To receive email from CitizensAHT.org, add mail@CitizensAHT.org to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Share on Facebook Share on Twitter More Share Options
Citizens Against Harmful Technology
Actively Participate In Educating the Public
CAHT Newsletter     January 15, 2017
 
CitizensAHT.org

IMPORTANT ANNOUNCEMENTS
This newsletter serves the entire TI community. You can support its publication by subscribing. We have reduced the yearly membership fee to $25.00 for 2017. Please join and support this group of individuals willing to give their time and resources on your behalf.

 
Important:

We will be directing you to documents which will provide support for you as a TI. You will be able to defend yourself to your family, friends, doctors, anyone who chooses to abuse you because they are ignorant or because they are being mind-controlled to abuse you. You must have evidence of this being done to more than you.
 
Print each document, save it or have it available in some form for easy use in a notebook or folder.

 
Thank you for your support.
CONFERENCE CALLS
TALKSHOE:  Sunday at 8:30 P.M. East Coast
(724) 444-7444, Call ID for CAHT: 134999 Pin 1#, Moderator: Neal

PO BOX:  FEDEX PO Box 328, 538 Canal Street, New Smyrna Beach, FL 32168

If you send a donation in the form of a check or money order, please send an email (mail@CitizensAHT.org) to announce your mailing so we can tell if any mail is missing. Or maybe put a tracking number on the envelope. DO NOT SEND CASH.

MEMBERSHIPS:  Membership is $25 per year. http://citizensaht.org/memberships
Membership DOES NOT include mailing of hard copies of the newsletter. The newsletter is an online publication and takes at least 16 hours to prepare each week. Membership dues are used for payment of expenses of online resources and research of shielding materials and devices. Please arrange a payment for hard copies by emailing your request to mail@CitizensAHT.org. Thank you all for supporting CAHT in its effort to educate and support the TI community.

DONATIONS: Donations can be in any amount and can be sent to the PO Box or through PayPal. 100% of your donations go to helping TI's.
 
 
FORUM: CitizensAHT.org
Have you participated in the CAHT forum?  Make your own page and request that it be left for your comments only. Add to it on a daily basis. Your story is important so you can store it here for others to read. People generally do not believe this Nazi torture program is being perpetrated. Document your story so it doesn't get lost.

 
Please get some good discussion of helpful topics going on this forum. Everyone will appreciate your contribution and insights into this serious problem which is affecting the entire world.
BROCHURE: Free to Members and for Events!
This brochure explains directed energy assaults, implants, body sensor networks and phone stalking. Free to members and free for events. Free download on CitizensAHT.org
TARGETED INDIVIDUAL TESTIMONY
Please share your electronic harassment and stalking stories here. Find friends and share your experiences. This radiation and electronic harassment is going on all over the world. Here is testimony that shows your story is not an isolated event. While each person is targeted differently, the similarities join our parallel experiences.
 
TESTIMONY ONE: 
 
This section usually shows personal experiences of our readers but there is a good example of what stalkers have accustomed their victims to seeing -NEON orange, yellow or green- clothing, in the Ft. Lauderdale Hoax videos. They identify themselves as being part of the stalking event with the colors. People are figuring this out. The entire event seems to have been staged, with CNN camera men already in place ready to film, stalkers and staged actors. The gunman may have been a TI, he knew to lay down on the ground and he wasn't shot. Reports say he was hearing voices. Was he a TI being used either willingly or unwillingly?  These are events which have meaning to the TI community because we've been acclimated to the players, but ordinary people are commenting on this fellow not being normal. "No one dresses up like that."  https://www.youtube.com/watch?v=I_-sLkI3ryY

 
Note:  Is he holding a phone in his right hand?  Only service animals area allowed in airports, hmmm. 
 


Everybody is running -- he's standing around talking on his phone.

