strahlenfolter stalking - ti - robert o. butner - account from mr. joseph hohlman - rob-files.com

Upload: hans-werner-gaertner

Post on 04-Jun-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    1/16

    This is the html version of the file http://www.rob-files.com/Mind%20Control%20Attacks%20-%20Joseph%20Hohlman.doc.

    Googleautomatically generates html versions of documents as we crawl the web.

    THIS IS A DOCUMENT FROM WWW.ROB-FILES.COM

    EDITED SEPTEMBER 2012

    Original JUNE 2009:

    ROM: WWW.ROB-FILES.COM

    Below is a very detailed, interesting and factual account from an honorable and professional friend, Mr. Joseph Hohlman.As with other issues in this report, all data and links can be researched for validation.

    One point is - there are hundreds of these type cases throughout the world (all with similar but different characteristics).Most have been properly reported to Federal Authorities.

    VALUABLE LINKS AT END

    Bob Butner

    Mind Control Attacks (Mindcon), Neurological Weapons Attacks, Electronic Attacks, Electronic Harassment, Electronic

    mplants and Brain State Monitoring / Brain State Control, Brain Entrainment, Brainwashing, Brainwave Signatures,

    Mind Reading (Mindread), Behavioral Modification, Body Control (Bodycon), Brain Stimulation, Subliminal Mindontrol Programming Technologies, Ultrasonic Mind Control, Manchurian Candidates, Electronic Gang Stalking,

    inaural Beats, Voice-to-Skull V2K Technology, Gang Stalking, (EWS)Electronic Weapons Systems, (DEW)Directed

    nergy Weapons, (EWSI)Electronic Weapon System Implants, (FLIR) Forward Looking Infrared ( thermal ) Imaging,

    aser Technologies..'Gang Stalking'.."Electronic Gang Stalking" (EGS); "Massive Electronic Attack Nightmare" (MEAN) -ometimes called, "electronic gangstalking," ; "Microwave" gang stalking and also including such technologies as "Ultrasonic"ang stalking..

    Electronic Weapons Systems" (EWS); "Directed Energy Weapons" (DEW); "Electronic Weapon System

    mplants" (EWSI); 'Gang Stalking'..

    Dear Sirs..

    My only question is why are these specific spy "technologies" and "gang stalking" activities currently legal for

    pying/harassment/stalking/torment/terrorizing/torture of any/all American citizens..For basically any reason they/someone may choose..}

    elow is a ( rather long/detailed ) overview of these "gang stalking activities/technologies" with specific referenced web-links ( at the end )..

    ome information maybe dated and/or obsolete..Some maybe hard for the 'unaware' to believe or even mentally phantom it's existence..

    's all very real and being used/implemented daily_in American communities across America..

    ve sent this email to:

    White House, 'D.O.J./Eric Holder, House Speaker Nancy Pelosi, Rep. John Conyers, Senator Patrick Leahy, Senator Dianne Feinstein, Senator

    Russ Feingold, Rep. Jane Harmon, House Democratic Leader Steny Hoyer, Senate Majority Leader Harry Reid..

    U.S. Secret Service, FBI, CBS, MSNBC, NBC, ABC, Time..

    ACLU) 'American Civil Liberties Union'_Attorneys..'Herman', 'Jaffer', 'Goodman', 'Rabinovitz', 'Guttentag', 'Hafetz', 'Spitzer'..

    lectronic Frontier Foundation( EFF )..Jennifer Stisa Granick 'Civil Liberties Director' (EFF)..

    ryan Cave LLP..Atty's Bryan Cave, Daniel I. Prywes, Kip F. Wainscott..

    Anthony D. Romero, Director ( 'ACLU' ); Amnesty International USA; Human Rights Watch;

    Also sent to: "[email protected]" , "[email protected]" , "[email protected]"[email protected]>, "[email protected]"

    t would be nice to see something positive enacted in congress, or in the courts negating these very serious violations of our Constitutional Rights

    nd Freedoms by in some cases, the very people sworn to up hold those ( time honored ) rights and freedoms..

    Generated with www.html-to-pdf.net Page 1 / 16

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]://www.rob-files.com/http://www.rob-files.com/http://www.rob-files.com/Mind%20Control%20Attacks%20-%20Joseph%20Hohlman.doc
  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    2/16

    You at the 'D.O.J'.,'ACLU', and 'EFF' do the 'most important work' in keeping this, our democracy strong and true..

    ____________________________________________________________________

    Any specific questions about electronic weapon systemscan be directed to:

    ohn J. Wil li ams, M.S.E.E. 'L one Star Consul ting I nc.'

    ink:http://www.lonestarconsultinginc.com/

    mail:[email protected]

    M IND CONTROL TUTORIAL / ELECTRONIC ATTACK TUTORIAL / ULTRASONIC ATTACK TUTORIAL '( li nk below )http://www.lonestarconsultinginc.com/free-mind-control-tutorial.htm#EMWEAPONS ]

    hank You, Joseph Hohlman (Targeted individual)

    Electronic Weapons Systems" (EWS); "Directed Energy Weapons" (DEW); "Electronic Weapon Systemmplants" (EWSI)..'Gang Stalking'

    To Covertly Manipulate and Control Human Behavior"..

    auses..

    1) can cause severe cranial/cranium/brain/pain

    2) sleep deprivation, tetanus, malaise, lethargic, lethargy, enervated, stupor, languor, listless, exhausted, phlegmatic, languid, indolent, lazy, slothful,

    ogy, sleepy, sluggish, torpid; tired, weary; feeble, frail, weak; apathetic, impassive, inert, limp etc..

    3) instill fear, rage, anger, irritability, agitation, exasperation, bitterness, indignation, impatient, petulant, vehemence, temper, resentment,

    aroxysm, furor, acerbic, acrimony, ferocity, violence etc..

    4) can cause strokes, heart attacks, or memory loss..

    5) long term exporsure causes a wide variety of illnesses, including lupus, fibro-myalgia, multiple sclerosis, chronic fatigue, lymphatic breakdown,epressed immune system, low t-cell count..

    ymptoms..

    _ You find that you suddenly awake at precisely the same time, every night

    _ Hot needles (or "stings") deep in your flesh, especially when trying to sleep

    _ Limbs jerking wildly, muscle twitching; can cause severe cranial/cranium/brain physical pain

    _ Forced awakening, can't go back to sleep, as if on high doses of caffeine

    _ Very high body heat, no fever, relaxed, cool surroundings

    _ Extremely powerful itching which may start as small electrical shocks

    _ Very fast heartbeat while relaxed (not having exercised recently)

    _ Ringing in ears - may start/stop when switching on or off electronic devices

    _Sudden "drop-you-in-your-tracks" fatigue at times you should not be tired_ Brain or body vibration; throbbing sensation in any part of your body

    _ Non-random traffic through the neighborhood, indicating use of thru-the-wall radar

    _ Repeated evidence of break-ins and sabotage both at home and at work

    _ Repeated instances where it seems others know things about you that could only be found out by bugging your phone, house, or vehicle

    Additional symptoms caninclude athrobbing, numbing, vibrating,and/or pulsing feeling in the brain and/or through out any part of the body when

    ttacked..

    A feeling of your heart pounding in your head while your body is still..

    lectronic attackcan disorient normal thought processes and brain function etc; making it hard to concentrate..Sometimes associated with severe

    hysical pain in the brain..

    an stimulate, precipitate,the feeling of heart attack, stroke etc.

    an cause you to think or hear things in your mind..

    uther government harassment has been witnessed by individuals from;

    Generated with www.html-to-pdf.net Page 2 / 16

    http://www.lonestarconsultinginc.com/free-mind-control-tutorial.htm#EMWEAPONSmailto:[email protected]://www.lonestarconsultinginc.com/
  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    3/16

    pecific local Police Departments/Fire Departments/ EMS/government agencies harassment of all types, sometimes in conjunction with either gang

    alking activities and/or the use of ( EWS, DEW, EWSI, FLIR, Microwave) technologies etc..

    he airline industry, private individuals,using aircraft of all sizes, helicopters ( commercial, private, and in some cases military

    ircraft )..Specifically/recently from O'Hara International/Chgo; Joliet, IL Regional Airport, Eppley Airfield and Millard Airport, Omaha, NE;

    nstances from Offutt Air Force base, NE, to actually target flights and noise specifically over/around individuals on the ground..

    Railroad industry targeting individuals with train and engine/horn noise when in close proximity of railroads..Specifically 'BNSF' in the Chicago area;

    nd 'Union Pacific R.R' in the Omaha, NE andCouncil Bluffs, IA area..

