Total Pageviews

Saturday, December 12, 2015

cmt1 December 12 2015

---------- Forwarded message ----------
From: "Columbia Mountain Times™" <noreply+feedproxy@google.com>
Date: Dec 12, 2015 10:14 AM
Subject: cmt1
To: <dprit4@gmail.com>
Cc:

cmt1


Continue information on International use EMF without Human consent

Posted: 12 Dec 2015 06:47 AM PST

Posted on October 8, 2015 Letter from Prescott Beighley to James To Kun-sun (涂謹申議員) 2006 and draft of paper on Technical Covert Surveillance in Hong Kong. Link to .pdf at end of post. It's hard to...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Civil Suit Against NSA etal, Use of Human Brain without consent of the individuals

Posted: 12 Dec 2015 05:47 AM PST

John St. Clair Akwei vs NSA, Ft. Meade, MD, USA Evidence for the Lawsuit filed at the US courthouse in Washington, D.C. (Civil Action 92-0449) Detecting EMF Fields in Humans for Surveillance.  A...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Your MoovieLive weekly update

Posted: 12 Dec 2015 05:15 AM PST

---------- Forwarded message ---------- From: <MoovieLive@moovielive.com> Date: Dec 11, 2015 11:31 PM Subject: Your MoovieLive weekly update To: <guyperea@gmail.com> Cc: ...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

GDACS daily newsletter for 12/12/2015

Posted: 12 Dec 2015 05:13 AM PST

---------- Forwarded message ---------- From: "GDACS" <gdacs-noreply@jrc.ec.europa.eu> Date: Dec 12, 2015 2:03 AM Subject: GDACS daily newsletter for 12/12/2015 To: ...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

City Weather

Posted: 11 Dec 2015 03:08 PM PST

Selected Cities SELECTED CITIES WEATHER SUMMARY AND FORECASTS...PART 1 OF 4 NWS/NDFD TELECOMMUNICATION OPERATIONS CENTER SILVER SPRING MD 750 AM EST FRI DEC 11 2015 TEMPERATURES INDICATE DAYTIME...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

The Roundup

Posted: 11 Dec 2015 02:59 PM PST

SIGNIFICANT WEATHER AND/OR OBSTRUCTIONS TO VISIBILITY. FLZ001>010-012>015-112-114-115-112300- PANHANDLE FLORIDA CITY           SKY/WX    TMP DP  RH WIND       PRES   REMARKS ...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

USS CONSTELLATION CVA64 CODE

Posted: 11 Dec 2015 02:36 PM PST

... . .-.. . -.-. - . -.. -.-. .. - .. . ...  ... . .-.. . -.-. - . -.. -.-. .. - .. . ... .-- . .- - .... . .-. ... ..- -- -- .- .-. -.-- .- -. -.. ..-. --- .-. . -.-. .- ... - ......

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

SQL latest Data

Posted: 11 Dec 2015 12:53 PM PST

https://drive.google.com/file/d/0BzHRuhQzYLczVEJyUVRxS2N1Nzg/view?usp=docslist_api

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

A interrupt in "tv" questions on how gov.tv and or org.tv etc etc has been removed per The United Nation's

Posted: 11 Dec 2015 12:00 PM PST

The domain is currently operated by dotTV, a Verisign company; the Tuvalu government owns twenty percent of the company. In 1999, Tuvalu negotiated a contract leasing its Internet domain name...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Attorney General Bondi's Weekly Briefing

Posted: 11 Dec 2015 11:17 AM PST

---------- Forwarded message ---------- From: "Attorney General Pam Bondi" <agnews@myfloridalegal.com> Date: Dec 11, 2015 2:15 PM Subject: Attorney General Bondi's Weekly...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

cmt1 December 11 2015

Posted: 11 Dec 2015 10:23 AM PST

---------- Forwarded message ---------- From: "Columbia Mountain Times™" <noreply+feedproxy@google.com> Date: Dec 11, 2015 1:15 PM Subject: cmt1 To: <dprit4@gmail.com> Cc: ...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]
You are subscribed to email updates from Columbia Mountain Times™.
To stop receiving these emails, you may unsubscribe now.
Email delivery powered by Google
Google Inc., 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States

Continue information on International use EMF without Human consent

Posted on October 8, 2015

Letter from Prescott Beighley to James To Kun-sun (涂謹申議員) 2006 and draft of paper on Technical Covert Surveillance in Hong Kong.

