Bookmark and Share
To receive email from Neal Chevrier, add to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Citizens Against Harmful Technology Inc.
Share on Facebook Bookmark and Share  
Citizens Against Harmful Technology            Newsletter          February 21, 2016

Help yourself by helping others. Become a volunteer activist.
Join CAHT today. The safe place for Targeted Individuals.

Sunday Conference Call

Talkshoe Phone Number: (724) 444-7444, Call ID: 139744 #, Pin 1#, Moderator: Neal Chevrier
Time: Sundays at 8:30 pm EST/7:30 pm Central/6:30 pm Mountain/5:30 Pacific.
You can log into: to join the chat room & listen through your computer speakers. Use *8 on your phone to request to be unmuted to share or ask a question on the call. Use *6 to mute yourself (& unmute yourself).

General Discussion: Harmful technology, Electronic Harassment, Organized Stalking & Protection. Please join us and share your experiences with us. Share with us any articles on technology that may be misused on Tis, including behavioral or social research. We gather information constantly to bring the most up-to-date technology to light in order to remove the mystery of targeting.

You can donate any amount you like here and specify if the amount is for a Membership which is $30.00 per year. Please email if you have problems with the donate button. You can also obtain a membership on our website at

Linqstat: Microwave (RF) Protection for You
This is a very high quality RF shielding material.
It doesn't out gas & is completely nontoxic !
Linqstat is much safer and thicker than Mylar and when Mylar starts to break down, it leaves Aluminum particles in the air which you breath in & make yourself more conductive let alone toxic.
For Linqstat orders, email Neal at
Make payment through PayPal or debit/credit cards at our donate button on our website, or by mail upon request.
LINQSTAT (≤50,000 ohms/sq) Electrically Conductive Film.
Product Part Number:  LINQSTAT MVCF S-Series 
We have 3 packages available:
Package 1:  6' (ft) x 3' for $ 30.00 (To make an 8 layer hat ).
Package 2: 12' (ft) x 3' for $ 50.00 (To make an 8 layer hat & 2 layer vest)
Package 3:  24' (ft) x 3' for $ 80.00 (To make a hat, vest & over under blanket for where you sleep ).
(Shipping, tracking & insurance is included in the price).
In This Issue
Sunday Conference Call
Linqstat: Microwave (RF) Protection for You
REQUEST: Submit and Share your Harassment or Stalking Story
Global Positioning System Implants - Indiana School of Law Opinion
Infrared Light Therapy
Environment: January 2016 Hottest On Record
The Privatization of Terrorism Blacklists Damages Innocent Lives
Video Review: Telephone Call Data Record Link Analysis Software
Sacred Geometry: How Cell Phones Work Using Fractals
Article: What is Behind Military Suicides?
Book Review: How to Get Your Life Back From Morgellons and Other Skin Parasites
How do you get the implants without your knowledge?
Categories of Surveillance/Harassment Technologies
REQUEST: Submit and Share your Harassment or Stalking Story
There is a spot in our newsletter which relates testimony of Targeted Individuals regarding their experiences. Please submit your story to be published here or on CAHT's website to
This week, a request was made for information on what to do about electronic sexual assault as follows:
"I have this 16 yr old girl in my group who has just started to be sexually molested by the perps. They did the 'object insert' feel when she had the first indication of periods (which came in 2 weeks early) last week. Today it seems they have started with arousing her. Or they threatened her to do so in public which is why she's stopped going to school. Is there any shield for their 'skin electrification' program? I heard that Reflectix magnetic tapes & Neodimium work. Has it worked for you, or do you know anyone it has worked for? I also have other women asking what to do to stop electronic rape. "
Another email I received provides a suggestion:
"Rose Quartz works to block frequency. I put a large piece between my legs last night. (not jewelry size), a really large piec, and put it on my genitalia area. My perp started screaming like a child. He qquit due to his family intervening. It blocks visuals, and burning frequencies - microwaves."
One answer may be placing a sheet of teflon backed with a rubber mouse pad over the area. There may be implants involved pulsing an ultrasound frequency between two implants.
THE FCC RULES STATE THAT ONLY MEDICAL PROFESSIONALS ARE AUTHORIZED TO OPERATE MEDICAL IMPLANTS. if your implants are being activated while you are in a store, they are operating your implants which is a crime enforceable by the FCC.  If a stalker GPS's you and connects the directed energy to your implant and turns it on, they are operating a medical implant. This is against FCC regulations. You must be a licensed medical professional authorized to operate your implant for a medical purpose. Take note in the Frequency Detection list I compiled of the short range medical telemetry devices & body area network implants. Some of these implants can be accessed only from short distances. This makes sense that Smart phones are being used to send & receive data through implants. Also note that Bluetooth, Zigbee & Near field communication networks are fairly close range access devices. We may  consider establishing a precedent for having people arrested & their Smart phones confiscated as evidence of illegal use of an implant interface device.
The rules state:  MMNs are defined in the Part 95 rules as follows:
An ultra-low power wideband network consisting of a MedRadio programmer/control transmitter and medical implant transmitters, all of which transmit or receive non-voice data or related device control commands for the purpose of facilitating functional electric stimulation, a technique using electric currents to activate and monitor nerves and muscles.
3. Restrictions on MMN Operation
Use of MMNs must comply with the following restrictions:
· MMNs can only be used to provide functional electric stimulation.
· MMNS can be used only for diagnostic and therapeutic purposes.
· MMNs must be provided to a patient only under the direction of a duly authorized health care
See all implant FCC rules and frequencies here:Wireless Medical Technologies
Global Positioning System Implants - Indiana School of Law Opinion