    Re-timing of any/all street stop lights; regulatingtraffic flow to consistently interfere with any driving activity..( Wherever you drive )

    Using gps implants and/or mobile tracking devices to stalk any movement whether walking or driving of victims by others (ie. gang stalkers/police

    tc)..

    he main objective of these 'gang stalking' activities in conjunction withspecific electronic harassment/electronic torture technologies is to

    emoralize and isolate victims sociallyand covertly..

    isrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, to cause severe sleep deprivation. Talking in public

    bout private things in the targets life..Disorientating victimsboth mentally and emotionally..

    Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt

    o the untrained eye, but psychologically degrading and damaging to the target over time.

    lat tires, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text

    messaged to be at a specific time and place, and perform a specific action..

    pying on everything a victim does; spying in everyway on everything they do; computer use, phones, gps surveilance, infared imaging surveillance,

    ideo, audio bugging; all forms of"Electronic Weapons Systems" (EWS); "Directed Energy Weapons" (DEW); "Electronic Weapon System

    mplants" (EWSI); Microwave Surveillance..

    might seem harmless to some, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in

    ne, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. It's like the death of a thousand paper cuts. One or

    wo minor incidents will not cause any harm to the target, but overtime the target is slowly worn down.

    o cause unending physical, mental and emotionaldiscomfort and pain24/7/365..In essence ruin victimslives ( and minds )..

    Gang stalking' is acompletely clandestine operation..It violates human rights; hate crime laws; discrimination laws;Many other specific

    onstitutional and privacy laws..

    he people and/or groups invovled in these .."Electronic Gang Stalking" (EGS) and/or "Massive Electronic Attack Nightmare" (MEAN),apparently have no respect for our.S. (and all human beings ), most sacred and fundamental values, lawsand way of life..They spit on this countries truth values, and justice system in general..

    hey can be compared to theKu Klux Klan(KKK)and other Neo Nazi individuals and groups..Even our government has been known to be

    mplicitin using these technologies though certaincommunities and law enforcement agencies..

    Also see:

    ttp://psychologicalwarfare.yuku.com/forum/viewtopic/id/602

    LECTRONIC NEUROLOGICAL ATTACKS, MIND CONTROL ATTACKS, BODY CONTROL ATTACKS, and other ELECTRONICATTACKS / ELECTRONIC HARASSMENT/TORTURE..

    Often victims of mind control and electronic attacks with long lists documenting every known type of mind control and

    lectronic attack program ( we know of many other undocumented programs ), pleading with us to alert powerful national and

    nternational authorities to investigate and stop mind control and electronic attacks. We have researched and published about

    mind control and electronic attack technologies for decades now, and clearly, these authorities are also well-aware of these

    mind control and electronic attack technologies for decades now. Since they have done little or nothing to investigate or stop

    mind control and electronic attacks in the past, there is no chance that they will ever in the future - in many cases THEY are the

    nes behind them. Frankly, those who still believe that national and international authorities are the solutions are clearly fools.

    ou have a better chance of the Tooth Fairy removing that electronic implant in your mouth than the Government! No one in any

    osition of national or international power will ever take any meaningful actions to stop electronic attacks and electronic mind

    ontrol !

    Most everyone who contact us for help tells us that they have already complained to local police, FCC, FBI, CIA, NSA, DIA, their doctors,

    oliticians, etc. and received no help - often treated disrespectfully - even ridiculed and threatened with incarceration in mental institutions - adding

    nsult to injury. In fact, the need to obtain and use special detection equipment to prove electronic attack with hard evidence is one big reason why

    Generated with www.html-to-pdf.net Page 3 / 16

    http://psychologicalwarfare.yuku.com/forum/viewtopic/id/602
  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    4/16

    lectronic attacks are apparently rapidly increasing in popularity over shootings because bullets produce lots of physical evidence covered by

    xisting forensic technology long ago developed to analyze and develop firearm evidence.

    While there is a vast number of possible mind control, body control and other electonic attack devices, there is only 4 known

    ommon modalities that such an attack can be delivered (with my rough estimation as to % of electronic attack signals involving

    ach):

    1) Electromagnetics (50%)

    2) Ultrasonics (45%)

    3) Electronic Implants / Electrical Body Contact (15%)

    4) Infrasonics (15%). Particle beams and unknown modalities are probably about 1%.

    Note that the percentages add up to more than 100% because a substantial number of attacks are believed to be caused by a

    ombination of these major modalities (e.g. ultrasonic signal modulated by an infrasonic signal), and that these percentages do

    ot include electronic attacks involving more than one signal at the same time (e.g. an electromagnetic attack and ultrasonic

    ttack occuring simultaneously). Each of these mind control, body control, etc. electronic attack modalities can be detected and

    ountermeasured using special equipment designed for that modality.

    You need to use specialized equipment to ascertain the modality, frequency, direction and timing of electronic attacks. If you

    re being electronically attacked, it could be through electromagnetic waves AND/OR through ultrasound AND/OR through

    nfrasound, AND/OR you have a non-transmitting electronic implant (i.e. totally internally programmed electronic implant). Each

    f these modalities require very different equipment to detect, determine and document (if necessary) modality, frequency,

    irection and timing of electronic attacks, and possibly jam and/or shield against electronic attacks.

    WHO ARE DOING ELECTRONIC WEAPONS SYSTEMS?These technologies are now in the hands of a vast number of technical people employed by

    arious governments, corporations, institutions, secret societies and individuals on a global basis. Every major government, corporation and educational institution

    oday which does substantial high-tech battlefield weapons research has some type of top secret psychological warfare operations (psyops) with ongoing programs

    esearching and developing these technologies, including testing them on hapless targets usually located in some other countries or otherwise considered to be

    xpendable. In the U.S., it is widely believed that DARPA(Defense Advanced Research Projects Agency) plays the biggest role in mind control and electronic

    ttack technologies; we believe that while DARPA is major player, there are many other active electronic attack and mind control programs not funded or directly

    ed to DARPA. The old Soviet KGB developed the Psychotronic Influence System(PIS), which to our knowledge has branched out into at least six major

    urrent electronic attack and mind control organizations. Some aspects of mind control and electronic attack technologies are now so publicly well known often with

    ews accounts of, for example, electronic implants, that only a few of us knew about decades ago. Note that apparently few of these devices are ever patented -

    most are still not even publicly advertised or published about - and some patented devices have been "darkened" by intelligence agencies and thus no longer public

    WHY ARE ELECTRONIC WEAPON SYSTEMS BEING USED?There are many reasons why a person/entity might maliciously use these technologies on

    r against another person/entity, including in the order we believe is based on what is most common (this excludes non-malicious exposures, such as high-voltagenes, non-malevolent commercial / industrial / scientific / military / airport operations, police doppler radar, etc.): (A) Electronic Weapons Testing, (B) Medical

    esearch, (C) Subliminal Advertising and Corporate Monitoring and Control of Buying Behaviors, (D) Military / Corporate / Terroristic Attack on Designated

    argeted Individuals (often with collateral damage), (E) Personal Revenge, (F) Pranksterism, (G) Espionage, (H) Secret Society Agendas (known and unknown),

    ) Criminal / Terrorist Weapon-of-Choice due to Lack of Evidence / Lack of Accountability (of all methods of attacking and h arassing people, electronic attacks and

    in d control attacks are the most easil y concealed, hardest to prove, most unbelieved, and most dif fi cult to prevent and stop with out the use of h igh ly-speciali zed equipment)

    WHAT ARE THE MAJOR ELECTRONIC WEAPONS SYSTEMS TECHNOLOGIES?There are three main high-tech modalities used:

    A) Electronic/ Electromagnetic(including radio, pulsed microwaves and radar)

    B) Ultrasonic(including audio modulation and infrasonic modulation of ultrasonic carriers)

    C) Infrasonic (while raw, unmodulated infrasonic signals are sometimes used for gross electronic attack and electronic harassment, they are not

    sed for mind control applications).

    quipment used to detect and jam / shield in one modality is ineffective against the other - they each require different signal detection, jamming and shielding

    ountermeasures. Each result in similar types of purported manifestations: Environmental manifestations, physical manifestations, and generalized 'medical

    manifestations' (which again also apply to many medical conditions not related to electronic attack and mind control attack, such as exposures to heavy

    metals, pesticides and biological toxins). These generalized 'medical manifestations' include, but are not limited to, headaches, irritability, angry outbursts, mental

    epression, suicide ideation or homicide ideation, intrusive thoughts, forced speech, feelings of going mad, feelings of being mentally programmed to commit

    bnormal acts (the "manchurian candidate" syndrome), thoughts being repeated back to you, wild and unexplained mood changes, hysteria or

    nexplained/uncontrollable crying, panic attacks, sensations of subliminal mind reading or mind control, hearing voices, music, buzzing, motor-like sounds, pings and

    ther sounds emanating from inside the head, appliances (or other smooth flat surfaces, especially metal surfaces), walls, hidden spaces, etc., visual

    allucinations, paranoia, feeling lost, aloof, goaless or detached from one's body, feelings of being overwhelmed, vertigo and light headiness, mental confusion, loss of

    alance, lost memory or erratic memory, chronic fatigue or lethargy, increased chemical sensitivities, immune system disorders, heart palpitations, skin problems,

    ores which don't properly heal, unexplained bleeding (especially through the ears or eyes), unexplained sweating or sudden temperature changes when you

    on't believe you have an infection, arthritic-like conditions, hair loss, "buzzing" (i.e. feeling that one's cells are twitching), crawling sensations or unexplainedching on the skin or underneath the skin or scalp, unexplained losses of feelings or sensations, etc.