Link to .pdf at end of post.

It's hard to find much mention of this topic in Hong Kong except for discussions of the relevant legislation. Note that Dr Beighley mentions mind control, electronic surveillance etc which these days barely get a mention in polite company and are shunted off to the realm of 'conspiracy theories'. Just think, if intelligent and concerned folks like Prescott Beighley believed this was an important issue almost 10 years ago, it surely should have become a hot topic by now. What about the technology? If it could do the things that PG mentions back then, what can it do now? Is it being used by governments and corporations against ordinary citizens? But, instead of free and open discussion on this important topic, we have nothing but the 'sound of silence'. Dare to mention it and you'll be ridiculed and called 'crazy'.

—–

Prescott Beighley Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Tel: 852 2358 7689 (voice) 852 2358 1749 (fax) e-mail: scottb@ust.hk

26lh June 2006

Hon James TO Kun-sun Room 409,

West Wing Central Government Offices Hong Kong

Dear Mr TO,

In view of your role as a member of the Legco Bills Committee on the Interception of Communications and Surveiliance Bill and as Chairman of the Panel on Security, I am enclosing a brief paper that I believe is relevant to the covert surveillance matters currently before Legco. As noted in the paper, not only do current surveillance technologies involve a level of sophistication that is heretofore unprecedented, they also involve levels of privacy invasion and health concerns the likes of which have never been seen before. And while technical surveillance may be covert and passively applied to monitoring the activities of target individuals, surveillance technologies can also be used for electronic harassment and mind control purposes. It is my sincere belief that the members of Legco should be aware of these matters and take them into consideration in formulating relevant legislation.

(Signature)

Adjunct Professor,

Hong Kong University of Science and Technology

Hong Kong resident since September 2003 U.S. citizen and passport holder Link to Prescott Beighley's draft paper Technical Covert Surveillance in hong Kong — I'm working on using ocr to convert the pdf to text format. So far this is unedited and may be hard to read. It's best to access above link.

Technical Covert Surveillance in Hong Kong Draft 26 June 2006

I.    Background

The matter of covert surveillance is currently before Legco in connection with the enactment of legislation governing the powers that Hong Kong security agencies shall have in conducting such surveillance activities. The purpose of this paper is to highlight recent developments and practices in technical covert surveillance that legislators and policy makers may want to take into consideration in formulating laws and policies.

II.    Review of technical surveillance technology and its applications

Surveillance may be described as follows: Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without their knowledge) or overt (perhaps with frequent reminders such as *'we are watching over you"). Surveillance has been ar intrinsic part of human history. Sun Tzu's The Art of War, written 2,500 years ago, discusses how spies should be used against a person's enemies. But modern electronic and computer technology have given surveillance a whole new field of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities.

A.    Technical surveillance technology and capabilities

Surveillance involving electronic and computer technology can be thought of as technical surveillance. While information about the technology used in covert technical surveillance is unclassified and generally available to the public, much of it is reportedly classified and known only to select government agencies.

1.    U.S. CONGRESS OFFICE OF TECHNICAL ASSESSMENT REPORT (1988)

In May 1988 the Office of Technological Assessment of the U.S. Congress published a special report entitled "New Technologies and the Constitution. 1

The main subject of the report is technology and rights in criminal justice.

The report states that In the last two decades, advances in imaging technology, remole sensing, telecommunications, computers, and related technologies have greatly increased the capability for surveillance of people and their activities.

1 Wikipedia entry,http://en.wikipedia.org/wiki/Surveillance. accessed 18 May 2006.

Electronic sensing includes both sensing techniques and techniques for aggregating and comparing computerized records to reveal additional information about an individual, The Fourth Amendment guarantee of 'the right of people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures' has required, and will in the future require, frequent reexamination and reinterpretation in the context of these new means of surveillance, by both Congress and the Federal Courts. (OTA Report, p12 )2

Since 1988, when the OTA report was published, considerable advancement in surveillance technologies has occurred. The OTA report notes that while earlier surveillance technologies consisted largely of telephone taps and concealed microphones, it now includes many far more sophisticated technologies that can be used to:

 identify an individual's location or track an individual's movements; monitor and record actions, such as dialing of telephone: numbers or automated transactions;listen in on communications or to intercept digital communications;visually monitor behavior; andtest or measure reactions and emotions (polygraph testing, voice stress analysis, brain wave analysis, etc.)

