To receive email from CitizensAHT.org, add mail@CitizensAHT.org to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Share on Facebook Share on Twitter More Share Options
Citizens Against Harmful Technology
Actively Participate In Educating the Public
CAHT Newsletter     January 29, 2017
 
CitizensAHT.org

IMPORTANT ANNOUNCEMENTS
First, please let us welcome the new members and returning members. Your participation in membership, conference calls and contributions to the newsletter are all welcome and appreciated.

 
This newsletter serves the entire TI community. You can support its publication by subscribing. We have reduced the yearly membership fee to $25.00 for 2017. Please join and support this group of individuals willing to give their time and resources on your behalf.

 
Important:

We will be directing you to documents which will provide support for you as a TI. You will be able to defend yourself to your family, friends, doctors, anyone who chooses to abuse you because they are ignorant or because they are being mind-controlled to abuse you. You must have evidence of this being done to more than you.
 
Print each document, save it or have it available in some form for easy use in a notebook or folder.

 
Thank you for your support.
CONFERENCE CALLS
TALKSHOE:  Sunday at 8:30 P.M. East Coast, 7:30 Central, 6:30 Mountain, 5:30 W Coast

(724) 444-7444, Call ID for CAHT: 134999 Pin 1#, Moderator: Neal

PO BOX:  FEDEX PO Box 328, 538 Canal Street, New Smyrna Beach, FL 32168

If you send a donation in the form of a check or money order, please send an email (mail@CitizensAHT.org) to announce your mailing so we can tell if any mail is missing. Or maybe put a tracking number on the envelope. DO NOT SEND CASH.

MEMBERSHIPS:  Membership is $25 per year. http://citizensaht.org/memberships
Membership DOES NOT include mailing of hard copies of the newsletter. The newsletter is an online publication and takes at least 16 hours to prepare each week. Membership dues are used for payment of expenses of online resources and research of shielding materials and devices. Please arrange a payment for hard copies by emailing your request to mail@CitizensAHT.org. Thank you all for supporting CAHT in its effort to educate and support the TI community.

DONATIONS: Donations can be in any amount and can be sent to the PO Box or through PayPal. 100% of your donations go to helping TI's.
 
 
FORUM: CitizensAHT.org
Have you participated in the CAHT forum?  Let us know if you have any advice you can pass on to other TI's or people with Morgellons.  Share shielding and treatment protocols. Document your story so it doesn't get lost.  Please get some good discussion of helpful topics going on this forum. Everyone will appreciate your contribution and insights into this serious problem which is affecting the entire world.
BROCHURE: Free to Members and for Events!
This brochure explains directed energy assaults, implants, body sensor networks and phone stalking. Free to members and free for events. Free download on CitizensAHT.org
ALL TI's DO THIS:  Hide Your IP Address
Why Hide It?
There are many reasons to hide yourself online. IP addresses can be used to discern your physical location, and can some times do so with remarkable accuracy. These addresses also act like personal identifiers, a little like a phone number, letting advertisers and adversaries track you online. They can also be used to launch targeted attacks against you.

 
You may even be hiding from a watchful or oppressive government. Journalists are especially likely to hide their IP addresses when they're reporting in dangerous areas or on sensitive subjects. Of course, I'm not encouraging anyone to break local laws, but I do want people to know how to keep themselves safe, should the need arise.
 
http://www.pcmag.com/article/343394/how-to-hide-your-ip-address
ACTIVISM: Edward Snowden Talk

Video: Media Blacks Out Edward Snowden’s Talk On COINTELPRO & History Of Mass Surveillance

NSA whistleblower Edward Snowden talks about the history of intelligence agencies and some notable whistleblowers.
TARGETED INDIVIDUAL TESTIMONY
Please share your electronic harassment and stalking stories here. Find friends and share your experiences. This radiation and electronic harassment is going on all over the world. Here is testimony that shows your story is not an isolated event. While each person is targeted differently, the similarities join our parallel experiences.
 
