Search This Blog

Showing posts with label Victims of Crime. Show all posts
Showing posts with label Victims of Crime. Show all posts

Saturday, September 7, 2013

Country Fry the Frog if you don’t have a Pot to piss in

If You Feel Froggy - Jump!

"The Obama administration labeled this act of terrorism workplace violence 
(Senator John Cornyn).”

 "If The President of the United States Said so -Then It is So (O'Dell)!"

". . .But you and I know it was terrorism, plain and simple (Senator John Cornyn)."

"No (O'Dell)!"

"If The President of the Untied States Said so -Then It is So (O'Dell)!"
If You Feel Froggy - Jump 


Gregory,
As a proud Texan, you know that the strength and resilience of the Fort Hood community is legendary.
In fact, since the terrorist attacks on September 11, 2001, no U.S. military installation has deployed more troops to overseas combat.
But on November 5, 2009, Maj. Nidal Hasan opened fire on our troops there; killing thirteen Americans and injuring thirty-two others in a vicious terrorist attack.
I Think After Three Bombings You Asked Me To Detail With The FBI
I Know How Feels To Be Rape By My Own Representation
You Asked For These and Dam Near Got Me Killed!
Work Um!


What is here is missing evidence to the case you are asking about.
But Nobodies Asking Me?
One-Way Communication is Going to Kill Us All!


Classified Email From Senator You Cannot Make This Shit Up
My Response Waiting for This Senator for 5 years

Geeks in my system need to be arrested by the Secret Service Now!
Don't Bother The FBI They Don't Know What Is Serious and What is not?

Just Because People of Public Trust Lied To Cover Their Own Ass Or Take Credit Where is not Due - is not My Fault

If Rick Perry Would Not Have Got In Way of Due Process At UTSA
My Problems Would of Been Taken Care of In One Day!


It is now going on Five Years and I Should Be Back At My Job At Boeing
and my extended Family, who cover the whole District 28th
Have mineral Rights That Perry Stopped Production on, which hurts a small region of Texas


The Very Heart of Economic Prosperity
If Big Oil Knew Perry Like I Do

They Would Take Him Behind The Barn
for a short conversation
and end a very bad relationship!


And Take Royal Girl With him She Is Illegitimate


25 Years of Terrorist Attacks No Correlation Country Race or Religion
Texas State Sponsored Terrorism 

Is Turning Texas Blue
It Is No Secret

Today, revolutionary war tactics and weapons have become
 more deadly and sophisticated; however, on March 6, 1836 the 
remaining ‘Defenders’ of Alamo did wait for a full house to enter the Alamo before detonating probably the original suicide bomb as a last act of defiance, killing hundreds and destroyed the Catholic Church the defenders were protecting.