3 With regard to point 1 above, technologies used to determine an individual's location and track that individual's movements originally involved the monitoring of criminal parolees and probationers by means of electronic transmitter devices such as wrist or ankle bracelets worn by persons whose actions are being monitored.

4 The term "electronic tagging" is often used here, as noted in the following: Electronic tagging is a form of non-surreptitious surveillance consisting of an electronic device attached to a person or vehicle, especially certain criminals, allowing their whereabouts to be monitored. In general, devices locate themselves using GPS and report their position back to a control centre, e.g. via the Cellular phone network. This form of criminal sentencing is known under different names in different countries, for example in New Zealand it is referred to as "home detention", and in North America "electronic monitoring" is a more common term.

5

2    U.S. Congress, Office of Technology Assessment, Criminal Justice. "New Technologies and the Constitution." OTA-CIT-366 (Washington, DC: U.S. Government Printing Offce, May1988.)

3    See OTA Report, p 13.

4    See OTA Report, p 33-37.

5    Wtkipedia Encyclopedia internet entry,http://en.wikipedia.org/wiki/Electronic_taggingaccessed 18 May 2006. 2 their activities.

Electronic sensing includes both sensing techniques and techniques for aggregating and comparing computerized records to reveal additional information about an individual, The Fourth Amendment guarantee of 'the right of people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures' has required, and will in the future require, frequent reexamination and reinterpretation in the context of these new means of surveillance, by both Congress and the Federal Courts. (OTA Report, p12 )2

2    U.S. Congress, Office of Technology Assessment, Criminal Justice. "New Technologies and the Constitution." OTA-CIT-366 (Washington, DC: U.S. Government Printing Offce, May1988.)

3    See OTA Report, p 13.

4    See OTA Report, p 33-37.

5    Wtkipedia Encyclopedia internet entry, http://en.wikipedia.org/wiki/Electronic_tagging accessed 18 May 2006. Today, available technologies include more sophisticated eavesdropping devices, hidden microphones and cameras, "through the wall" infrared cameras and radar devices, e-mail and fax intercepts, and electronic tracking devices attached to motor vehicles.

2.    REMOTE NEURAL MONITORING

Available technologies also include remote neural monitoring of individuals. This is done either by using microchips implanted in an individual or through the remote capture of a person's specific electromagnetic "signature." In both cases, remote electronic devices are then used to locate and monitor the activities of the targeted individual. While precise information on such technoiogy is somewhat limited, there is reason to believe such technologies not only exist, but are being employed, as reported in a document prepared as evidence in a U.S. federal lawsuit against the National Security Administration (NSA) brought about in 1992 by a former NSA employee.

5 Regarding such the use of this technology in the U.S., it is reported in this document that The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze ail objects whether man-made or organic that have electrical activity.

7 It is further stated in the report that The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public. Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA's electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost

6    John St. Clair Akwei vs. NSA, Fort Meade, Maryland, filed at the US courthouse in Washington, D.C, February 20, 1992 (Civil Action 92-0449). Mr Akwei claimed to have knowledge of the National Security Agency's structure, national security activities, proprietary technology, and covert operations to monitor individual citizens. The lawsuit was dismissed shortly thereafter in March 1992 for reasons…..(get)

7    John St. Clair Akwei vs. NSA, Fort Meade, Maryland (Civil Action 92-0449), PR-Jl IN-2RRF) Q9V D effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S. A. personnel in the community usually have cover identities such as:social workers, lawyers and business owners.

8 It is further stated in the court document that a subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment MSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance, NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

9 More sophisticated technological capabilities are also described in the court document: NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUItra program of the early 1950's, which included neurological research into "radiation" (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation Intelligence," defined as "information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation." Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes.

10 John St. Clair Akwei vs. NSA, Fort Meade, Maryland (Civil Action 92-0449). D John St. Clair Akwei vs. NSA, Fort Meade, Maryland (Civil Action 92-0449).

3.    MICROCHIP IMPLANTS

The technology whereby microchips can be implanted in individuals and be used to locate and track their movements is now firmly in place. This technology, sometimes referred to as radio frequency identification (RFID) is described as follows: Radio Frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is a small object that can be attached to or incorporated into a product, animal, or person. RFID tags contain silicon chips and antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver. Passive tags require no internal power source, whereas active tags require a power source.

