strahlenfolter stalking - ti - unwitting victim - targeted individuals support site -...

Upload: hans-werner-gaertner

Post on 04-Jun-2018

240 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 Strahlenfolter Stalking - Ti - Unwitting Victim - Targeted Individuals Support Site - Unwittingvictim.com

    1/6

    Please!help us continuethe fight by donating they

    prey on all of our families

    by keeping it below the

    awareness threshold ON

    THIS LEVEL IT DOES

    MAKE A HUGE

    DIFFERENCE

    LINKED TO CREDIT CARD

    SERVICE SECURE SERVER

    Feel Free to Email Me

    We need to communicate

    without being blocked, edited,

    and filtered.

    Standing up for human rights

    Insider Speaks Out:

    Electromagnetic

    Effects on BrainRet. British military intelligence

    scientist interview: covering

    reality and effects of Directed

    Energy Weapons

    Capt. Paul E. TylerThis is a great declassified

    explanation of electromagnetic

    weaponry and human

    experimentation withoutsubjects consent.

    The links below take you

    directly to the pages containing

    the applicable laws at

    Michigan State Legislatures

    website.

    Brief of Michigan's

    Electromagnetic

    Weapon Law

    Michigan Law 4513Paragraph k addresses

    electronic and electromagnetic

    weapons Act 256 2003,

    effective 2004.

    Penalties Part 4514

    INTEL: Developing

    'Brain Chip'Intel states "by 2020, brain

    chips should be available for

    the consumer."

    Missouri Law

    UNWITTING VICTIMTARGETED INDIVIDUALS = TI

    SUPPORT SITEStanding up for human rights, supporting those who have been used for human experiments

    Senator Glenn "You just think about your family, your own son, your own daughter, or

    grandchildren

    who might be, the next time they got to a doctor, the subject of some medical experiment that

    they

    are not even told about."

    Senator Glenn's Statement floor U.S. Senate

    JFK Speaks Against Secret SocietiesShort video

    Spacer video

    President Eisenhower's Farewell AddressEisenhower warns of threat to liberties from VAST MILITARY

    COMPLEX

    Extremely important part 50 seconds into video

    Clinton Public Apology for human

    experiments (NEW)IMPORTANT VIEW AT LEAST THIS ONE VIDEO

    Those who cross the lines from legal to illegal, ethical to unethical,

    not only hide under the professions as whole, but also have well

    greased mechanisms in place to ensure that it remains hidden

    form scrutiny. Those who had the propensity to act in this hideous

    way, along with anyone involved, have the ability to use these

    mechanisms (systems). Rockefeller Commission

    Essential Awareness Building Material ForAll Including Ti's & Ti's Families

    Good Awareness Foundation Overview

    The Bridge of Information and Link to Citizens

    New video faster paced.

    The more we become aware the more we have the realization that the technologies,

    methods, and techniques employed are no longer in the hands of those who originally

    developed or participated in the programs.

    The point that needs to be mentioned at this juncture is that those on the side of the fence who are acting

    legally, morally, and ethically have a hard time grasping that someone would act that immorally, unethically,

    and illegally. And this is why at t imes the statements and apologies from the highest levels are needed. Thisensures it is remembered that it is in society, and there are those who are acting in such ways. Who is

    engaged in these acts is as concerning as what they are engaged in.

    Their organization is described by using the analogy of an onion. The layers hide, or

    shield, the core. At its epicenter is the use of human beings for human experimentation.

    As you move in from the "peripheral layers" of the onion, which will be addressed later,

    towards the epicenter, the primary function of the layers is geared towards targeting

    unwitting victims. It is designed, as it becomes more and more engrossed in targeting the

    unwitting victim, to make and keep the victim vulnerable for the use of the human

    organism, unwitting victim. What makes most of us in society susceptible, especially their

    victims, is the lack of awareness that they are, and have the ability to, act as

    surreptitiously as they do while engaging in such egregious and unconscionable behavior.

    They are surreptitiously on top of the victim, regardless of whether the victim is aware ornot.