TESTIMONY ONE: 
 
TI has square object in eye. Is it a camera?

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
TESTIMONY TWO:
 
The Attackers Have a "Brain Reading" Tool
https://www.youtube.com/watch?v=hTtX0V38wLI
 
Published on Jan 16, 2013
9/10/15
--------------------------
The attackers might possibly have implanted something in my brain, possibly on my somatosensory cortex, when they rendered me unconscious back in the early 1990s in a Denver Youth Hostel in Denver, Colorado, when I was in my early 20s. I say this because I have done some experiments where I breathed normally (e.g., in and out my nose) but simply *thought* of breathing out some other location (like out one of the corners of my mouth) and the attackers started attacking the location that I merely *thought* about. So either they've implanted something, or they're using micro-doppler radar that's so invasive that it's actually reading blood flow on my somatosensory cortex.

My best advice for understanding the *details* of the particular directed-energy weapons they're using on me, and *how* they're using them, the possible *physics* behind them, and how to lessen their effects or stop them from hurting you, can be found in continually updated document titled "How the Terrorists Do It" in my public Google Drive directory:

https://drive.google.com/folderview?i...

4/15/15
--------------
I don't think they can do any kind of "mind reading" per se, but the doppler radar lets them see things like lung muscles (breathing) and heart muscle (heart beat). If they know you're breathing hard and your heart rate is speeding up, they could naturally infer that you're scared, or at least excited at something. Possibly they can also "see" blood flow in the sense that blood is mostly water, and water absorbs microwaves (and it's probably a MICROWAVE doppler radar). So moving blood (water) would create a sort of "interference" in their radar that they may be able to detect -- may even to the point of detecting blood flow in the brain.

6/29/2013
------------------
Since I first published this video in January, I learned more about the technology that I think my attackers are using to track and harm me. Recently I came across some articles on "see through the wall" radar/doppler/micro-doppler technology. You can learn more about this technology at the following links:

http://www.wired.com/dangerroom/2013/...
https://www.justnet.org/pdf/00-WallSe...

It appears they use a doppler radar that (1) can penetrate many materials, including most walls, even at long distances (miles), and (2) is so sensitive it can identify not merely **A** heartbeat or lung compression/decompression, but a **PARTICULAR** person's heartbeat/lung movements, etc.

I feel that these criminal EXPERIMENTERS have gone BEYOND that however, using this radar so INVASIVELY that it can actually reflect off BLOOD FLOW in my brain. If you can detect blood flow within someone's brain, you can actually do a form of "brain reading". I'm no neuroscientist, but I know that some extant brain-scanning technologies use this idea already; it may be that brain areas of greater blood flow = brain areas of greater ACTIVITY. Knowing this, the attacker can know when I feel FEAR or perhaps even when I'm activating -- or THINKING about activating -- muscles on a particular side of my face.

It's also possible that while trying to only THINK about breathing out of the corner of my mouth, that I actually ACTIVATED SOME MOUTH MUSCLES EVER SO SLIGHTLY, that they were nevertheless able to detect with this very sensitive micro-doppler radar.

1/16/2013
------------------
I made an important discovery this week, the details of which you'll hear in the video. The bottom line: The attackers can, through "interrogating beam" or implant (or combination of both), "read" information based on my brain activity (electrical activity, or glucose uptake, or who knows what).

I have been wondering for the longest time how they not only could find me (my whole body -- probably via interrogating beam or GPS implant, etc.), but how they could know (1) when I'm breathing and (2) where I'm breathing from (nose or mouth). Well, this week I tried an experiment: I concentrated and VISUALIZED breathing out of my mouth while actually breathing out of my nose -- and they shot my mouth! I repeated this experiment time and time again, and confirmed the results. I did the opposite: I breathed out my mouth and visualized nose breathing, and they shot my nose! I even HELD MY BREATH and visualized mouth breathing and they went ahead and shot my mouth, completely out-of-sync with any breath.
PDF #4: Remote Behavioral Influence Technology Evidence
https://www.youtube.com/watch?v=LTQWTxDwK8g
VIDEO:  Reading the Mind