    DENTIFYING BRAIN OR BODY'S ELECTRICAL WAVEFORMS..Remote brainwave signature identification and tracking are forms of remote sensing

    chnology. Remote sensing is believed to occur at high enough frequencies where wavelength is small and directionality is very good but at low enough frequencies

    Generated with www.html-to-pdf.net Page 4 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    5/16

    where most of the signal energy is not absorbed by the brain but passes through - about 800 MHz - 1 GHz (the same band where cellphone and cordless

    hone frequencies are assigned and probably not just coincidentally). Basically, the most popular method used to obtain brainwave signatures and track

    eople by means of their brainwave signatures is by remotely and usually secretly transmitting a microwave carrier beam through the person (usually the head) and

    hen receiving, amplifying and analyzing the signal that exits the head or body, which is now very slightly modulated by your brain's or body's own unique electrical

    waveforms. The carrier frequency is then filtered out and the modulation greatly amplified and specially processed to retrieve your unique "electronic signature" ( i.e.

    brainwave signature") or to conduct mind reading (mindread). In medical and laboratory situations, Functional Magnetic Resonance Imaging (FMRI)is

    ometimes used, but in the field where the invasive electrodes and skin contact electrodes popular to FMRI are impractical, a microwave transmitter (e.g.

    mbedded in a cellphone or cordless phone signal) is generally used. Also see "Microwave Surveillance" ( below )

    Each person is believed to have his/her own set of distinctive brain waveforms which are as unique as fingerprints. By using this technique, individuals - even groups

    f people (racial profiling and gender profiling technology and personality profiling technology using brain scans now believed to exist ) - can be

    emotely and automatically tracked, targeted, controlled and attacked from even miles away (usually at much closer distances) and even in crowds, buildings and

    ehicles. These signals are now believed to be harvested enmass possibly through virtually omnipresent cellular towers, telecoil/magnetic loop systems, traffic lights,

    c. where large numbers of people gather at or pass through relatively small public apertures (public portals

    such as doors to buildings, gated areas, hallways, sidewalks, intersections, streets, anywhere lines form, bus stops, train stops, airports, subway entrances / exits,

    malls, etc., and often piggybacking or linking them to surveillance cameras and metal detectors is how they are usually implemented to make them more effective,

    heaper to implement, easier to secretly plant and maintain, less conspicuous, and increases deniability if discovered.

    One popular mind control technology is the, "Emotional Brainwaves Clusters" (EBC) technology, now believed to be the most popular form of mind control and

    rainwave attack involving brainwave signature capture. Emotional brainwaves clusters is basically a complex set of brainwaves one has when facing any kind of

    motional situation, such as fear, anger, grief, shock, sexual excitement and pain, but can also involve clusters which result from passive acceptance, indifference,

    nhibition or apathy to otherwise emotional situations for brain entrainment purposes. Since there are differences between people in their emotional brainwave

    usters, they are a type of brainwave signature and therefore fall under the brainwave signature technology. The perpetrator is not interested in individual brainwaves

    aused by emotions but clusters of brainwaves which emanate primarily from limbic system. The perpetrator records these emotional brainwave clusters for a

    rgeted individual when the victim experiences some emotional event; he/she may even trigger the emotional events to capture brainwave clusters. He/she then

    modulates an high-frequency EM or ultrasonic carrier with these complex emotional brainwave clusters, and then plays them back to the victim whenever he/she

    wants to trigger that particular emotional response - brainwave entrainment for a Pavlovian response. If the emotional response is one to pain, for example, theerpetrator can then induce that same or similar pains in the victim whenever he/she chooses to do so at the push of a button. If it is for sexual excitement, the victim

    an be sexually stimulated during inappropriate times. Brainwave clusters can also be used for other brainwave signature applications, such as electronic tracking.

    he victim can be made apathetic to a life-threatening situation. The mind control and electronic attack abuses of emotional brainwaves clusters is practically

    nlimited.

    MIND CONTROL / ELECTRONIC ATTACK USING COMMON AC AND PHONE WIRING, METAL PIPES, TUBES AND STRUCTURES,

    AND ULTRASONIC ATTACK USING SPEAKERS..Your home/business wiring, piping, even car wiring can be hijacked to electronically harass or surveil

    ou by hitchhiking signals onto them. These omnipresent conductors serve as the optimum means to connect up, transmit and distribute these very harmful electronic

    urveillance, mind control and electronic attack signals throughouta building. Offering optimum conductors for virtually endless varieties of bugs, taps, harassment,

    ontrol and line blaster devices Because power and telephone lines, and metal pipe (e.g. plumbing), metal tubing (e.g. wire shielding) and linear metal structures (e.g.

    lumbing, rebar, girders, conduit, trim, rails, fencing, screens, picture frames, etc.) surround you virtually everywhere you go in any building electronic surveillance

    evices, equipment control devices, mind control devices and electronic attack devices can be connected to them in virtually every room and even outside the

    uilding for some distances.

    We have received reports, for example, of computers being altered so that they automatically access the Internet when plugged into AC power and turned ON -

    ven though they are not connected to any known modem - because they have been altered with devices hidden inside them which transmit and receive data and

    ontrol signals through the AC power connection - plug the computer into your wall outlet to power it up and you are automatically Online where your sensitive files

    an be uploaded to an attacker and/or malware downloaded into your system! If you have set aside a computer to be offline because you do your accounting, taxes

    r other very private activity on it to protect your most sensitive data from Online access, without a special AC line filter, you may be only fooling yourself. This same

    ctic is used on other pieces of equipment connected to either an AC power line or a phone line - even if the equipment is turned OFF! The only known way to

    rotect yourself from these types of attacks is to filter out your power and phone lines to eliminate high-band signals. Our WHHE-type devices both test for and filter

    ut harmful hitchhiking signals.

    With today's technology, radio transmitters, receivers, electronic implants, recording devices and video cameras are often smaller than a stack of a few quarters, and

    an thus be easily concealed. However, especially when it comes to lower frequency and powerful radio transmitters, hiding the antenna is often problematic.

    However, clever snoops and electronic warfare specialists have developed all kinds of improvised antenna systems - many are ordinary metal wires, pipes, tubes,

    ructures and other objects that one would not suspect to be antennas. Some examples include the telephone and AC power wiring inside or outside of buildingslumbing and pipes, metal clothes lines, fencing and posts, car luggage racks (can be made into very powerful transmitting antennas and sensitive receiving

    ntennas which can cover large areas - especially nice for urban areas with tall buildings!), hair curlers, ink pens, tin cans, pots and pans, pie plates, hand

    ools, lawn tools, eating utensils, pieces of wire, screws and nails, shelves, belts, handles, etc. Even pringle cans and tennis ball cans have been adaped into RF

    hotgun antenna systems capable of receiving and transmitting wireless modem data from computers for about a mile. Tesla theorized that even the entire Earth could

    e made into one giant antenna. Even ordinary antennas, such as those used for TVs, radios, ham stations, CB, etc., can double as spy and/or electronic attack

    ntennas. And loop antennas can be concealed in most anything of any shape and thickness adequate to contain it (e.g. inside of a book or book cover). Our rule

    f thumb is that if it is metal - or even if it is just electrically conductive - there is a good chance that it can be adapted into an antenna - even if the resulting antenna

    ain is so poor that the range is only a few dozen feet, and to look for 1-2 connected wires.