25 Years of Terrorist Attacks No Correlation Country Race or Religion
1990 16 May : Wembley IRA detonate a bomb underneath a minibus killing Sgt Charles Chapman (The Queen's Regiment) and injuring another soldier. No one was ever convicted of Sgt Chapman's murder.
1990 20 July : London Stock Exchange, the IRA detonated a large bomb at the London Stock Exchange causing massive damage.
1991 7 February : Mortar attack on 10 Downing Street[19]
1991 18 February:  A bomb explodes in Paddington Station, damaging the building's roof but causing no casualties. Three hours later another bomb explodes at Victoria Station. One man is killed and 38 people injured.
1992 5 February : Urumqi Bombing Two buses exploded in Urumqi, resulting in at least 3 deaths, and 23 injured.[7] Unconfirmed reports indicated the attacks were perpetrated by the East Turkestan Islamic Party.[9] According to government documents, other bombs were discovered and defused in a local cinema and a residential building.[7]
1992 10 January : Small device exploded. No injuries, Whitehall Place, London SW1.
1992 28 February : A bomb explodes at London Bridge station injuring 29 people.
1992 10 April : Baltic Exchange bombing: A large bomb explodes outside 30 St Mary Axe in the City of London. The bomb was contained in a large white truck and consisted of a fertiliser device wrapped with a detonation cord made from Semtex. It killed three people: Paul Butt, aged 29, Baltic Exchange employee Thomas Casey, aged 49, and 15-year old Danielle Carter. Several people were critically or severely injured. The bomb also caused damage to surrounding buildings (many of which were further damaged by a second bomb the following year). The bomb caused £800 million worth of damage—£200 million more than the total damage costs resulting from all 10,000 previous explosions that had occurred relating to the Troubles in Northern Ireland. A new skyscraper was built on the site of the previous historic building.[20]
1992 11 April : A large bomb explodes underneath the A406 flyover at Staples Corner, causing serious damage to roads and nearby buildings including a B&Q DIY store and causing the closure of the junction. The blast was large enough to be felt many miles away.
1992 12 October : A device exploded in the gentlemen's toilet of the Sussex Arms public house in Covent Garden, killing one person and injuring four others.
1992 16 November : the IRA planted a bomb at Canary Wharf in the Docklands. The device was spotted by security guards and was deactivated safely.
1992 17 December : A bomb hidden in a litter bin in a third-floor men's lavatory of the John Lewis department store, Oxford Street, London, was detonated by the IRA just after 11 am. A second bomb exploded 15 minutes later at the rear of the store, in Cavendish Square, while shoppers and staff were still being evacuated. Four people were injured.[21]
1993 28 January : a bomb exploded in a litter bin outside Harrods, injuring four people.[22]
1993 26 Feb. : New York City: bomb exploded in basement garage of World Trade Center, killing 6 and injuring at least 1,040 others. 
1993 27 February : a bomb exploded in a litter bin outside a McDonalds restaurant in Camden Town, injuring several people.[23]
1993 24 April : Bishopsgate bombing: the IRA detonated a huge truck bomb in the City of London at Bishopsgate, It killed journalist Ed Henty, injured over 40 people, and causing approximately £1 billion worth of damage,[24] including the near destruction of St Ethelburga's Bishopsgate church, and 
1993 1  October : Over eight days, a series of IRA bombs were left in various London locations. On October, four bombs were left on Finchley Road, three of which exploded, causing damage to buildings and several injuries caused by falling glass.
1993 4 October: pairs of bombs were left in Highgate (where one failed to explode), Hornsey, and Archway, causing significant damage but no injuries. 
1993 8 October: bombs exploded in Staples Corner and West Hampstead, again causing damage but no injuries.
1994 March : Heathrow Airport, The IRA launched a series of mortar attacks on the airport, partially paralysing the capital's main air route.
1995 19 April : Oklahoma City: car bomb exploded outside federal office building, collapsing wall and floors. 168 people were killed, including 19 children and 1 person who died in rescue effort. Over 220 buildings sustained damage. Timothy McVeigh and Terry Nichols later convicted in the antigovernment plot to avenge the Branch Davidian standoff in Waco, Tex., 
1995 13 Nov. : Riyadh, Saudi Arabia: car bomb exploded at U.S. military headquarters, killing 5 U.S. military servicemen.
1996 13 January : Lhasa, Tibet Four major attacks were acknowledged, although unofficial sources reported more. The attacks generally targeted and successfully wounded people, whereas earlier bombings targeted buildings, such an obelisk on the Qinghai-Tibet highway.[57] 
1996 18 March : a bomb exploded at the regional government and local Communist Party compound. The government temporarily shut down tourism in Tibet in response.[60
1996 9 February :  Docklands bombing: the IRA bombed the South Quay area of London, killing two people.
1996  25 June :  Dhahran, Saudi Arabia: truck bomb exploded outside Khobar Towers military complex, killing 19 American servicemen and injuring hundreds of others. 13 Saudis and a Lebanese, all alleged members of Islamic militant group Hezbollah, were indicted on charges relating to the attack in June 2001.
1996 15 February : A 5-pound (2.3 kg) bomb placed in a telephone box is disarmed by Police on the Charing Cross Road.
18 February 1996 : An IRA bomb detonates prematurely on a bus travelling along Aldwych in central London, killing Edward O'Brien, the IRA terrorist transporting the device and injuring eight others.[25]
1997 27 February: Urumqi, Xinjiang Urumqi bus bombs. Bombs detonated on three buses in Urumqi, leaving nine dead and 68 seriously wounded.[7] The Uyghur Liberation Party claims responsibility for the bombings.[7]
1998 February - April : Qaghiliq  Xinjiang A series of six explosions occurred in February and March aimed at economic and industrial targets. The following month, authorities reported that bombs exploded at homes and offices of local communist party and public security agents.[7]
1997 29 April : Britain's transport industry claimed minimum losses of £30 million after a series of IRA bomb alerts in southern England brought traffic to a standstill. In the London area, the Heathrow airport and the M25 motorway were closed.[26]
1998   7 Aug. : Nairobi, Kenya, and Dar es Salaam, Tanzania: truck bombs exploded almost simultaneously near 2 U.S. embassies, killing 224 (213 in Kenya and 11 in Tanzania) and injuring about 4,500. 4 men connected with al-Qaeda 2 of whom had received training at al-Qaeda camps inside Afghanistan, were convicted of the killings in May 2001 and later sentenced to life in prison. A federal grand jury had indicted 22 men in connection with the attacks, including Saudi dissident Osama bin Laden, who remained at large.
2000 1 June : A bomb exploded on Hammersmith Bridge at 4.30 am.
2000 September : The Real IRA, a group which had split from the Provisional IRA, launch an RPG-22 at the MI6 building in central London, causing damage.
2000 12 Oct. : Aden, Yemen: U.S. Navy destroyer USS Cole heavily damaged when a small boat loaded with explosives blew up alongside it. 17 sailors killed. Linked to Osama bin Laden, or members of al-Qaeda terrorist network.
2001 6 May : A bomb exploded at a Royal Mail sorting office in Colindale, London at 01.53 GMT, injuring one person. This bomb came just three weeks after an almost identical blast at the same office.[27]
2001 16 March : Shijiazhuang, HebeiShijiazhuang bombings
108 civilians were killed when several ANFO bombs (similar to those used by the IRA and in the 1993 World Trade Center and 1995 Oklahoma City bombings) tore through four city blocks in the city of Shijiazhang.[63] The perpetrator, 41-year-old Jin Ruchao, was allegedly motivated by hated of his ex-wife.[64] The government account was greeted with skepticism, however;[65] and some sources suggested Jin may have been a scapegoat, and that the bombings may have been the work of disgruntled former factory workers frustrated by layoffs.[66] The bombings were described in the New York Times as the deadliest mass murder in decades,[67] and was characterized by China scholar Andrew Scobell as perhaps the worst terrorist act in the history of the People's Republic of China.[16]
2001 3 August : Ealing bombing: The Real IRA detonated a car bomb in Ealing Broadway, West London, injuring seven.
2001 11 Sept. : New York City, Arlington, Va., and Shanksville, Pa.:  hijackers crashed 2 commercial jets into twin towers of World Trade Center; 2 more hijacked jets were crashed into the Pentagon and a field in rural Pa. Total dead and missing numbered 2,9921: 2,749 in New York City, 184 at the Pentagon, 40 in Pa., and 19 hijackers. Islamic al-Qaeda terrorist group blamed. (See September 11, 2001: Timeline of Terrorism.)
2001 4 March : BBC bombing: At around 00:30 GMT, the Real IRA detonated a car bomb outside the BBC's main news centre in the Shepherd's Bush area of west London.
2002 3 April : Chengdu, Sichuan On 3 April 2002, a bomb described as a "simple fuse device" detonated in Tianfu Square in Chengdu, the capital of Sichuan province. According to local media reports, one individual was seriously injured, and many others were hurt in the blast. Two men were apprehended: 52-year-old Tibetan religious leader Tenzin Deleg Rinpoche, and 26-year-old Lobsang Dondrub.[35] 
2002  June 14 : Karachi, Pakistan: bomb explodes outside American consulate in Karachi, Pakistan, killing 12. Linked to al-Qaeda.2003 1  May 12, Riyadh, Saudi Arabia: suicide bombers kill 34, including 8 Americans, at housing compounds for Westerners. Al-Qaeda suspected.
2004  May 29–31 : Riyadh, Saudi Arabia: terrorists attack the offices of a Saudi oil company in Khobar, Saudi Arabia, take foreign oil workers hostage in a nearby residential compound, leaving 22 people dead including one American. 