Global Positioning System Implants - Indiana School of Law-2005

Although this legal opinion is long and thorough, it is a great start in a legal argument that may benefit TI's.  You probably know that a Global Positioning System (GPS) device can determine the location of a person anywhere in the world instantly and precisely. Implants for humans are called Personal Location Devices (PLDs) by the industry. The GPS implant device is inserted under the skin using a needle and it remains in place until surgically removed. The implant would communicate its location via radio signals to nearby cellular towers which communicate with satellites. Unlike a simple RFID or Verichip, a GPS chip can communicate over distance of kilometers.
Use of the GPS implant device creates privacy issues unlike any encountered before. Who should have access to the location information of the person with the GPS implant? People will be anticipating the emergency uses of the technology—for example locating a kidnapped child or a lost Alzheimer’s patient, but GPS data can be intercepted when it is transmitted to the end user through wireless communications.

TI's know they are being targeted to death, so whoever is orchestrating their tortuous demise does the implanting and the stimulating and its you know the implants are not medically necessary or operated by medical professionals. Targeted Individuals know that this information is available to everyone who stalks them from the kid down the street, the handler and government contractor who handling your stalking events, to businesses who target you in the stores, and the airplane and black helicopters that stalk you overhead.
Infrared Light Therapy
Note Hertz Equivalent
Approximate Colour
A 440 619.69 Orange-Yellow
A# 457.75 595.66 Yellow-Orange
Bb 472.27 577.34 Yellow
B 491.32 554.95 Yellow-Green
Cb 506.91 537.89 Green-Yellow
B# 511.13 533.44 Green
C 527.35 517.03 Green
C# 548.62 496.99 Green-Blue
Db 566.03 481.70 Blue-Green
D 588.86 463.03 Blue
D# 612.61 445.08 Blue-Violet
Eb 632.05 431.39 Violet-Blue
E 657.54 414.67 Violet
Fb 678.41 401.91 Ultra Violet
E# 684.06 398.59 Invisible Violet
F 705.77 772.66 Invisible Red
F# 734.23 742.71 Infra Red
Gb 757.53 719.86 Red
G 788.08 691.96 Red-Orange
G# 819.87 665.13 Orange-Red
Ab 845.89 644.67 Orange
Environment: January 2016 Hottest On Record
Last month was the hottest January in modern times. The average temperature across global land and ocean surfaces was 1.87 degrees Fahrenheit (1.04 Celsius) above the 20th century average for January, according to the US National Oceanic and Atmospheric Administration.
This was the highest January average since records began in 1880. January marked the ninth consecutive month to break a monthly global temperature record. The planet's average land surface temperature in January rose 2.81 degrees Fahrenheit above the 20th century's average, making it the second highest for January ever recorded.
NOAA also reported that last month's average ocean surface temperature came to 1.55 degrees Fahrenheit above the average for the 20th century and the highest for January in recorded history.
January's snow cover in the northern hemisphere was 740,000 square miles, the northern hemisphere's ninth-largest in the 50 years measurements have been taken. North America's snow cover in January was the sixth largest on record, strongly affected by the effect of warm Pacific currents driven by the El Nino weather pattern, which returned last year and is expected to last until early spring.
However, average ice coverage in the Arctic Ocean in January extended 410,000 square miles, the smallest since records began in 1979.
Antarctic Sea ice in January shrank to 800,000 square miles, making it the 16th smallest ice extent on record and the smallest since 2011.6
The Privatization of Terrorism Blacklists Damages Innocent Lives
According to a VICE News article, banks, employers, and government agencies use private service to screen customers and clients and are blacklisting thousands of people as terrorists.

Thomson-Reuters’ “World-Check” database slaps a “terrorism” designation — and a picture of a red balaclava — on the profiles of individuals, charities, and religious institutions. Many of them are Muslims who have never been charged or even accused of terrorism-related offenses. The results are far-reaching and can include closure of the blacklisted individuals’ bank accounts, inability to get a job, or denial of government benefits.
Blacklisting for Profit
World-Check is particularly zealous in its effort to cash in on widespread fear of terrorism and a regulatory system that raises the stakes for banks and other companies desperate not to be accused of financing terrorism. Its confidential database includes more than 2.7 million individuals and entities, over 93,000 of whom it has designated as terrorists. According to a World-Check fact sheet, the company contracts with “49 of the world’s 50 top banks,” over 300 government agencies, and “9 of the top ten global law firms.” The Department of Homeland Security uses World-Check, as does HireRight, an employment screening company that conducts background checks for more than 40,000 organizations in 240 countries.
Like the government, which blacklists people even after acquittal or closure of a terrorism-related investigation, World-Check uses its “terrorism” designation for people who have not been charged with a crime but may be accused, questioned, or investigated for terrorism offenses — a vast body of innocent people. And World-Check apparently shares the government’s lack of concern about stale information.