 
 
PDF #2: Telemetry System maintains continuous monitoring of implant
 
A telemetry system for the continuous measurement of the voltage of an implanted bioelectric battery
 
http://link.springer.com/article/10.1007/BF0247
 
This system of telemetry was devised for the continuous monitoring of the voltage of a bioelectric battery implanted in a dog at the Institut de Recherches Chirurgicales, C.H.U. de Brabois, 54500 Vandoeuvre, France. The information is transmitted to a measuring system via a 2·15 MHz carrier. A calibration curve obtained at 37C prior to the implantation permits a knowledge, at any moment, of the voltage of the implanted bioelectric battery, and also, in certain cases, allows any abnormal functioning to be detected. This transmitter, after four years of use in the research programme, has demonstrated the ease with which it may be employed, and above all, its high reliability. It is capable of transmitting 5mV voltage variations of the bioelectric battery.
 
References
  1. Mackay, R. S. (1968)Biomedical telemetry. John Wiley & Sons, New York.Google Scholar
  2. Kaderfors, R., Kaiser, E. andPetersen, I. (1969) Energizing implantable transmitters by means of coupled inductance coils.IEEE Trans. BME-16, 177.Google Scholar
  3. England, S. J. M. andPasamanick, B. (1960)Science 133, 106.Google Scholar
  4. Stephenson, H. E., Schuder, J. C. andMackenzie, J. W. (1967) Energy transport through tissue by inductive coupling.Am. J. Surg. 114, 87.CrossRefGoogle Scholar
  5. Schuder, J. C., Stephenson, H. E. andTownsend, J. F. (1961) High level electromagnetic energy transfer through a closed chest wall.IRE Int. Conv. Rec. 9, 119.Google Scholar
  6. Mackenzie, J. W., Schuder, J. C. andStephenson, H. E. (1967) Radio frequency energy transports into the body.J. Surg. Res. 7, 67.CrossRefGoogle Scholar
Note the dates on this research. Also, know that implants are triggered by inductive coupling. See Inductive Link Design in Medical Implants and Wireless Power Transfer by Inductive Coupling for Implantable Batteryless Stimulators.
VIDEO: Song Reduces Anxiety by 65%
Anxiety — that feeling of dread, fear, worry and panic — is certainly nothing new. Hippocrates wrote about it in the fourth century BCE. As did Søren Kierkegaard in the 1860s. And Sigmund Freud addressed the disorder in 1926. But now neuroscientists in the U.K. have zeroed in on a single song that results in a dramatic 65 percent reduction in overall anxiety…
 
Technology also contributes to the rise of anxiety. A good number of millennials feel exposed without their smartphones — and are rarely without them. Mobile gadgets tend to be their window to the world and foster a sense of connectedness. Social media allows us to compare everything — relationships, diet, figure, beauty, wealth, standard of living — not only with our friends, but with celebrities too. And, as research has shown, time on social media can cause depression in people who compare themselves with others.”

The Creation Of The Ultimate Anti-Stress Music

Researchers at Mindlab International in the U.K. wanted to know what kind of music induces the greatest state of relaxation. The study involved having participants try to solve difficult puzzles — which inherently triggered a certain degree of stress — while connected to sensors. At the same time, participants listened to a range of songs as researchers measured their brain activity, heart rate, blood pressure and rate of breathing.
 
What they found is that one song — “Weightless” — resulted in a striking 65 percent reduction in participants’ overall anxiety, and a 35 percent reduction in their usual physiological resting rates.
 
Experience it for yourself here:
https://www.youtube.com/watch?v=UfcAVejslrU
ARTICLE: What is Brainwave Entrainment?
 
What is Brainwave Entrainment?
 
Brainwave Entrainment (pronounced: "ehn - TRAIN - mint") refers to the brain's electrical response to rhythmic sensory stimulation, such as pulses of sound or light.
 
When the brain is given a stimulus, through the ears, eyes or other senses, it emits an electrical charge in response, called a Cortical Evoked Response (shown below). These electrical responses travel throughout the brain to become what you "see and hear." This activity can be measured using sensitive electrodes attached to the scalp.
 

When the brain is presented with a rhythmic stimulus, such as a drum beat for example, the rhythm is reproduced in the brain in the form of these electrical impulses. If the rhythm becomes fast and consistent enough, it can start to resemble the natural internal rhythms of the brain, called brainwaves. When this happens, the brain responds by synchronizing its own electric cycles to the same rhythm.
 
