality at present, not a chimera from a futuristic dystopia! To those who might disbelieve my description of satellite surveillance, I'd simply cite a tried-and-true Roman proverb: Time reveals all things (tempus omnia revelat)...

ELECTRONIC SURVEILLANCE

Title lll of the omnibus Crime Control and Safe Streets Act 18 U.S.C. 2510-2520, authorizes the use of electronic surveillance for classes of crimes carefully specified in 18 U.S.C. 2516. Such surveillance is subject to prior court order. 18 U.S.C. 2518 sets forth the detailed and particularized application necessary to obtain such an order, as well as carefully circumscribed conditions for its use. The Act represents a comprehensive attempt by Congress to promote more effective control of crime while protecting the privacy of individual thought and expression. Much of Title lll has been drawn to meet constitutional requirements for electronic surveillance. The most basic function of any government is to provide for the security of the individual and his property. And unless government safeguards its own capacity to function and to preserve the security of its people, society itself may become so disordered that all rights and liberties are endangered. Civil liberties, as guaranteed by the U.S. Constitution, imply the existence of an organized society maintaining public order without which liberty itself is lost in the excesses of unrestrained abuses.

The Foreign Intelligence Surveillance Act

("FISA" Pub.L. 95-511, 92 Stat. 1783, enacted 1978-10-25, 50 U.S.C. ch.36) is an Act of Congress which prescribes procedures for the physical and electronic surveillance and collection of "foreign intelligence information" between "foreign powers" and "agents of foreign powers" (which may include American citizens and permanent residents suspected of

being engaged in espionage and violating U.S. law on territory under United States control.[1]

1073 The Foreign Intelligence Surveillance Act (FISA) -50 U.S.C. § 1809

Congress has enacted comprehensive legislation governing electronic surveillance. In 1968, Congress passed Title III of the Omnibus Crime Control and Safe Streets Act of 1968, 18 U.S.C. § 2510 et seq. In 1978, the Foreign Intelligence Surveillance Act of 1978 ("FISA"), 50 U.S.C. § 1801 et seq., was enacted. In 1986, Congress passed the Electronic Communications Privacy Act of 1986 ("1986 Act"), Public Law No. 99508, which substantially revised Title III to provide coverage for the technological advances developed in the area of electronic communications since the passage of the original act. Minor amendments have since been made to the 1986 Act. These statutes share several common characteristics. Both Title III and FISA prescribe authorization procedures which must be followed before electronic surveillance can be conducted. Compare 18 U.S.C. §§ 2516 to 2517 with 50 U.S.C. §§ 1802 to 1805. These procedures include judicial approval of surveillance applications; minimization of interceptions by surveilling officials; and limitations on the use of intercepted information. Moreover, both statutes impose civil and criminal sanctions on unauthorized surveillance activities. Compare 18 U.S.C. §§ 2511 (criminal penalties) and 2520 (civil sanctions) with 50 U.S.C. §§ 1809 (criminal penalties) and 1810 (civil sanctions). On the other hand, one court has distinguished between these regimes, holding that "FISA regulates both aural and visual electronic surveillance conducted for foreign intelligence purposes, and [Title III] regulates aural electronic surveillance conducted for domestic purposes." United States v. Koyomejian, 970 F.2d 536, 540 (9th Cir.) (en banc), cert. denied, 506 U.S. 1005 (1992).

§ 1802. Electronic surveillance authorization without court order; certification by Attorney General; reports to Congressional committees; transmittal under seal; duties and compensation of communication common carrier; applications; jurisdiction of court
• (1) Notwithstanding any other law, the President, through the Attorney General, may authorize electronic surveillance without a court order under this chapter to acquire foreign intelligence information for periods of up to one year if the Attorney General certifies in writing under oath that  (A) the electronic surveillance is solely directed at • (i) the acquisition of the contents of communications transmitted by means of communications used exclusively between or among foreign powers, as defined in section 1801(a)(1), (2), or (3) of this title; or • (ii) the acquisition of technical intelligence, other than the spoken communications of individuals, from property or premises under the open and exclusive control of a foreign power, as defined in section 1801(a)(1), (2), or (3) of this title;  (B) there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party; and  (C) the proposed minimization procedures with respect to such surveillance meet the definition of minimization procedures under section 1801 (h) of this title; and if the Attorney General reports such minimization procedures and any changes thereto to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence at least thirty days prior to their effective date, unless the Attorney General determines immediate action is required and notifies the committees immediately of such minimization procedures and the reason for their becoming effective immediately.

(b) Applications for a court order under this chapter are authorized if the President has, by written authorization, empowered the Attorney General to approve applications to the court having jurisdiction under section 1803 of this title, and a judge to whom an application is made may, notwithstanding any other law, grant an order, in conformity with section 1805 of this title, approving electronic surveillance of a foreign power or an agent of a foreign power for the purpose of obtaining foreign intelligence information, except that the court shall not have jurisdiction to grant any order approving electronic surveillance directed solely as described in paragraph (1)(A) of subsection (a) of this section unless such surveillance may involve the acquisition of communications of any United States person.

(2) An electronic surveillance authorized by this subsection may be conducted only in accordance with the Attorney General's certification and the minimization procedures adopted by him. The Attorney General shall assess compliance with such procedures and shall report such assessments to the House Permanent Select Committee on Intelligence and the Senate Select Committee on Intelligence under the provisions of section 1808 (a) of this title. • (3) The Attorney General shall immediately transmit under seal to the court established under section 1803 (a) of this title a copy of his certification. Such certification shall be maintained under security measures established by the Chief Justice with the concurrence of the Attorney General, in consultation with the Director of Central Intelligence, and shall remain sealed unless  (A) an application for a court order with respect to the surveillance is made under sections 1801 (h)(4) and 1804 of this title; or  (B) the certification is necessary to determine the legality of the surveillance under section 1806 (f) of this title. • (4) With respect to electronic surveillance authorized by this subsection, the Attorney General may direct a specified communication common carrier to  (A) furnish all information, facilities, or technical assistance necessary to accomplish the electronic surveillance in such a manner as will protect its secrecy and produce a minimum of interference with the services that such carrier is providing its customers; and  (B) maintain under security procedures approved by the Attorney General and the Director of Central Intelligence any records concerning the surveillance or the aid furnished which such carrier wishes to retain. The Government shall compensate, at the prevailing rate, such carrier for furnishing such aid.

Title 28 Electronic Surveillance

28 Electronic Surveillance -- Title III Applications • The Application should meet the following requirements:  It must be prepared by an applicant identified as a law enforcement or investigative officer. The application must be in writing, signed by the United States Attorney, an Assistant United States Attorney, and made under oath. It must be presented to a Federal district court or court of appeals judge and be accompanied by the Department's authorization memorandum signed by an appropriate Department of Justice official. The application may not be presented to a magistrate. See 18 U.S.C. §§ 2510(9) and 2516(1); see also In re United States of America, 10 F.3d 931 (2d Cir. 1993), cert. denied, 115 S. Ct. 64 (1994).  It must identify the type of communications to be intercepted. "Wire communications" include "aural transfers" (involving the human voice) that are transmitted, at least in part by wire, between the point of origin and the point of reception, i.e., telephone calls. 18 U.S.C. § 2510(1). This includes cellular phones, cordless phones, voice mail, and voice pagers, as well as traditional landline telephones. "Oral communications" are communications between people who are together under circumstances where the parties enjoy a reasonable expectation of privacy. 18 U.S.C. § 2510(2). An "electronic communication" most commonly involves digital-display paging devices or fax machines, but also includes electronic mail, computer transmissions, and, in some cases, satellite transmissions. It does not include tone-only paging devices, tracking devices (as defined by 18 U.S.C. 3117), or electronic funds transfer information. 18 U.S.C. § 2510(12).

It must identify the specific Federal offenses for which there is probable cause to believe are being committed. The offenses that may be the predicate for a wire or oral interception order are limited to only those set forth in 18 U.S.C. § 2516(1). In the case of electronic communications, a request for interception may be based on any Federal felony, pursuant to 18 U.S.C. § 2516(3). It must provide a particular description of the nature and location of the facilities from which, or the place where, the interception is to occur. An exception to this is the roving interception provision set forth in 18 U.S.C. § 2518(11)(a) and (b). The specific requirements of the roving provision are discussed in USAM 9-7.111. Briefly, in the case of a roving oral interception, the application must show, and the court order must indicate, that it is impractical to specify the location(s) where oral communications of a particular named subject are to be intercepted. 18 U.S.C. § 2518(11)(a)(ii) and (iii). In the case of a roving wire or electronic interception, the application must state, and the court order must indicate, that a particular named subject is using various and changing facilities for the purpose of thwarting electronic surveillance. 18 U.S.C. § 2518(11)(b)(ii) and (iii). The accompanying DOJ document authorizing the roving interception must be signed by an official at the level of an Assistant Attorney General (including Acting AAG) or higher. 18 U.S.C. § 2518(11)(a)(i) and (b)(i).