    Electromagnetic (EM) weapons, or directed-energy weapons (DEW), we do not see, hear,

    taste, or smell, although we are grossly affected by them as citizens. They utilize the

    various frequencies of the electromagnetic spectrum to disable or kill the target. Among

    electromagnetic weapons are psychotronic weapons. These EM weapons interact with the

    nervous system of the target. Silence Sound Weapons are weapons affecting our

    subconscious, but can be raised above our awareness threshold. Having the below

    graphic as a mental picture helps convey what it is that an exposed person encounters.

    http://www.icomw.org/archives/tyler.asphttp://www.unwittingvictim.com/BioEthics.htmlhttp://www.unwittingvictim.com/AwarenessBuilding.htmlhttp://en.wikipedia.org/wiki/United_States_President's_Commission_on_CIA_activities_within_the_United_Stateshttp://www.youtube.com/watch?v=24O2RjMhzFA&hd=1http://www.youtube.com/watch?v=_bqr5DVx3dwhttp://www.youtube.com/watch?v=xhZk8ronceshttp://www.unwittingvictim.com/BioEthics.htmlhttp://www.unwittingvictim.com/Intel.htmlhttp://www.legislature.mi.gov/documents/2003-2004/publicact/pdf/2003-PA-0257.pdfhttp://www.legislature.mi.gov/documents/2003-2004/publicact/pdf/2003-PA-0256.pdfhttp://www.unwittingvictim.com/%20http://www.legislature.mi.gov/documents/2003-2004/billanalysis/House/pdf/2003-HLA-4513-s.pdfhttp://www.icomw.org/archives/tyler.asphttp://www.unwittingvictim.com/Interview.htmlmailto:[email protected]
  • 8/14/2019 Strahlenfolter Stalking - Ti - Unwitting Victim - Targeted Individuals Support Site - Unwittingvictim.com

    2/6

    MicrochippingVideos of microchipping, Fox

    News and Australian 60

    minutes,

    pictures of many removed

    covert human microchip

    implants,

    and pictures of cancer

    allegedly cause by implanted

    human microchips.

    Newsweek CoverStoryGleaning thoughts from the

    electrical activity of the brain,

    brain mapping, and injecting

    thoughts through

    electromagnetic waves.

    They restrict or retard you the

    reader from information in

    anyway they can. In this article

    they would only present, the

    first few sentences to distract

    and derail you from the

    information, which is stating

    something humorous,

    conveying the future is here

    today.

    Nuremberg

    CodeExtremely important article, it is

    very short and an easy read.

    Some points on the

    time line of human

    experimentation

    Time Line

    Electromagnetic

    Weapons

    Actual Statements

    from Presidential

    CommissionChildren, experimentation, and

    mind control.

    Cointelpro and the

    Church HearingsGreat Overview. Unsavory and

    vicious tactics have been

    employed. The Constitutionalsystem of checks and

    balances has not adequately

    controlled intelligence

    activities. In the final report of

    the Senate select committee,

    Cointelpro was castigated in

    no uncertain terms.

    Silent Sound and

    V2K( Voice to Skull):

    Confirmed and In

    ProductionSound bypasses the ear drum.

    100 PatentsInventions that effect thoughts,

    emotions, memory, and

    thinking from external sources.

    US Army War College Quarterly "The Mind Has No Firewall"

    Great Awareness Foundation Building Piece.

    The "data" the body receives from external sources--such aselectromagnetic, vortex, or acoustic energy waves--or creates through its

    own electrical or chemical stimuli can be manipulated or changed just as

    the data (information) in any hardware system can be altered.

    PSYCHO-ELECTRONIC WEAPON ATTACKS on HUNDREDS of THOUSANDS of INNOCENT

    U.S. CITIZENS and NON ALIKE

    Capitol Office

    State Capitol

    Jefferson City Mo.

    573-751-0246

    District Office

    Second Street

    King City Mo.

    660-535-6664

    May21,2009

    To Whom It May Concern,

    This letter is to ask for your hel p for the many constituents in our country who are being affected unjustly

    by electronic weapons torture and covert harassment groups. Serious privacy rights violation and

    physical

    injuries have been caused by the activities of these groups and their use of so-called non-lethal

    weapons onmen, women, and even children.

    I am asking you to play a role in helping these victims and also stopping the massive movement in the

    use

    of Veri-chip and RFID technologies in tracking Americans.

    Long before Veri-chip was known we were testing these devices on Americans, many without their

    knowledge or consent.

    There are new revelations of the cancer risk besides the privacy and human rights problems with the

    use of

    Veri-chip and RF signals.

    I am asking for your help in stopping these abuses and aiding those already affected.