This is commonly called the Frequency Following Response (or FFR):
 

FFR can be useful because brainwaves are very much related to mental state. For example, a 4 Hz brainwave is associated with sleep, so a 4 Hz sound pattern would help reproduce the sleep state in your brain. The same concept can be applied to many other mental states, including concentration, relaxation and meditation.
 
 
 
The Neuro-Programmer uses sound and light to directly affect the brain through a complex neural process called Brainwave Entrainment.
https://www.transparentcorp.com/products/np/isochronic_tones.php

 
If you listen closely during an NP3 session, you will hear small, rapid pulses of sound. As the session progresses, the frequency rate of these pulses is changed slowly, thereby changing your brainwave patterns and guiding your mind to various useful mental states.
 
What is Entrainment?
 
Entrainment is a principle of physics. It is defined as the synchronization of two or more rhythmic cycles. The principles of entrainment appear in chemistry, neurology, biology, pharmacology, medicine, astronomy and more.
 
CASE IN POINT: While working on the design of the pendulum clock in 1656, Dutch scientist Christian Huygens found that if he placed two unsynchronized clocks side by side on a wall, they would slowly synchronize to each other. In fact, the synchronization was so precise not even mechanical intervention could calibrate them more accurately.
 
> A short history of brainwave entrainment
> Technical information on brainwave entrainment
> Binaural beats
> Isochronic tones and Neuro-Programmer 3
 
Technical Section - Advanced information on brainwave entrainment
Webpage: themindunleashed.com

Our Society Has the Same Symptoms as the Roman Empire Just Before the Fall: Is a Collapse Inevitable?

Just as civilizations fell before, our society may be headed for collapse. With the right ingredients, the western world may fall prey to its own devices and end life as we know it. The chilling part is we are seeing some of the same signs that occurred right before the fall of the Roman Empire.
Researchers say,
“Two important features appear across societies that have collapsed. The stretching of resources due to the strain placed on ecological carrying capacity and the economic stratification of society into Elites and Masses.”
IMPLANTS: Electronic Tagging Kills Endangered Orca
 
Humans are being ‘tagged’ all the time by the deep state – they’ve got us on our smart phones, our computers, and in the myriad of cameras placed throughout public places in the world. Satellite terrorism even allows the military to conduct non-consensual experiments on our emotional states, affected by ELF, and a virtual global grid, ‘radar’ used to guide acoustic and electromagnetic energies. This invasive spying is supported by satellites, cell phones, and the clandestine imbedding of head and ear implants. Now, the death of a killer whale in the Pacific Northwest that was being tracked with similar technology calls for a re-evaluation of its wide-spread use.  An expert panel of scientists agreed that efforts to attach the satellite tag to the male whale likely paved the way for a rare fungal infection that killed the endangered mammal, leaving only 82 orcas left in that population.
Book: Surveillance, Torture and Control
Surveillance, Torture and Control in the Modern World: A collection of links to Inform the General  Public and Targeted Individuals  about the Crimes of Organized Stalking and Electronic Harassment
 
There exists a whole new class of technological weaponry which can be used covertly, right through the walls of your home, to cause physical and psychological damage and even death.

Innocent victims of this weaponry are now being reported globally. It is feared that this weaponry is now in the hands of the financial elite and is being used to stifle dissent and silence activists or "enemies of the state".

This is an explanation and exploration of the crimes of organized stalking and electronic harassment. It is a reference book to used by the general public and targeted individuals.
Article: How to Defeat Remote Neural Monitoring and Mind Control
by Edmund Igberase, Targeted Individual

 
If you have a hard time understanding how remote neural monitoring (RNM) works, just think of how a lie detector works.  In theory RNM functions in similar manner to a lie detector: by measuring physiological responses emitted by the body.  In RNM, it is those physiological responses emitted via electromagnetic impulses by the brain.
 
As you learn to defeat the predictive capabilities of the system -- quenching, redirection, multi-tasking and spontaneity-- their attempts to restrict your reference choices will become increasingly evident and you will begin to perceive what I will describe as 'functional or focal duality' within your working memory. The perps system's prediction error rate will dramatically increase and its attempts to predict your thoughts or intentions will become humorous if not simply annoying.
 