It must identify, with specificity, those persons known to be committing the offenses and whose communications are to be intercepted. In United States v. Donovan, 429 U.S. 413 (1977), the Supreme Court stated that 18 U.S.C. § 2518(1)(b)(iv) requires the government to name all individuals whom it has probable cause to believe are engaged in the offenses under investigation, and whose conversations it expects to intercept over or from within the targeted facilities. It is the Department's policy to name as potential subjects all persons whose involvement in the alleged offenses is indicated. See United States v. Ambrosio, 898 F. Supp. 177 (S.D.N.Y. 1995); United States v. Marcy, 777 F. Supp. 1400 (N.D. Ill. 1991); United States v. Martin, 599 F.2d 880 (9th Cir.), cert. denied, 441 U.S. 962 (1979). It must contain a statement affirming that normal investigative procedures have been tried and failed, are reasonably unlikely to succeed if tried, or are too dangerous to employ. 18 U.S.C. § 2518(1)(c). The applicant may then state that a complete discussion of attempted alternative investigative techniques is set forth in the accompanying affidavit. It must contain a statement affirming that the affidavit contains a complete statement of the facts--to the extent known to the applicant and the official approving the application--concerning all previous applications that have been made to intercept the oral, wire, or electronic communications of any of the named subjects or involving the target facility or location. 18 U.S.C. § 2518(1)(e).

United States Attorney manual
• • 9-7.110 Format for the Authorization Request When Justice Department review and approval of a proposed application for electronic surveillance is required, the Electronic Surveillance Unit of the Criminal Division's Office of Enforcement Operations will conduct the initial review of the necessary pleadings, which include: A. The affidavit of an "investigative or law enforcement officer" of the United States who is empowered by law to conduct investigations of, or to make arrests for, offenses enumerated in 18 U.S.C. § 2516(1) or (3) (which, for any application involving the interception of electronic communications, includes any Federal felony offense), with such affidavit setting forth the facts of the investigation that establish the basis for those probable cause (and other) statements required by Title III to be included in the application; B. The application by any United States Attorney or his/her Assistant, or any other attorney authorized by law to prosecute or participate in the prosecution of offenses enumerated in 18 U.S.C. § 2516(1) or (3) that provides the basis for the court's jurisdiction to sign an order authorizing the requested interception of wire, oral, and/or electronic communications; and C. A set of orders to be signed by the court authorizing the government to intercept, or approving the interception of, the wire, oral, and/or electronic communications that are the subject of the application, including appropriate redacted orders to be served on any relevant providers of "electronic communication service" (as defined in 18 U.S.C. § 2510(15)).

United States Attorney manual
• • 9-7.111 Roving Interception Pursuant to 18 U.S.C. § 2518(11)(a) and (b), the government may obtain authorization to intercept wire, oral, and electronic communications of specifically named subjects without specifying with particularity the premises within, or the facilities over which, the communications will be intercepted. (Such authorization is commonly referred to as "roving" authorization.) As to the interception of oral communications, the government may seek authorization without specifying the location(s) of the interception when it can be shown that it is not practical to do so. See United States v. Bianco, 998 F.2d 1112 (2d Cir. 1993), cert. denied, 114 S. Ct. 1644 (1994); United States v. Orena, 883 F. Supp. 849 (E.D.N.Y. 1995). An application for the interception of wire and electronic communications of specifically named subjects may be made without specifying the facility or facilities over which the communications will be intercepted when it can be shown that the subject or subjects of the interception have demonstrated a purpose to thwart interception by changing facilities. See United States v. Gaytan, 74 F.3d 545 (5th Cir. 1996); United States v. Petti, 973 F.2d 1441 (9th Cir. 1992), cert. denied, 113 S.Ct. 1859 (1993); United States v. Villegas, 1993 WL 535013 (S.D.N.Y. December 22, 1993). When the government seeks authorization for roving interception, the Department's authorization must be made by the Attorney General, the Deputy Attorney General, the Associate Attorney General, an Assistant Attorney General, or an Acting Assistant Attorney General. See 18 U.S.C. § 2518(11)(a)(i) and (b)(i).

United States Attorney Manual
• • 9-7.112 Emergency Interception Title III contains a provision which allows for the warrantless, emergency interception of wire, oral, and/or electronic communications. Specifically, under 18 U.S.C. § 2518(7), the Attorney General (AG), the Deputy Attorney General (DAG), or the Associate Attorney General (AssocAG) may specially designate a law enforcement or investigative officer to determine whether an emergency situation exists that requires the interception of wire, oral, and/or electronic communications before a court order authorizing such interception can, with due diligence, be obtained. As defined by 18 U.S.C. § 2518(7), an emergency situation involves either: (1) immediate danger of death or serious bodily injury to any person; (2) conspiratorial activities threatening the national security interest; or (3) conspiratorial activities characteristic of organized crime. The only situations which will likely constitute an emergency are those involving an imminent threat to life, i.e., a kidnapping or hostage taking. See United States v. Crouch, 666 F. Supp. 1414 (N.D. Cal. 1987)(wiretap evidence suppressed because there was no imminent threat of death or serious injury); Nabozny v. Marshall, 781 F.2d 83 (6th Cir.)(kidnapping and extortion scenario constituted an emergency situation), cert. denied, 476 U.S. 1161 (1986). The emergency provision also requires that grounds must exist under which an order could be entered (viz., probable cause, necessity, specificity of target location/facility) to authorize the interception. Once the AG, the DAG, or the AssocAG authorizes the law enforcement agency to proceed with the emergency Title III, the government then has fortyeight (48) hours, from the time the authorization was granted, to obtain a court order approving the emergency interception. 18 U.S.C. § 2518(7). The affidavit supporting the application for the order must contain only those facts known to the AG, the DAG, or the AssocAG at the time his or her approval was given, and must be accompanied by a written verification from the requesting agency noting the date and time of the authorization. Failure to obtain the court order within the forty-eight-hour period will render any interceptions obtained during the emergency illegal. Prior to the agency's contact with the AG, the DAG, or the Associate AG, oral approval to make the request must first be obtained from the Assistant Attorney General (AAG) or a Deputy Assistant Attorney General (DAAG) of the Criminal Division. This approval is facilitated by the Office of Enforcement Operation's Electronic Surveillance Unit, which is the initial contact for the requesting United States Attorney's Office and the requesting agency. Once the Electronic Surveillance Unit attorney briefs and obtains oral approval from the AAG or the DAAG, the attorney notifies the agency representative and the Assistant United States Attorney that the Criminal Division recommends that the emergency authorization proceed. The agency then contacts the AG, the DAG, or the AssocAG and seeks permission to proceed with the emergency Title III.

47 C.F.R. section 15.9
          

§ 15.9 Prohibition against eavesdropping. Except for the operations of law enforcement officers conducted under lawful authority, no person shall use, either directly or indirectly, a device operated pursuant to the provisions of this part for the purpose of overhearing or recording the private conversations of others unless such use is authorized by all of the parties engaging in the conversation.

Penal Code Section 630

630. The legislature hereby declares that advances in science and technology have led to the development of new devices and techniques for the purpose of eavesdropping upon private communications and that the invasion of privacy resulting from the continual and increasing use of such devices and techniques has created a serious threat in a free civilized society. The Legislature by this chapter intends to protect the right of privacy of the people of this state.

ELECTRONIC STALKING PENAL CODE 646.9 (g)

(g) For the purpose of this section, “Credible threat” means a verbal or written threat, including that performed through the use of an electronic communication device, or a threat implied by a pattern of conduct or a combination of verbal, written, or electronically communicated statements and conduct, made with the intent to place that person that is the target of the threat in reasonable fear for his or her safety or the safety of his or her family, and made with the apparent ability to carry out the threat so as to cause the person who is the target of the threat to reasonably fear for his or safety of his or her family. It is not necessary to prove that the defendant had the intent to actually carry out the threat. (h) For the purpose of this section, the term “electronic communication device” includes, but is not limited to , telephones, cellar phones, computers, video recorders, fax machines, or pagers. “Electronic communications” has the same meaning as the term described in Subsection 12 of Section 2510 of Title 18 of the United States Code.