11 RFIDs are currently being used in a variety of ways: Implantable RFID chips designed for animal tagging are now being used in humans as well. An early experiment with RFID implants was conducted by British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998. Applied Digital Solutions proposes their chip's "unique under-the-skin format" as a solution to identity fraud, secure building access, computer access, storage of medical records, anti-kidnapping initiatives and a variety of law-enforcement applications. Combined with sensors to monitor body functions, the Digital Angel device coufd provide monitoring for patients.

12 In addition, Hong Kong Airport imbeds RFID chips in each luggage tag. RFIDs can be more reliably tracked electronically than the old barcode system. Computerized conveyor belt system delivers luggage to the airplanes automatically.

13

B.    Huang Si-ming incident

A front-page article in the January 25, 1996, edition of The South China Morning Post reported that an assistant professor at the Hong Kong University of Science and Technology (HKUST) had fiied a US$100 million 10 John St. Clair Akwei vs. NSA, Fort Meade, Maryland (Civil Action 92-0443). 1! Wikipedia Encyclopedia internet entry, http://en.wikipedia.org/wiki/RFID, accessed 18 May 2006. n Wikipedia Encyclopedia internet entry, http://en.wikipedia.org/wiki/RFID, accessed 18 May 2006. 33 Wikipedia Encyclopedia internet entry, http://en.wikipedia.org/wiki/RFlD, accessed 18 May 2006. 5 lawsuit against the U.S. government for implanting a mind-control device in his teeth during a root canal dental procedure. HKUST was also named in the lawsuit on the grounds that it was continuing the mind-control practices initially begun in the U.S.

C.    Related matters

The technologies used in passive covert electronic surveillance may also be used for electronic harassment and mind control purposes. For example, the remote neural technology described above may be modified such that electromagnetic energy is directed at target individuals in order to harass them or alter their behavior in some way. Electronic devices used in this manner are sometimes referred to as "non-lethal weapons" and are related to the electronic weaponry being developed and used by military and law enforcement forces. Electronic harassment and mind control practices, which have been reported in the U.S. and elsewhere, not only involve the matter of privacy, they are potentially harmful to the health and well-being of target individuals,

III.    Issues pertinent to Hong Kong

It would appear that a number of questions are relevant to Legco as it considers legislation related to covert surveillance matters:

1.    Are the security agencies and other government agencies in Hong Kong aware of the existence of electronic devices that can capture a person's electronic signature, or that can be implanted in the human body, for the purpose of locating and monitoring from a remote location the activities of that individual? If no, why not? If yes, are such devices being used in HK? If yes, how, where, when and why? If no, are such devices being considered for future use in Hong Kong ? If yes, under what conditions would the use of such devices; be permitted?

2.    Would the Hong Kong government permit security and intelligence agencies of other governments to conduct technical surveillance activities within the borders Hong Kong? If yes, only on their own citizens? If yes, on citizens other than their own and Hong Kong citizens? If yes, on Hong Kong citizens?

14 See, for example, "Electronic Harassment" by Roger Tolces, an electronic security consultant, atwww.bugsweeps,com/info/electroniic_harassment.htmfor information about electronic harassment and see, for example, the Radiation Health Foundation, Inc. website www.rhfweb.com for information about electronic harassment and mind control.

This entry was posted in CrimeEthics,HarassmentHong KongHuman RightsLaw,SurveillanceTechnology and tagged bioelectric fieldcovert surveillanceDOMINTeavesdropping devicesEEGelectromagnetic signature,Electronic Brain Linkelectronic harassment,electronic monitoringelectronic tagging,electronic warfareEMFEMF Brain Stimulation,GPShkustHuang Si-ming incidentHUMINT,Interception of Communications and Surveiliance BillJohn St. Clair AkweiLegco Bills Committee,microchipsmind controlMKUItraNational Security AdministrationNSAOTAPrescott Beighleyprivacy invasionRadiation Intelligence,radio frequency identificationremole sensing,Remote Neural MonitoringRFIDRNMsecurity agenciessurveillance technologiestarget individualsTargeted Individualtechnical surveillance technologyU.S. federal lawsuit byadmin. Bookmark the permalink.

Civil Suit Against NSA etal, Use of Human Brain without consent of the individuals

John St. Clair Akwei vs NSA, Ft. Meade, MD, USA

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C. (Civil Action 92-0449)

Detecting EMF Fields in Humans for Surveillance. 

A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance. 

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S. 