Both World-Check and government watchlists impose severe consequences on the people they label as terrorists, such as detention at the border, harassment, and inability to travel by air or sea, and the shame and fear that comes with being a terrorism suspect. World-Check’s terrorism designation can prompt banks to close people’s accounts, convince prospective employers not to hire a candidate, and cause funding sources for organizations or contractors to dry up.
The Department of Homeland Security’s Analytic Framework for Intelligence, a massive data-mining project, uses World-Check to analyze “individuals of interest” and identify “non-obvious relationships” with others, which broadens the government’s lens of suspicion, and intensifies the focus on affected individuals, potentially leading to more and more blacklisting.
World-Check is similar to the government in another way that compounds all the other problems: lack of a meaningful process to challenge inclusion. The government has steadfastly refused to inform people why they’ve been watchlisted and stigmatized as terrorists, denying them a viable way to challenge wrongful watchlisting and clear their names. World-Check, too, offers no means of redress. Senior World-Check employees have never seen someone successfully challenge inclusion in its database.
Video Review: Telephone Call Data Record Link Analysis Software

How NSA Contact Chaining Combines Domestic and Foreign Phone Records
While this subject may not interest you, this video makes it real what people you will never know are doing with the data from the phone calls you make. The domestic phone records collected by the NSA are used for contact chaining that combines both domestic and foreign identifiers. NSA didn't want to draw attention to their foreign metadata collection and analysis efforts, but it did became clear from the many documents about the Section 215 program that were declassified by the US government.
Sacred Geometry: How Cell Phones Work Using Fractals
Ever wonder how an entire computer fits into the smallest cell phone? It’s all about fractals.
Benoit Mandelbrot was an inquisitive Polish-born scientist who investigated the true nature of chaos. He created the “Mandelbrot set”, a famous fractal sequence which is a product of mathematics. Mandelbrot discovered that there were fractal  patterns in all aspects of nature. He wrote the book The Fractal Geometry of Nature. Mandelbrot worked for IBM and used this sequence to develop 3D computer graphics generation systems for more realistic landscapes with the textures of mountains, waters, and clouds.
Radio astronomer Nathan Cohen used the knowledge in Mandelbrot’s book to make cell phones possible. When Cohen’s Ham radio wasn’t getting good enough reception, he began to experiment with it. He bent the antenna into a fractal shape and found that his radio came in much clearer than before. It was a moment of ingenious invention.  He accidentally discovered the technology necessary to make the most complex smart phones possible.
Most antennas accommodate a specific range in frequency. However, fractal antennas allow for the transmission of a wide range of electromagnetic frequencies. Without this function, we would not be able to process all the complex software in such a small size as smart phones today.
Fractals are considered shapes of sacred geometry, because such shapes hold extraordinary properties that can be applied to the reality. These fractal shapes which repeat in self-similarity transmit electromagnetic frequencies in a way that was not possible before this random breakthrough in technology.
The Fibonacci Sequence

Article: What is Behind Military Suicides?

In early 2013, the official website of the United States Department of Defense announced an epidemic of military suicides in 2012 had far exceeded the total of those killed in battle—an average of nearly one a day and veteran suicide was running at 22 a day—about 8000 a year.

Some have claimed that this spate of self-harm is because of the stresses of war, but 85% of military suicides have not seen combat and 52% have never even deployed. All evidence points to the soaring rates of psychiatric drugs prescribing since 2003. The side effects of these drugs such as increased aggression and suicidal thinking are reflected in similar rates of military domestic violence, child abuse and sex crimes, and self-harm.

The definitions of what "mentally ill" is changing to include any display of emotion. In psychiatry, psychological disorders such as PTSD, personality disorder and social anxiety disorder are followed by the prescription of at least one psychiatric drug. The risks of taking psychotropic drugs have long been known. With antidepressants, there are now nearly 100 drug regulatory agency warnings from ten countries and the European Union alerting prescribers and patients to the drugs’ adverse effects, including hostility, violent behavior and suicide. About one in 6 soldiers take psychiatric drugs. Any soldier re-entering civilian life cannot own a gun if they have taken psychiatric drugs, increasing the number of unarmed civilians.

The U.S. Pentagon spends $2 billion a year on mental health. The Veterans Administration spent less than $3 billion in 2007 but nearly $7 billion in 2014. Money is being spent on making conditions worse, perhaps using money to study how to get people to kill themselves, because that is what the results are. The answer lies in the right to full and honest informed consent—as well as exercising the right to refuse treatment.

"We have never drugged our troops to this extent
and the current increase in suicides is not a coincidence."
- Bart Billings, Ph.D., Retired Col. and former military psychologist
Book Review: How to Get Your Life Back From Morgellons and Other Skin Parasites
by Richard L. Kuhns
Morgellons and other itchy skin parasites can literally destroy your life. They are a life changing event which can ruin one's life. Yet, even though the medical community still doesn't acknowledge them or know how to deal with them, with recent modern advances made in the last year or so, you can take your life back to normal or near normal again. A special diet, the King Diet, has been discovered that greatly diminishes the symptoms. Diet along with bathing, environmental controls, and various supplements and medications can bring life back to being worth living once again. This book, written by an ex sufferer of skin parasites, is the most comprehensive resource you will find regarding Morgellons, Collembola, Strongyloides, and skin fungus.