    Of all the improvised antenna systems possible for buildings, the most popular to perpetrators is unshielded home AC wiring and phone wiring, and metal pipes,

    ubes and structures. Improvised vehicle antenna systems include the normal radio antenna, the luggage rack, the metal bumpers, the +12VDC wiring under the

    ood, etc. These "ready-made" antennas are usually but not always big in size ( especially the AC wiring) and installed in virtually all homes, businesses and

    ehicles usually in both the walls and ceilings (plus in the floors of some homes/businesses). All one needs is a single access point - anywhere in the network ofwires, piping, etc. inside or outside the building - to inject and/or receive the offending signals, and/or to tap power off of the line to power mind control, electronic

    ttack and/or surveillance devices.

    Since these conductors are so prevalent in virtually every building, added with the technologies of time multiplexing signals and frequency multiplexing signals, literally

    Generated with www.html-to-pdf.net Page 5 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    6/16

    ozens - even 100s - of these types of very harmful signals can be operational on any day and night against you - usually no matter what rooms you are in. Your

    ome or business is just several huge signal distribution networks plus transmitting and receiving antenna arrays. And all such wiring, piping, etc. can usually be just as

    asily abused for electronic surveillance, mind control and electronic attacks even if you turn OFF or disconnect them from their normal uses (e.g. turning Off AC

    ower, disconnecting phones). This is nothing new - both power and phone wiring have been lawfully used for decades to carry high-band voice, control signals, and

    ata (e.g. faxes, modems, DSL, zons, intercoms, alarm systems for phone lines, and intercoms and alarm systems for power lines) - proven technologies

    sing common household AC wiring and phone wiring. Furthermore, because generic power and phone wiring and piping in all or part of one's home and business

    re often unshielded, they can be both easily accessed and connected up to AND used as a huge transmitting and/or receiving radio antennas to communicate with

    nything from electronic implants - to guys parked in the street - to cellphone towers down the road - to control centers 100s miles away - to ships at sea - to

    atellites - to electronically harass, control and/or interfere with your life! For examples: (1) Signals on them can be transmitted wireless for miles, and (2) Physical

    ccess to the wiring, piping, etc. is not even required; because the wiring, piping, etc. is unshielded, signals can often be inductively coupled into or out of power

    nes, phone lines, piping, etc. (e.g. inductively-coupled phone line taps are decades old technology).

    The trapped victims are boxed-in by the 4-6 sides of these huge matrix antennas for hours at a time - especially when asleep - and therefore they (and their

    ectronic equipment / electrical equipment) are subjected to possible massively intense and long-duration EMF exposures - analogous to being zapped like a

    iece of meat in a microwave oven! We cannot emphasize enough that to protect yourself from these types of high-intensity mind control and electronic attacks and

    urveillance, you MUST filter out all unwanted high-frequency signals from both your two AC lines (usually two 120 VAC legs of a standard 240 VAC system)

    nd phone lines your car, and unpowered wiring and metal piping, tubing and structures. This is becoming increasingly alarming to us because we have recently

    eceived reports from likely victims indicating to us that these forms of mind control and electronic attack are greatly increasing.

    Since these virtually endless varieties of bugs, taps, harassment, control and line blaster devices can take on virtually any appearance and/or be hidden in just about

    nything inside of or near your building, they can be very difficult to detect through physical searches (short of tearing down all of your walls and ceilings where

    he lines and piping run, and disassembling all of your equipment). For example, these devices can be easily concealed inside TVs, radios, computers, landline

    hone equipment, etc. - fully operating even when the TV, radio, phone, etc. itself is not turned ON. Or hidden in an outlet, inside of your wall or in your attic - even

    nside your car. Since not all of these harmful devices are RF devices, the non-RF ones cannot be detected using TSCM field strength testing used for wireless

    ystems. Nor can strictly receiving devices be TSCM-detected. And usually nor can transmitting devices which transmit in bursts, randomly or pre-dawn hours, nor

    when the perpetrator believes the area is being electronically swept and turns Off the transmitters until the TSCM crew leaves. In short, your phone and power

    wiring, piping, etc. can be easily and secretly tapped into using hardwired or inductive-coupling techniques just about any place they are routed internal or external toour home/business

    Since ultrasonic transmitters can also be made very small and easily hidden, there is almost endless numbers of ways ultrasonic transmitters and ultrasonic circuits

    an also be hidden. Ultrasonic transmitters and ultrasonic circuits can be embedded in ordinary speaker systems, megaphones, loudspeakers, earphones, home

    ntertainment equipment, appliances, computers, etc. commonly found in homes, businesses, cars, and even on the streets - each one secretly transmitting subliminal

    ltrasonic messages to you for mind control attack and electronic attack purposes. Say you are at a protest or political rally. That bullhorn you see may also be

    ansmitting a secret subliminal ultrasonic mind control message to you. There is now a technology called, " Silent Sound Spread Spectrum" (SSSS,S-Quador

    quad) which is apparently now widely abused to do ultrasonic mind control and ultrasonic attack. One SSSS technology mentioned in mind control and electronic

    ttack reports is the "Silent Subliminal Presentation System" (SSPS). Silent Sound Spread Spectrum basically entails randomly changing the high-frequency

    udio or ultrasonic carrier signal frequency (modulated by the mind control or electronic attack signal) to prevent detection and jamming by narrow-band

    ound and ultrasonic equipment. That's why our ultrasonic direction finding, ultrasonic triangulation and ultrasonic jamming equipment operate over the entire

    ractical air ultrasonic band (20KHz - 220+KHz).

    The high-band signal frequencies used on power and phone lines, piping, etc. (which can be time multiplexed and/or frequency multiplexed to support

    everal such systems) are usually 5+ times higher than the standard 60 Hz / 50 Hz (power wiring) or 3200 Hz maximum (phone wiring) bandwidth normally

    sed on them. The usable bandwidth of many power and phone lines exceed 2 MHz for loops up to about 6,000 ft (1.14 miles) and much higher over much shorter

    oops - very usable for electronic surveillance, mind control and electronic attack. Metal piping, tubing and structures can conduct signals far higher in frequency than

    ven power and phone lines (because most power and phone lines, pipes, etc. are unshielded, electrically noisy and inductive and leaky to high freqs, most high-

    and signals are under 200 KHz and high in volume level). Loading these unshielded conductors with all kinds of multiplexed and high-band signals they were not

    esigned for may cause the wiring, piping, etc. itself and their terminations to resonate with strange sounds and noises which seem to emanate from walls and ceilings

    ften on quasi-random and directional bases (e.g. strange sounds you can hear when standing in one position but not in another position, and/or at some

    mes and not at other times, and/or during certain conditions of humidity and/or temperature but not at other conditions ), often throughout most of a

    uilding, and often similar to the vibrating and humming of an old or defective power transformer. They can also vibrate and hum in the ultrasonic and infrasonic

    andwidths when signals mix and produce sum and difference frequency components. The weird sounds can also sound like a distant motor running, distant voices,

    whispering and mumbling, spiritual and God-like voices, high-pitched voices, low-pitched voices, chattering, music, animal sounds, whistles, echoes, pulsing,

    ounding, popping, finger-snapping, digital data sounds, zinging sounds, whooshing sounds, theremin sounds, etc., especially when real time complex signal mixings

    f possibly several signals at once result in partially demodulated and/or multiply-mixed high-band signals. These weird noises can literally drive some people nuts! Ifou are hearing sounds, noises or even voices or Morse-code sounding digital data signals or control signals coming from your walls, ceilings or appliances or

    nappropriately while you are on the phone, you may not be imagining it. Also, high frequencies imposed on power wiring can adversely affect induction motors

    especially compressor motors common to refrigerators, freezers and air conditioners), causing them to operate roughly, chatter noisily and possibly stall out

    because induction motor speed is proportional to the frequency of its power source, multiple frequencies can harm them ), and can cause lights to

    nusually brighten or flicker. Modulated high frequencies on phone lines can cause malfunction of phone and computer equipment (e.g. loss of broadband sync,

    nability or slowdown in using DSL or even dial-up, faxes, zons, etc. because of a "noisy line"). Our device types include several popular Wiring Hitchhiker

    Harassment Eliminator (WHHE) device-types designed to detect and filter out high-band signals from AC power lines (WHHE1), telephone lines (WHHE2), car

    2VDC power bus (WHHE3), and powered and unpowered conductors of many types such as unpowered wiring, and metal piping, tubing and structures

    WHHE4)

    CELL PHONE MIND CONTROL / ELECTRONIC ATTACK, AND CORDLESS PHONE MIND CONTROL / ELECTRONIC ATTACK..Cellular

    hones, cordless phones, Ipods and other head-press wireless devices, especially in conjunction with satellites, are ideally suited as the perfect receiving and deliveryystems for electronic attacks and mind control attacks, and it is now believed that electronic attacks and mind control attacks on both national and global bases are

    ow routinely done through cellphones, cordless phones and other head-press wireless devices, and have been for years. Consider:

    (A) Almost everyone these days has one and often several cellphone, cordless phone, etc. head-press wireless device.