California Penal Code § 653m (2001) - Obscene, Threatening or Annoying Communications (a) Every person who, with intent to annoy, makes contact by means of an electronic communication device with another and addresses to or about the other person any obscene language or addresses to the other person any threat to inflict injury to the person or property of the person addressed or any member of his or her family, is guilty of a misdemeanor. (b) Every person who makes repeated contact by means of an electronic communication device with intent to annoy another person at his or her residence, is, whether or not conversation ensues from electronic contact, IS guilty of a misdemeanor. (c) Every person who makes contact by means of an electronic communication device with the intent to annoy another person at his or her place of work is guilty of a misdemeanor punishable by a fine of not more than one thousand dollars ($ 1,000), or by imprisonment in a county jail for not more than one year, or by both that fine and imprisonment. (1) There is a temporary restraining order, an injunction, or any other court order, or any combination of these court orders, in effect prohibiting the behavior described in this section. HISTORY: Added Stats 1963 ch 801 § 1. Amended Stats 1978 ch 1022 § 1. Amended Stats 1990 ch 383 § 1 (AB 3437); Stats 1992 ch 1136 § 7 (SB 1541); Stats 1993 ch 589 § 116 (AB 2211); Stats 1998 ch 825 § 5 (SB 1796), ch 826 § 2 (AB 2351); Stats 1999 ch 83 § 147 (SB 966).

California Penal Code Section 653m

CONVENTION AGAINST TORTURE AND OTHER CRUEL, INHUMAN OR DEGRADING TREATMENT OR PUNISHMENT
ARTICLE 1

For the purpose of this Convention, the term “Torture” means any act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes as obtaining from him or a third person information or a confession, or punishing him for an act he or a third person has committed or is suspected of having committed, or intimidating or coercing him or a third person, or at the instigation of or with the consent or acquiescence of a public official. No exceptional circumstances whatsoever, whether a state of war or a threat of war, internal political in stability or any other public emergency, may be invoked as a justification of torture. An order from a superior officer or a public authority may not be invoked as a justification of torture,

ARTICLE 2
4.

5.

(1) Except as otherwise specifically provided in this chapter, any person who intentionally— (a) sends through the mail, or sends or carries in interstate or foreign commerce, any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications; (b) manufactures, assembles, possesses, or sells any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications, and that such device or any component thereof has been or will be sent through the mail or transported in interstate or foreign commerce; or (c) places in any newspaper, magazine, handbill, or other publication or disseminates by electronic means any advertisement of— (i) any electronic, mechanical, or other device knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications; or (ii) any other electronic, mechanical, or other device, where such advertisement promotes the use of such device for the purpose of the surreptitious interception of wire, oral, or electronic communications, knowing the content of the advertisement and knowing or having reason to know that such advertisement will be sent through the mail or transported in interstate or foreign commerce, shall be fined under this title or imprisoned not more than five years, or both.
HISTORY: (Added June 19, 1968, P.L. 90-351, Title III, § 802, 82 Stat. 214; Oct. 21, 1986, P.L. 99-508, Title I, § 101(c)(1), (7), (f)(2), 100 Stat. 1851.) (As amended Sept. 13, 1994, P.L. 103-322, Title XXXIII, §§ 330016(1)(L), 330022, 108 Stat. 2147, 2150; Oct. 11, 1996, P.L. 104-294, Title VI, § 604(b)(45), 110 Stat. 3509; Nov. 21, 1997, P.L. 105-112, § 2, 111 Stat. 2273; Nov. 25, 2002, P.L. 107-296, Title II, Subtitle C, § 225(f), 116 Stat. 2158.)

18 U.S.C. 2512 Manufacture Distribution, Possession, and advertising of wire, oral or electronic communication intercepting devices prohibited

18 U.S.C. 2513 Confiscation of wire, oral or electronic communication interceptingused, sent, carried, manufactured, devices Any electronic, mechanical, or other device

assembled, possessed, sold, or advertised in violation of section 2511 or section 2512 of this chapter may be seized and forfeited to the United States. All provisions of law relating to (1) the seizure, summary and judicial forfeiture, and condemnation of vessels, vehicles, merchandise, and baggage for violations of the customs laws contained in title 19 of the United States Code, (2) the disposition of such vessels, vehicles, merchandise, and baggage or the proceeds from the sale thereof, (3) the remission or mitigation of such forfeiture, (4) the compromise of claims, and (5) the award of compensation to informers in respect of such forfeitures, shall apply to seizures and forfeitures incurred, or alleged to have been incurred, under the provisions of this section, insofar as applicable and not inconsistent with the provisions of this section; except that such duties as are imposed upon the collector of customs or any other person with respect to the seizure and forfeiture of vessels, vehicles, merchandise, and baggage under the provisions of the customs laws contained in title 19 of the United States Code shall be performed with respect to seizure and forfeiture of electronic, mechanical, or other intercepting devices under this section by such officers, agents, or other persons as may be authorized or designated for that purpose by the Attorney General.

HISTORY: (Added June 19, 1968, P.L. 90-351, Title III, § 802, 82 Stat. 215; Oct. 21, 1986, P.L. 99-508, Title I, § 101(c), 100 Stat. 1851.)

TITLE 18 U.S.C. SECTION 242

Deprivation of Rights Under Color of Law

This statute makes it a crime for any person acting under color of law, statute, ordinance, regulation, or custom to willfully deprive or cause to be deprived from any person those rights, privileges, or immunities secured or protected by the Constitution and laws of the U.S. This law further prohibits a person acting under color of law, statute, ordinance, regulation or custom to willfully subject or cause to be subjected any person to different punishments, pains, or penalties, than those prescribed for punishment of citizens on account of such person being an alien or by reason of his/her color or race. Acts under "color of any law" include acts not only done by federal, state, or local officials within the bounds or limits of their lawful authority, but also acts done without and beyond the bounds of their lawful authority; provided that, in order for unlawful acts of any official to be done under "color of any law," the unlawful acts must be done while such official is purporting or pretending to act in the performance of his/her official duties. This definition includes, in addition to law enforcement officials, individuals such as Mayors, Council persons, Judges, Nursing Home Proprietors, Security Guards, etc., persons who are bound by laws, statutes ordinances, or customs. Punishment varies from a fine or imprisonment of up to one year, or both, and if bodily injury results or if such acts include the use, attempted use, or threatened use of a dangerous weapon, explosives, or fire shall be fined or imprisoned up to ten years or both, and if death results, or if such acts include kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, shall be fined under this title, or imprisoned for any term of years or for life, or both, or may be sentenced to death.
HISTORY: (June 25, 1948, ch 645, § 1, 62 Stat. 696; April 11, 1968, P.L. 90-284, Title I, § 103(b), 82 Stat. 75; Nov. 18, 1988, P.L. 100-690, Title VII, Subtitle B, § 7019, 102 Stat. 4396.) (As amended Sept. 13, 1994, P.L. 103-322, Title VI, § 60006(b), Title XXXII, Subtitle A, § 320103(b), Subtitle B, § 320201(b), Title XXXIII, § 330016(1)(H), 108 Stat. 1970, 2109, 2113, 2147; Oct. 11, 1996, P.L. 104-294, Title VI, §§ 604(b)(14)(B), 607(a), 110 Stat. 3507, 3511.)

TITLE 18 > PART I > CHAPTER 13 > § 241§ Conspiracy against RIGHTS IF two or more persons conspire to injure, oppress, threaten, or intimidate any person in any State, Territory, Commonwealth, Possession, or District in the free exercise or enjoyment of any right or privilege secured to him by the Constitution or laws of the United States, or because of his having so exercised the same; or If two or more persons go in disguise on the highway, or on the premises of another, with intent to prevent or hinder his free exercise or enjoyment of any right or privilege so secured— They shall be fined under this title or imprisoned not more than ten years, or both; and if death results from the acts committed in violation of this section or if such acts include kidnapping or an attempt to kidnap, aggravated sexual abuse or an attempt to commit aggravated sexual abuse, or an attempt to kill, they shall be fined under this title or imprisoned for any term of years or for life, or both, or may be sentenced to death.
HISTORY: (June 25, 1948, ch 645, § 1, 62 Stat. 696; April 11, 1968, P.L. 90-284, Title I, § 103(a), 82 Stat. 75; Nov. 18, 1988, P.L. 100-690, Title VII, Subtitle B, § 7018(a), (b)(1), 102 Stat. 4396.) (As amended Sept. 13, 1994, P.L. 103-322, Title VI, § 60006(a), Title XXXII, Subtitle A, § 320103(a), Subtitle B, § 320201(a), Title XXXIII, § 330016(1)(L), 108 Stat. 1970, 2109, 2113, 2147; Oct. 11, 1996, P.L. 104-294, Title VI, §§ 604(b)(14)(A), 607(a), 110 Stat. 3507, 3511.)