2004 June 11–19 : Riyadh, Saudi Arabia: terrorists kidnap and execute Paul Johnson Jr., an American, in Riyadh, Saudi Arabia. 2 other Americans and BBC cameraman killed by gun attacks. Dec. 6, Jeddah, Saudi Arabia: terrorists storm the U.S. consulate, killing 5 consulate employees. 4 terrorists were killed by Saudi security.
2005  9 Nov :  Amman, Jordan: suicide bombers hit 3 American hotels, Radisson, Grand Hyatt, and Days Inn, in Amman, Jordan, killing 57. Al-Qaeda claimed responsibility.
2006 13 Sept. : Damascus, Syria: an attack by four gunman on the American embassy is foiled.
2007 5 January : Pamirs Plateau, Xinjiang Xinjiang raid Chinese police raided a suspected East Turkestan Islamic Movement (ETIM) training camp in Akto County in the Pamirs plateau near the border between Afghanistan and Pakistan.[68] 
2007 12 Jan. : Athens, Greece: the U.S. embassy is fired on by an anti-tank missile causing damage but no injuries.Dec. 11, Algeria: more than 60 people are killed, including 11 United Nations staff members, when Al Qaeda terrorists detonate two car bombs near Algeria's Constitutional Council and the United Nations offices.
2008 9 March : Urumqi, Xinjiang State-run Xinhua News Agency reported that authorities had successfully foiled a terrorist attack on a commercial jet.[69] The Southern China flight departed from Urumqi, and made an emergency landing in Lanzhou while en route to Beijing. Two individuals were reportedly taken into custody after flight crew discovered flammable material in the plane's toilet.[69] 
2008 12 August : Yamanya, Xinjiang Chinese media reported that three security officers were allegedly killed in a stabbing incident in Yamanya, near Kashgar in Xinjiang.[55] The report did not specify what the attacker’s affiliations were.[55]
2008 4 August : Kashgar, Xinjiang Kashgar attack Suspected ETIM militants reportedly drove a truck into a group of approximately 70 jogging policemen. According to official Chinese media accounts, they then got out of the truck wielding machetes, and lobbed grenades at the officers, killing 16 people. 
2008 26 May : Iraq: a suicide bomber on a motorcycle kills six U.S. soldiers and wounds 18 others in Tarmiya.June 24, Iraq: a suicide bomber kills at least 20 people, including three U.S. Marines, at a meeting between sheiks and Americans in Karmah, a town west of Baghdad.June 12, Afghanistan: four American servicemen are killed when a roadside bomb explodes near a U.S. military vehicle in Farah Province.
2008 13 July : Afghanistan: nine U.S.soldiers and at least 15 NATO troops die when Taliban militants boldly attack an American base in Kunar Province, which borders Pakistan. It's the most deadly against U.S. troops in three years.
2008 Aug. : 2008 18 and 19, Afghanistan: as many as 15 suicide bombers backed by about 30 militants attack a U.S. military base, Camp Salerno, in Bamiyan. Fighting between U.S. troops and members of the Taliban rages overnight. No U.S. troops are killed.Sept. 16, Yemen: a car bomb and a rocket strike the U.S. embassy in Yemen as staff arrived to work, killing 16 people, including 4 civilians. At least 25 suspected al-Qaeda militants are arrested for the attack.
2008 10 August : Kuqa County, Xinjiang Xinhua reported that seven men armed with homemade explosives reportedly drove taxis into government buildings, in Kuqa, Xinjiang, injuring at least two police officers and a security guard. Five of the assailants were shot and killed.[72]
2008 26 Nov. : India: in a series of attacks on several of Mumbai's landmarks and commercial hubs that are popular with Americans and other foreign tourists, including at least two five-star hotels, a hospital, a train station, and a cinema. About 300 people are wounded and nearly 190 people die, including at least 5 Americans.
2009 9 Feb. : Iraq: a suicide bomber kills four American soldiers and their Iraqi translator near a police checkpoint.
2009 10 April : Iraq: a suicide attack kills five American soldiers and two Iraqi policemen.
2009 June 1: Little Rock, Arkansas: Abdulhakim Muhammed, a Muslim convert from Memphis, Tennessee, is charged with shooting two soldiers outside a military recruiting center. One is killed and the other is wounded. In a January 2010 letter to the judge hearing his case, Muhammed asked to change his plea from not guilty to guilty, claimed ties to al-Qaeda, and called the shooting a jihadi attack "to fight those who wage war on Islam and Muslims."
2009 25  Dec. : A Nigerian man on a flight from Amsterdam to Detroit attempted to ignite an explosive device hidden in his underwear. The explosive device that failed to detonate was a mixture of powder and liquid that did not alert security personnel in the airport. The alleged bomber, Umar Farouk Abdulmutallab, told officials later that he was directed by the terrorist group Al Qaeda. The suspect was already on the government's watch list when he attempted the bombing; his father, a respected Nigerian banker, had told the U.S. government that he was worried about his son's increased extremism.
2009 30 Dec. : Iraq: a suicide bomber kills eight Americans civilians, seven of them CIA agents, at a base in Afghanistan. It's the deadliest attack on the agency since 9/11. The attacker is reportedly a double agent from Jordan who was acting on behalf of al-Qaeda.
2010 19 August : Aksu, Xinjiang 2010 Aksu bombing.According to Chinese media reports, six ethnic Uyghur men were allegedly involved in loading a vehicle with explosives and driving into a group of security officers at a highway intersection near Aksu, Xinjiang. Seven people, including two attackers, were killed, according to police.[10] 
2010 1 May : New York City: a car bomb is discovered in Times Square, New York City after smoke is seen coming from a vehicle. The bomb was ignited, but failed to detonate and was disarmed before it could cause any harm. Times Square was evacuated as a safety precaution. Faisal Shahzad pleads guilty to placing the bomb as well as 10 terrorism and weapons charges.
2010 10  May : Jacksonville, Florida: a pipe bomb explodes while approximately 60 Muslims are praying in the mosque. The attack causes no injuries.
2010 29 Oct. : two packages are found on separate cargo planes. Each package contains a bomb consisting of 300 to 400 grams (11-14 oz) of plastic explosives and a detonating mechanism. The bombs are discovered as a result of intelligence received from Saudi Arabia's security chief. The packages, bound from Yemen to the United States, are discovered at en route stop-overs, one in England and one in Dubai in the United Arab Emirates.
2011 17 Jan. : Spokane, Washington: a pipe bomb is discovered along the route of the Martin Luther King, Jr. memorial march. The bomb, a "viable device" set up to spray marchers with shrapnel and to cause multiple casualties, is defused without any injuries. 
2011 18 July : Hotan, Xinjiang 2011 Hotan attack Chinese media reported that 18 people died when 18 young Uyghur men stormed a police station in the city of Hotan. The men were alleged to have stabbed a security guard and two female hostages, and killed another security guard with a bomb. The attack ended when security officers shot and killed 14 of the attackers. Chinese media initially referred to the attackers as rioters or thugs, though subsequent accounts called the event a terrorist attack.[11] 
2011 30–31 July : Kashgar, Xinjiang. 2011 Kashgar attacks At least 18 people died in a series of alleged terrorist attacks in the city of Kashgar. According to state-run media accounts, the violence began when two Uyghur men hijacked a truck, ran it into a crowded street, and started stabbing people, killing six.[77] 
2012 11 Sept. :  Benghazi, Libya: militants armed with antiaircraft weapons and rocket-propelled grenades fire upon the American consulate, killing U.S. ambassador to Libya Christopher Stevens and three other embassy officials. U.S. secretary of state Hillary Clinton said the U.S. believed that Al Qaeda in the Islamic Maghreb, a group closely linked to Al Qaeda, orchestrated the attack. 
2012 29 June : Xinjiang Tianjin Airlines Flight GS7554 Chinese official media reported that six men attempted to hijack Tianjin Airlines flight GS7554 from Hotan to Urumqi, Xinjiang. The men reportedly sought to gain access to cockpit ten minutes after takeoff, but were stopped by passengers and crew. A spokesperson for the Xinjiang government said the men were ethnic Uyghurs.[81] Xinhua reported at least 10 passengers and crew were injured when six hijackers tried to take control of the aircraft.[82] 
2013 1 Feb. : Ankara, Turkey: Ecevit Sanli detonates a bomb near a gate at the U.S. Embassy. Sanli dies after detonating the bomb. One Turkish guard is also killed. Didem Tuncay, a respected television journalist, is injured in the blast. Unlike the bombing at the embassy in Benghazi last September, the U.S. government immediately calls the bombing a terrorist attack. According to Turkish officials, the attack is from the Revolutionary People's Liberation Party, which has been labeled a terrorist organization by the U.S. and other nations.
2013 15 April : Boston, Mass.: multiple bombs explode near the finish line of the Boston Marathon. Two bombs go off around 2:50 in the afternoon as runners finish the race. At least three people are killed. One is an eight year old boy. More than 170 people are injured. Three days later, the FBI releases photos and video of two suspects in the hope that the public can help identify them. Just hours after the FBI releases the images, the two suspects rob a gas station in Central Square then shoot and kill a MIT police officer in his car. 
2013 24 April : Xinjiang 2013 Xinjiang ethnic clashes. It was an incident of ethnic clash that took place between Muslim Uighur and Han Chinese community.As reported by BBC[84] nearly 21 people were killed in the incident including 15 police officers.
2013 26 June : Lukqun, Xinjiang At least 35 people were killed in clashes between ethnic Uyghurs and police in the deadliest altercation in the region since 2009. Chinese official media reported that a group of 17 knife-wielding Uyghur men attacked a police station and government building. Chinese authorities pronounced the event a terrorist attack, and blamed separatists and overseas forces for fomenting tensions.[85] 