How do you get the implants without your knowledge?
It happens in hospitals while people are asleep for surgeries or in recovery, or if you are a visitor and go to sleep while being there for a relative or friend. Also, covert operations occur where people come in your home while you are sleeping, put you to sleep with frequencies, perform the implantation and when you wake up, you have no recollection anything took place. However, these stalkers usually leave some sign they have been in your bedroom while you were sleeping to create the terror factor. 
Implant methods include surgery, injection with a syringe, implantation with a stylus or "gun", inhalation and ingestion by mouth. Some are liquid and can be injected, for example liquid crystal in the eyes. Injections can include nano materials which attach to the brain or may contain metallic particles at the center which are used to heat up the body with RF frequencies. Hyperthermia therapy is a type of medical treatment in which the patient is injected with nano particles into body tissues which are exposed to slightly higher temperatures via frequencies to damage and kill cancer cells or to make cancer cells more sensitive to the effects of radiation. In the case of Targeted Individuals, this therapy is used to heat the victim with torturous temperatures when subjected to microwave frequencies, heating them to the point of extreme pain. Here are several implantation methods of interest.
SASS 09.pdf at
An RFID tag is injected at the back of the throat, wires go directly into the medulla oblongata, a part of the brain very close to the back of the throat. The medulla oblongata (or medulla) is located in the hindbrain, anterior to the cerebellum. The medulla oblongata is a cone-shaped neuronal mass responsible for multiple involuntary functions ranging from vomiting to sneezing. The medulla contains the cardiac, respiratory, vomiting and vasomotor centers and therefore deals with the autonomic functions of breathing, heart rate and blood pressure.

Fully-Implantable Cochlear Implant With Nasal Insertion Capability, Hugh Emmanuel
The cochlear implant has two pieces, one which goes up through the sinuses and the other into the cochlea. System for producing artificial telepathy; Patent No 2005055579 A1--A device is proposed which will provide the user with a form of artificial telepathy, namely the ability to communicate with others with no obvious signs of connection. The system comprises a mobile phone `engine' which interfaces to an existing or future public mobile telephony network.
Devices, Systems and Methods For Diagnosing and Treating Sinusitis and Other Disorders of the Ears, Nose and/or Throat, US Patent 20080154250 A1 describes minimally invasive flexible catheters which can be inserted through the sinuses, advancing an illuminating portion of a light emitting probe into a patient's head, either the nasopharynx, Eustachian tube, inner ear or middle ear.
The following is a good illustration of how an implant can be placed in or near the brain through the sinuses. This device can also place an implant through the top of the mouth. I don't have the source of the drawing at this time.

Categories of Surveillance/Harassment Technologies
(Source – US Congress Office of Technology Assessment)

Electronic Eavesdropping Technology – (Audio Surveillance)

• Radiating devices & receivers (e.g. miniature radio & ultrasonic transmitters)
• Non-radiating devices (eg wired surveillance systems including phone taps and concealed microphones)
• Tape recorders
• Laser-facilitated listening devices, rifle mikes and other “remote ” equipment (incl. satellites)
N.B. Even phones can be made “hot on the hook” i.e. turned into microphones when not in use.

Optical/Imaging Technology – (Visual Surveillance)

• Photographic techniques (incl. zoom lens and infra red cameras)
• Television (e.g. closed circuit)
• Night vision devices (e.g. image intensifiers)
• Satellite based viewing (up to and including the monitoring of writings as they are written; indoors)
• Aircraft facilitated viewing

Computers & Related Technologies – (Data Surveillance)

• Microcomputers – decentralization of machines and distributed processing
• Computer networks
• Software (eg. expert systems)
• Pattern recognition systems
• Voice Activated & thought activated computers (incl. “remote” equipment)

The NSA covertly monitors every call, fax, e-mail, telex and computer data message. The relevant computers search for key words/phrases. Anything/anyone of interest is drawn to the attention of agency operatives. This can lead to a large scale personal surveillance operation by the NSA or other agencies; like the CIA and their criminal connections. The current system is called ECHELON.

Sensor Technology

• Magnetic sensors
• Seismic sensors
• Infra red sensors
• Strain sensors
• Electromagnetic sensors (incl. brain wave sensors)

Other Devices and Technologies

• CB radios
• Vehicle location systems (incl. satellite tracking)
• Machine readable magnetic strips
• Polygraphs
• Voice stress analyzers
• Laser interception devices
• Cellular radio
• Anti personnel weapons – sonic and phasar weapons as well as psychotronic weapons; which target the nervous system. (These have been trialed in riot control in France etc)
• Scalar wave weapons – (scalar waves emanate naturally from living organisms and the earth itself).
• Infrasound weapons – inducing various forms of illness from remote sources (Also used on dissidents in France)
• Neurophones and similar (more advanced) technologies – Satellite or ground based. These can deliver aural harassment via microwaves or lasers aimed at the target. Visual harassment laser systems. These deliver blurred vision, holographs and so on to disorientate the target and/or experiment; victims’ reactions being monitored to study how best to “control” targets.
• Brain wave monitors/analyzers (remote sensing). These newer technologies actually allow the target’s thoughts to be interpreted.
• “Over the horizon” technologies – These facilitate ground-based methods of harassment (eg The Alaskan HAARP project which bounces signals off the ionosphere).
• The NSA’s Echelon and Prism systems, which are now in the public domain thanks to whistleblowers, monitor ALL telecommunications worldwide. Programmed phrases / words are highlighted and those drawing the attention of the computers monitoring are then targeted by operatives using other technologies. The principle targets are not terrorists or criminals but rather opponents of those powerful criminals who are protected by this very system. National Security claims are a bogus excuse for establishing such systems then misusing them in secret.
N.B. There are literally hundreds of ways of tracking the earth’s inhabitants which are available to corrupt agency officials and their criminal contacts (e.g. the mafia). The last seven are examples of devices used to covertly menace political targets who do not have a public profile. Most can be satellite based and anyone can be targeted provided they have neither influence nor contacts in public life. Government secrecy provisions help to prevent public disclosures regarding these technologies. However, there is more than an element of corruption / complicity evident amongst politicians, journalists and other public figures who are aware of what goes on. Others are afraid to interfere.