TITLE 18 U.S.C SECTION 241

TITLE 50 SECTION 1810 CIVIL LIABILITY

 

An aggrieved person, other than a foreign power or an agent of a foreign power, as defined in section 1801(a) or (b)(1)(A) of this title, respectively, who has been subjected to an electronic surveillance or about whom information obtained by electronic surveillance of such person has been disclosed or used in violation of section 1809 of this title shall have a cause of action against any person who committed such violation and shall be entitled to recover (a) actual damages, but not less than liquidated damages of $1,000 or $100 per day for each day gf violation, whichever is greater; (b) punitive damages; and (c) reasonable attorney's fees and other investigation and litigation costs reasonably incurred

(a) Prohibited activities  A person is guilty of an offense if he intentionally • (1) engages in electronic surveillance under color of law except as authorized by statute; or • (2) discloses or uses information obtained under color of law by electronic surveillance, knowing or having reason to know that the information was obtained through electronic surveillance not authorized by statute.  (b) Defense  It is a defense to a prosecution under subsection (a) of this section that the defendant was a law enforcement or investigative officer engaged in the course of his official duties and the electronic surveillance was authorized by and conducted pursuant to a search warrant or court order of a court of competent jurisdiction.  (c) Penalties  An offense described in this section is punishable by a fine of not more than $10,000 or imprisonment for not more than five years, or both.  (d) Federal jurisdiction  There is Federal jurisdiction over an offense under this section if the person committing the offense was an officer or employee of the United States at the time the offense was committed.

TITLE 50 SECTION 1809 CRIMINAL SANCTIONS

ATTENTION & WARNING:

You are being warned of a massive attack of U.S. citizens that is going on at this moment all across the country. Evidence of the activity has been discovered through technical research proving that this is in fact true. For approximately six years there have been reports from people throughout this country claiming that they have been under attack in their homes from radio frequency weapons that cause effects that decrease the immune system, also these reports include that many of these people are implanted with covert devices causing extreme pain are also being reported. You and your family members may also be victims of this same activity, some of the initial symptoms are very common such as insomnia, acid reflux and many others, the radio frequency energy also causes physiological changes that cause syndromes and disease of all kinds including heart attack because the techniques of attack is radio frequency. This means you or your family members could have symptoms or be sick from this same widespread covert activity.

THE REASON FOR GIVING YOU THIS INFORMATION IS AS YOU WOULD IMAGINE,THAT WE AS AMERICANS KNOW THAT YOU WOULD BE HIGHLY INTERESTED IN SUCH CRIMES AGAINST US U.S. CITIZENS. WHEN SUCH CRIMES HAVE BEEN REPORTED TO POLICE, THE FBI, OR OTHER LAW ENFORCEMENT AGENCIES IT IS TOTALLY IGNORED DESPITE EVIDENCE ILLUSTRATING THAT SUCH ATROCITIES ARE GOING ON. THIS MEANS AT THIS MOMENT YOUR COUNTRY IS KEEPING YOU IN THE DARK ON PURPOSE WHILE THERE IS AN ACTIVITY OF PUBLIC EXCUTIONS WITHOUT TRIAL GOING ON ACROSS THIS NATION.

“WARNING”

“SOUNDS IMPOSSIBLE BUT IT’S TRUE”

It sounds impossible that attacks on citizens are occurring. From millionaires to ordinary housewives and husbands even children are under attack from directed energy and covertly implanted with harmful and deadly devices. Directed energy purposefully pointed at them for what has been proven to be multiple purposes. Such purposes are human experiment, population management reduction, behavioral manipulation, political reasons, economic business sabotage, reduction of retirement benefits, increasing medical profits, law enforcement investigations designed to pad their budgets, motives of rape, to make money from programs offering use of such equipment, used as a revenge technology tool by corrupt operatives and worst of all but relevant that there are quotas for operatives to make.

I would like to draw your attention to some extreme and horrendous criminality being conducted with the involvement of United States Government-related Agencies and the complicity, if not participation, of many other governments and agencies. I am a victim of torture and abuse using Directed Energy and Neurological Weapons technology. There is massive ignorance and secrecy regarding this, and victims such as I are being subjected to uncontrolled and unacknowledged torture and mental and physical destruction. This has remained completely unreported and undiscussed publicly.

I have been a victim of directed energy weapons, remote harassment, and organized stalking since 2002. The phenomenon is real. It includes psychological harassment to induce Psychosis, Isolation, Depression, and suicide; physical and emotional manipulation; and devastation of financial and social resources . Nobody is above the law, yet some groups or agencies out there believes themselves to be. This is not right. The use of directed energy weapons, remote harassment, and organized stalking are quite plainly unlawful, criminal acts, and indeed cruel and unusual punishment. I refuse to surrender my freedom and I demand justice, not just us and fuck you !!!!!!!

I can confirm the following technical abilities and powers as follow:
1.That they can place a human subject under continuous surveillance, no matter where he/she is from remote locations. 2. That they can monitor a human brain from remote locations including thought, reaction, motor command, auditory event and visual image reading. 3.They can continuously input directly into a human brain from remote locations, including the ability to override, control and alter consciousness, and to induce voices, noises,other disturbances, images, and “dreams” into the brain. 4. That they can directly interfere with abuse , torture and hit your body with invisible beams from remote locations. 5. That they can interfere with alter, insert, etc. data files, communications and legal evidence from remote locationseven during transmission. THESE THINGS ARE ALREADY IN EXISTENCE AND ARE ALREADY BEING USED AND ABUSED ON MYSELF AND OTHER U.S. CITIZENS.

HOW IS ALL THIS DONE ?

These Advances in Scientific Technology and Techniques are done many different ways ranging from Satellite to the different types of towers located through out each city, county, and state and the United States…………. They can be done from remote locations ranging from your local police agency, police car, and from other command points. They can use a computer from these location to lap tops and even hand held computers.

In this next example it is showing you how easily and on the fly as they call it can be done. AM TO FM MODULATION

RFID : Radio Frequency

RFID “Powder”

IDentification Devices

The world’s smallest and thinnest RFID tags are manufactured by Hitachi. These RFID chips (Radio Frequency IDentification chips) measure just 0.4x 0.4 millimeters. The new RFID chips have a 128 bit ROM for storing a unique 38 digit number They can also use Retrorelection Communication and Identification with passive chips.

Figure 11 An image of a typical medical telesensor developed at ORNL [179]. Another area of interest at ORNL is the development of medical telesensors, which are being used by military troops in combat zones to provide information on vital functions to remote recorders. An array of chips has been developed to collectively monitor bodily functions. These chips are attached at various points on a person using a nonirritating adhesive and can send physiological data by wireless transmission to an intelligent monitor on another person’s helmet. The monitor can also be used to receive and transmit global satellite positioning data to help medical staff locate a wounded soldier. Figure 11 shows a 2 × 2-millimeter silicon chip attached to the skin. The chip contains a temperature sensor in an integrated circuit, a lithium thin-film battery that supplies the very low level of power required by the circuit and signal processing and transmission electronics, and an antenna that sends the data by radio signals (radiofrequency transmission) to a monitor when the chip is queried.

 

TELESENSOR

VeriChip is the first Food and Drug Administration (FDA)-approved human-implantable RFID microchip. VeriChip received United States FDA approval in 2004. ...

VeriChip is the first Food and Drug Administration (FDA)approved human-implantable RFID microchip. VeriChip received United States FDA approval in 2004. About twice the length of a grain of rice, the device is typically implanted above the triceps area of an individual’s right arm. Once scanned at the proper frequency, the VeriChip responds with a unique 16-digit number which can correlate the user to information stored on a database for identity verification, medical records access and other uses. The insertion procedure is performed under local anesthetic in a physician's office and once inserted, is invisible to the naked eye. As an implanted device used for identification by a third party, it has generated controversy and debate. Double click on the YouTube and watch the video make sure you are on the large screen on the bottom left above the word DRAW these three buttons push the one that looks like a goblet The Frequency’s used for these devices are 125/134.2 KHZ and 13.56 MHZ. YouTube - Verichip

Implants

Implants are without a doubt the most invasive form of harassment. Electronic implants consist of transmitters, ESF generators, micro-neurophonic transceivers, tracking devices and other micro sized devices designed to cause harassment by tracking or controlling movement and thought. It consists of a unit that is powered by bodily fluids and is capable of transmitting voice signals, high voltage pulses, emitting a small tracking beacon signal, or other unspecified uses (mind control). Implant types: transponder, transceiver, micronuerophonic transceivers, RFID,

ZIPQUILL

The ID-100 TROVAN implantable transponder was previously approved on February 15, 1996. The TROVAN ZIPQUILLTM is a unique transponder delivery device which consists of a tiny container shaped like a bullet, which tapers to a sharp point. Inside is an ID-100A transponder. The ZIPQUILL does not make an incision, or cut, in the skin as a syringe would. Rather it pierces the skin, allowing for rapid closure of the opening after penetration of the ZIPQUILLTM, thereby minimizing tissue damage and trauma. Once inserted into a human, the device can be tracked by Global Positioning Satellite technology and the information relayed to the internet.