Michio Kaku on Reading Minds, Recording Dreams, and Brain Imaging

MUST READ!  ARTICLE: The individual vs. Globalism
The Individual vs. Globalism
 
Jon Rappoport, Guest
Waking Times
 
“Global solution” means the individual is cut out of the equation, he doesn’t count, he doesn’t mean anything in the larger scheme of things, he’s just another pawn and cipher to move around on the board. This is the elitist end game of social justice and equality. As more duped and deluded people sign on to this agenda, the whole concept of the individual shrinks and becomes irrelevant.
 
The global solution is purposeful. It is the script for the future: create problems whose only solution appears to be collective. The purpose is to psychologically, mentally, emotionally, and spiritually divert the individual’s attention from his own vision, his own profound desires, his own imagination—and place it within The Group (“all of humanity”).
 
Propagandize the idea that, if the individual concerns himself with anything other than The Group, he is selfish, greedy, inhumane. He is a criminal. More and more, this is how the young are being trained these days.
 
The grand “we” is being sold to them like a cheap street drug. They buy in. They believe this “we” is real, instead of a hollow con designed to drag them into a Globalist framework owned and operated by mega-corporations, banks, foundations, governments, and ubiquitous Rockefeller interests.
 
And what of the individual, his mind, his unique perception, his independent ideas, his originality, his life-force?  Swept away in the rush toward “a better world.”
 
I have breaking news. Earth is not a spaceship and we are not crew members. If Earth is a spaceship, it has serious design flaws, because it keeps making the same trip around the same sun every year. Each one of us does not have a specified function, as a crew member would. Going back as far as you want to in history, shortage and scarcity in the world that engendered a crisis was either created by some elite or maintained by them, for the purpose of eradicating dissent and fomenting a collectivist solution. Meaning a solution that came from the top. Meaning a solution that reduced individual freedom.
 
In recent human history, a different idea emerged: establish severely hamstrung government, in order to protect the individual against it. This idea has had a very tough time. Collectivists have fought it every step of the way.
 
But regardless of circumstances, the individual can author his own freedom and what it implies. He can discover, within himself, extraordinary possibilities. He can contemplate what it means to create reality that expresses his most profound desires. And then he can begin a voyage that no one and no group can stop.
 
Civilizations come and go, rise and fall; the individual remains. Without the individual, imagination stops. The word “imagination,” when properly understood, indicates that the individual can envision and then create futures that never were, and never would be, unless he invented them. Imagination is the opposite of “provincial,” “restricted,” “well-known,” “familiar,” “accepted.”
 
That is its challenge to the status quo. That is the true threat the individual poses to all predictive systems.  Therefore, “it’s all just information” is a psyop code-phrase. Ideas, thoughts—nothing is original, nothing is new; we all “share” information floating in the collective consciousness; the individual invents nothing. This is the opposite of the truth.
 
The individual invents everything. He can’t be predicted when he is himself. He is not a pattern. He is not a system.  He is not anyone else. He thrives on his own inspiration. He is the ultimate riverboat gambler. He bets the house on his own as-yet uncreated future. He is not a piece of universe. He is not a humble servant of Order.  He invents the space and time of his own time to come.
 
As early as 1961, a brilliant healer, Richard Jenkins, whom I write about in my book, The Secret Behind Secret Societies, explained what was to come. He wrote me a note, which I’m paraphrasing from memory: “People are confusing their own empathy for others with some overblown idea about group-identity. They aren’t the same. People are becoming afraid of their own unique and distinct existence. This is a social fear. A new social contract is being foisted on the population. Either you belong, or you have no rights. This is a totalitarian concept. It’s coming in through the back door.”
 
Well, now, it’s right there at the front door. The individual still has a choice. But he has to make it. Explore his own power, or give it away for nothing more than an illusion of belonging. Stoke the fires within, or form a diluted image of self, and bow down to The Group.
 