Terrorist Attacks on Americans
http://www.infoplease.com/ipa/A0001454.html

Terrorist Attacks on the British
http://en.wikipedia.org/wiki/List_of_terrorist_incidents_in_London

Chinese Terrorist Attacks
http://en.wikipedia.org/wiki/Terrorism_in_China

Tuesday, September 3, 2013

Can Play His Own Harmonica to His Own Tune


Reported

Sworn in Court and Affidavit by Two Texas Witnesses 

Texas 711 Ice Slushy Brain Freeze Harmonic Melodies and Bedtime Fairy Tails - If They Can They Will

And They Did

Texas Gov. Rick Perry Experiments
(A Decade of Abuse by This Guy Rick Perry)

The day my Life Long Friend, Teacher and Guru, Open the Gate of the Ashram, a pilgrims rite of passage, he watched me walk away forever on my own two feet; within the hour, three FBI Agents laugh as they watch me as I try to enjoy breakfast at a Vegas coffee shop, then say, “We will leave you Alone – Today!” They had trailed me for years for whatever reason I still do not know. 


FISA The Las Vegas Connection

Blame It On Texas Fusion Centers Not NSA

There are two distinct Sounds that of the physical world and that of the Soul or how I can determine what is artificial and what is not. 




Sri Paul Marché

Sri GregO:  Of course, any weapon system, say a Colt 45 pistol to the head leaves so much brain trauma to any Hindu Guru, which is not worthy of discussion. Within the realm of human reasoning, and yes I know of many that can go beyond it, please consider the source of the following article(S):

"If You See Something Say Something"
Non-Lethal Weapons Can Be Bio-Lethal Weapons



These Studies Have Know To Cause Non-Infectious Meningitis

Causes

Non–infectious meningitis causes include
•Cancers
•Systemic lupus erythematosus (lupus)
•Certain drugs
•Head injury
•Brain surgery

Transmission

This type of meningitis is not spread from person to person. Non-infectious meningitis can be caused by cancers, systemic lupus erythematosus (lupus), certain drugs (Vioxx a known Journal Medicine), head injury, and brain surgery.

Signs & Symptoms

Meningitis infection is characterized by a sudden onset of fever, headache, and stiff neck. It is often accompanied by other symptoms, such as
•Nausea
•Vomiting
•Photophobia (sensitivity to light)
•Altered mental status


CDC - Meningitis - Non-Infectious Meningitis - @CDCgov





Subject: [New post] Satellite "Mind Control" - Bioelectric Weapons From: blomblad i vinden (no-reply@wordpress.com) To: @yahoo.com; Date: Mon, 18 Jul 2011 09:36:35 

Satellite "Mind Control" - Bioelectric Weapons blombladivinden | July 18, 2011 at 2:36 pm | Categories: Bioteknologier, Mind-Control | URL: http://wp.me/p1lC9L-J3

1.SATELLITE »MIND CONTROL« - BIOELECTRIC WEAPON 
"The events at the international political scene, in the last few years, confirm that the concept of remote control of human brain is a matter of negotiations. In January 1999 the European Parliament passed a resolution where it calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings." 

MIND CONTROL WEAPON 
September 9 2008 

The term “Mind control” basically means covert attempts to influence the thoughts and behavior of human beings against their will (or without their knowledge), particularly when surveillance of an individual is used as an integral part of such influencing and the term “Psychotronic Torture” comes from psycho (of psychological) and electronic. This is actually a very sophisticated form of remote technological torture that slowly invalidates and incapacitates a person. These invisible and non-traceable technological assaults on human beings are done in order to destroy someone psychologically and physiologically. Actually, as par scientific resources, the human body, much like a computer, contains myriad data processors. They include, but are not limited to, the chemical-electrical activity of the brain, heart, and peripheral nervous system, the signals sent from the cortex region of the brain to other parts of our body, the tiny hair cells in the inner ear that process auditory signals, and the light-sensitive retina and cornea of the eye that process visual activity. We are on the threshold of an era in which these data processors of the human body may be manipulated or debilitated. 

Definition of psychotronic (psycho-physical) weapons Psychotronic Weapons (PF- weapons) this is the totality of all possible methods and means (techno-genic, suggestive, pharmacological, paranormal, complexes, and others) of hidden, forced influences on the psyche of a person for the purpose of modifying his consciousness, behavior and health for what is desired in the way of influencing aspects of control..." This is not only dangerous, this is deadly!" 

The First phase is the harassment/surveillance program. 

They use Echelon, Tempest, microchips, implants, see through wall radar, obtain informants, neighbors, and co-conspirators to harass, discredit, and harm an individual. Victims loose their families, jobs, homes, and cars. Ultimate goal to destroy a persons life which will isolate them from family, friends. The isolation is needed to have access to the person to conduct many of the experiments on them. 

The second phase is the assaults of Directed Energy Weapons. 
After a victim becomes isolated from everyone in the world. The victim now having feelings of regret, remorse, of loss, trauma, and are drained and broken emotionally and physically. During this time many have been implanted with microchips. Many begin experiencing extreme pain to their head. Some hear voices. Then pain is delivered to various other parts of their bodies. The pain is delivered by Directed Energy Weapons. 

Directed Energy Weapons. 

Some of the weapons were known as non-lethal weapons. They use such weapons as extremely low frequency Elf electromagnetic weapons (which has been used in mind control), acoustics, harmonics (which have been used as a mind control technique), ultrasound, microwave audiograms, microwave pulsed, and radio frequency. Another electromagnetic energy beam can be used to induce "considerable agitation and muscular activity" or "induce muscular weakness and lethargy" this weapon is know as Ultra High Frequency EM. Psychological warfare tactics are being used against unsuspecting citizens to destroy their jobs, their families and their lives. The perpetrators will stop at nothing. Their objective is to utterly destroy a person, very often resulting in a person taking his or her own life, or ending up in a mental hospital. This has been taking place for years and nothing is ever said about it. Nothing is ever written about it. Some people also experience electronic harassment. This is extremely distressing, painful and invasive, and feels like one's mind and body is undergoing constant rape, 24 hours a day, 7 days a week. The technology used to do this is unknown, but hundreds of victims report the same physical sensations and experiences. Many take their lives in an attempt to escape the horror. The technology involves the use of electromagnetic waves of various frequencies to achieve different results. Some frequencies will make a person tired, while others may cause confusion or memory loss. "Electronic harassment" or e-harassment is a catch-all term used to describe a group of circumstances which a large number of people are currently experiencing in common. 

Saturday, February 19, 2011 PSYCHOTRONIC WEAPONS – BRAIN MANIPULATION FROM A DISTANCE 

In October 2010, the congressman Denis J. Kucinich introduced in the American Congress A bill, obliging the American president to get engaged in the negotiations aimed at the ban of space based weapons. In this bill the definition of a weapon system includes: any other unacknowledged or as yet undeveloped means inflicting death or injury on, od damaging or destroying, a person(or the biological life, bodily health, mental health, or physical and economic well-being of a person) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations or the purpose of information war, mood management, or mind control of cush persons or populations. As in all legislative acts quoted in this article the bill counts with sound, light or electromagnetic stimulation of human brain. Psychotronic fweapons remain, at least for a layman uninformed of secret military research, in the sphere of science fiction, since so far none of the published scientific experiments was presented in the way which would allow for its replication. 