NSA Signals Intelligence Use of EMF Brain Stimulation 

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950's, which included neurological research into "radiation" (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation Intelligence," defined as "information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation." 
Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. 

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) 

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. RNM can send encoded signals to the brain's auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. 

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject's brain while they are in R.E.M. sleep for brain- programming purposes. 

Capabilities of NSA operatives using RNM 

There has been a Signals Intelligence network in the U.S. since the 1940's. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject's brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject's perceptions, moods, and motor control. 

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link. 

National Security Agency Signals Intelligence Electronic Brain Link Technology 

NSA SigInt can remotely detect, identify and monitor a person's bioelectric fields. 

The NSA's Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain. 

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called "evoked potentials." 

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding "evoked potential" or set of "evoked potentials." The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject's brain. 

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). 

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain's neural circuits. EMF Brain Stimulation can also change a person's brain-states and affect motor control. 
Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). 

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. 

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. 

An example of EMF Brain Stimulation: 

Brain Area

Bioelectric 
Resonance
Frequency

Information Induced
Through Modulation

Motor Control Cortex

10 HZ

Motor Impulse Co-ordinationAuditory Cortex

15 HZ

Sound which bypasses the earsVisual Cortex

25 HZ

Images in the brain, bypassing the eyesSomatosensory Cortex

09 HZ

Phantom Touch SenseThought Center

20 HZ

Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. 

Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived. 

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. 

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

Your MoovieLive weekly update

---------- Forwarded message ----------
From: <MoovieLive@moovielive.com>
Date: Dec 11, 2015 11:31 PM
Subject: Your MoovieLive weekly update
To: <guyperea@gmail.com>
Cc:

Ensure you receive MoovieLive weekly bulletin. Add MoovieLive@moovielive.com to your address book.
Dec 12, 2015
Hi presidentus,
Your Weekly MoovieLive Guide to the Best in Blockbuster
Concussion
Revisit the dramatic true story with Will Smith of a pathologist discovering the continuous brain trauma professional football players suffer from.
Which is the best movie of 2015?
2015 is one of the most fruitful years of great movie releases. Putting box office sales aside, tell us which among these titles you think deserves to be movie of the year!
 
Spectre(2015) By Ed Goettman
Bond is taking a much needed (wink, wink) vacation in Mexico City during the Day of the Dead festivities when he disrupts a terror plot about to take place. However big changes are happening back headquarters as the 00 agents are being retired and replaced by a multi-national spy system of information gathering and drone attacks. But of course, the...[ read more ]
 
In the Heart of the Sea
In 1820, the whaleship Essex is crewed by Captain George Pollard, Jr., first officer Owen Chase, second officer Matthew Joy, and cabin boy Thomas Nickerson. During their voyage, the ship is sunk when it is rammed by a very large and enraged bull sperm whale, ultimately leaving its crew shipwrecked at sea for 90 days more than a thousand miles from ...[ full synopsis ]
The Big Short
Star Wars: Episode VII - T...
Alvin and the Chipmunks: T...
Daddy's Home
Joy
 
Cillian Murphy
Cillian Murphy (born 25 May 1976) is an Irish film and theatre actor. He is often noted by critics for his chameleonic performances in diverse roles and distinctive blue eyes. A native of Cork, Murphy began his performing career as a rock musician. After turning down a record deal, he made his professional acting debut in the play Disco Pigs in 199...[ read more ]
Harrison Ford
Andy Serkis
Mark Hamill
Amy Poehler
Domhnall Gleeson
 
PowerDVD 15 - The World's Best Media Player Just Got Better
  Get the no. 1 movie & media player to enjoy crystal clear 4K Ultra HD, HEVC, ISO & Blu-ray 3D media playback with next-gen TrueTheater enhancements.
PowerDirector 14 - PCMag's 2015 Award Winner
  Fast & Flexible Video Editing. Over 500 built-in effects and templates to get you started. Plus new Express Projects, Action Camera Center, Motion Tracking, customizable design tools, and more.
Media Suite 13
  The Most Complete Collection of Award-Winning Multimedia Software - including PowerDVD 15, PowerDirector 13, PhotoDirector 6, Power2Go 10 and 11 more products.
 
Follow CyberLink on facebook All content © 2015 CyberLink Corp. All Rights Reserved.
You've received this weekly bulletin because you have indicated to receive our email notifications. If you don't want to receive this weekly bulletin in the future, please update your settings on MoovieLive.