    Sincerely,

    Rep. Jim Guest

    Implantable microchips are just one of the technologies, methods, and techniques they employ.

    http://www.unwittingvictim.com/Overview.htmlhttp://www.unwittingvictim.com/MindHasNoFirewallLt%20Colonel%20Thomas.htmlhttp://www.unwittingvictim.com/SilentSoundV2K.htmlhttp://www.unwittingvictim.com/Cointelpro.htmlhttp://www.unwittingvictim.com/StatementsPresidentialCom.htmlhttp://www.unwittingvictim.com/TimeLine.htmlhttp://www.unwittingvictim.com/TimeLine2.htmlhttp://www.unwittingvictim.com/NurembergCode.htmlhttp://www.unwittingvictim.com/NurembergCode.htmlhttp://www.unwittingvictim.com/Norseen.htmlhttp://www.unwittingvictim.com/5_22_8Third_09.html
  • 8/14/2019 Strahlenfolter Stalking - Ti - Unwitting Victim - Targeted Individuals Support Site - Unwittingvictim.com

    3/6

    Patent that Dates

    Back to the 70's

    US Congressman

    Kucinich Introduced

    Legislation in 2001SSec7 Definitions.(III) & (IV) (II)

    The use of land-based, sea-

    based, or space-based

    systems using radiation,

    electromagnetic, psychotronic,sonic, laser, or other energies

    directed at individual persons

    or targeted populations for the

    purpose of information war,

    mood management, or mind

    control of such persons or

    populations...

    Decades of CIA

    Human

    ExperimentationIncludes information on

    veterans law suit against the

    CIA. EXTREMELY POSITVE

    PROCEEDINGS AND

    COMMENTS from U.S.

    Magistrate Judge John Larsen

    GREAT FIND

    Declassified

    Documentation

    MKULTRA and

    Human

    Experimentation

    Support Site with

    Conference Calls

    ShieldingIncludes enclosures, paints,

    bedding, and absorbers.

    Washington Post's statement;

    "It is not just science

    fiction or the

    imaginings of the

    mentally ill"Many times it is harder for them

    to minimize, and engage their

    discrediting machine. Such as

    when confronting this example.

    Information From

    A PerpSeems to have validity, and be

    in line with what is part of a

    larger whole.

    Released 2007

    Illegal CIA Activities

    Human ExperimentsSpanned Decades

    U.S. Code

    Electromagnetic

    The sizes of these devices have become too small for the human eye to see.

    Deep Brain Nanowire Electrode

    Inserted in blood vessels MoreNanotechnology (Actual Chips)

    Microchips on a

    Penny

    These technologies represent some of the many ways they have to monitor us unwitting victims

    and monitor how our brains and bodies are reacting to what they employ. They will cause what

    affects us their victims, including employing these chips and nanobots, and then use them to

    detect how the subjects are affected. These graphics are intended to convey this small part of

    what these organizations use, their ever-evolving sophisticated capabilities and the exponentially

    ever-decreasing size of the technology, now so small it cannot be detected by the naked eye.

    Both body and brain implants are in existence. Those who are unethical are using technologies,

    methods and techniques to experiment using human-beings, attempting to affect and control their

    victims brains and bodies from afar. These technologies, methods, and techniques are in part

    how we bleed at the gills as a nation economically. Those who are unscrupulous in their business

    enterprises have obtained this technical knowledge through the years, and have benefited by

    keeping it under the awareness radar of society as a whole. As we trace the time lines, we can

    see the evolution of what they employ.

    Without Invasiveness

    (Courtesy of Shinji Nishimoto)UofC Berkeley

    What The Mind Sees Vs. What The Eye Sees

    More documentation of the use of unwitting victims for human experimentation through the years