That it is feasible to manipulate human behavior with the use of subliminal, either sound or visual, messages is now generally known. This is why in most of the countries the use of such technologies, without consent of the user, is banned. Devices using light for the stimulation of the brain show another way how the light flashing in certain frequencies could be used for the manipulation of human psychic life. As for the sound, a report on 
persons at whom the beam of sound waves is targeted, appeared last year in the world newspapers. 

The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the development of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seem to be the electromagnetic energy.   

BRAIN-MACHINE INTERFACE Robert Asher, Sandia National Laboratories June 2002,Arlington, Virginia 

Increasingly, the human is being asked to take in multisensory inputs, to make near-instantaneous decisions on these inputs, and to apply control forces to multitask and control machines of various sorts. The multitasking, multisensor environment stresses the human, yet, more and more s/he being asked to operate in such an environment. As an example, the visionary project on uninhabited combat vehicles discusses an increased workload in piloting combat vehicles. DARPA has a brain-machine interface program about to start. This program has as its goal human ability to control complex entities by sending control actions without the delay for muscle activation. The major application for this program is control of aircraft. The intent is to take brain signals and use them in a control strategy and then to impart feedback signals back into the brain.   

The DARPA program could be extended to include a broader range of potential impact by including the possibility of other applications: learning and training, automobile control, air traffic control, decision-making, remote sensing of stress, and entertainment. Learning and training might be implemented as information coded into brain signals and then input into the person. Air traffic control in increasingly busy skies can use such capability: the controller has multiple inputs from multiple aircraft. These can be input into his brain in a 3-D aspect and an alertness signal used to “wake him up” when his attention drifts beyond acceptable limits. Not only intellectual data might be passed from one person to another without speaking, but also emotional and volitional information. Decision making may become more precise as emotional, fatigue, and other cognitive states can be appraised prior to making a critical decision. The potential impact on automobile safety is great. The driver can have quicker control of his automobile (Fig. E.15), allowing for safer driving while reducing the car-to-car spacing on congested highways. This would help alleviate highway congestion and the need for more highways. Furthermore, it would allow for safer driving as driver attention can be measured and the driver “alerted” or told in some manner to pay attention to his or her driving when attention wanders beyond safe margins. It can allow for detection of driver impairment so that the vehicle may be made either not to start or to call emergency. Direct connection into the brain could yield a revolution in entertainment, 




MATRIX-style, into the midst of a movie or educational show. Can you imagine the impact of being immersed in a fully 3-D audio-visual simulation of the battle of Gettysburg? 
Hands-off control of an automobile through a device for reading and implanting brain waves. 
Role of Converging Technologies 
Nano. The brain-machine interface effort will require nanotechnologies in order to make the required experimental measurements and to implement the devices for both receiving brain electromagnetic signals and transmitting signals back into the brain. 
Bio. This is a highly biological, neuroscience effort, which requires detailed understanding and measurements of the brain’s electromagnetic activity. It requires a significant measurement protocol. 
Cogno. This effort by its very nature will directly affect the cognitive aspects of the individual by externally applied electromagnetic fields by implanting information for the individual. Thus, this effort can lead to increased learning and other cognitive results. 
Transforming Strategy to Reach the Vision 
To achieve these goals, enter a partnership with DARPA to fund additional technologies and applications that would enhance the brain-machine interface effort. Work should be focused on the goals of using the technologies for cognitional aspects, understanding memory, and learning brain function to be able to design devices to increase their capabilities. 
Estimated Implications 
This effort would yield a technological revolution, in applications from computers to entertainment. It would give the United States a global competitive advantage while yielding solutions to specific domestic problems such as air traffic control and highway safety in increasingly crowded environments. It will revolutionize education. This effort will yield devices that may be applied to a number of activities and be sufficiently small as to be wearable in a car or at home. 
DEPARTMENT OF THE NAVY                            OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 3900.39D BUMED MOOR, 3 November 2006 
  SECNAV INSTRUCTION 3900.39D From: Secretary of the Navy 


Subj: HUMAN RESEARCH PROTECTION PROGRAM 

i. International Research.   Research involving human subjects who are not U.S. citizens or DOD personnel, conducted outside the United States, and its territories and possessions, requires permission of the host country. The laws, customs, and practices of the host country and those required by this instruction will be followed. An ethics review by the host country, or local Naval IRE with host country representation, is required.   j. Classified Research.   Classified research with human subjects is held to the same ethical principles and human subject protections as unclassified research and must receive prior approval from the Secretary of Defense (SECDEF) (SECDEF Memorandum of December 13, 1999) . Classified research is not eligible for review under expedited review procedures as noted in reference (n)   

A. Research includes, but is not limited to, any project, task, test, pilot study, experiment, investigation, study, clinical study, clinical investigation, clinical trial, evaluation, developmental effort or similar undertaking, whether or not conducted or supported under a program that is officially considered research. Any effort, even if not considered research for other purposes, is considered research for purposes of this instruction. 

EUROPA - TARGETED  INDIVIDUALS 

The human mind has never been a simple project. Because of its complexity and plasticity, it has yet not been completely understood. Under the dark ages of brain research, scientists have nevertheless learned how to stimulate and partially control the human brain's responses. At any time it has been done, it has caused pain and suffering for the owner of the brain: the human subject. 

Backed up by the "best" scientists, sponsored by the military and the secret service, thousands of individuals have their lives destroyed in the quest of developing technologies that are not science fiction anymore. 
The human brain, is seen as a computer where information can be downloaded and from where information can be uploaded. Cloning the individual's brain and nervous system is the only hope today's scientists have to understand the human brain and develop advanced artificial intelligence and synthetic telepathy, allowing people to communication by thought, not speech. The European and World countries governments, faced with this "challenge" are unable to protect their citizens against the greatest possible 

violations of their human rights. There are no excuses whatsoever for researchers to destroy people's and entire families lives. Under the secrecy of "national security", they violate human rights conventions and every universal human right a human being is born with, going deep into the very consciousness of the person that is affected. 

DIRECTED ENERGY PROFESSIONAL SOCIETY 
These Directed Energy (DE) internships are concerned with the research, development and testing of high energy laser and high power microwave components, systems and effects at Federal laboratories and universities at sites around the country. Most of these positions are made possible by funding from the High Energy Laser Joint Technology Office. 

Internship Qualifications These paid summer internship positions are available for currently enrolled undergraduate and graduate students at U.S. colleges and universities. Positions are open to U.S. citizens only. The disciplines include but are not limited to these: science - physics, chemistry engineering - electrical, optical, chemical, mechanical, and materials mathematics and computer science 

Position Descriptions Generally, interns will work for the summer in a laboratory or university under the tutelage of full time researchers. Work may include experimental, theoretical, or computer modeling and simulation, depending on the position. Specific work assignments, hours and pay will vary. Organizations The organizations below are expected to offer these internships in 2012. Advertising for open positions will begin in December 2011. 