Further Information

It is evident that countless people (world wide) have already lodged complaints about the following technologies. They are available to government agencies, defense contractors and “organized” crime figures.

• The Neurophone
   US Patent # 3,393,279. July 16th, 1968, US Patent # 3,647,970. March 7th, 1972

Although the offered explanations for “Hearing Voices” can include everything from trickery to hidden transmitters to tinnitus to psychic/haunting experiences to possession or encounters with God/aliens (to so – called schizophrenic episodes) by far the most common REAL reason is covert Neurophone harassment as arranged by government agencies and/or other criminals.

The Neurophone was developed by Dr Patrick Flanagan in 1958. It’s a device that converts sound to electrical impulses. In its original form electrodes were placed on the skin but with defence department developments, the signals can be delivered via satellite. They then travel the nervous system directly to the brain (bypassing normal hearing mechanisms). Dr Flanagan’s “3D holographic sound system” can place sounds in any location as perceived by the targeted / tortured listener. This allows for a variety of deceptions for gullible victims.

Today, the CIA, DIA (etc) use satellites and ground based equipment to deliver verbal threats, deafening noise and propaganda using neurophone technology. Anything from TV’s/radio’s appearing to operate when switched off through to “Voices from God” and encounters with “telepathic” aliens are all cons using neurophone technologies to torment, deceive and (most importantly) discredit agency/criminal targets. Naturally, the system can mimic anyone’s voice and automatic computer translations (into any language) are incorporated.

Anecdotal evidence indicates that people like David Koresh, Martin Bryant and others could have been programmed then remotely triggered (or tricked) using harassment technologies like the neurophone. (Although most of the targets are intelligent and law-abiding). For example, Mark Chapman, reportedly heard voices before and after killing John Lennon. “God” apparently told him to confess verbally.

To explain why others physically moving into the path of the laser (or whatever) do not pick up the signals, please note the following possibilities:

a) Kirlian photography may be an ancillary system so it’s attuned to the targets personal energy field (their unique EM waves).
b) The magnetite in our brains can act as a detectable fingerprint.
c) Equally each of us has a unique bioelectrical resonance frequency in our brains. EMF Brain stimulation may be encoded so that pulsating EM signals sent to the targets brain cause audio-visual effects which only the target experiences. This, to me, is the best explanation.
d) The individuals “vibrational pattern” could be used as a signal filter like a radio receiving only the sound modulating the frequency of the station it’s tuned to.
e) The monitors simply adjust the volume downwards when you’re in a position where the signal could hit someone else’s body. Even if they heard it (briefly) they’d attribute it to another voice in the crowd etc.

As with the final proof, the definitive answer lies in the actual blueprints; secreted in the bowels of the Pentagon or some similar facility. Nonetheless, there is no report of ANY intercepted neurophone signals. If it wasn’t so effective it would not have been used to facilitate silent communications between U.S. government agents/military personnel.

• Psycho-Acoustic Projector, U.S. patent #3,566,347, (23/2/71)
   A device/weapon which can actually deafen the target.

• Silent Subliminal Messages, US Patent # 5,159,703. October 27th, 1992
   Inventor – Dr Oliver M. Lowery

Non aural carriers in extreme audio frequency ranges are amplified or modulated with the desired material and propagated acoustically for direct inducement into the brain. This is an excellent method of influencing people without their knowledge. An alert reader would recognise how this could create coincidences and stir up conflict; especially if what’s fed to one person corresponds with what’s gathered (via surveillance) from another. It can also help to create coincidences of the sort the media creates (through surveillance feedback) only in reverse, where the subjects are fed information prior to the event (eg. a news story) and coerced into believing they are psychic.
Patented devices known to facilitate subliminal message delivery are too numerous to list.
However, examples include:
  • Auditory subliminal message system and method. U.S. patent #4395600, Rene Lundy and David Tyler, 26/7/83. A system to mix messages into background music (ala the subliminal transmissions used in some U.S. department stores to prevent shoplifting or boost sales).
  • Subliminal message generator. U.S. patent #5,270,800, Robert Sweet, 14/12/93. To be used with TV, cable TV and computers. (A visual medium).
  • Superimposing method and apparatus useful for subliminal messages. U.S. patent #5,134,484, Joseph Wilson, 28/7/92. Relates to video signals. The subliminal data can be from a prerecorded or live signal.
N.B Sound can also be induced by radiating the head with microwaves. One unpublished application was the Gulf War but, more times than not, the targets are mostly innocent/oppressed civilians trying to exercise their basic rights to free speech in so-called western democracies.

• Methods and Systems of Altering Consciousness
US Patent # 5,123,844. June 23rd, 1992
US Patent # 5,289,438. February 22nd, 1994

These systems stimulate the brain with different frequencies and wave forms to alter the subject’s state of consciousness.

Electro Magnetic Field (EMF) monitoring/interference is one of the most insidious and secretive of all methods used by the agencies.

N.B. Similarly, EEG cloning feeds back the results of EMF monitoring in an attempt to induce emotional responses (e.g. fear, anger, even sleep etc.).