The “Right to Privacy” may be inferred from the language of the First, Fourth, Fifth, and Ninth Amendments. It has also been established through common law precedents. As early as 1891, Justice Gray of the U.S. Supreme Court indicated that”[n]o right is held more sacred, or is more carefully guarded, by the common law, than the right of every individual to possession and control of his own person, free from all restraint or interference of others, unless by clear and unquestionable authority of law. Similar sentiments have been echoed by Justice Cardozo in his famous statement that “[e]very human being of adult years and sound mind has a right to determine what shall be done with his own body” The right to privacy defined by Justices Gray and Cardozo is a right to bodily integrity. Also it is recognized that an individual has the right to prevent intrusions into his own body under “Property Law”, and he can invoke the Fourteenth Amendment protection. Implantation of microchips concern an internal property interest in the self because placement of the device involves breaking the skin to place a foreign object within the body permanently. Fourth Amendment claims can be applied to microchip implants. The clearest application will be to the embodiment of the device that can read-write and track. Still, read only and readwrite devices implicate Fourth Amendment principles because, once installed, either could be scanned by police to obtain information about the individual. Scanning of the microchip would be considered as a Search…………………. The Fifth-Amendment could be applied to the use of microchips implants because it could be a form of self-incrimination as the device has scanning and tracking capabilities Futhermore, the implantation of the device is illegal as can be seen in Senate Bill 362 and Civil Code 52.7 Futhermore in the case of any of the embodiments, an individual has a expectation of privacy and a right as to the information on the microchip that has been implanted illegally.

SENATE BILL No. 362
                       

SENATE BILL No. 362 Introduced by Senator Simitian February 20, 2007 An act to add Section 52.7 to the Civil Code, relating to identification devices. legislative counsel’s digest SB 362, as amended, Simitian. Identification devices: subcutaneous implanting. Existing law accords every person the right of protection from bodily restraint or harm, from personal insult, from defamation, and from injury to his or her personal relations, subject to the qualifications and restrictions provided by law. This bill would prohibit a person from requiring, coercing, or compelling any other individual to undergo the subcutaneous implanting of an identification device, as defined. The bill would provide for the assessment of civil penalties for a violation thereof, as specified, and would allow an aggrieved party to bring an action against a violator for damages and injunctive relief, subject to a 3-year statute of limitation, or as otherwise provided. The bill would also allow an interested party to petition the court on behalf of an incompetent or minor upon specified circumstances. Vote: majority. Appropriation: no. Fiscal committee: no. State-mandated local program: no. 95

“VOICE “MORPHING”
  

“Gentleman! We have called you together to inform you that we are going to overthrow the United States government” So begins a statement being delivered by Gen. Carl W. Steiner, former Commander-in-chief, U.S. Special Operations Command. At least the voice sounds amazingly like him. But it is not Steiner. It is the result of voice “morphing” technology developed at Los Almos National Laboratory in New Mexico. By taking just a few seconds a digital recording of Steiner’s voice scientist George Papcun is able, in real time, to clone speech patterns and develop an accurate facsimile. With this technology they can become your friends voice, a cop, a parole office or your mate as “voices in the air” to harass and stalk you…………………and talk to you 24/7 a day for years. Digital morphing-voice, video, and photo has come of age, and used as psychological operations (PSYOPS) to seek and exploit human vulnerabilities on citizens, parolees, and homeless, in our city's, states, in the U.S..

SILENT COMPUTERIZED SUBVOCAL SPEECH
 

What is analyzed is silent ,or sub-auditory speech, such as follows as when a person silently reads or talks to himself. Biological signals arise when reading or speaking to oneself with or without actual lip or facial movement. A person using the subvocal system thinks of phrases and talks to himself so quietly, it cannot be heard, but the tongue and vocal cords do receive speech signals from the brain. After, the signals are amplified, computer software reads the signals to recognize word or sound. This site and technology can be found on the computer at Silent Computerized Subvocal Speech, which is being used by Law Enforcement and other agencies and people.

A Voice Only You Can Hear: DARPA's Sonic Projector

Imagine a weapon that creates sound that only you can hear. Science fiction? No, this is one area that has a very solid basis in reality. The Air Force has experimented with microwaves that create sounds in people's head (which they've called a possible psychological warfare tool), and American Technologies can "beam" sounds to specific targets with their pate (and yes, I've heard/seen them demonstrate the speakers, and they are shockingly effective). Now the Defense Advanced Research Projects Agency is jumping on the bandwagon with their new "Sonic Projector" program: The goal of the Sonic Projector program is to provide Special Forces with a method of surreptitious audio communication at distances over 1 km. Sonic Projector technology is based on the non-linear interaction of sound in air translating an ultrasonic signal into audible sound. The Sonic Projector will be designed to be a man-deployable system, using high power acoustic transducer technology and signal processing algorithms which result in no, or unintelligible, sound everywhere but at the intended target. The Sonic Projector system could be used to conceal communications for special operations forces and hostage rescue missions, and to disrupt enemy activities.

The Voice of God weapon -- a device that projects voices into your head to make you think God is speaking to you -- is the military's equivalent of an urban myth. Meaning, it's mentioned periodically at defense workshops (ironically, I first heard about it at the same defense conference where I first met Noah), and typically someone whispers about it actually being used. Now Steven Corman, writing at the COMOPS journal, describes his own encounter with this urban myth: At a government workshop some time ago I head someone describe a new tool that was described as the “voice of Allah.” This was said to be a device that would operate at a distance and would deliver a message that only a single person could hear. The story was that it was tested in a conflict situation in Iraq and pointed at one insurgent in a group, who whipped around looking in all directions, and began a heated conversation with his compatriots, who did not hear the message. At the time I greeted this story with some skepticism. Is there any basis to this technology? Well, Holosonic Research Labs and American Technology Corporation both have versions of directed sound, which can allow a single person to hear a message that others around don't hear. DARPA appears to be working on its own sonic projector. Intriguingly, Strategy Page reports that troops are using the Long Range Acoustic Device as a modified Voice of God weapon: It appears that some of the troops in Iraq are using "spoken" (as opposed to "screeching") LRAD to mess with enemy fighters. Islamic terrorists tend to be superstitious and, of course, very religious. LRAD can put the "word of God" into their heads. If God, in the form of a voice that only you can hear, tells you to surrender, or run away, what are you gonna do? And as Corman also notes, CNET recently wrote about an advertisement in New York for A&E's TV show Paranormal State, which uses some of this technology. Beyond directed sound, it's long been known that microwaves at certain frequencies can produce an auditory effect that sounds like it's coming from within someone's head (and there's the nagging question of classified microwave work at Brooks Air Force Base, that the Air Force stubbornly refuses to talk about). That brings us back to the Voice of God/Allah Weapon. Is it real or bogus? In one version -- related to me by another defense reporter -- it's not just Allah's voice -- but an entire holographic image projected above (um, who decides what Allah looks like?). Does it exist? I'm not sure, but it's funny that when you hear it brought up at defense conferences, no one ever asks the obvious question: does anybody think this thing will actually convince people God is speaking to them? I'm thinking, not.

HEARING VOICES & ARTIFICIAL TELEPATHY

Hearing Voices- The experience of “Artificial Telepathy” is really not that extraordinary. It’s as simple as receiving a cell-phone call in one’s head. Satellites link the sender and the receiver. A computer “multiplexer” routes the voice signal of the sender through microwave towers to a very specifically defined location or cell. The “receiver” is located and tracked with pinpoint accuracy, to within a few feet of actual location. But, the receiver is not a cell phone. It’s a human brain. Out of nowhere, a voice suddenly blooms in the mind of the target……………. The problem is that artificial telepathy provides the perfect weapon for mental torture and information theft. It provides an extremely powerful means for exploiting, harassing, controlling, and raping the mind of any person. Artificial telepathy also offers an ideal means for complete invasion of privacy. If all thoughts can be read then Passwords, Pin numbers, one cannot be alone in the bathroom or shower. Sleep can be disturbed, dreams can be invaded and altered, thoughts derailed or block or twisted, Private moments with a mate is invaded, evidence is collected to try and blackmail you. And you find yourself hunted, stalked, harassed and abused by a person (s) 24/7 a day who refuse to give there names. And they get delight in the perverse and sadistic torture of there targets and commenting on everything you think, and comment they are demonstrating there is nothing you can do about it, and prove it and they say they can not get busted as they are police, parole and other individuals……………….