    (B) Cellphones, cordless phones, etc. can be reached from virtually everywhere in the world so one or just a few centralized mind control / electronic attack

    Generated with www.html-to-pdf.net Page 6 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    7/16

    central control facility ("Mind Control Central") is now easily implemented. Today, you can almost as easily be electronically attacked and surveilled by a guy

    in Asia, Africa, South America, Europe, and the Mideast as you can from the guy next door.

    (C) Cellphones, modern cordless phones, etc. usually operate in the 800 MHz - 1,800 MHz band - ideal frequencies for mind control and electronic attack

    because of the brain absorption characteristics of these frequencies, and in a pulsed microwave signal format make this band ideal for remote sensing

    attacks.

    (D) Your cellphone, cordless phone, etc. antenna is just a few inches from your brain - with some people, on a near constant basis - yet almost always 10+

    times that distance from the nearest other human brain - so mind control / electronic attack victims - Targeted Individuals (TI)- can be easily isolated and

    individually selected for mind control or electronic attacks (either by calling them or piggybacking on one of their usual calls), or selected by

    characteristics filtered from databases (e.g. by race, political beliefs, religion, ethnicity, socio-economic group, gender, age, shopping habits,

    location, etc.), or enmass through computer-generated mass dialings (cordless phone, cellphone, etc. antennas have incredible direct and intimate

    access to your brain - no other antenna is routinely placed that close to the brain - so close that the brain is exposed to substantial levels of

    both the magnetic and electrical components of the electromagnetic fields).

    (E) Furthermore, the antenna's closeness to the brain with very little relative motion between the brain and the antenna also makes the targeting of specific

    regions of the brain also much more precise, automatic, continuous and easily done.

    (F) Furthermore, because of antenna closeness to the brain, you not only get a good dose of the wireless device's electrical component of the

    electromagnetic field but also its magnetic component - believed to be even more dangerous and disruptive to brain function and therefore more effective for

    electronic attack and mind control attack applications. Even if you wrapped your head in aluminum foil, which might shield you against most of the electrical

    component, aluminum foil is virtually transparent to the magnetic component. You would have to wrap your head in iron foil or an iron helmet, which is hard-

    to-get, expensive, heavy, stiff, and rusts.

    (G) Modern cellphones, etc. have embedded GPS systems where the user can be located just about anywhere on Earth within 15 x 15 meters (some within

    2 x 2 meters), making secretly tracking YOU incredibly fast, easy, continuous, reliable, inexpensive, and covert.

    (H) Cellphone, cordless phone, etc. transmitted carrier frequencies can easily be time multiplexed and/or frequency multiplexed with other nearby frequencies

    modulated with electronic mind control and electronic attack signals which you are oblivious of and can't eliminate (however, while limited shielding is

    possible, shielding can worsen the situation (see herein); some say that many cellphone drop-outs are actually due to multiplexing problems).

    (I) Cellphone, cordless phone, etc. conversations can be eavesdropped upon in a variety of ways - this gives the mind controller and electronic attacker an

    ideal source of real time feedback to the malicious signals he/she is injecting into your brain ( it is believed that some of these devices are also

    programmed to act as room bugs - continuously transmitting nearby conversations just by being turned ON - with or without you making a

    phone connection ).

    (J) Cellphone, cordless phone, etc. mind control attack techniques can be coupled with other mind control attack techniques, such as electronic implants.

    (K) Cellphones, cordless phones, etc. and their call records and data records can be hacked - making you vulnerable to mind control, electronic attack and

    surveillance efforts perpetrated by rogue states, terrorists and criminals.

    ELECTRONIC IMPLANTS..Electronic Weapon System Implants (EWSI)- commonly referred to as electronic implants - and their

    omplexity and miniaturization have progressed tremendously in the last decades. There are now countless variations of electronic

    mplant designs, implant functions, implant applications, and size, material, and placement (usually inside a tooth or shaded from X-

    ay by an irregularly-shaped bone like vertebrae). The smallest electronic implants are less than the size of a grain of rice, and these

    mplants can be injected directly into the body using a syringe. Reports indicate that nanomotor implants (tiny motors) and nanobotmplants (tiny robots) are either now or will soon be in widespread use.

    Electronic implants is yet another way of electronic tracking, targeting, controlling and attacking Targeted Individuals. Also, some full-up electronic transmitters and

    ansceivers are now so small that they can be easily concealed in such external things as cellphones, Ipods, clothing, eye wear, jewelry, watches, pens, etc. - not

    ven to mention RFID technology. The major efforts in this area now is to couple these types of devices with mind control and electronic devices to develop

    xtensive and linked mind control networks of these systems so that huge invisible electronic nets can be thrown over urban areas, towns and gatherings so that

    veryone and even every animal under the net can be instantly tracked, viewed, overheard, controlled, programmed, punished, rewarded - electronically gang

    alked if you will - at the push of a button. Network implementation and integration is now believed to be well underway in every major American city based on

    nformation we have recently received.

    Texas Instruments (TI) has developed a technology, the AUDEO technology, which is a wireless sensor worn on the neck which captures neurological activity the

    rain sends to the vocal cords, digitizes these signals, and then converts the signals into clearly spoken speech. While the Audeo technology is admittedly an almost

    miracle for people suffering from serious neurological disorders which impairs or prevents speech, it is clearly another technology which can also be abused byovernments, corporations and criminal and terroristic organizations to produce fake or doctored spoken words from people, including forced spoken confessions,

    which they never intended to make, simply by adding, removing and/or changing the actual words the person intended to speak to much more nefarious words.

    urthermore, since it captures speech signals on their way to the vocal cords, this captured speech information can be used to modulate a carrier frequency and

    ansmitted and divulged to eavesdroppers even before the person actually speaks the words, giving the eavesdroppers head starts on using/abusing the information

    o their own advantages. Or after intercepting the speech signals, the speaking of the signals can be instantly blocked or changed by the perpetrators to prevent the

    ictim's thoughts from ever being verbally disclosed, thereby resulting in forms of thought interception and speech control, and giving perpetrators even more time to

    se/abuse the information before the victim can write it down. Andother example, a person may have a strong desire to tell a crooked politician, "Stop robbing the

    eople!" but out of fear, mute the actual stating of the thought (how many times has anyone said something really bad under the breath, whispered or mumbled);

    owever, the evil powerful politician can now intercept the thought to determine exactly what the person was going to say using a technology similar to Audeo, and

    herefore, be able to persecute, intimidate and control people based only on their strong thoughts and whispered and mumbled statements. Is a more effective form

    f mind control than this even possible! And evil politicians can use the technology to force crowds to cheer them - instead of jeer them by soon ordering these

    mplants for everyone.

    Texas Instruments is just one of many entities now engaged in such implanted electronics R&D with clearly huge potentials for abuse. The 2/12/09 issue of

    Electronic Design's" cover story was dedicated to medical implants. Here they talk about medical signals generated by implantable devices which can be picked up

    ia a Bluetooth-equipped cellphone, stating that, "the technology is already here."Is that person near you with a Bluetooth using it for normal cellphone uses? Or

    he/she conducting an electronic attack or mind control attack against you or someone else? And if integrated with cellphones and Bluetooth technology, how about

    pod technology, telecoil technology (below), and with computers, speaker systems, megaphones, earphones, other phones, home entertainment systems,

    Generated with www.html-to-pdf.net Page 7 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    8/16

    ppliances, etc.? This article also states, "... neural implants are providing a vast range of information about how human beings behave."Is this a tacit

    dmission that widespread implant monitoring of the populace is going on? Even St. Jude's Medical Center is doing medical implant research. Their device consists

    f 16 implanted electrodes, each individually programmed using external inductive coupling, to produce pulses of different intensities and frequencies to control pain.

    How difficult could it be to convert such a device to produce pulses which induce pain? Purdue University researchers developed a miniature device three times the

    width of a human hair, implanted underneath the scalp, records neural signals relayed to it by monitoring electrodes in various parts of the brain allowing doctors to

    predict" upcoming seizures. How difficult would it be for a similar system to induce seizures or thought control? This device is so advanced that it transmits 10 times

    more data than other modern implantable transmitters while using a tiny 8.8mW of power. Could a similar system transmit vast amounts of data on your thoughts?

    ypically, the circuits used by modern electronic implants consume little power, and their long-lasting electronic implant batteries are quickly recharged using silent

    nd non-invasive inductive-coupling devices - once implanted, they don't need to be removed to be serviced during a lifetime. Electronic implants can also deploy

    anomotors and nanobots technology to crawl through and invade parts of the body like parasitic worms and wreak all kinds of havoc on the mind and body. I've

    een told that these technologies are just fine if well-regulated.