This could possibly work on certain members of a crowd or audience….again this could facilitate scams etc.

Dr Ross Adey concludes that all aspects of human behavior can be affected, even controlled. He used 0.75 milliwatts per square centimeter of pulsed, modulated microwave at a frequency of 450 MHz.

Notably the Alaskan HAARP project (featuring the B.J.Eastland patented technology – U.S. patent #4,686,605, 11/4/87 – “Method and Apparatus for altering a region in the Earth’s atmosphere, ionosphere or magnetosphere” and others also facilitates experiments in the disruption of human mental processes. It’s the largest, most versatile radio frequency radiation transmitter in the world also allowing experimentation in weather “modification”, wireless, electrical power beaming and communications “disruption”. Its systems like this which could one day see attempts made to brainwash/control entire populations. And that is just as feasible as a wholesale nuclear holocaust.

• Microwave Weapons
Twenty years ago a scientist, Allan Frey, found that if a microwave carrier were to be sliced and carried audio modulation, that modulation could be heard by someone in the signals path. The thin pulses of radio carrier wave cause currents to flow through the nervous system – the result is a remote transmission; no wires or contact is needed.
“A hearing system” U.S. patent #4,877,027, 31/10/89. Wayne Brunker.
“A hearing device” U.S. patent #4,858,612, 22/8/89. Philip L.Stocklin.
The latter involves microwaves aimed at the auditory cortex. A mike turns the sounds to electrical signals which are treated so as to provide multi frequency microwaves which are applied to the brain area. Whatever sound the mike picks up (like a voice) is relayed to the target.

The first known experiment with microwaved voices was conducted by Sharp and Grove in the early 70’s. However, the Defense Intelligence Agency and the Advanced Research Projects Agency are principally to blame for the abuse of such technologies since. (Project Pandora). The CIA’s Langley Research Center as well as an army of “mad” scientists working in Energy/Defense department labs across the U.S. are also responsible. As with the NASA Apollo program, many of those originally involved were ex Nazi or Russian Cold war scientists (even WWII Japanese) recruited, regardless of their earlier crimes, to commit more crimes, this time for the U.S.A.

It’s worth noting the reported experiments carried out in bygone days included The MKULTRA (mind control)/LSD experiments, germ and nuclear fallout testing (on military and civilian personnel), electro-shock treatment on institutional victims and so on. The U.S. Energy and Justice departments are now involved in such programs so the U.S. can escape violation of international defense/agency treaties. That’s also why the “D” for “defense” was dropped from DARPA.

In any event, once a technology is labelled “Top secret-classified” they can use it any way they like on anyone. God Bless America.

• Brain Wave Monitors / Analyzers
Lawrence Pinneo, a neurophysiologist and electronic engineer working for Stanford Research Institute (a military contractor) is the first “known” pioneer in this field. In 1974 he developed a computer system which correlated brain waves on an electroencephalograph with specific commands.
In the early 1990s, Dr Edward Taub reported that words could be communicated onto a screen using the thought-activated movements of a computer cursor. (Currently under secrecy provisions; “Classified”)
In 1994, the brain wave patterns of 40 subjects were officially correlated with both spoken words and silent thought. This was achieved by a neurophysiologist, Dr Donald York, and a speech pathologist, Dr Thomas Jensen, from the University of Missouri. They clearly identified 27 words / syllables in specific brain wave patterns and produced a computer program with a brain wave vocabulary.
It does not take much thinking to realize that the US agencies have access to a perfected version of this technology. In fact the relevant computers have a vocabulary in excess of 60,000 words and cover most languages.
In fact, the NSA’s signals intelligence monitor the brainwaves of their targets by satellite and decode the evoked potentials (3.50Hz 5 milliwatts) that the brain emits.
So, using lasers / satellites and high-powered computers the agencies have now gained the ability to decipher human thoughts – and from a considerable distance (instantaneously).

• How is it done?
The magnetic field around the head, the brain waves of an individual can be monitored by satellite. The transmitter is therefore the brain itself just as body heat is used for “Iris” satellite tracking (infrared) or mobile phones or bugs can be tracked as “transmitters”. In the case of brain wave monitoring the results are then fed back to the relevant computers. Monitors then use the information to conduct a “conversation” where audible neurophone input is “applied” to the victim.

Human thought operates at 5,000 bits/sec but satellites and various forms of biotelemetry can deliver those thoughts to supercomputers in Maryland, U.S.A, Israel, etc which have a speed of over 300 trillion bits/sec which means just one (Blue Gene) supercomputer can process more information than ten times the entire world’s population. These, even today, monitor millions of people simultaneously. Eventually they will monitor almost everyone, worse than any Orwellian “Big Brother” nightmare you could possibly imagine, only it will be a reality. Yet our world leaders, who know this, do nothing.

NB Whilst the live/human comments are individualistic and unrelated to the victims own thought processes oftentimes the artificial intelligence involved will parrot standard phrases. These are triggered by your thoughts while the human monitors remain silent or absent.
To comprehend how terrible such a thorough invasion of privacy can be – imagine being quizzed on your past as you lie in bed. You eventually fall off to sleep, having personal or “induced” dreams, only to wake to the monitors commenting / ridiculing your subconscious thoughts (dreams).