The “I” is not isolated. He can reach out to others whenever and however he wants to. The question is, is he moving on the ground of his own independence, or is he searching for a group life raft, to which he will attach himself without thought or hesitation?
 
Beyond economics or politics, Globalism is a system that offers a life raft which is heading toward a machine-future. Disembark and find the great We, a construct of integrated parts, each of which is an individual, in a state of spiritual amnesia. Happiness there is function and sedation, immortal and shadowless, wiped clean of distinctions.
VIDEO: Non-Heating Effects of EMF

Prof. Martin Pall - How WiFi & other EMFs Cause Biological Harm

VIDEO: Expert Olle Johansson on Harmful EMF

ADVERSE HEALTH EFFECTS OF ELECTROMAGNETIC POLLUTION - Video of Lecture by Prof. Olle Johansson

Johansson explains specific cellular reactions of hypersensitive people to EMF explosure.  However, he does not think these things are done on purpose, he's not fully informed, even on the medical implications of implants for torture. This shows how compartmentalized scientists are. They don't know the full scope of the government's use of microwave.

 


Article: Silencing Dissent (Individualism)

Clandestine “Classified” Human Subject Experimentation using EMF Radiation/Sonic/Ultrasonic Neuroweaponry

Thousands of Americans, and citizens worldwide, are being experimented on, and have been, for some decades, by “stealth” technologies and “concealed monitoring,” without their consent and knowledge, in many many fields of bioscience and social science and psychology, including neuroscience, through the use of deadly, EMF radiation & sonic/ultrasonic neuroweaponry, satellite and ground surveillance, cybersurveillance, electronic surveillance, and “radiation surveillance”–a euphemism within a euphemism, essentially pointing to EMF neuroweaponry.
 
How is this achieved? A few ways:
1) Science of every stripe is being funded in massive waves by Military and Intelligence and Security agencies at Universities: in other words, if you want to establish tenure, or get that Post-Doctoral Fellowship or Graduate Fellowship or whatever other juicy award, you will plunge into unethical research, which is “properly classified” by the Military, and not think twice about what you are doing, which essentially is experimenting on non-consenting humans and helping the Military weaponize science or/and perfect their extant weapons on the unsuspecting citizenry. Thoughtless, feckless, shameless, unethical students of every stripe from Social Science and Psychology to Neuroscience and Oncology are currently engaging in “classified” research at various universities and research institutions, and knowingly experimenting on uninformed, non-consenting human subjects, to whom they have been provided access by virtue of their Mil/Intel funding, via Security, Intelligence, and Military classifications, which, by the way, are actually protected by our current proliferation of Secrecy laws, Defense laws, Security laws, Intelligence laws–including the NDAA, the Patriot Act, and others.  This can be researched–which Universities and departments get funding from Mil/Intel/security//what project RFPs does one see issued by Military agencies and departments/Intel/DHS/Security?–and links will be continually posted on this page to extant information.
 
CLASSIFIED SECRET HUMAN SUBJECT EXPERIMENTATION CURRENT STATUS & HISTORY
 
 
 
2) Informed Consent, as coded in the Common Rule and the CFR–Code of Federal Regulations, here linked in Dept. of Health and Human Services’ Part 46, Protection for Human Subjects–has been officially Hijacked & is No Longer Protected by United States Law: Take a good look at how different agencies are required to follow that code, and you will see that the DoD–and all its departments, including Navy, Air Force, Special Ops, etc.,–and the CIA, the DHS, and other Federal agencies–each have been handed a carefully altered version of the code, a customized version you could say, hooked in to each their own intentions regarding experiments on human subjects, and each with its own happy platter of exemptions.