1. Multi-Tasking
 
Learn how to multi-task as multi tasking causes you to think in multiple threads.  When you are constantly thinking in multiple threads (multiple tasks or thoughts) then there is no coherent pattern for the perps to establish and integrate into RNM data.  In other words, 'integration completion' between the RNM system and your brain is hindered and without your response to that specific 'impulse injection', the RNM verification process is breaks apart.
 
The perps are using a  'fabricated or falsified stream' to interfere with your memory and thought process.  Once you become dependent (ie. you believe their impulse injections are your own) on the system's output (or they believe your responses to it are consistent) they will begin to fabricate 'subconscious responses' which they will pretend are indicators of honesty/dishonesty, positive recognition, anxiety, etc, and they will use 'impulse injection' to convince you that the fabricated responses are your own.
 
If you are unaware of this constant mental manipulation the system will begin to shape your thoughts and behavior. They will use this to [attempt to] restrict your thoughts and behavior by blocking [interfering with] your memory and thought process while these suggestions (injected impulses) are being provided - the interference is triggered and can be activated at will by the attackers.
 
2. Spontaneity
 
Never follow a set pattern of conduct.  Always change your behavior every day at a moments notice.  Do this when your quickly (not slowly) on the move as it is more difficult for their remote neural system to monitor your thoughts while your in rapid motion.
 
If you decide to go to the grocery store go to the convenience store instead.  Change it up everyday but don't do the same things over and over as that establishes a pattern of conduct. Remember they are trying to alter your daily motives and emotional perceptions.
 
The remote neural monitoring system is designed to provoke you emotionally so they can generate response statistics which the system will use to determine how to interpret and link descriptions with data captured about your memory references.

 
Once they have consistent statistics the system will use previous 'references' and inject them into your subconscious thought during normal activity which is also referred to in 'impulse injection' to convince you that the response was your own and influence you to complete or describe the reference by making the appropriate verbalizing or performing a related action. You can fight and/or control this if you learn to defeat these memory attacks.
 
This same remote neural attack can be used to disrupt your speech if the attackers decide to prevent you from discussing a specific topic or repeating a given word. The system can be configured to disrupt your recollection when formulating a related statement or inject gibberish [triggered substitution] while you are attempting to speak.
 
The goals of these attacks appear to be Censorship, Memory Management, and Direct Behavior Control.  However these people are not concerned with legal constraints or any particularly acceptable way of life. They simply use anything you enjoy or appreciate to abuse you regardless of your behavior so if they give you a compliment, realize that they are only doing it to see how you will respond when they negate it and torture you nightly.
 
If you keep a constant handle on your 'state of activity' as well as your situational perception you will recognize conflicting impulses and although it is possible for the system to overpower your impulses, if you understand the attacks you will be able to recognize the physical changes resulting from these powerful impulses and this should prompt you to re-evaluate your current state.
 
Unless you have been tortured to near-incoherency you should be able to fight the system's influences.  These remote neural attacks are most effective when you are stepping through sequenced tasks so try to avoid 'zoning' on your activities. How?  By changing your actions and activities randomly & constantly at the speed of thought.  Don't always plan out or think out your daily itinerary, if you don't have to.  'Just do it' !
 
Remote neural manipulation is accomplished via their system's ability to interpret your thoughts and is wholely dependant on its ability to predict and influence your 'reference' choices or impulse sequencing during thought composition. The system maps patterns with impulses and identifiers (evoked potentials) and uses statistical data about your 'composition habits' to predict how you will think or act as you begin to formulate thoughts or prepare to act. The system's ability to define and map these references intelligibly depends on your cooperation [or ignorance] and the attackers' ability to make sense of what they see visually or what they can guess based on your past activity.
 
3. Quenching
 
They will constantly run you through a 'verification' routine where the system probes you for a particular set of responses repeatedly in order to establish a pattern. If you are interacting and countering these probes the operator will vary the routine in an attempt to 'verify' via different methods.
Once the system 'verifies' the selected responses they will be used in the next wave of harassment routines - the process is endless and you will see the effects clearly if you are consistently defeating the system. If you are not defeating the remote neural system then you will not see or notice the effects. [Annotation: This suggests learning and feedback from the target, who is apparently a sort of "node" in artificial intelligence.]
The way to defeat their remote neural monitoring system is by 'quenching'.
 