If the ability to “brain scan” individuals expands from the million or so currently under scrutiny to include ALL inhabitants of the planet (as per the Echelon surveillance system which already monitors ALL private/commercial telecommunications) then no-one will ever be able to even think about expressing an opinion contrary to those forced on us by the New World Order. There will literally be no intellectual property that cannot be stolen, no writing that cannot be censored, no thought that cannot be suppressed (by the most oppressive/invasive means).

The combined use of these technologies enables remote torture and interrogation. (Memories are triggered by neurophone questioning and the brain wave analyzers deliver the answers). Any nebulous arguments about US national security and the need for classified research on human subjects speak for themselves. (The writer has a copy of a White House internal memo, signed by Bill Clinton on these matters).

Remember that in the past CIA mind control experiments have involved LSD as well as electro-shock treatment. The MK Ultra (Mind Control) program itself is infamous as are the instances where implants have been detected by X-Ray etc. Also there are those experimented on under the the cover of ‘Alien visits’. Today, Neurophone and mind reading technologies are at the forefront of similar programs. In many ways these new technologies are an even more sinister means of conducting illegal human experiments.
Colonel John Alexander, advising head of NATO’S non-lethal weapon initiative, is the main proponent of these technologies. He favors all manner of devices which can, from a distance, induce illnesses, read minds and covertly harass innocent targets. If he could he would implant a microchip in each newborn child and initiate a mind control program designed to brainwash the entire planet or at least those not fully in tune with their New World Order. Even to entertain such a thought is criminally insane yet he has said such things in public. In fact Scientific American magazine and the major Scandinavian newspaper, Helsingen Sanomat, have suggested all people will be implanted with a DNA microchip in the future. E.g Prince William has already been implanted (for “location” purposes?) while some U.S Military/Agency personnel, including NASA astronauts, have been implanted so as to study their thoughts/emotions etc. Think of the possibilities for robotics and cloning in the future.

Remember, these technologies (developed for times of war / terrorism) are (post cold war) being used today on lobbyists, intellectual dissenters and peaceful activists; to discredit and silence them. (So much for democracy.) Notably different methods are often used on different victims within a certain area (city) so as to avoid providing a pattern for investigators to observe. This also provides a cross section of political targets for their experimental programs.

It is also noteworthy that some of the victims are ex-agency / military personnel who have rebelled or tried to blow the whistle on corrupt practices within these organizations. Some of these report that not only have the thoughts and emotions of millions of targets been catalogued by military/intelligence agencies but all such agencies have political/mafia/media links due to both infiltration and association. Many of the actual monitors/harassers are also recruited from the worst possible sources.

These people also report that experiments in controlling voters by these remote methods were tried in Haiti, Bosnia etc AND that in 1994, the U.S D.O.D proposed using such technology on all individuals opposing their views(and competitors etc). The DIA would know.
N.B. These technologies are invariably used in conjunction with satellite (audio / visual) surveillance; creating the effect of an electronic POW concentration camp. Mental rape is only one of the many crimes committed in this mobile environment. E.g scientists, writers, political/military leaders etc can have their intellectual property stolen at the source. Without doubt the computers store and analyze the intelligence gathered by surveillance/harassment technologies. Their vast memories allow detailed studies of how the human mind works so as to learn how to influence and/or control people. Duplicating these processes for robotics and other artificial intelligence purposes is another sinister goal.

The US and other world governments are guilty of fostering gross human rights abuses by using these methods. Their covert operators can now do their worst without fear of detection. The cost is justified by the control gained and the experimental results achieved. Of course, (as with the space program and military expenditures in general) the funds used could be better spent solving real problems like hunger, disease, poverty and crime.


• Agencies such as the CIA, ASIS and ASIO should be accountable to appropriately selected committees etc.
• Military units, like Australia’s DSD and the U.S. DIA, should not have the right to access satellite (or other) technologies to spy on or harass law-abiding citizens; especially in their own country. Equally they should not assist foreign governments with ‘Big Brother’ systems like Echelon, except where assisting with law enforcement activities (which they do not).
• Federal Police should be able to access oscillating scanners and EEG machines like SQUID (Superconductor Quantum Interface Detector) through the defense department or appropriate facilities. These can detect the relevant frequencies and this provides proof.
• There needs to be a United Nations Satellite Committee to oversee developments in satellite technology from a humanitarian perspective.
• UN weapons inspectors should include non-lethal weapons and satellite weaponry on their checklists.
• The International Criminal Court should deny veto rights to the US government. The threat of class actions against US government departments may then lead to the end of these atrocities.


(i) Pres. Bill Clinton issued a memo and an Admin’ order of governmental Federal Policy change but it was not implemented before he left office. It related to “Strengthened protection for human subjects of classified research”, 27th March, 1997. (May 13th, 1997….Federal register). His wife, Hillary Clinton, later as US Secretary of State (responsible for the agencies), made no further attempt to stop the atrocities in question.

(ii) Senator John Glen introduced the “Human research subject protection act” (s.193, 105th congress, Jan 22, 1997). As an ex astronaut he knew full well how necessary this was but the bill was not passed.

(iii) The European Parliament recently passed resolutions calling for a world convention to ban all weapons used for human experimentation/manipulation. (see Resolution on the environment security and foreign policy A4 – 0005/99, Jan 28th, 1999.EP1159). The European Parliament also called for a convention introducing a global ban on any weaponry enabling manipulation of human beings. The International Committee of the Red Cross also expressed its concerns in July ’94.