 
3) Exemptions to Informed Consent are rife in the CFR, for all Federal departments and agencies. Here is the list of CFR sections for each agency using the “Common Rule,” provided by the Office of Human Research Protections, HHS:
The reference in the U.S. Code of Federal Regulations is shown below for each U.S. federal department and agency which has adopted the Common Rule:
7 CFR part 1c – Department of Agriculture
10 CFR part 745 – Department of Energy
14 CFR part1230 – National Aeronautics and Space Administration
15 CFR part 27 – Department of Commerce
16 CFR part 1028 – Consumer Product Safety Commission
22 CFR part 225 – Agency for International Development
24 CFR part 60 – Department of Housing and Urban Development
28 CFR part 46 – Department of Justice
32 CFR part 219 – Department of Defense
34 CFR part 97 – Department of Education
38 CFR part 16 – Department of Veterans Affairs
40 CFR part 26 – Environmental Protection Agency
45 CFR part 46, subpart A – Department of Health and Human Services
45 CFR part 46, subpart A – Central Intelligence Agency (by Executive Order 12333)
45 CFR part 46, subpart A – Department of Homeland Security (by federal statute)
45 CFR part 690 – National Science Foundation
49 CFR part 11 – Department of Transportation
Each of these sections, especially ones for the Military and Intelligence agencies, offers exemptions. Yes, these are exemptions to Informed Consent. Please stay tuned for a new blog, The Ghost of Informed Consent, which will translate to plain English each of these sections, so the Hijacking of Consent can be laid bare. But take a look yourself at these sections–just Google them, read them fully, look at what they say.
In gist, what they say is there are lots of situations where Informed Consent can be thrown out the window, and these situations will be covered by law–in the interests of National Security primarily, and as decreed in secret by the Secretary of Defense, and they will be classified Top Secret or whatever classification will help maintain absolute, pungent, permanent Secrecy. Whether it’s medical research, genetics research, neuroscience research, psychiatry research, psychology research, social science research; whether it involves EMF radiation/sonic/ultrasonic weaponry, or Military PsyOps, or a combo of these.
 
Let’s be clear, these exemptions point to Secret Human Experimentation–on Americans.
 
In reports, the people targeted by Mil/Intel/Security for secret human experimentation are tagged under language designed to shroud, such as “federally classified human use protocol,” which can be seen in this 2002 Air Force biomedical research report from Veridian Engineering which can be found online, Biological Effects of Directed Energy.

Again, more links forthcoming.
 
4) In addition, these classified research projects and weapons-testing projects are subject to No external oversight. Most Defense projects use internal Institutional Review Boards–which means most Universities and private companies/Defense contractors doing this Military research–using military weapons–are, like the Military, answerable to no-one outside the internal review board–which has a stake in letting the research happen at all or continue–yes, a monetary stake; Univs do love their funding, and Defense contractors, as we know, subsist on our taxes.
 
5) There are a multiplicity of ways in which people are “trafficked” today–for isn’t this trafficking?–into non-consenting human experimentation & research. Federal agencies and programs, NSA spies, FBI lists, Medical facilities with a MOU with Defense/Intel, all of whom will traffick: foster children, people on disability, the incarcerated, the pregnant, anyone with a chronic health condition who visits their doctor frequently, anyone who is a patient anytime at any medical facility; anyone who undergoes surgery; anyone who stays overnight in a hospital; and anyone who catches the attention of NSA sleuths using Artificial Intelligence filters on your email or actions online; anyone in your community who speaks out, stands out, signs petitions; anyone who becomes the victim of a petty vendetta, retaliation, grudge; anyone with moral fibre who openly opposes government or private oppression/wrongdoing.
 
5) The rash of creation of fusion centers and Joint Actions permits all sorts of abuses, through tying Law Enforcement to FBI/CIA/NSA Intel and DoD High Tech: such as,  permitting fraudulent NSA/FISA actions (such as waving around a fraudulently-obtained National Security Letter from a secret FISA court to gag all community members from divulging the fact of their being notified of a fraudulent “classified investigation” being conducted on a target subject, and to thereby also force them to participate in covert community harassment/”research”/”behavior modification” of target subjects; or permitting local law enforcement to use EMF weapons on activists and residents, and call it “court-ordered electronic surveillance,”  and use satellite and portable EMF weapons on subjects and call it “radiation surveillance.”
 