You 'quench' remote neural monitoring by interacting with and countering their tactics.
None of what these people are collecting could ever be used in a case against you. Every piece of information collected by their system can be considered falsified and/or fabricated because the system is designed to continuously provide 'suggestions' according to data which has been previously collected about your current activity and the accuracy of the reference descriptions [definitions] is extremely low since the attackers don't really care about truth and the system will fabricate statements and/or imagery while they are abusing you. The fabrications are generally the result of misinterpretation of references and emotional indicators as well as distortion of 'injection feedback' in addition to false entries added manually by the attackers as a result of their inability to understand what they are viewing or their malintent. There is no reliable way for the attackers to determine what is true even if they try to apply their observations to the aforementioned indicators. An attempt to prove guilt with their system would be the equivalent to a cop dropping a gun at a crime scene and claiming it belonged some individual who happened to be passing by - RANDOM and FALSIFIED. There is no legal application for this system or anything generated by it. They will only capture what they want to abuse you with and when they decide to 'censor' your thoughts they will force you into an abusive or incoherent thought pattern using the injection and blocking methods mentioned above.
 
For example when you experience 'sudden severe aggression and agitation' its the perps, not you.  They injected those impulses.  Remember they want to keep you constantly thinking about them.
You can limit and counter this effect by learning to read memory while blocking their system however it takes quite a bit of skill and self-awareness.  This is known as 'Redirection'.
 
4. Redirection
 
Redirection is simple.  When the remote neural attack happens and impulses and thoughts are introduced into your mind (by strong urge [high frequency attack] or slight motivation [low frequency attack]) just change your thread of thought.  This hinders 'integration completion'  between your brain and the RNM system.  The Bible says "...whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable--if anything is excellent or praiseworthy--think about such things". (Phillipians 4:8).
 
You can thwart their RNM attack by establishing a 'working reference' each time they attempt to inject impulses and thoughts to your brain.  This is done by recognizing something in life that makes you very happy and then re focusing or 'redirecting' back to that happy experience in life each time you are attacked through RNM.
 
If you can do this each day their attacks will simply be an annoyance to you as you can work around it, but it will still hinder performance tremendously as you will be forced to test and validate memory constantly and the physical sensations of the system radiating your brain will be both irritating and distracting.
Note that these attacks can be performed successfully at lower intensities and you will only notice them if you are frequently being tested at higher intensities: Torture!
 
Understanding the memory attacks (blocking your real memories and injecting false memories and impulses) are key because if you do not recognize modification of your 'active memory' the system will cause you to briefly lose time perception which may be enough procedural [functional] disorientation to influence you to respond to an injected impulse. Forced speech for example.
 
It is possible for the system to influence you to speak unwillingly or, at the very worst, without you knowing it. For example if you are susceptible to the systems influences you may not realize that it is frequently or constantly influencing you to make minor choices. These motivational impulses can also be used to influence you in a manner that will give you the desire to speak, and I emphasize desire because you need to understand that these impulses will only make you feel the urge [at higher levels set by the attackers] or basic motivation [at baseline levels] to perform the tasks it is influencing you to do.
 
In combination with this motivation to speak the system uses past references to direct you - for example you personal memory of turning to speak to your wife and the associated impulse - and when you react to this influence the system will block your working memory while streaming the desired output which will result in you making one or more statements under the system's control. They will test this on you frequently with 'word substitution' and if you can learn to control this in thought then you can control it while speaking but you must learn to multitask constantly!
 
If you do not have a 'working reference' to return to after the forced speech attack it is possible that you will have no recollection of making the statement.
VIDEO: How to Create A Mind Controlled Slave
Based upon the book, "The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave" by Cisco Wheeler and Fritz Springmeier.  Fritz speaks about his work in helping others to recognize and also overcome the programming that they were subjected to during some portion of their life.