“HEARING VOICES” 1

The hearing of microwave pulses is a unique exception to the airborne or bone conducted sound energy normally encountered in human auditory perception. The hearing apparatus responds to acoustic or sound pressure waves in the audible frequency range, but the hearing of microwave pulses involves electromagnetic waves whose frequency ranges from hundreds of megahertz (MHZ) to tens of gigahertz (GHZ). Since electromagnetic waves (e.g., light) are seen but not heard, the report of auditory perception of microwave pulses was at once astonishing and intriguing. Moreover, it stood in sharp contrast to the responses associated with continiuos wave (CW) microwave radiation. Intially, it had been interperted to imply direct microwave interaction with the neurophysiological system………………..

“HEARING VOICES” 2

The thermocelastic theory for hearing microwave pulses was developed on the basis of bulk absorption of pulsed microwave energy in the brain, which was assumed to be sperical, for analytically clarity and simplicity. Recently. A numerical analysis was presented using the Finite-

Difference/Time-Domain computational formulation, which is capable of detailed anatomic

modeling of the brain and head structure. Aside from confirming the characteristic of the induced acoustic waves such as sound frequency and pressure amplitudepreviously obtained using a homogeneous spericaal head, the numerical computation graphically illustrates the sequence of pressure wave propagation inside the head, following absorption of pulsed microwave energy. The pressure wave reverberated, and then focused near the center of the head.

“HEARING VOICES” 3

Among the several transduction mechanisms suggested that involve mechanical displacement, the thermoelastic expansion has emerged as the most effective mechanism. The pressure waves generated by thermolestic stress in the brain tissue are found to be one to three orders of magnitude greater than any other candidate mechanism. A detailed mathematical analysis has shown that the minuscule (10-6 oC) but rapid rise in temperature in the head of animals and humans as a result of the absorption of pulsed microwave energy creates a thermoelastic expansion of tissue matter, which then launches an acoustic wave of pressure that travels to the cochlea and is detected by the hair cells there. The thermoelastic theory of auditory preception of pulsed microwaves describes the acoustic waves (frequency, pressure and displacement) generated in the head as functions of head size and characteristics of impinging and absorbed microwave engeries

"Synthetic Telepathy"
 

In 1975, researcher A. W. Guy stated that "one of the most widely observed and accepted biologic effects of low average power electromagnetic energy is the auditory sensation evoked in man when exposed to pulsed microwaves." He concluded that at frequencies where the auditory effect can be easily detected, microwaves penetrate deep into the tissues of the head, causing rapid thermal expansion (at the microscopic level only) that produces strains in the brain tissue. An acoustic stress wave is then conducted through the skull to the cochlea, and from there, it proceeds in the same manner as in conventional hearing. It is obvious that receiver-less radio has not been adequately publicized or explained because of national security concerns. Today, the ability to remotely transmit microwave voices inside a target's head is known inside the Pentagon as "Synthetic Telepathy." According to Dr. Robert Becker, "Synthetic Telepathy has applications in covert operations designed to drive a target crazy with voices or deliver undetected instructions to a programmed assassin." This technology may have contributed to the deaths of 25 defense scientists variously employed by Marconi Underwater and Defense Systems, Easems and GEC. Most of the scientists worked on highly sensitive electronic warfare programs for NATO, including the Strategic Defense Initiative. It is claimed that directed energy weapons might have been used to literally drive these men to suicide and 291accidents.

Thought Readings:
 

Thought reading is an enhanced version of computer speech recognition, with EEG waves being substituted for sound waves. The easiest "thought" reading is actually remote picking up of the electro-magnetic activity of the speech-control muscles. When we say words to ourselves, silently, or, read a book, we can actually feel the slight sensations of those words in our vocal muscles all that is absent is the passage of air. Coordinated speech signals are relatively strong and relatively consistent. We are "fed" hypnotic signals to force consistent "neutral" content (but of different character than prior to becoming test subjects) in dreams. These forced, neutral content ("bland" content) dreams occur every single night and may represent the experimenters' efforts to have our experiences portray themselves in such dreams, in effect, mining our experiences. www.raven1.net/elecvisn.htm confirms the ability of current unclassified technology to actually see what a living animal sees, electronically. It is therefore extremely likely that these forced dreams can be displayed on the experimenters' screens in an adjacent apartment or adjacent house, (which are made obvious to the involuntary experimentee).

Silent Subliminal Presentation System
 

 

This is the BAD BOY they use and piggyback with other devices on carrier frequency’s to elicit all sorts of other effects. Audible sound is transmitted directly into the target’s skull, or through a target’s wall, of course this can drive the through-the-wall target crazy, and if the target complains, the target will be immediately diagnosed as mentally ill. Patent 5159703 This also can be put on a carrier frequency and transmitted through cell phone towers, AND OTHER DEVICES.

SILENT SOUND TECHNIQUES
 

 

Taken from patent 5159703 this technology is subliminally, a much more powerful technology is at work A sophisticated electronic system to speak directly to the mind of the listener, to alter and entrain brainwaves, to manipulate his brains electroencephalographically (EEG) patterns and artificially implant negative emotional states-feelings of fear anxiety, despair and hopelessness…………. The subliminal system don't just tell a person to feel an emotion, it makes them feel it, it implants that emotion in their minds……… ………. There appear to be two methods of delivery with the system. One is direct microwave induction into the brain of the subject, limited to short-range operations. The other, as described above, utilizes ordinary radio (AM-FM) and television (UHF-VHF)………..

FCC RF IMAGING AND SURVEILLANCE

Surveillance Systems: Although technically these devices are not imaging systems, for regulatory purposes they will be treated in the same way as through-wall imaging and will be permitted to operate in the frequency band 1.99-10.6 GHz. Surveillance systems operate as "security fences" by establishing a stationary RF perimeter field and detecting the intrusion of persons or objects in that field. Operation is limited to law enforcement, fire and rescue organizations, to public utilities and to industrial entities. Also in these RF fields they can hear and talk. They can also track and locate individuals.

GPSit Tracking & Monitoring Global Positioning Satellite International Technologies

GPSit: has a secure

computer online tracking service for virtually any cell phone in the nation and you can find and see a persons location with the same wireless solution that law enforcement agencies across the nation uses every day this is the most complete and comprehensive solution for digital mapping and 24/7 tracking . The exclusive Find and See Locator tracking software and interactive website allows the end user 24/7 easy access to the location of their vehicles, packages or people in less than 30 seconds. GPSit has created management tools to facilitate the simultaneous locating or tracking of persons, Retrive, files or print instant history reports on persons locations.

CELL PHONE TOWERS

TM-UWB Time Modulated Ultra Wideband is used by Law Enforcement officers and they use these cellphone towers to conduct secret surveillance and communications since the communication are on the low frequency ultrawideband they are only detected as background noises by other devices.

 

 

 

     

CDMA-Code Division Multiplex Access COFDM- Coded Orthogonal Frequency Division Multiplexing FDMA-Frequency Division Multiplexing Access OFDM- Orthogonal Frequency Division Multiplexing TDMA- Time Division Multiplexing Access WCDMA- Wideband Code Division Multiplexing Access SDMA- Spatial Division Multiplexing TM-UWB- Time Modulation Ultra Wideband RF Towers- Radio Frequency Microwave towers DS-CDMA SS-CDDA

Device and method for detecting localization, monitoring, and identification of living organisms in structures
  

Document Type and Number: United States Patent 7057516 Abstract: A device and method for detecting the presence of living organisms in a structure or behind a wall or partition utilizes a microwave or radio-frequency one or more transceivers which generate separate and distinct interrogating signals and receives separate and distinct signals reflected from a structure and living organisms within it. The reflected signals received by each of the transceivers are processed, for instance by a microprocessor, so as to provide output signals that indicate the presence or absence of a living organism in the structure or behind wall or partition. The microprocessor distinguishes and differentiate signals from different living organisms and from false indication of the presence of living organisms, thereby enabling the detection of living organisms despite the existence of motion signals caused by non-living organism motion. Similarly, the device can distinguish between the biological characteristics, such as respiration rates, of targets to determine if the targets are of the type sought, for example, human targets as opposed to pets or insects.