This is how people all over America are being “targeted” and being experimented on, this is how invisible radiation technologies are being used to attack people in secret.
 
Many many people in America know or must know about this secret human experimentation–student researchers, faculty researchers, review board members, University administrators, medical facility personnel, doctors, nurses, medical technicians, pharmacy staff, community members served NSLs, people in the pay of the military or law enforcement who wield the EMF neuroweapons, who incessantly point their little cell phone app at unconsenting subjects in public, transmitting GPS co-ordinates to an operation center, whether mobile or satellite, to initiate the neuroweapon hit, neighbors of subjects who permit their houses and driveways and windows to be used, by weapon-wielders, the so-called “gangstalkers” or Citizen Watch/Infragard vigilantes who stalk subjects and subject them to all sorts of rabid road actions and street theater–there is a Vast number of people in everyday society who are fully aware of this criminal covert human experimentation, being carried out in our midst.
 
Is every one of them without a conscience? Is every one of them unable to see that what they are party to is morally and absolutely wrong, that what they are condoning is the torture and death of innocents, that a government that can permit such experimentation on its own citizens–and call it classified–is criminally corrupt at core, and cannot be understood to be a people’s rightful government?
 
Who will speak out of what they know, what they are doing? Who will break out from under this “national security” spell and challenge this High Crime of experimenting openly on American citizens while denying it (as classified/secret/cannot be confirmed to exist or not exist) in daylight?
More and more of us need to delve, explore, and publish our findings on these subjects. More of us need to openly challenge the horrors of experimentation on anyone and everyone with these terrible weapons, which are tagged euphemistically by Defense as “non-lethal” and “crowd-control”–especially as currently used on citizens, on a 24/7 basis, constantly! they are deadly, damaging, pain-producing, and ultimately-lethal, for they promote a slow-kill, or steady-destruction. These weapons–which permit the remote biological manipulation of the bodies and  brains of human beings–are in our midst now, but as humans we need to take a stand–we do not have to use them, we can exercise our base common sense: all over the world, they need to be banned.
BOOK: Nanomaterials- Organic/inorganic hybrid self-assembling fiber
Never before in the history of mankind has there been a disease which produced colored fluorescent fibers. These can be made in the laboratory a number of different ways but synthetic molecules conjugated to living molecules produces this unique product in living biological specimens. This is called organic/inorganic chemistry.  If you use these words and do some searches you come up with a number of articles that show how round molecules self-assemble themselves into living chains of living fibers.
 

Organic-Inorganic Hybrid Nanomaterials

Susheel Kalia, ‎Yuvaraj Haldorai - 2014 - ‎Technology & Engineering
It is noteworthy that self-assembly of anisotropic nanostructures, such as ... Short hybrid fibers of the fluorescent poly (methylmethacrylate-co-vinylanthracene) ...
 
IMPLANTS: Capacitive Coupling Human Body Communications Based on Digital Transmission

Review of capacitive coupling human body communications based on digital transmission