Together we expose the larger agenda of the New World order explaining why it is that the elite are involved in subjecting the populace and even their own children to what seems to us psychotic schizoid behaviors. It is difficult for those of us that are normal and love our children wanting nothing more than to be able to raise them in a nourishing environment, to grasp in understanding why and how it is that they could involve themselves in such abominable atrocity.
ENVIRONMENT:  Climate Engineering Cataclysm

Climate Engineering Cataclysm: A Live Presentation By Dane Wigington

http://www.geoengineeringwatch.org/climate-engineering-cataclysm-a-live-presentation-by-dane-wigington/
 
For over 7 decades global climate engineering programs have been expanding in scope and scale. For over 7 decades the decimation these programs have inflicted on planet Earth has been accumulating. The biosphere on which all life depends has already been pushed past the breaking point on countless fronts. Though there are a great many forms of anthropogenic activity contributing to the ongoing destruction of Earth's climate and life support systems, climate engineering/geoengineering/weather warfare is mathematically the greatest and most immediate threat we face (short of nuclear cataclysm). Exposing and halting the ongoing global climate engineering assault must be made our top priority if we are to have any chance of salvaging what still remains of Earth's life support systems. The live PowerPoint presentation below addresses the true severity of the threat we face from covert climate modification programs.
 
From climate engineering to forced vaccinations, the walls are closing in. All of us are needed in the critical effort to sound the alarm.  Dane Wigington's Facebook Page  DW
LIVE SCIENCE: Ice to Release Cold War-Era Toxic Waste
Toxic waste from a long-abandoned Cold War-era camp could leach into nearby ecosystems as temperatures warm in Greenland. The site, known as Camp Century, covers 136 acres (0.55 square kilometers) — about the size of 100 football fields — and includes approximately 53,000 gallons (200,000 liters) of diesel fuel; building materials; and 63,000 gallons (240,000 liters) of wastewater, including a large amount of sewage. Researchers warn that as temperatures rise, meltwater could move through the ice, absorbing toxic waste from the camp and carrying it to the coast. In about 75 years, if human-driven climate change continues unabated, the ice covering the site will melt, they said. One of the most worrisome contaminants frozen at the site are polychlorinated biphenyls (PCBs), chemicals that were once widely used in electrical structures and equipment. Studies have shown the chemicals to be harmful to the immune system, reproductive system, nervous system and endocrine system.
 
HEALTH: Natural Counterparts of Most Prescribed Drugs

The 7 Most Prescribed Drugs in the World and Their Natural Counterparts

Of the over 4 billion prescriptions written every year, the United States and Canada make up more than 80% of the world’s prescription opioids (psychoactive medications). Between 1997 and 2012 prescription opioids increased in dosage by almost 500%. Pharmaceuticals and medical errors are now a leading cause of death. Painkillers are the leading cause of accidental death.
Keep Your Spiritual Thoughts
Isaiah 41:11-13 (NIV)
 
11 “All who rage against you will surely be ashamed and disgraced; those who oppose you will be as nothing and perish.
12 Though you search for your enemies, you will not find them. Those who wage war against you will be as nothing at all.
13 For I am the Lord your God who takes hold of your right hand and says to you, Do not fear; I will help you."
 
COMMENT:  Those who wage war against innocent people will come to nothing.  God will take hold of our hand to help and comfort us.
LYME/MORGELLONS: A biological warfare weapon
 
Recent U.S. snowstorms found to contain elements of entomological warfare being conducted on American populace
By Shepard Ambellas
March 6, 2014
 
The U.S. is now a designated military testing ground for real-time biological and entomological warfare applications using Americans as test subjects under public law 105-85
 
“Entomological warfare (EW) is a type of biological warfare that uses insects to attack the enemy. The concept has existed for centuries and research and development have continued into the modern era. EW has been used in battle by Japan and several other nations have developed and been accused of using an entomological warfare program.” – Wikipedia.
 
(INTELLIHUB) — The bottom line is that we will stop at nothing to bring you prudent, factual, thought-provoking news and opinion from some of the most interesting sources in the world. So needless to say, we will not stop reporting on the “fake snow” or “polymer snow” that has been found in several U.S. cities, including Atlanta, which was mocked by some including “truther” Mark Dice, who wrote it off as a joke early on.  However, after researching nearly one-hundred accounts or claims of this “fake snow” that seemly won’t melt, burning oddly under flame, smelling like plastic– it’s of my opinion that there is something else to this issue and that we are not being told the real truth about the recent cold spells.
 