Steering of directional sound beams
      

Steering of directional sound beams Document Type and Number: United States Patent 7146011 Link to this page: http://www.freepatentsonline.com/7146011.html Abstract: Apparatus is disclosed for steering a directional audio beam that is self-demodulated from an ultrasound carrier. The apparatus includes means for modulating a carrier signal with an audio signal and means for adjusting the amplitude and phase of at least one of the audio signal and/or the carrier signal to steer the audio beam to a desired direction. The apparatus also includes means for generating an ultrasound beam in the desired direction driven by the modulated carrier signal. The apparatus may include means for weighting the audio and/or carrier signal by a zeroth order Bessel function to synthesize a Bessel distribution source. A corresponding method for steering a directional audio beam is also disclosed. A harmonic generator may be used to generate harmonics of low frequencies in the audio signal. The harmonics may provide (upon demodulation) a psycho-acoustic impression of improved perception of low frequencies. Further, a modulated ultrasonic signal or an unmodulated audio signal may be band-passed into two or more different bandlimited signals. The band-limited signals may be amplified and transmitted by ultrasonic transducers having mechanical resonance frequencies substantially equal to a characteristic frequency of the band-limited signals. Ultrasonic processing of the audio signal may include square root methods without generating large numbers of harmonics.

Filigree electrode pattern apparatus for steering parametric mode acoustic beams Document Type and Number: United States Patent 6661739 A piezoelectric embedded monolithic active surface for transmitting a directed acoustic beam comprising a monolithic active surface, a plurality of piezoelectric elements embedded on the surface forming an array comprising, a plurality of coupled frequency pairs comprising, a first primary frequency row extending in a frequency steered direction the first primary frequency row enabled to accept a first primary frequency signal, and a second primary frequency row extending in the frequency steered direction and located adjacent to the first primary frequency row the second primary frequency row enabled to accept a second primary frequency signal, wherein the plurality of coupled frequency pairs repeat in a delay-steered direction and wherein each of the coupled frequency pairs are enabled to accept a time delayed copy of the first and second primary frequency signals.

AMERICAN TECHNOLOGY

ACOUSTIC HETRODYNE
This device projects sound at a object and you think it’s coming from there. This is an old type form of directed acoustics now there is LRAD,MRAD, Phraselator Magnetic AudioDevice. HYPERSONIC SPEAKERS


Magnetic Audio Device

Los Angeles County Sheriffs Department

It can project a focused beam of voice or sound over a distance of two (2) miles. • This device can go through walls and buildings. • This device based on frequency and tonal pattern can disorientate a target or (individual). This device can be used instead of the CDMA or TM-UWB towers. These devices can be used to talk to individuals or targets in the RF Perimeter fields.

Cop Tech 2010 Stink bombs, pain beams, spy drones—this is the future of law enforcement, brought to you by the Los Angeles Sheriff's Department

PROOF OF DIRECTED ACOUSTIC BEAMS
 

http://video.google.com/videoplay?docid=758224616 LT-PMS-1 is used by the Los Angeles County Sheriff’s Department and other Law enforcement agencies.

AMERICAN TECHNOLOGY
 

LRAD Long Range Acoustical Device. This device is used by Law Enforcement Agencies for crowd control and in hostage situations supposedly but it has been misused, for Electronic Harassment and Stalking of homeless, parolees and citizens. LRAD has a range of 1,000 meters.

AMERICAN TECHNOLOGY

Sound Saber:
Products are superior to horn devices used as Mass Notification System as the clarity CIS=0.95) and directionality. It achieves its acoustic charteristics with a total harmonic distortion (THD) of less than 1.5 % @ 70 % power (1KHZ. Sine wave). The physics of its flat transducers lend themselves to the creation of BEAMS to send the announcement where it is needed. The Mass Notification System is the Early Warning Operation System or Emergency Alert System (EAS) is used instead of air raid sirens.

HSS: HyperSonic Speakers a listener can stand anywhere and it emits a ultrasonic sound in a highly controlled narrow beam so that can only be heard if you are “in the beam” For example, you can direct the ultrasonic emitter toward a hard surface such as a wall and the listener perceives the sound coming from that spot. Or you can point it at one person and nobody else can hear it. Or police officers have them mounted in there grill in there police car and line up on target or individuals.

American Technology

http://www.atcsd.com/site/content/view/13/29 then find (requires) selection speed: 56K/300K choose one and watch video.

PAIN BEAM

Los Angeles County Sheriff’s, Glendora P.D. and Azusa P.D. law enforcement agencies and individuals in the public are using devices with highly directional beams which are capable of controlling people with pain and then vexing and making them angry and attack people.

PROOF YOU CAN BE CONTROLLED AND ANGERED
 

YouTube - Mind Control Microchip Verichip Wel DOUBLE CLICK ON YOU TUBE above AND WATCH VIDEO !!!! Form your own opinion !!!!!

PHASOR PAIN FIELD GENERATOR

Intended for Law Enforcement Personnel.

• Produces a power field of ultrasonic shock wave energy.
 

 

140+ db Matrix Output 12VDC Internal Batteries or External 115VAC 6” x 6” x 4” Size This device can also be seen or purchased at www.amazing1.com

PHASOR PAIN FIELD BLASTER

Miniature electronic device intended for personal protection or field research. Complex sonic shock waves are internally adjustable for maximizing on target subject.

• 125 db Directional sonic shock waves • 4”x3” shirt pocket size • Operates on a 9 volt battery. • This devices can be seen or purchased at www.amazing1.com

PHASOR BLAST WAVE PISTOL

Experimental Device can be used on animals or people. Unit is fully adjustable for maximizing effect on target subjects.
• 130 db of directional sonic shock waves • 3 ½” x 5” Barrel Houses Transducers and Electronics • Butt Section Houses 8 AA Batteries • External Sweep and Frequency Controls. • This device can be seen or purchased at www.amazing1.com

ACTIVE DENIAL SYSTEM
 

ADS is a focused, speed-of-light milli-meter wave energy beam that creates intense heat. Active Denial Technology uses a transmitter producing electromagnetic radiation at a frequency of 95 GHZ. And an antenna to direct a focused, invisible beam towards a designed subject traveling at the speed of light, the energy reaches the subject and penetrates the skin to a depth of less than 1/64 of an inch. The waves excite water molecules in the epidermis skin to around 130 degrees Fahrenheit causing an intensely painful burning sensation. This model is for use by LAW ENFORCEMENT. This device has a 3.2 mile distance

AMERICAN TECHNOLOGY
 

PHRASELATOR A device that can translate and broadcast voices and talk to you in 50 languages. This device is also used by law enforcement agencies.

THIS IS HOW THEY DISABLE A CAR OR TARGET
 

 

Engine disabling weapon - Patent 5952600 A non-lethal weapon for disabling an engine such as that of a fleeing car by means of a high voltage discharge that perturbs or destroys the electrical ... www.freepatentsonline.com/5952600.html - 44k - Cached - Similar pages Remote vehicle disabling system - Patent 5293527 A compact transportable electromagnetic pulse (EMP) generating system for generating and transmitting EMPs at a target vehicle to disrupt electronics ... www.freepatentsonline.com/5293527.html - 59k - Cached - Similar pages

PROOF YOUR VEHICLE CAN BE DISABLED
 

http://video.google.com/videoplay?docid=-144 http://video.google.com/videoplay?docid=-14 This video is over 5 years old.

Disorientation Device

    

Experimental device uses moderate powered magnetic pulses believed to disorientate many fauna from their normal life styles of migration, mating instincts, etc.. Theory is currently being tested for ridding areas of bothersome animals and insects. Increased energy fields have long been known to confuse humans. We now offer a special portable laboratory pulser intended for use by qualified R&D personnel to study this phenomena. Variable 1-25 Pulses Per Sec. Pulse Energy Up to 10 Joules 12 VDC/115 VAC/Battery Operation Cylindrical PVC Enclosure Higher Powered Units on Request

SONIC NAUSEA DEVICE

Easily hidden circuit produces a high pitch sound that causes nausea and disorientation in a perimeter field where the device is located and the target has to get away from. Operates on a 9 volt battery. This device can be seen or purchased at www.amazing1.com.

The Neurophone

Dr. Patrick Flanagan invented the neurophone in 1958 when he was 14 years old. Portrayed in "New Alchemy" as a boy genius who invented (among many other things) a better ICBM launch detector in elementary school, Flanagan received a good deal of media attention even then. Unable to get a patent on the device until 1967 because the patent office didn't believe him, they eventually recanted when, according to Flanagan, the neurophone allowed a deaf patent office employee to hear. On the strength of his demonstration, and with his attorney present, the patent was issued immediately. Flanagan later worked on human/dolphin communication at Tufts University, where he incorporated the neurophone into his work. The device enabled researchers to reduce high-frequency sounds to the audible range, and a small-vocabulary language was developed. Soon after, Flanagan filed a patent for a digital version of the neurophone which was not immediately issued. Instead, he says, the Defense Intelligence Agency slapped a secrecy order on the project that would last five years - during which he was unable to work on the project or discuss it with anyone. According to Begich, Flanagan wasn't alone - by 1968, over 750,000 patents had been stolen from the public by such means.