    Short list of symptoms

    chilling of Skin/ Instant Coldness

    -daytime discernible "microwave hot spots" on skull

    thermal heating

    - nighttime, severe night sweatsintense itching

    sensation of electric current running through the body

    induced sleep

    hyperactive bladder

    deterioration of cognitive abilities

    jaw or tooth pain

    sleep deprivation

    Short list of their tactics/organized stalking

    appliance tampering

    helicopter/airplane home fly overs

    being followed

    blacklistingcar tampering

    home monitoring workplace harassment activity

    mail tampering

    computer tampering

    noise campaigns

    e-mail monitoring/interference

    street theater

    http://www.unwittingvictim.com/MoreDocumentation.htmlhttp://www.unwittingvictim.com/BrainMovieImage.htmlhttp://www.unwittingvictim.com/DeepBrainNanoElectroImplant.htmlhttp://www.unwittingvictim.com/FamilyJewels2.htmlhttp://www.unwittingvictim.com/Perp.htmlhttp://voices.washingtonpost.com/spy-talk/2010/11/cia_brain_experiments_pursued.htmlhttp://www.unwittingvictim.com/5_22_4_8_09.htmlhttp://www.freedomfchs.com/http://www.unwittingvictim.com/DeclassifiedHumanExperimentationMKULTRAAndMore.pdfhttp://www.unwittingvictim.com/DeclassifiedHumanExperimentationMKULTRAAndMore.pdfhttp://www.unwittingvictim.com/CIAMilitaryMindControl.htmlhttp://www.unwittingvictim.com/RepKucinich.htmlhttp://www.unwittingvictim.com/Patent3,951,134.html
  • 8/14/2019 Strahlenfolter Stalking - Ti - Unwitting Victim - Targeted Individuals Support Site - Unwittingvictim.com

    4/6

    WeaponsA person who uses, attempts

    or conspires to use, or

    possesses and threatens to

    use. This has a 2 million dollar

    penalty and a minimum 25

    years sentence

    French Government

    Bans WiFi in

    Schools; Requiresthat No Child Under

    the Age of 8 Should

    Be Exposed to WiFi

    Electromagnetic

    Radiation.It should be noted that some

    European countries use the

    age of 16 rather than 8. This

    helps convey the dangers of

    EMR even in these amounts,

    especially to young people.

    Russian Law draft

    describespsychotronic

    weapons in detailHelps convey that it is not a

    victim as an individual, and not

    exclusive to the U.S. Aiding us

    when attempting to address

    technology that is developed to

    the point that it can adversely

    effect human-beings brains,

    minds, and bodies.

    Russia Wants Ban

    on HAARP Testing

    Piece from Provda, a RussianNewspaper

    Great Technical

    Information Link

    These Are the

    People Who

    Research and

    Develop What

    Adversely Affects

    the General Public

    Neuroscience-EGE

    Report: Implants in

    the Human BodyThis report a good report on

    the subject; it describes a

    spectrum of human

    implantable microchip

    technology.

    Boston Globe's

    Article on Brain

    Computer Interface

    and Funding

    Decades of

    Published Evidence

    severe disorientation while driving

    lesions on internal organs

    dream manipulation

    memory loss

    electroshocks

    tingling

    numbness

    targeting of pets

    unexplained sounds in home

    wiretapping/electronic surveillance

    food tampering

    Link to More Complete Lists and Survey

    Control of another human-being's normal brain and body function, by electromagnetic energy and

    radiation, dates back to the 60's. By means of electrical stimulation of the brain, the rhythm ofbreathing and heart beat [this was even stopped for several pulses] was affected, as well as the

    function of most of the viscera -- like the secretion of the gall bladder. Also resulting were

    frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, and dizziness, and

    epileptic seizures were induced in healthy persons.

    They have been on us like flies in a horse barn through the years for different reasons. Their

    primary reason is to monitor how we acted and reacted to what they employed, without our

    knowledge, long before we become aware. Unlike many of us who have become aware there are

    those who are unaware and may never become aware. How horrifying it is to find out that

    someone is adversely affecting our lives, but its twice as horrifying to find out they have beenacting in this way for decades. They have burned bridges of support many times before we knew

    we needed to cross those bridges of support. With their less than one sided view the only view

    heard, they are continually attempting to predispose those who would be support for us their

    victims, or would scrutinize their behavior. Once we become aware or obtain too much

    information for their liking, they use their monitoring abilities to keep us from obtaining

    independent support, ensuring that the information we have and what we prepare is intercepted

    and watered down. This minimizes the impact of my work and ensures that the answers I have

    found do not get to someone independent, or a group of independent people before they have

    their covers and smoke screens in place.

    Organized Criminal Involuntary Servitude, Stalking, and Intimidation (OCISSI)

    It is commonly known that the violent criminal element (their organization) has gotten a hold of

    these technologies, methods, and techniques. People have infiltrated their groups and they have

    confirmed they are a violent organization that inflicts harm and hardship on us, their victims, which

    is the definition of violent. They employ these things for their personal gain; this does not have to

    be monetary gain, it can be things such as information for research and development, including

    R&D of new, even more sophisticated technologies, or it can be simple curiosity.

    You begin to recognize who is involved when you can recognize how they function and operate.

    This includes things such as who has, and has had, their fingers on the information 'block,' 'edit,'

    and 'filter' buttons controlling the information flow that is being presented. Who has their hands on

    the slander and misinformation machine, which is a well known part of their program. And, who is

    demonstrating and employing these technologies, methods, and techniques

    With their ability to present whatever view they want to, they supply bad information and data or

    only the information that ensures they get the decision or response they want. When there is

    information that reveals, proves, they presented bad information and bad data, they will stop at

    nothing to create a smoke screen that they can hide behind. This ensures they will need to have

    their well greased block, edit, and filter mechanism control all new information, or it would reveal

    this fact.