So far what we do know is that strange polymer fibers have been found in the snow in several states. We know that snow recently found in several parts of the eastern U.S. smells like burnt plastic when melted under a flame or in a pan (using no butane).
 
However, even to my surprise, new findings posted on YouTube show that America may be under attack by entomological warfare as vast quantities of fleas [insects] have now been found in new snowfall following low-altitude passes by aircraft in Craig, Montana.
 
Shockingly, this matches up with diabolical tests conducted on human beings by Biological Warfare Unit #731 during the World War II era.
 
Don Tow writes:
The largest Japanese biological/chemical warfare laboratory was in Ping Fan, a small village near the city of Harbin, Heilongjiang Province in northeast China, known as Unit 731. Unit 731 was a gigantic complex covering six square kilometers and consisted of more than 150 buildings, with living quarters and amenities for up to 3,000 Japanese staff members, 300-500 of whom were medical doctors and scientists. The complex contained various factories. It had 4,500 containers for raising fleas, six giant cauldrons to produce various chemicals, and around 1,800 containers to produce biological agents. Approximately 30 kg of bubonic plague bacteria could be produced there in several days. Especially in the area of biological weapons, Unit 731 could be considered to be the largest such laboratory ever in the world. Not only that it was state of the art, it significantly extended the state of the art, partially because the Japanese had no reluctance at all to experiment with live patients, including doing autopsies while the victims were still alive.
 
You see under public law substantiated in 1997, all of this has been made possible, allowing the testing of chemicals and biological agents on “Civilian population” as pointed out in my documentary film SHADE the Motion Picture.
 
Public Law 105–85  105th Congress
 
PUBLIC LAW 105-85- NOV. 18, 1997: USE OF HUMAN SUBJECTS FOR TESTING OF CHEMICAL OR BIOLOGICAL AGENTSSEC. 1078. RESTRICTIONS ON THE USE OF HUMAN SUBJECTS FOR TESTING OF CHEMICAL OR BIOLOGICAL AGENTS.(a) PROHIBITED ACTIVITIES. – The Secretary of Defense may not conduct (directly or by contract)(1) any test or experiment involving the use of a chemical agent or biological agent on a civilian population; or
(2) any other testing of a chemical agent or biological agent on human subjects.(b) EXCEPTIONS.- Subject to subsections (c), (d), and (e), the prohibition in subsection (a) does not apply to a test or experiment carried out for any of the following purposes:(1) Any peaceful purpose that is related to a medical, therapeutic, pharmaceutical, agricultural, industrial, or research activity.

(2) Any purpose that is directly related to protection against toxic chemicals or biological weapons and agents.
(3) Any law enforcement purpose, including any purpose related to riot control.
So section (a) prohibits these cruel and inhumane chemical and biological tests on humans.
Then section (b) says that the prohibitions in section (a) do not apply to tests carried out for virtually any purpose. So section (b) completely negates the prohibitions of section (a).
 
To no surprise the Center for Disease Control in Atlanta has also acknowledged the possibility of using the “plague as a biological weaponin a white paper about “medical and public health management”.
TARGETED INDIVIDUAL TALK SHOW TIMES
Please email Mail@CitizensAHT.org if you wish to add any call to this list. We want as many listings as possible to keep you in touch with the support you need.
 
 TALKSHOE:  744-7444

SUNDAY
 
 
     Neal for Citizens Against
     Harmful Technology
134999
8:30 p.m. Eastern
     Renata

 
114616
3 pm Eastern
MONDAY
 
 
     Derrick for PACTS
 
115863
 
     Mike
 
641.715.0632
code 116202
6 pm Eastern


TUESDAY
 
 
     Ella
 
141476
9 pm Eastern
WEDNESDAY
 
 
     Su Maya



 
 
 
 
 
 
1 712- 775- 7031
367 668 644#
 
People can call, sign in, or just listen to the show by radio streaming at:
https://www.freeconferencec

all.com/wall/367-668-644
 
THURSDAY
 
 
     Ella
141476
9 pm Eastern
     Mike Mason
641.715.0632 code 116202
6 pm Eastern
FRIDAY
 
 
     Linda


140091
 
SATURDAY

 
 