711 Human Performance Wing - Texas

Air Force Institute of Technology - Ohio

Air Force Research Laboratory - Hawaii, New Mexico

Army Research Laboratory- Maryland   Naval Postgraduate School - California   Naval Research Laboratory (satellite) - Washington, D.C., Florida   

A Pilot Study 
US Army Space and Missile Defense Command - Alabama 
INTERMITTENT VORTICITY, POWER SPECTRAL 
SCALING AND DYNAMICAL MEASURES ON RESTING 
BRAIN MAGNETIC FIELD FLUCTUATIONS 
Arnold J. Mandell, Karen A. Selz, Tom Holroyd, Linsay Rutter 
and Richard Coppola 
NIMH Core MEG Laboratory and Cielo Institute 
Supported in part by the Fetzer-Franklin Trust, DARPA 
(Microelectronics) and the Space and Naval Warfare Center 

The Eyes Closed, Resting Record 

The time dynamics of global brain electromagnetic field activity, recorded in humans as continuous, eyes closed resting MEG (and EEG) records, are regarded by some as reflections of physiologically and psychologically relevant, emergent macroscopic behavior of nonlinearly coupled, cooperative brain systems (Basar et al., 1983; Bucolo et al., 2003; Chen et al., 2003; Friedrich et al., 1989; Haken, 2 1996; Mandell, 1983a). Others, more involved in neuronal current source localization studies of task or state-related magneto-encephalographic records (Cornwell et al., 2008; Fife et al., 2002; Garolera et al., 2007; Nolte et al., 2004) have treated the globally distributed, spontaneous neuronal current generated, brain magnetic field activity as “…high-ranked (leading eigenvalued) background activity… interfering magnetic fields generated from (not relevant) spontaneous brain activities...intrinsic brain noise…” (Sekihara et al., 1996; Sekihara et al., 2008; Sekihara et al., 2006). Covariance matrix-derived beamformers from several minutes of the eyes-closed resting record have been used in “prewhitening techniques”, adding noise in order to get around linear dependency in the matrix if it is too low dimensional and to minimize interfering low dimensional intrinsic brain magnetic field noise (Sekihara et al., 2008; Zumer et al., 2007; Zumer et al., 2008). 
Another view of spontaneous magnetic field fluctuations have been influenced by studies of spatial (neuroanatomical) brain localization using concomitant fMRI techniques. They have suggested the existence of spontaneous, regional, above baseline activity in the normal eyes closed, resting state. This activity is particularly pronounced in medial prefrontal, parietal and both posterior and anterior cingulate, and is suppressed during goal-directed 


behavior (Damoiseaus et al., 2006; Griecius et al., 2003; Gusnard & Raichle, 3 2001). Activity in this “network” has been labeled “default activation” by Raichle (Raichle ME et al., 2001). The many second time scale of fMRI imaging demonstrated density variations that were characteristic for the normal eyes closed, resting condition (Biswal et al., 1995). Importantly, the spontaneous activity in the resting state also appears to involve neural network activity across several time scales (Honey et al., 2007). 

In two state, task-no task, experimental designs, the resting activity, “default activation, ” has been speculated to reflect spontaneous, task unrelated, images and thoughts (Greicius & Menon, 2004; Greicius et al., 2004; Raichle ME et al., 2001; Vincent et al., 2007). These transient mental events in the eyes closed, resting condition have also been called “daydreaming” (Singer, 1966 ), “task-unrelated-thoughts,” TUTs(Giambra, 1989), “unrest at rest”(Buckner & Vincent, 2007), “wandering minds,” and “stimulus independent thought”, SITs (Gilbert et al., 2007). Psychologists that have studied inner life subjectively, William James (James, 1902) and Sigmund Freud (Freud, 1914/1955 among many others, have focused on these autonomously arising transient streams of free associations and imagery. James analogized them to the turbulent eddies of the hydrodynamic flow of consciousness which he believed these transients to be among the universal properties of the conscious human brain. Examinations of a subject’s spontaneous 4 internal activity as exteriorized by the psychoanalytic instruction, “…say everything that comes to your mind…” has been central to the practice of psychoanalysis for over a Century {Fenichel, 1945 #8190). It appears that the ostensibly resting “default brain activity” in the “default network” persists in monkeys through anesthesia-induced changes in states of consciousness (Vincent et al., 2007). This result is consistent with a several decade history of research using priming, evoked potentials and task recovery paradigms to demonstrate implicit, working memorial events that occur during even surgical anesthesia (Jordon et al., 2000). The implied relationship between 2-5 second epochs of MEG activation such as that seen below in Fig. 5 as intermittent helical vortices (we call them strudels) and TUT or SIT-like subjective phenomena must remain entirely speculative. 

General Premise and Hypothesis It is the underlying premise of this pilot study of intrinsic brain magnetic field fluctuations that they manifest signatory patterns in transformations and measures which can discriminate among global brain states. We examine this premise by partially isolating and qualitatively and quantitatively characterizing 12.5, 54, 180 or 240 seconds of eyes closed, resting spontaneous magnetic field activity in ten resting controls and ten medicated schizophrenic probands. From our previous 5 work in brain-related physiological systems (Mandell, 1979; Mandell, 1983b; Mandell,  1987; Mandell et al., 1982; Mandell & Selz, 1993), a more specific hypothesis is suggested: 

"Compared with controls, magnetic field fluctuations in schizophrenic patients will demonstrate relatively higher values for indices of emergent dynamical structure and relatively lower values for a variety of measures reflecting the dynamical entropy “used up” in their formation (Mandell & Selz, 1997c; Selz & Mandell, 1991; Selz et al., 1995; Smotherman et al., 1996)." 

A MEG Derived Data Series: Symmetric Sensor Difference Sequences, ssds(i) Ten normal controls and ten age- and sex-matched schizophrenic proband subjects (see Subjects below) were studied in the National Institutes of Mental Health’s Core MEG Laboratory in Bethesda, MD. A 275 channel, superconducting quantum interference device (SQUID radial gradiometer system from CTF Systems Inc. Port Coquitlam, BC, Canada (Anninos et al., 1986; Cohen, 1972; Rutter et al., 2009; Weinberg et al., 1984) was used in data collection (see Magnetoencephalographic Data Collection below). 

6. Our approach to MEG-derived signals abrogates source orientation, localization and inverse problem tools such as leadfield matrices (Dale & Sereno, 1993; Hamalainen et al., 1993), adaptive synthetic aperture magnetometer, SAM, beamformer techniques, or projection onto Talairached MRI image reconstructed volumes (Dalal et al., 2008; Dalal et al., 2004). For these approaches to this data set, see Rutter et al (Rutter et al., 2009). In their study of spontaneous activity in the eyes closed, resting state, they found a statistically significant decrement in the amplitudes of MEG recorded posterior regional gamma (30-70Hz+) activity in schizophrenic patients compared with normal controls (Rutter et al., 2009). In that study as well as these, a high pass, 0.6 Hz, as well as 60, 120, 180 and 240 Hz notch filters were routinely applied to the individual sensor records before the computation of the sensor pair ssds(i), (the difference between the two sensor). It  is our presupposition that the “… spontaneous activity… all over the brain…”(Sekihara et al., 2008) reflects global and neurophysiologically meaningful patterns of complex neuronal activity-generated magnetic field fluctuations in interaction with MEG SQUID sensors (Barone A & G., 1982; Braiman & Wiesenfeld, 1994). A magnetic flux applied to the SQUID magnetometer, gives rise to a circulating current, which in turn modulates the inductance of the autonomously oscillatory Josephson junctions (Landberg et al., 1966; Levi et al., 1977). The great sensitivity of the SQUID devices permits measuring changes in magnetic field associated with even a single flux quantum. 