(iv) UNIDIR (The United Nations Institute for Disarmament Research) has issued a media guide to disarmament esp. re weapons of mass destruction. Non-lethal weapons are listed and the list includes mind control weapons. Resolutions, treaties, international conventions/laws must quickly be introduced to bridge the gap between rapidly advancing (and usually ‘classified’) technologies and inadequate laws. UN weapons inspectors should then seek access to government (et al) facilities (worldwide – including the U.S.) to eradicate these evil weapons.


(vi) US Rep Dennis Kucinich (D-OH) introduced a bill “The space preservation act of 2001″ (HR 2977). This was an attempt to ban all weapons in space, including the ones referred to on this site. The congressional record shows that “Mind Control”, “Psychotronic” and “Mood Management” weapons were referred to in HR 2977 but the bill had to be reintroduced as HR 3616 as a watered down version that excluded such terms. Like the earlier attempts by Pres. Clinton and Sen. Glenn this failed to shore up the loopholes which allow non-consensual human experimentation by the agencies and the military. And, like most things kept from the public, these secretive crimes, allowed by the deliberate placement of bad laws, are undemocratic, abhorrent and inspired by an inhumane, elitist mentality that the Nazis and Dr Mengele himself would be proud of.

The ACLU (American Civil Liberties Union) filed a lawsuit in early 2012 against the US government ( Obama administration) concerning the covert targeting / killing of individuals by the agencies; with executive approval or orders.

However these are only promises recognizing the problem. None have yet bore fruit. The use of most “non-lethal” weapons contravenes the spirit of all privacy laws and criminal codes as well as every relevant code and convention in play internationally; including The Declaration of Human Rights. The International Covenant on Civil and Political Rights. The Geneva Convention and The Nuremberg Code. The perpetrators are guilty of crimes against humanity. Those supporting them are engaging in class warfare of the worst kind.


Some of the martyrs to the cause are listed below. These people, all of which spoke with authority and inside knowledge, were all murdered for blowing the whistle on covert satellite harassment….

• Bill Roy, ANU lecturer and Chief Technician, Canberra Black Mountain Tower. He was planning to enter politics and tell the world the truth about satellite surveillance / harassment. He was run down while on his bike, alone in the Uni’ grounds after dark.
• Dr Fred Bell, Physicist and ex DOD employee. He was speaking publicly about evil attacks on citizens using classified technologies. He was murdered in his hotel room just after speaking on Jesse Ventura’s Conspiracy show on TruTV.
Ironically, he was the great grandson of Alexander Graham Bell who invented the “telephone” while he himself was killed for telling people about “neurophones”, amongst other things.
• Ted Gunderson, Ex FBI agent. Ted was an effective activist that assisted many and worked tirelessly to resolve this situation. He died suddenly in suspicious circumstances.
• Alistair Stuart, a Psychiatrist. He was discredited then murdered in his home for highlighting the number of political / agency targets who were falsely committed to mental institutions in order to silence them.
• Michael Hastings – He was a journalist working on a story about the CIA chief when killed in a very suspicious accident in 2013. He had also previously ended the career of General McChrystal.


• Bradley Manning – Jailed in 2013 for 35 years (hopefully to be paroled much sooner if not pardoned altogether) for passing on military information to Wikileaks founder Julian Assange. His motivation was seeing atrocities in Iraq whilst serving there. His concern was for others. In the absence of adequate reporting channels, media coverage or government accountability for such human rights abuses only whistleblowers can bring such things to the attention of the public and then only through marginalized organizations. This of course conveniently allows the government to hide most crimes and demonize those reporting them. The most apt comment I read on this matter read something like this: “When exposing a crime is able to be called a crime by the criminals who committed it you can be sure that those same criminals rule”. The US military and agencies manipulate the truth and brainwash the public so that those not thinking straight support their views, giving them at least some leeway to get away with injustices such as imprisoning Mr Manning. Talk of fictional “psych’ ” problems is always a last resort and they also used that in his case.

• Julian Assange – He published the Manning documents / revelations en masse through Wikileaks and has been hounded for it to the point where he’s sought political asylum from the gov’t of Ecuador. The big lie used on him concerns some obvious sexual frame up. Like other whistleblowers, he has been demonized for speaking the truth which has become a crime or revolutionary act according to the criminals committing the crimes. How the guilty turn the accusations back onto the innocent in today’s evil world would have been a valuable clue for the despots of the past who would be in awe of what technology and total control of the information flow have delivered to the masters of today’s evil world.

• Edward Snowden – Attacked to the point where he sought asylum in China then Russia, for revealing to Guardian reporter Glenn Greenwald the extent of the NSA’s PRISM surveillance system; gathering all information from all communications from all citizens. Like William Binney before him, also an NSA whistleblower re’ ECHELON and other systems, he’s been victimized and set up to look like a traitor. Again, as with the quote for Mr Manning, I say: When exposing treachery is able to be called treachery by the traitors responsible you can be sure that those same powerful traitors rule.

Jesus Christ, who IS the truth, said that “the world” hated him because he said that it was evil (the truth). When men like those mentioned above say the same they are treated the same; with lies and set ups, fueled by merciless hatred and ending in ultimate injustice by the rulers of “the world”. “The whole world is under the rule of the evil one” said Jesus. It was true then and it’s true now. “In a time of universal deceit telling the truth is a revolutionary act”, George Orwell.
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. 

Citizens Against Harmful Technology Inc.  •  P. O. Box 000000  •  New Smyrna Beach, FL 32141

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Share on Facebook Bookmark and Share