    Based on so-far unverified reports, telecoils / magnetic induction loop systems are more and more being hijacked and subverted into mind control attack and

    ectronic attack transmitters. Telecoils (also referred to as Tele-Coils, TCoils, T-Coils, TSwitches, T-Switches, magnetic induction pick-up coils, etc.) are today

    nstalled in many hearing aids (about 80% of new hearing aids) and basically operate on a system where the speaker audio is outputed to a magnetic induction

    ystem (basically, a large magnetic coil of the right impedance wired to the speaker output of an audio system, which can be a public address system, various

    ntertainment equipment, computer audio output, etc.) as an extrasensory means of "hearing" audio for the hearing impaired. The telecoil is embedded in the hearing

    d itself (or possibly in the electronic implant!), and is a form of an assistive listening device. The magnetic induction coil transmitting antenna is located somewhere

    within the targeted room / area, and is usually vertically oriented. They are usually well-hidden and cannot be detected without special electronic equipment. Today

    many public and private forums have secreted magnetic induction coil systems to support telecoils hearing aids. The magnetic coil can be, for example, wrapped

    round a pillar in large meeting rooms / areas such as churches, auditoriums, conference rooms, classrooms, theaters, airports, stadiums, arenas, theme parks,

    museums, etc. - they are about as fast and cheap to make and install as a typical audio speaker system. This technology can also be hacked into or converted into

    urveillance systems where the spy, for example, stands just outside of a conference room / courtroom outfitted with a telecoil hearing aid, can intercept

    onversations occurring within the conference room / courtroom from a magnetic loop bug placed there by either the conference / court personnel or secretly by

    imself. A person can also be secretly "enslaved" as a spy if they have an telecoil electronic implant in which the electronic implant acts as a radio repeater /

    ltrasonic repeater and, unknowing to the victim, receives the telecoil-type audio signal, and then amplifies, converts and uploads it to a remote radio receiver /

    ltrasonic receiver. If such an electronic implant were to experience electrical leakage or just from the processing / retransmission of the signal by the electronicmplant, a small amount of the signal can be received by the brain circuits, thereby possibly making the victim feel that he/she is also listening to the remote

    onversation. Even when used as intended, it is believed that the magnetic signal of the magnetic induction loop system can be more effectively manipulated into a

    ubliminal mind control system than standard audio which is limited by one's hearing bandwidth. It is also believed that the embedded telecoil itself can receive actual

    rainwaves and through a repeater system built into the hearing aid or electronic implant, amplify, convert and re-transmit one's brainwaves; and also that the telecoil

    an also be wired as a transmitting antenna to transmit signals (e.g. control signals) into and/or out of an hearing aid or electronic implant. To ferret out these possible

    ew, insidious and devastating electronic implant / telecoil magnetic loop system technolology abuses requires an EMF Direction Finder or EMF Triangulator. Note

    hat the same telecoil magnetic loop systems can also be easily wired to serve as magnetic loop RECEIVING antennas to serve other surveillance, mind control and

    ectronic attack functions. We predict the telecoil technology will eventually meld into Bluetooth or some other cellphone / IPod technology. Like virtually all mind

    ontrol technology, much more investigation into possible abuses of this technology is required.

    An increasingly popular use of electronic implants is for secret communications. Basically, two or more people have implanted into them electronic implants which

    re radio transceivers tuned to the same frequencies and modulation modes. Transducers are installed at the vocal cords and at the auditory semicircular canals.

    hen, completely silently and secretly, each person communicates with each other anywhere from a few feet away to half way across the world through satelliteswithout the use of any external phone or radio. The first auditory transducer is used to transmit the received speech from the sender into nerve impulses interpreted

    y the receiver's brain as the voice of the sender (but can also be used to send recorded messages or any other sound or noise). A second auditory transducer is

    sed to pick up the sounds that the person is hearing - eavesdropping if you will - then transmitting those sounds to the receiver along with the "voice" tremors picked

    p by the vocal cords transducer. Thus, at all times, each person is simultaneously both a receiver and a sender. A limited version of such implant are implanted into

    ictims who are not supposed to know that they have such an implant. This is easily done by excluding the first auditory transducer, thereby making the

    ommunications only one-way in which the victim is unknowingly the constant sender, and by doing so can monitor what the victim hears and says at all times. This is

    powerful system used in espionage, surveillance, mind control and electronic harassment of all types. We now understand that an advanced version of this powerful

    ystem is being field tested, which also includes a transducer that monitors the optic nerve to essentially turn people's eyes into remote spy cameras. While these

    ystems are rarely used on members of the general public, if you believe that somone seems to know virtually everything you say and/or hear no matter how private,

    hen you might consider this type of electronic attack as a possibility. Aside from detection and removal of the implant - both difficult to do - the only other electronic

    ountermeasures are personal jamming and shielding.

    We have heard of electronic implants being encased in small mercury sacks or bags to give the electronic implants a changing and more undefined and amorphous-

    ke or bone-shaped appearance to X-Rays. If the Hg sack leaks inside the body, the Hg gets into the bloodstream and can then poison the brain and body. The firstetectable symptom of an electronic implant may be mercury poisoning..

    Microwave Surveillance'..

    Microwave Surveillance from Commercial Satellites..

    Also see:

    ttp://rob-files.com

    tp://rob-profile.com/Microwave%20Surveillance%20from%20Commercial%20Satellites.doc

    ATELLITE MIND CONTROL / ELECTRONIC ATTACK..Until recently, satellites were relatively rarely deployed this way (some say never),xcept when used in conjunction with cellphones and similar such devices, such as Ipods, PDAs, GPS locators, and as far as we know, never

    Generated with www.html-to-pdf.net Page 8 / 16

    http://rob-profile.com/Microwave%20Surveillance%20from%20Commercial%20Satellites.doc
  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    9/16

    sed to transmit directly a harmful signal into a person. When satellites are used, they are mostly used to track people (e.g. GPS) and to controlther more powerful equipment located closer to the Targeted Individuals assigned to do the actual damage on the Targeted Individuals.owever, the government has recently publicly announced that both commercial and military spy satellites will now be directly and routinelyeployed to surveil Americans; the roles of satellites in mind control attacks and electronic attacks will likely vastly increase in magnitude andophistication in the future. Satellites are also ideally suited, in conjunction with cellphones, Ipods, PDAs, etc., to induce insanity in selectedndividuals.

    .0 Summary of Critical Points

    .1 Microwave Surveillance techniques have been in use for over fifty years.

    .2 As a result of the deployment of commercial communications satellites around the globe since the 1970 s Microwave Surveillance frompace has been conducted by governmental agencies and corporate entities against unsuspecting citizens without any governmental oversight

    whatsoever.

    .3 The effects of human exposure to elevated levels of microwave radiation range from discomfort to death- an effect called Electronarcosis.

    .4 Sufficient information about Microwave Surveillance is available that any citizen or organization desiring an understanding of this technologynd its effects will find public source documentation which covers most aspects of the technologys use and abuse.

    .5 Reporting criminal misuse of Microwave Surveillance techniques is virtually impossible because of poor information transfer within the lawnforcement community, lack of training on the part of law enforcement professionals, and, all too often, bad attitudes.

    .0 Statement of Problems to be Resolved

    .1 Would the United States Congress have the people that they are elected to serve believe that they are too busy to develop cognizance about

    Microwave Surveillance technology when a portion of each years federal budget is directed toward the acquisition of new equipment from thisechnology area? Solution- make the U.S. Congress aware of the problems and potentials associated with Microwave Surveillance.

    .2 Would the United States Department of Justice have the people that they are sworn to serve and protect, believe that they are too busy toevelop any sort of understanding about a technology which is documented in their own literature and deployed by Special Agents on theirayroll? Solution- help the United States Department of Justice to gain a broader awareness of the problems and potentials associated with

    Microwave Surveillance.