     Dr. Millicent Black
      Church Conference Call

140567


6 pm Eastern
     Ella - Activism call

141476
4 pm Pacific
     Derrick
 
115863
9 pm Eastern
 
 
Support Group
Chicago, Illinois
The Chicago area Support Group – covering Illinois, Indiana, and Wisconsin will have their next meeting
Saturday, January 14, 2017
Time: 11:00 AM Central Time
Location: Hammond Public Library
564 State Street
Hammond, Indiana
Organizers are requesting an RSVP to Shavon at von.pray@gmail.com

or Candace at cam14395@aol.com
  
Washington, DC Activism Event
 Rally at the National mall during
President-elect Donald Trump's Inauguration
Friday, January 20, 2017

 11:00 AM to 3:00 PM Eastern Time
For more information, contact Spencer Carter at:
spencer.carter1966@gmail.com

 
Seattle, Washington
THE SEATTLE AREA SUPPORT GROUP will have its next meeting on
Sunday, January 22, 2017
Time: 1 - 3 PM Pacific Time
Location: Broadview Branch Library at:

12755 Greenwood Ave.
Seattle, Washington
For more information, you may contact
Laura Solway - 206-365-6139
Curtis Kimble – 817-901-8720
This event is not being sponsored by the Seattle Public Library.

 
Portland, Oregon
The Portland, Oregon Support Group Meeting that was scheduled for last Saturday Jan. 7, has been rescheduled due to inclement weather to: Saturday, February 4, 2017
3:30 to 5:30 PM Pacific Time
Hollywood District Public Library
4040 Northeast Tillamook
Portland, Oregon
Contact person;  Amy – 971-207-3401
 
SHIELDING:  Linqstat
Please email Neal to order. electricrose22@yahoo.com
 
SHIELDING TIP: You can sew a lining of metallic fabric inside an already lined garment so you have 3 layers of cloth, the outside, the conductive EMF shielding fabric and the original lining. Place a TENS pad on the fabric inside the lining and one TENS electrode on your skin and the electrical field will continuously surround your head or entire body, without touching your skin. This is particularly effective if you place the metallic fabric inside a garment with a hood and draw the hood closely around your head. It may even temporarily block frequencies from your head/ear implants.
 
Whatever material you use to cover yourself, you can produce an electrical current through it if you place a TENS electrode on the side that's not touching you.
 
 
If you have a tent, you can just tape some pieces of Linqstat together and drape them over the tent. You could make it the exact shape as the rain cover. You can ground it to an outlet, to a ground with a banana clip or attach a TENS electrode to it to create an energy field through the material. Using a tent structure that's already got places to attach the Linqstat make it a lot easier. You can even get a simple one and put it on your bed to drape the Lingstat over. Completely covering an already-made tent  like this one with Linqstat is pretty easy and you can just put the TENS pad on the outside of it and "light it up", keeping the frequencies on the outside. LINK TO GROUNDING CLIPS
 
This is a very high quality RF shielding material. It should be grounded so that any radio frequency will dead end at the ground. It doesn't out gas, does not break down & is completely nontoxic! Linqstat is a very stable carbon loaded product. It is the carbon which blocks microwaves.
 
ORDER YOUR LINQSTAT, email Neal at electricrose22@yahoo.com.
Make payment through PayPal or debit/credit cards at our donate button on our website, or by mail upon request. Be sure to state whether the payment is a donation, membership or Linqstat.
 
LINQSTAT (≤50,000 ohms/sq) Electrically Conductive Film.
Product Part Number:  LINQSTAT MVCF S-Series 
 
We have 3 packages available:
Package 1:  6' (ft) x 3' for $ 30.00 (To make an 8 layer hat ).
Package 2: 12' (ft) x 3' for $ 50.00 (To make an 8 layer hat & 2 layer vest)
Package 3:  24' (ft) x 3' for $ 80.00 (To make a hat, vest & over under blanket for where you sleep ).
(Shipping, tracking & insurance is included in the price).
Disclaimer
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. 

Citizens Against Harmful Technology Inc.  •  P. O. Box 000000  •  New Smyrna Beach, FL 32141

http://CitizensAHT.org

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Share on Facebook Bookmark and Share