7. If a constant biasing current is maintained in the SQUID device, it is the voltage which is modulated by changes in phase at junctions. Phase at Josephson junctions is sensitive to the quanta of magnetic flux. We dismiss a common generalization of many MEG practitioners that most or all local polarities of the intrinsic magnetic field noise “cancel out.” In the context of the somewhat analogous magnetic dynamo problem: “…given a flow in a conducting fluid, will a small seed magnetic field amplify exponentially with time…” (Finn & Ott, 1988)--we show below that ssds(i)s do-- it was argued that the magnetic flux loops nonuniformly stretch and fold into themselves manifesting only partial cancellation and diffuse fine scale oscillations, in a process which can be quantified by a fractional cancellation exponent (Ott et al., 1992) and measures made on temporal-spatial intermittency. 

In addition, if some currents run parallel to magnetic fields, which is expected to be the case with poorly localized, multiple neocortical neuronal sources, the magnetic field lines may follow a variety of 

dynamical shapes in which the magnetic pressure gradient is balanced by the magnetic tension. For example, there may not be any Lorentz force, J x B = 0, leading to a measurable field configuration without any net electrical current at all. We thus don’t infer a particular neuronal current source (or event) for the data series. Characterizing the fluctuations allows the elucidation of patterns in the brain’s global magnetic field flux dynamics without reference to anatomical location (Clarke, 1994). 
8 example, we find a common dynamical pattern often involves intermittently appearing, multiple time scale helical vortices. We call them unwindable strudels lest they lead to the brain being called a critically loaded sand pile that spawns avalanches (Beggs & Plenz, 2005; Levina et al., 2007)). In comparison with the several second time resolution of fMRI, the MEG’s superior temporal resolution, ~ 1 ms, combined with its “underdetermined” weaknesses with respect to specific brain localization when used alone (Hamalainen et al., 1993; Im et al., 2005; Lee et al., 2007; Sarvas, 1987; Uutela et al., 1998), suited our goal of characterizing magnetic field (rather than inferred neuronal) properties of what has been called intrinsic physiological brain noise (Nagarajan et al., 2006; Sekihara et al., 1997; Sekihara et al., 2005). The use of ssds(i) exploits the hemispheric symmetry of the human brain (Geschwind, 1970) and serves several purposes: (1) It imposes a natural gauge (distance serves as a traveling, local normalization procedure; (3) The ssdi (i) reduces the penetrance of electromagnetic field correlates of blink, cough, and movement as well as the cardiac and respiratory artifacts that both symmetric sensors generally share; (4) Using ssds(i) instead of the raw MEG time series tends to cancel the symmetrically shared generic MEG (and EEG) Δ, Θ, α, β, and γ modes, as well as other patterns of bihemispheric covariance; (5) Advantageous from the magnetic field point of view is the fact that using ssds(i) makes issues of 9 neuronal current source location moot; ; the spatial sensitivity profile of the ssds(i) considered as a virtual sensor typically covers a large volume of the brain. The techniques similar to that used here of paired sensor difference series, ssds(i), have been used to reduce or remove the mean and double or more the higher moments in analyses of nonstationary neural membrane conductance noise (Conti et al., 1980; DeFelice, 1977; Sigworth, 1981). 

NAVAL -  research laboratory experiments (NRL) Florida 
The beam is formed by a combination of sound and ultrasound waves which causes that a person targeted by this beam hears the sound inside of his head. Such a perception could easily convince the human being that it is mentally ill. The acts presented in this article suggest that with the development of technology and knowledge of the functioning of human brain new ways of manipulation of human mind keep emerging. One of them seem to be the electromagnetic energy.   

Pentagon report investigated lasers that put voices in your head                   February 18, 2008 by Lisa Zyga 

A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture.Some of the applications the report investigated include putting voices in people's heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion - all from hundreds of meters away. 
A US citizen requested access to the document, entitled "Bioeffects of Selected Non-Lethal Weapons," under the Freedom of Information Act a little over a year ago. There is no evidence that any of the technologies mentioned in the 10-year-old report have been developed since the time it was written The report explained several types of non-lethal laser applications, including microwave hearing, disrupted neural control, and microwave heating. For the first type, short pulses of RF energy (2450 MHz) can generate a pressure wave in solids and liquids. When exposed to pulsed RF energy, humans experience the immediate sensation of "microwave hearing" - sounds that may include buzzing, ticking, hissing, or knocking that originate within the head. Studies with guinea pigs and cats suggest that the mechanism responsible for the phenomenon is thermoelastic expansion. Exposure to the RF pulses doesn´t cause any permanent effects, as all effects cease almost immediately after exposure ceases. 

As the report explains, tuning microwave hearing could enable communicating with individuals from a distance of up to several hundred meters. The report explains: 

"The phenomenon is tunable in that the characteristic sounds and intensities of those sounds depend on the characteristics of the RF energy as delivered... Because the frequency of the sound heard is dependent on the pulse characteristics of the RF energy, it seems possible that this technology could be developed to the point where words could be transmitted to be heard like the spoken word, except that it could only be heard within a person´s head." 

In one experiment, communication of the words from one to ten using ´speech modulated´ microwave energy was successfully demonstrated. Microphones next to the person experiencing the voice could not pick up these sounds. Additional development of this would open up a wide range of possibilities." The report predicts that communicating at longer distances would be possible with larger equipment, while shorter range signals could be generated with portable equipment. Putting voices in people´s heads could cause what the report calls "psychologically devastating" effects. The technology might even allow for communicating with an individual hostage surrounded by captors, although this would require "extreme directional specificity. With another weapon, electromagnetic pulses could be used to disrupt the brain´s functioning, although this technology was still in the theoretical stages at the time. Under normal conditions, all brain structures function with specific rhythmic activity depending on incoming sensory information. 

Sometimes, the brain synchronizes neuronal activity in order to focus on a specific task, but the degree of neuronal synchronization is highly controlled. However, under certain conditions (such as physical stress or heat stroke), more areas of the brain can fire in a highly synchronized manner, and may begin firing uncontrollably. The report describes a method for replicating this highly synchronized neuron firing across distances of several hundred meters. High-voltage (100 kV/m) electromagnetic pulses lasting for one nanosecond could trigger neurons to fire, disrupting the body´s controlled firing activity. Short-term effects may include loss of consciousness, muscle spasms, muscle weakness, and seizures lasting for a couple minutes. These high-voltage pulsed sources, which would require an estimated frequency of 15 Hz, exist today. 
Another form of non-lethal torture described in the report is microwave heating. By raising the temperature of the body to 41°C (105.8°F), humans can experience sensations such as memory loss and disorientation, and exhibit reduced aggression. According to the report, humans can survive temperatures up to 42°C (107.6°F), at which time prolonged exposure can result in permanent brain damage or death. The microwave heating technique was tested on a Rhesus monkey, where a 225 MHz beam caused an increase in the animal´s body temperature. Depending on the dosage level, the temperature increase occurred within a time of 15 to 30 minutes. After the beam was removed, the animal´s body temperature decreased back to normal. The report suggests the technique could be useful for controlling crowds or in negotiations. While the investigations reveal intriguing techniques for non-lethal torture, the report does not mention plans for carrying out specific experiments or studies in the future. 

DARPA - nanotechnology 

1.Military Defense Robotics 

Machines Will Rise: Becoming Self Aware The Department of Defense is building robots for the Pentagon. It has been seen as a move that could advance AI research and move the Defense robotics industry into the New Age. As viewed in our Exoskeleton section one of the leading manufactures in the exoskeleton arena is a company called Cyberdyne Technologies. Industry experts are already predicting that when the soldier steps out of this unit the exoskeleton will be able to operate autonomously. 