    As I prepare material, they will confiscate and present it in a watered down way that minimizes

    their behavior and minimizes the technology, methods, and techniques they dare to use. They

    should present it as they presented their less than one-sided view through the years, not when Ifind a way to counter their less than one sided view. They literally have stolen and altered both my

    paper and electronic files at times as soon as I was done preparing them.

    They are on top on me. It is obvious that the material comes from me. If it is presented by those

    who are privy to the information from being on top of me, then they are preempting me and the

    http://www.unwittingvictim.com/involuntaryServitude.htmlhttp://www.unwittingvictim.com/Delgado.htmlhttp://www.unwittingvictim.com/Symptoms.htmlhttp://www.unwittingvictim.com/Ethics2.htmlhttp://www.unwittingvictim.com/deps.htmlhttp://www.unwittingvictim.com/MeansOfInformationWar.htmlhttp://www.unwittingvictim.com/HAARPRussia.htmlhttp://www.unwittingvictim.com/RussianLaw.htmlhttp://www.unwittingvictim.com/French.html
  • 8/14/2019 Strahlenfolter Stalking - Ti - Unwitting Victim - Targeted Individuals Support Site - Unwittingvictim.com

    5/6

    of Microchip

    Technology and

    Symptoms

    Personal note: I am

    under mind-bending

    effects from what

    they employ.I do suffer on an ongoing

    basis.

    I have included the following

    statement, due to those

    inflicting the harm and

    hardship continually

    attempting to preempt, and

    mirror me, while suppressing

    me and 'information'. This is in

    their continuall y attempt to

    keep the information below the

    awareness threshold of those

    who would scrutinize, or

    recognize their behavior. They

    also steal and sloth my work

    (much of my work as I stated

    elsewhere on this site is for

    other purposes, such as legal

    action) this is in part not only tominimize the impact, but also

    to bolster their fraudulent

    behavior.

    Very importantly they will admit

    to something employed, or a

    minimized version to

    accomplish what they present.

    When these thing are

    scrutinized they will attempt to

    play another side of the fence

    garnering a response, or

    decision that is devoid of what

    they were stating, or

    presenting a moment earlier.

    Hold them accountable for

    what they presented earlier or

    later.

    That they have anything

    employed is what is

    instrumental. Who has these

    things employed is as

    concerning as what they

    employ.

    Their addressing it at all is in

    response to what I am working

    on.

    They are involved in being on

    top of me like glue, and at

    times there will be a direct

    association with me through

    the years. How much of my

    other work is in the same place

    in a minimize hidden way.

    Lastly, this site will include

    voice files in the near future to

    save visitor time.

    information. The source, being me, cannot be questioned. Those who take credit for my work,

    minimizing the impact, will attempt to leave the room, or hide behind a smoke screen, when light

    is being put on their involvement. This light leads to scrutiny that begins to unravel their deceit

    and fraudulent behavior. This is the type of behavior that identifies them and their gross

    involvement in inflicting the harm and hardship on us, their victims.

    SEE THROGH THE WALL TECHNOLOGY

    Video: N.Y. City Police Commissioner to deploy see through clothes terahertz technology THIS

    YEARThese links are simply used to convey technology that is available and evolving, and has been

    around for decades. Those who are engaged in the use of human being against their will,

    knowledge, or want, as well as being surreptitiously involved in an unwitting victims life, recklessly

    use this and much more crude technologies. They do not have the well being of the victim in

    mind.

    TROUGH THE WALL TECHNOLOGY

    This is a newer look and contains information from another owned site.

    http://cdn.attracta.com/badge/verify/46186.htmlhttp://www.dailymail.co.uk/sciencetech/article-2131932/The-REAL-X-Ray-spex--new-terahertz-scanner-lets-mobile-phones-walls.htmlhttp://www.repost.us/article-preview/hash/0a209f49795861e0020dd5916ef56f04/http://www.unwittingvictim.com/5_22_8_09B.htmlhttp://educate-yourself.org/mc/listofmcsymptoms05jun03.shtml
  • 8/14/2019 Strahlenfolter Stalking - Ti - Unwitting Victim - Targeted Individuals Support Site - Unwittingvictim.com

    6/6