    .0 Commercial Communications Satellites for Microwave Surveillance

    n October of 1945, a gifted science and science fiction writer proposed the extraordinary idea of using stationary satellites to beam televisionnd other communications signals around the world. Arthur C. Clarke (2001: A Space Odyssey, Rendevous With Rama, The Hammer of God,ct.) reasoned that if a satellite were positioned high enough above the Earth s equator, its orbit could be matched by the rotation of the Earth.

    he satellite would then appear to be fixed in one particular spot in the sky. Because a satellites orbital speed varies with its distance from thearth, a geostationary orbit is only possible directly above the equator, in a narrow belt about 22,300 miles out. Although it took the technologywhile to catch up with his simple but elegant concept, today there are hundreds of satellites taking advantage of his original thinking. In

    ecognition of his pioneering vision, this band of outer space real estate is called the Clarke Orbit.

    n 1965, the Early Bird satellite became the worlds first commercial geostationary satellite. It could carry 240 telephone communications circuits,r one television channel. On June 2, 1965, Early Bird introduced live television across the Atlantic Ocean. Early Bird was the first satellite to bewned and operated by the International Telecommunication Satellite Organization (INTELSAT).

    irst Canada, then the United States, and subsequently other countries constructed their own geostationary satellite systems. Each new satellitead greater capabilities, expanding our ideas of the technically possible. As of early 1998, there were more than 150 domestic and internationalommunications satellites in geostationary orbit over the Earths equator.

    .1 Uplinks and Downlinks

    ach satellite is both a receiver and a transmitter. First, the ground station, also called the uplink, sends a signal to the satellite. The satelliteutomatically changes the signals frequency and retransmits it back to stations on the ground. This second path is called the downlink. A satellitemuch like a broadcasting tower 22,300 miles high, an automatic relay station that can transmit into a coverage area, which encompasses up

    o 42.4 percent of the Earths surface.

    ach satellite has a number of redundant modules, spare components that can be switched into operation in the event that any malfunctionccurs. Ground control stations can remotely switch in backup facilities in case of failure.

    .2 Satellite Transponders ( dated information )

    very communications satellite carries several channels, called transponders, which process communications traffic. Most satellites havexteen or more transponders in operation, each capable of transmitting one or more television signals as well as thousands of simultaneous

    elephone conversations.

    Generated with www.html-to-pdf.net Page 9 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    10/16

    he satellite frequency bands are located high above those used by earth-bound TV channels. Sunspots, and/or other atmospheric conditions,o not affect these super-high frequencies. Satellites therefore provide extremely reliable communications coverage 24 hours a day.

    Operating at frequencies of several billion cycles per second, or Gigahertz (GHZ), the region s satellites relay communications via two distinctommunications bands. North Americas high-power services use frequencies ranging from 12.2 to 12.7 GHZ. A few operators using medium-ower satellites use adjacent frequencies from 11.7 to 12.2 GHZ. The entire frequency spectrum from 10.7 to 12.75 GHZ is commonly called theKu band. Throughout the Americas, numerous other satellites are available that operate within a lower frequency spectrum ranging from 3.7 to.2 GHZ (the frequency of observed Microwave Surveillance operations). This frequency range is known as the C band.

    .3 Footprints to Surveillance

    he satellites transmission area covers a certain part of the Earth s surface, called a footprint. An agency, such as the Florida Public Serviceommission, with access to a satellites operating codes can commandeer the services of one of the satellites transponders and conducturveillance of a targeted individual and intercept all conversations and sounds within the surroundings of this individual.

    GlowWormSurveillance' allows individuals to be tracked under ground, under water, anywhere. This writer has three gold bridges, each ofwhich is at least three centimeters long. So long as the wavelength of the transmitted signal is shorter than the targeted object, which in this case

    is, the signal will bounce back to the sender like a radar image.

    .4 Surveillance..

    xternally induced auditory input could be achieved by means of pulsed microwave audiograms, or analogs of spoken word sounds. The effect

    n the receiving end is the (schizophrenic) sensation of hearing voices which are no part of the recipients own thought processes.

    uch a device has obvious applications in covert operations designed to drive a target crazy with hearing voices.

    racking a target with a satellite-based communication signal, capturing the sounds in the targeted individuals environment via the transmissionf voices from the ground control station across 44,600 miles of space into the head of the targeted individual create a starting point fornderstanding the danger of covert Microwave Surveillance operations.

    .0 Electronarcosis and Signals Interception

    One way that Electronarcosis effects are produced is through the raising of the temperature of the targeted individual. When water moleculesre heated, the body temperature rises. Between 105 and 107 degrees Fahrenheit the targeted individual will experience a seizure- at 109

    egrees, death occurs.

    eing targeted by the Active Denial System, a HUMVEE configured with a microwave transceiver and a parabolic transmission dish on its roof.ransmitting at 98 Gigahertz (GHZ), the unit will beam a focused beam of microwave radiation used to disperse crowds. The same painful effectfelt by an individual targeted by a microwave satellite transmission generated in the range of 3.7 to 4.2 GHZ, C-Band satellite operations.

    he other way that Electronarcosis works is through the disruption of brainwave functioning by overloading the electrochemical operation of therain with a steady, elevated level of microwave radiation. A victim will experience disorientation, vertigo, and nausea, echoing the painful,ebilitating effect that can be induced by a focused beam of microwave radiation.

    ignal interception of brain wave activity, is one of the most fascinating and interestingly, unmentioned characteristics of "Microwave

    urveillance" operations. This ability to capture and record the images generated in the Visual Cortex and the sounds of a person s innerialogue.he measurement of brain waves, Alpha, Beta, Delta, and Theta, by Electroencephalography (EEG) is an accepted practice around the world.he capturing, on-screen presentation, and recording of mental images and dialogue intercepted by a focused beam of microwave radiation,ven a beam bounced off a satellite 22,300 miles above the equator, is a capability is retarded bymisdirected security statuspriorities andross misinformation.

    Gang Stalking'.."Electronic Gang Stalking" (EGS); "Massive Electronic Attack Nightmare" (MEAN) - sometimes called,electronic gangstalking," "microwave gang stalking" and also including such technologies as "ultrasonic gang stalking"..

    Gang Stalkingis experienced by Targeted Individuals aspsychological attack, that is capable of immobilizing and destroying a target over time. The covertmethodsused often leave no evidenceto incriminate the Civilian Spies. It's similar to workplace mobbing, but takes place outside in the community. It's called

    Gang Stalking', because groups of community Spies organise to stalk and monitor targets 24/7.Gang Stalkingis a systemic form of control, which seeks

    o destroy every aspect of a targeted I ndividualslife. A covert investigation is opened and the target is followed around 24/7by informant, cops, community

    roups, local companies, private foundations, federal agencies.Overtand covertmethods are used as part of thesurveil lance process. An especially

    Generated with www.html-to-pdf.net Page 10 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    11/16

    adistic form of electronic attack and mind control attack is apparently becoming much more widespread. We call it the, "Massive Electronic Attack Nightmare"

    r MEAN. It is also popularly known as the "Electronic Gang Stalking" scenario or EGS. A MEANor EGSTargeted Individual experiences widespread and

    aried manifestations because he/she is the victim of at least several different same-time-frame (not always simultaneous) mind control and electronic attack

    ystems - usually including both electromagnetic and ultrasonic modalities, and both external devices and electronic implants. Under a MEANattack, virtually no

    matter where the Targeted Individual goes or what he/she does or what time it is or who accompanies the Targeted Individual, he/she suffers greatly. Electronic

    ttacks may be continuous, sporadic/random and/or periodic. The term, "gang stalking" or "gang mobbing, "which probably goes back to at least the 1950s,

    nvolves a covert and continuous psychological warfare conspiracy against a victim done in such a way as to make each individual part of the attack easily

    xplainable (and thus not prosecutable) as mere "coincidence," "random event," "unexplainable event," "life's breaks," "bad luck," "imagined" or similar, but when

    onsidered in their totality evidences a complex and usually well-planned conspiracy to persecute, taunt and harass the victim for whatever reasons the perpetrators

    perate under to mentally, physically, financially and/or reputationally injure, discredit or destroy the victim. The perpetrators often have unknown connections

    etween each other (e.g. belong to the same criminal organization, religion, cult, political group, special interest group, commercial group, government, etc.). It is the

    ame ancient concept of killing an enemy by inflicting a thousand small cuts to inflict maximum pain and suffering from beginning to end. "Electronic gang stalking"

    sometimes called, "electronic gangstalking," "microwave gang stalking" and also including such technologies as "ultrasonic gang stalking" - is simply gang

    alking using electronic harassment, electronic attack, and brain entrainment and other mind control attack techniques. We prefer the MEANterm because "gang"

    means more than one perpetrator, while today all it takes is one perpetrator to be able to control - often on a remote control, programmed and/or automated basis

    ften using artificial intelligence - all the equipment he/she needs to simultaneously perpetrate massive mind control or electronic attack on their victims.