2.NANO SOLDIERS A New Industrial Revolution In January 2000, U.S. President Bill Clinton requested a $227-million increase in the government's investment in nanotechnology research and development, which included a major initiative called the National Nanotechnology Initiative (NNI). This initiative nearly doubled America 's 2000 budget investment in nanotechnology, bringing the total invested in nanotechnology to $497 million for the 2001 national budget. In a written statement, White House officials said that "nanotechnology is the new 

frontier and its potential impact is compelling." About 70 percent of the new nanotechnology funding will go to university research efforts, which will help meet the demand for workers with nanoscale science and engineering skills. The initiative will also fund the projects of several governmental agencies, including the National Science Foundation , the Department of Defense , the Department of Energy , the National Institutes of Health , NASA and the National Institute of Standards and Technology. Much of the research will take more than 20 years to complete, but the process itself could touch off a new industrial revolution. Nanotechnology is likely to change the way almost everything, including medicine, computers and cars, are designed and constructed. Nanotechnology is anywhere from five to 15 years in the future, and we won't see dramatic changes in our world right away. 

A Short History of Nanotechnology 

1959 Feynman gives after-dinner talk describing molecular machines building with atomic precision 1974 Taniguchi uses term "nano-technology" in paper on ion-sputter machining 1977 Drexler originates molecular nanotechnology concepts at MIT 1981 First technical paper on molecular engineering to build with atomic precision STM invented 1985 Buckyball discovered 1986 First book published AFM invented First organization formed 1987 First protein engineered First university symposium 1988 First university course 1989 IBM logo spelled in individual atoms First national conference 1990 First nanotechnology journal Japan's STA begins funding nanotech projects 1991 Japan''s MITI announces bottom-up "atom factory" IBM endorses bottom-up path Japan's MITI commits $200 million Carbon nanotube discovered 1992 First textbook published First Congressional testimony 1993 First Feynman Prize in Nanotechnology awarded for modeling a hydrogen abstraction tool useful in nanotechnology First coverage of nanotech from White House "Engines of Creation" book given to Rice administration, stimulating first university nanotech center 1994 Nanosystems textbook used in first university course US Science Advisor advocates nanotechnology 1995 First think tank report First industry analysis of military applications Feynman Prize in Nanotechnology awarded for synthesis of complex three-dimensional structures with DNA molecules 1996 $250,000 Feynman Grand Prize announced First European conference NASA begins work in computational nanotech First nanobio conference 1997 First company founded: Zyvex First design of nanorobotic system Feynman Prize in Nanotechnology awarded for work in computational nanotechnology and using scanning probe microscopes to manipulate molecules 1998 First NSF forum, held in conjunction with Foresight Conference First DNA-based nanomechanical device Feynman Prize in Nanotechnology awarded for computational modeling of molecular tools for atomically-precise chemical reactions and for building molecular structures through the use of self-organization

1999 First Nanomedicine book published 

First safety guidelines Congressional hearings on proposed National Nanotechnology Initiative Feynman Prize in Nanotechnology awarded for development of carbon nanotubes for potential computing device applications and for modeling the operation of molecular machine designs 2000 President Clinton announces U.S. National Nanotechnology Initiative First state research initiative: $100 million in California Feynman Prize in Nanotechnology awarded for computational materials science for nanostructures and for building a molecular switch 2001 First report on nanotech industry U.S. announces first center for military applications Feynman Prize in Nanotechnology awarded for theory of nanometer-scale electronic devices and for synthesis and characterization of carbon nanotubes and nanowires 2002 First nanotech industry conference Regional nanotech efforts multiply Feynman Prize in Nanotechnology awarded for using DNA to enable the self-assembly of new structures and for advancing our ability to model molecular machine systems 2003 Congressional hearings on societal implications Call for balancing NNI research portfolio Drexler/Smalley debate is published in Chemical & Engineering News Feynman Prize in Nanotechnology awarded for modeling the molecular and electronic structures of new materials and for integrating single molecule biological motors with nano-scale silicon devices 2004 First policy conference on advanced nanotech First center for nanomechanical systems Feynman Prize in Nanotechnology awarded for designing stable protein structures and for constructing a novel enzyme with an altered function 2005 At Nanoethics meeting, Roco announces nanomachine/nanosystem project count has reached 300 Feynman Prize in Nanotechnology awarded for for designing a wide variety of single molecular functional nanomachines and for synthesizing macromolecules of intermediate sizes with designed shapes and functions 
2006 National Academies nanotechnology report calls for experimentation toward molecular manufacturing Feynman Prize in Nanotechnology awarded for work in molecular computation and algorithmic self-
assembly, and for producing complex two-dimensional arrays of DNA nanostructures 2007 Feynman Prize in Nanotechnology awarded for construction of molecular machine systems that function in the realm of Brownian motion, and molecular machines based upon two-state mechanically interlocked compounds 2008 Technology Roadmap for Productive Nanosystems released Protein catalysts designed for non-natural chemical reactions Feynman Prize in Nanotechnology awarded for work in molecular electronics and the synthesis of molecular motors and nanocars, and for theoretical contributions to nanofabrication and sensing 2009 An improved walking DNA nanorobot Structural DNA nanotechnology arrays devices to capture molecular building blocks Design 'from scratch' of a small protein that performed the function performed by natural globin proteins Organizing functional components on addressable DNA scaffolds Feynman Prize in Nanotechnology awarded for experimental demonstrations of mechanosynthesis using AFM to manipulate single atoms, and for computational analysis of molecular tools to build complex molecular structures 2010 DNA-based 'robotic' assembly begins Feynman Prize in Nanotechnology awarded for work in single atom manipulations and atomic switches, and for development of quantum mechanical methods for theoretical predictions of molecules and solids 2011 First programmable nanowire circuits for nanoprocessors DNA molecular robots learn to walk in any direction along a branched track Mechanical manipulation of silicon dimers on a silicon surface 
MORE  INFORMATIONS...."!   MINISTRY OF DEFENCE  IN AMERICA HAVE  SECRET  CODE -  " PILOT STUDY"!!! *************************************** THAT  IS   EXPERIMENT  OF  NAVAL-DARPA ON  CIVILIANS PEOPLES!   - international research of MINISTRY OF DEFENCE AMERICA - secret research MINISTRY OF DEFENCE AMERICA   - "Ministry of defence"  of each country NATA - NATO   from 1980 participate with DARPA-NAVAL! - NATO -  "RTO research technology organisation"  


   
- IRIS - /Ministry of defence USA/ satellite tracking peoples - MATRIX - reading thoughts "brain machine computer system" - "Pilot study - experiment"  -  reasons -     "reading thoughts in car, home, on job " -  DARPA -  nano technology -  NAVAL - satellite research laboratory -  MARYLAND...  bio  computers     SPACE WEAPON - MIND CONTROL - MIND WEAPON Documents   PENTAGON - Pilot study....!!! http://www.earthpulse.com/epulseuploads/articles/NavyRegulationForHumanTesting.pdf RUSSIA http://www.earthpulse.com/epulseuploads/articles/ControlledOffensiveBehavior.pdf RUSSIA - USA http://www.earthpulse.com/epulseuploads/articles/ParaphysicsRDWarsawPact.pdf AND http://www.earthpulse.com/epulseuploads/articles/SovietCzechoslovakianParapsycho.pdf   juni 2011