As essential to use mobile devices such as smart-phones, smart-pads, and smart-watches used in daily life and growing need for sensor network systems for healthcare services, wireless body area networks (WBAN) have become increasingly important  [1] and [2]. Human body communications (HBC) is considered to be an effective method to realize WBANs to support low-power and low-complexity devices  [3]. HBC uses the human body as a transmission channel without wireless or wired connections  [4], [5] and [6]. Simple and intuitive touch allows for the transfer of data and the creation of wireless networks for WBAN devices  [3] and [7]. Previous research including up-to-date results on HBC, can be classified into three parts: channel modeling of the human body with a signal measurement method  [8], [9], [10], [11], [12], [13] and [14], modulation scheme  [3], [15], [16], [17], [18] and [19]and frame synchronization  [3], [17], [18] and [19] for achieving a desired data rate, and practical implementation of an HBC transceiver  [18], [20] and [21].
Human body channel models can be divided into signal transmission methods of capacitive coupling and galvanic coupling  [22]. In capacitive coupling, a signal is delivered by forming an electric field induced by the signal electrode  [11], and in galvanic coupling, a signal is controlled by an applied current flow considering the human body as a waveguide  [23]. This paper addresses only capacitive coupling techniques, which achieve better performance compared to that of galvanic coupling when frequencies higher than 60 kHz are considered for desired data rates supporting WBAN applications  [1] and [22]. The signal path of the human tissue is also interpreted as electric circuits in  [2] and [11] and electric field equations in  [13]. The channel model of IEEE standards 802.15.6 for WBANs describes the impulse response for HBC in terms of the size of the ground planes of the transmitter (Tx) and receiver (Rx) and the distance between the Tx and Rx  [8].
Article: This is the culprit.
This is the culprit.
LINK - https://api.soundcloud.com/tracks/278446319
 
Computer models create alternative realities for each person within a "mirror" of our entire world. Essentially, what we consider our "real world" is running as a duplicate reality within a sentient, artificial computer system. Each person, over 7 billion is reproduced as a "node", their names substituted with an avatar agent.
 
We've been played. Take a look. Oh, the horrid suffering they're causing, lives gone and their goal: to get us to kill ourselves. These are the real negative-gene carrying humans on this earth, all underground. An artificial sediment SIMULATION like a game of mind control communicating with nano and smart dust and morgellons
 
Another way of defining or describing a PSYOPS is, mind control; with the final goal being total control. This involves the employment of Artificial Intelligence (AI), along with both Game Theory and Signal Theory. In Game Theory, the AI knows of all possible positions a person will take and the resulting outcomes. In Signal Theory, Frequency Weapons are used for mass mind control, such as Scalar Weapons blanketing a continent, and Neuron-linguistic Programming (NLP) to map the mind and control it.
 
Qubits + PeV = Portal
New Name for LHC =  VHEeP    Very High Energy electron Proton
New model number for D-Wave's Adiabatic Quantum Computer = 4096
New name for Mandela Effect = Mandela Portals

New name for the Game: Monte Carlo
 
"Key" to the bottomless pit defined:

The "key" is the same as a key comprised of bits, required to break a coded message.  Cryptography. The "key" is the number of qubits necessary to decode the encrypted key, i.e., RSA encryption. The "key" is coded information.  Once the "key" unlocks the code, the information can be read. This information contains instructions on how to open the final portal.  To open the bottomless pit. Literally, the "key" is the model 4096 Adiabatic Quantum Computer from D-Wave. The model number is the number of qubits in the computer. This number coincides with the number of bits in the "key" needed to unlock the coded information to be transmitted through the portal. If one were to compare the developmental timelines since 2000 of both the Large Hadron Collider (LHC) and the model numbers of D-Wave's Adiabatic Quantum Computers (AQC). . . you would see they run on concurrent and parallel paths.


The AQC is connected to the LHC and is needed to open the portal, as well as maintaining its stability.   And, to receive digitized DNA and information from "the other side". Geordie Rose, since 2010 has made it public knowledge their AQC's functioned because they were actually, literally sending information (combinatoral equations/problems) into another dimension.  And, then receiving back answers/solutions from unknown sources.  But, the answers were correct.


These steps were proof-of-concept processes. They now know how many bits the "key" is comprised of. They now know how many qubits it takes to CREATE THE KEY. They have built the model 4096 AQC (SECRET). 4096 bits in the key. 4096 qubits in the AQC.  It is linked over to CERN.  The LHC and the AWAKE experiment are now combined. The Main Ring of the LHC is physically connected to the AWAKE linear accelerator, which is 1000 times more powerful than the LHC itself. These machines will hit 20 PeV. (Peta is Quadrillion) Right now, the LHC alone is running at 13 TeV  (Tera is Trillion) Last Oct. I said the LHC would hit 1.15 PeV.  Three weeks later, CERN admitted I was correct, citing a spike of 1.14 PeV. CERN is preparing to go to 20 PeV in conjunction with D-Wave's model 4096 AQC.