 Remarkable concept where you listen to sounds picked up
from a reflecting surface illuminated by a laser. These light reflections, or scatter, are reproduced back to the original sound by our special optical receiver. Assembled laser and receiver modules may be placed on video tripods and temporarily aligned for limited performance demonstration systems. They may also be enclosed as shown in the instructions for use as a field worthy device with a potential range of up to 500 feet. May be used as a long range laser voice communicator with a range usable to 10 miles line of sight. Low cost audio surveillance science project or useful device for listening to power line faults, over pressured pipes, etc. Plans show 3 systems ranging from a low cost science project to a long range infra red surveillance system. Includes LVC1 long range optical voice communication system.

Build Long Range Laser Window Bounce Listeners and Optical Voice Communication Systems

Filigree electrode pattern apparatus for steering parametric mode ... United States Patent 6661739. Link to this page:. http://www.freepatentsonline.com/6661739.html. Abstract:. A piezoelectric embedded monolithic active ... www.freepatentsonline.com/6661739.html - 41k - Cached - Similar pages Phased beam transducer - US Patent 6108275 Phased beam transducer - US Patent 6108275 from Patent Storm. A phased-beam transducer is disclosed for transmitting and receiving steered acoustic beam ... www.patentstorm.us/patents/6108275.html - 16k - Cached - Similar pages
 

 

 

Compact, lightweight, steerable, high-power microwave antenna ... United States Patent 6559807. Link to this page:. http://www.freepatentsonline.com/6559807.html. Abstract:. A compact, lightweight, steerable, high-power, ... www.freepatentsonline.com/6559807.html - 39k - Cached - Similar pages Communication system and method including brain wave analysis and ... http://www.freepatentsonline.com/6011991.html. Abstract:. A system and method for enabling human beings to communicate by way of their monitored brain ... www.freepatentsonline.com/6011991.html - 52k - Cached - Similar pages Ultrafast time hopping CDMA-RF communications: code-as-carrier ... United States Patent 5610907. Link to this page:. http://www.freepatentsonline.com/5610907.html. Abstract:. An ultrashort pulse time hopping ... www.freepatentsonline.com/5610907.html - 60k - Cached - Similar pages

 

 

 

 

Shared-carrier frequency hopping - US Patent 5301188 Shared-carrier frequency hopping - US Patent 5301188 from Patent Storm. In a TDMA cellular network, there is provided a mechanism for sharedcarrier ... www.patentstorm.us/patents/5301188.html - 15k - Cached - Similar pages Modulated retroreflection system for secure communication and ... Modulated retroreflection system for secure communication and identification - US Patent 5819164 from Patent Storm. A modulated retroreflection system for ... www.patentstorm.us/patents/5819164.html - 18k - Cached - Similar pages Ultrawide-band communication system and method - US Patent 5677927 Ultrawide-band communication system and method - US Patent 5677927 from Patent Storm. An impulse radio communications system using one or more subcarriers ... www.patentstorm.us/patents/5677927.html - 16k - Cached - Similar pages Old Medical Device With Harassment Potential U.S. patent #3773049, covering the technology used in the LIDA machine. ... It is covered by U.S. Patent # 3773049. In addition to the pulsed RF field, ... www.raven1.net/lida.htm - 8k - Cached - Similar pages [ More results from www.raven1.net ]

System and method for intrusion detection using a time domain ... System and method for intrusion detection using a time domain radar array - US Patent 6400307 from Patent Storm. A system and method for highly selective ... www.patentstorm.us/patents/6400307.html - 21k - Cached Similar pages
Virtually steerable parametric acoustic array - US Patent 4703462 Virtually steerable parametric acoustic array - US Patent 4703462 from Patent Storm. The invention concerns an application of linear system parameter ... www.patentstorm.us/patents/4703462.html - 16k - Cached - Similar pages
 

 

 

Hearing system - Patent 4877027 Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10000 megahertz that are modulated with a ... www.freepatentsonline.com/4877027.html - 30k - Cached - Similar pages United States Patent: 5159703 United States Patent, 5159703. Lowery, October 27, 1992. Silent subliminal presentation system. Abstract. A silent communications system in which nonaural ... www.raven1.net/5159703.htm - 27k - Cached - Similar pages Frequency hopping code division multiple access system and method ... Frequency hopping code division multiple access system and method - US Patent 5657343 from Patent Storm. A frequency-hopping-communications system, ... www.patentstorm.us/patents/5657343.html - 18k - Cached - Similar pages

SIGNS, SYMPTOMS, CAUSES, AND EFFECTS FROM “ELECTRONIC STALKING AND HARASSMENT”

Stress is a psychological and physiological response to events that upset our personal balance in some way. Stress affects the mind, body, and behavior and can cause DEATH. ………… Chronic Stress: is “unrelenting demands and pressures for seemingly interminable periods of time” Chronic stress is stress that wears you down day after day and year after year, with no visible escape. It grinds away at both mental and physical health, leading to breakdown or DEATH. ….......... Instead of leveling off once the crisis has passed your stress hormones, heart rate, and blood pressure remain elevated. Extended or repeated activation of the stress response takes a heavy toll on the body. The physical wear and tear it causes includes damage to the cardiovascular system and immune system suppression. Health problems linked to stress are HEART ATTACK, HYPERTENSION (HIGH BLOOD PRESSURE) STROKE, DEPRESSION, SUBSTANCE ABUSE, ULCERS, IRRITABLE BOWEL SYNDROME, MEMORY LOSS, INSOMNIA, THYROID PROBLEMS…..

911 MYSTERIES

http://www.google.com/search?q=911M  CLICK ON ABOVE SITE WITH YOUR MOUSE THEN:  GO TO :911Mysteries - Demolitions Re-Cut (High ... 1 hr 30 min - Sep ... Watch video - 90 min -

An example of EMF Brain Stimulation:
Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation Motor Control Cortex 10 HZ Motor Impulse Co-ordination

Auditory Cortex 15 HZ Sound which bypasses the ears Visual Cortex 25 HZ Images in the brain, bypassing the eyes

Somatosensory Cortex 09 HZ Phantom Touch Sense Thought Center 20 HZ Imposed Subconscious Thoughts

Voices in the Head Washington Post on Electronic Harassment Technologies "An academic paper written for the Air Force in the mid-1990s mentions the

idea of a weapon that would use sound waves to send words into a person's head. "The signal can be a 'message from God' that can warn the enemy of impending doom, or encourage the enemy to surrender." In 2002, the Air Force Research Laboratory patented precisely such a technology: using microwaves to send words into someone's head. The patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects..." -- Washington Post article on electronic harassment and voices in the head, 1/14/07 It's quite fascinating how many people immediately discount anyone who talks about mind control. Government mind control programs have been reported numerous times in the major media and have been the subject of intense Congressional investigations which revealed widespread abuses. Below is yet another major media article on this key topic, this one revealing that some people who hear voices in their heads may actually be the subject of electronic harassment. As these articles and thousands of pages of declassified government documents make clear, mind control has been secretly studied for many decades. If you are unaware of this important field of study, there are many reliable, verifiable resources which give much more information than the article below. For informative major media news articles on electronic harassment weapons, click here. For a brief, excellent summary of these weapons, click here. For a concise two-page summary of government mind control programs based on 18,000 pages of released government documents, click here. Though this information may be disturbing, we feel it is better to be informed than to close our eyes. By spreading

"It's undeniable that the technology exists," Girard says, "but if you go to the police and say, 'I'm hearing voices,' they're going to lock you up for psychiatric evaluation." In response to a Freedom of Information Act request filed for this article, the Air Force released unclassified documents surrounding that 2002 patent -- records that note that the patent was based on human experimentation in October 1994 at the Air Force lab, where scientists were able to transmit phrases into the heads of human subjects, albeit with marginal intelligibility. Research appeared to continue at least through 2002. Where this work has gone since is unclear -- the research laboratory, citing classification, refused to discuss it or release other materials. PYSOPS may be an unfamiliar term to you, yet it is of crucial importance. PSYOPS, or psychological operations, is a term used in military and government intelligence networks to "exploit human vulnerabilities in enemy governments, militaries and populations to pursue national and battlefield objectives," as quoted from the Washington Post article below (link provided). Stated more simply, PSYOPS is a means of intentionally deceiving targeted individuals and populations through a variety of sophisticated methods for specified objectives A US State Department report suggested it was possible to induce a heart attack in a person from a distance with radar. [79] MC 172

RICHARD A. MONGEON AKA: THE RABBIT ARIES THE RAM

THIS IS THE JUNGLE BABY!

Sign up to vote on this title
UsefulNot useful