    There was a time when MEANattacks were relatively rare because the sophistication, manpower, expense and time involved to create, integrate and operate a

    unctional MEANsystem were prohibitive to almost everyone. At that time, MEANTargeted Individuals - less than about 1% of all mind control and electronic

    tack victims - were either almost always very important people like major Government officials, CEOs of major corporations, important scientists and engineers or

    uper spies, or they were so hated by powerful people that it was worth their tormentors to attack them. However, with today's circuit minituarization, computer

    utomation, powerful electronic design programs, artificial intelligence, and mind control and electronic attack technologies now available to virtually everyone and

    ften ecomically affordable by most people, a powerful MEANsystem can be created and deployed in minimal time, and with minimal expertise, expense and

    manpower. One part-time MEANperpetrator can now keep MEANsystems operating on several Targeted Individuals at the same time on a remote control,

    rogrammed and automated basis, often using artifical intelligence to both control and optimize his/her system.

    MEANelectronic attacks usually start out as simple electronic attacks. If the perpetrator then determines that the victim is not using effective countermeasures (e.g.

    hielding, jamming, detection, avoidance/evasion, documenting to increase credibility with authorities ), then escalates into more systems of attack. It's just

    ke if someone punches you and you put up no effective resistance, chances are he/she will stomp you to death, but will often move onto an easier target if you

    unch back at the start. So the faster the victim deploys effective countermeasures against electronic attack, usually the better success at stopping escalation to a

    MEANlevel of electronic attacks. No single electronic countermeasure device will defeat a full-blown MEANattack. If you are a MEANTargeted Individual, you

    may require numerous electronic countermeasure devices. Even so, no one can guarantee that the MEANattack can be defeated because MEANattackers are

    ften highly motivated, persistent, intelligent and with greater resources than simple electronic attackers. In virtually all cases of mind control, electronic attack, mind

    eading, etc., it is much easier and cheaper to render an attack than to defend against one just as it is much easier to fire a shotgun than to defend yourself against

    00 shotgun pellets coming at you at once. If a MEANattack is not entirely defeated, it usually can be at least jammed and/or shielded against to tolerable levels.

    r its location detected, which often identifies the attacker, permitting the victim to legally retaliate as well as to jam, shield against or evade future attacks.

    The Informantscan be parts of these community oriented poli cing programs, but often they are just average citizens. Just like with Cointelpro investigations,

    veryone in the targets life is contacted and asked to be a part of the ongoing, never ending monitoring (systemic harassment), which is designed to destroy the

    rget over years and leave them with no form of support.

    While there are all kinds of laws and regulations regulating experiments on animals, there are no laws protecting people. This is why government agenciescan

    xperiment on YOU.There is no recourse at this time for anyone wantingto "unvolunteer" themselves from these experiments.There are no metersavailable to the

    verage citizen that will detect and therefore prove the use ofDEWbeing used against anyone.These directed energy weapons (DEW)candamage tissue, induce

    mood swings, loss of memory, and cause a wide variety ofphysical symptoms.Yet theDEW are just as effective as a bullet in "nullifying"the targeted

    ndividual.While there are laws regulating guns, there areno laws regulatingDEW.Basically,the " hit men"deploying these weapons can never be

    etected.This is tantamount to having a firearm with a disappearing bullet. Granted, death occurs more slowly than by bullet, often appearing to be from natural

    auses, however; when death does occur, there is no "manhunt".Noone is brought to trial, the "hit man" goes free, moving on, no doubt, on to thenext "hit." Murder

    one slowly enough goes unnoticed.

    Many Targeted Individuals are harassed and placed under surveillance in this way for months or even years before they realise that they are being targeted by an

    rganised protocol of harassment.

    What happens during this Gang Stalking surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and

    issidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the

    ommunity at large would be used to monitor, prosecute, and harass them. In Russia it was used by the state to declare activist, dissidents or anyone they thought toe an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control.

    The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs

    were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Covert Human Intelligence

    ources.

    Civilian Spies, also known as "Covert Human Intelligence Sources" are recruited from every level and sector of society. Just like with Cointelpro investigations,

    veryone in the targets life is made a part of this ongoing never ending, systemic psychological harassment and manipulation of the target. These actions are

    pecifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave

    hem with no form of support.

    For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and

    estroying a target over time. For the state its a way to keep the targets in line, control them, or destroy them.

    Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised

    ffort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It's described as a

    ystemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss

    what values they would like to have in their community, community development, and it's also a time to discuss any problems that might be happening in a specific

    Generated with www.html-to-pdf.net Page 11 / 16

  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    12/16

    rea. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run

    rograms at, provincial, state and federal levels. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other

    ountries as well.

    The modern day systemic form of control could only be funded at higher governmental levels, just like it has in other societies where these similar types of

    arassment programs have been implemented. It's all part of a system of control and conformity that has been in place for many years. A system of control with

    many local groups and appendages taking part.

    What are the goals of Gang Stalking?

    he goal is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of

    his harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable.

    ther goals involve sensitizing the target to every day stimulis as a form of control, which is used to control targets when they get out of line. Once the target is

    ensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public.

    hese programs are designed to make the targets of this harassment vulnerable, they want to make them destitute. The secondary goals seems to be to make the

    rget homeless, jobless, give them a breakdown, and the primary goals seems to be to drive the target to forced suicide, just like what they did with some of the

    rgets of Cointelpro. It's a useful way of eliminating perceived enemies of the state.

    What are other Names for Gang Stalking?

    here are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Organised Stalking, Cause

    talking, Multi-Stalking, Community Mobbing, but it's all part of the same harassment protocol. What many people do not realise is that Gang Stalking is just one

    ppendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but

    re not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old

    ame, that is once again being played by governments on their unsuspecting citizens.

    How are targets chosen?

    argets can be chosen because of many reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because theyelong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy. Were

    onsidered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as

    uspicious by a civilian spy/snitch and their names were handed over.

    s becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many

    argeted Individuals seem to be unaware that large chunks of our society are now being used as Citizen Informants.

    Who gets targeted?

    argeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to

    nyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, womans groups, (single)women, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets

    re often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues. Every time the target moves, the

    ame information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue. Traits of those targeted

    Who takes part?

    eople from all walks of life are being recruited to be the eyes and ears of the state. People from all races, ages, genders. Every sector of society that you can think

    f is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip

    op culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable

    nstallers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the Uk,aying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources.

    ome of these citizens might be recruited via programs such as, Citizen Corp, Weed and Seed, Citizens On Phone Patrol, (COPP), City Watch, T.I.P.S. Many

    arted with good intentions to help patrol and monitor their cities and neighbourhoods. Others are recruited via their families, others at school, others at work. Since

    Generated with www.html-to-pdf.net Page 12 / 16

    http://www.telegraph.co.uk/news/uknews/2689996/Children-aged-eight-enlisted-as-c%20ouncil-snoopers.htmlhttp://gangstalkingworld.com/Forum/YaBB.pl?num=1205738832/0
  • 8/14/2019 Strahlenfolter Stalking - TI - Robert O. Butner - Account From Mr. Joseph Hohlman - Rob-files.com

    13/16

    very sector, class, race in society takes part, recruitment is multi-faceted.

    Many do not understand or care that the end consequence of this harassment protocol is to destroy a person.

    Why people participate in Gang Stalking?

    here are many reasons that someone takes part in this activity.

    Some do it for the sense of power that it gives them.

    Others do this as a way to make friends and keep friends. Its something social and fun for them to do. Many in society use the one handed sign language to

    ommunicate and it's very effective in breaking down race, gender, age, social barriers.

    Others are forced or black mailed by the State or the police into taking part.

    They are told that they are part of homeland or national security and being used to help keep and eye on dangerous or emotionally disturbed individuals. They see

    hemselves as heroic spies for the state.

    ivilian spies can come from a variety of different programs such as the Citizen Corp, Citizen On Phone Patrol COPP, Weed and Seed, T.I.P.S., City Watch or

    ome other centralized government program used for patrolling and monitoring cities.

    Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy

    rograms. Eg. Some may be given the choice of Spying for the State or the police vs going to jail.

    Others are told outright lies and slander about the target to get them to go along with ruining the targets life.

    Many are however just average citizens who have been recruited by the state the same way citizens were recruited in the former East Germany and other

    ountries. It's the way the society is.

    What are some techniques used against targets?

    few of the most common techniques are listed below.

    ) Classical conditioning.

    Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday

    imuli, which is then used to harass them. Its used out in