 
Mandela Portals
 
Meanwhile . . . the Mandela Effects continue to increase . . .
 
The following video is not specific to the Mandela Effect, it is however Geordie Rose, CTO of D-Wave presenting the technology of the Adiabatic Quantum Computer.   I cite various time markers in the video.

MANDELA EFFECT! Quantum Computing Artificial Intelligence Is Here!

https://www.youtube.com/watch?v=_ut7DN5N17E
HEALTH: Liquid Manna Rad D-Tox

Liquid Manna Rad D-Tox - $34.95

Scalar energy charged ORMES formula to support the removal of harmful internal radio contamination. For most people one bottle will be sufficient unless re-exposed to higher levels of contamination, such as that found when flying, or traveling to areas in proximity to nuclear contamination, such as in Japan, Hawaii, or near Chernobyl, Ukraine, etc.
ENVIRONMENT:  Massive Microwave Pulse Goes to Core of Earth to cause Earthquakes
Two Major Pipeline Spills Reported Same Week Trump Advances KXL, DAPL
http://www.ecowatch.com/pipeline-spills-dicaprio-2216397184.html
 
Two major pipeline spills were reported the same week that President Donald Trump signed orders to move the Keystone XL (KXL) and Dakota Access (DAPL) pipelines forward. The recent breaches highlight the dangers of unreliable fossil fuel infrastructure in North America.
The president signed executive orders on Tuesday. One a day later, about 138,600 gallons of a diesel mix spilled from a broken pipeline in Iowa.
The pipeline is owned by Oklahoma-based Magellan Midstream Partners, which recently reached an $18 million settlement with the U.S. Environmental Protection Agency over alleged violations of the Clean Water Act, involving three pipeline spills in Texas, Nebraska and Kansas.
 
On Monday, reports emerged of a Tundra Energy Marketing Ltd-owned pipeline that spilled 52,830 gallons of crude oil onto aboriginal land in Saskatchewan, Canada. The spill happened on reserve lands of the Ocean Man First Nation.
 
Trump promises that pipelines such as the Keystone XL and the Dakota Access will help increase domestic energy production and create jobs. Energy companies also say that pipelines are safer and more environmentally friendly to move fuel compared to rail or trucks.
 
According to a ProPublica report, America's 2.5 million miles pipelines "suffer hundreds of leaks and ruptures every year, costing lives and money," and these lines are only getting older. Not only that, the report notes that pipeline accidents have killed more than 500 people, injured more than 4,000 and cost nearly $7 billion in property damages since 1986.
 
Oil Pipeline Spills 53,000 Gallons on First Nations Land
By Waking Times Media Staff
Posted on January 25, 2017
A pipeline spill in the oil-rich province of Saskatchewan, Canada resulted in about 200,000 liters, or 52,834 gallons, of crude oil spilling into the North Saskatchewan River, cutting off drinking water supply for two cities.

 
This is the province’s largest pipeline breach since July’s disastrous 225,000 liter (59,438 gallon) Husky Energy Inc spill, in which some oil entered the North Saskatchewan River and cut off drinking water supply for two cities.
 
The latest spill happened on reserve lands of the Ocean Man First Nation. Ocean Man Chief Connie Big Eagle told Reuters that a local resident smelled the scent of oil for a week, located the spill and brought it to her attention on Friday.
While no homes were affected, the spill is about 400 meters (1,320 feet) from the local cemetery, Big Eagle said.
HEALTH: Fructose More Deadly Than Sugar
FRUCTOSE: More Deadly Than Sugar
 
The introduction of high-fructose corn syrup (HFCS) into the Western diet in 1975 has been a multi-billion dollar boon for the corn industry because it was cheap and readily available. The current annual consumption of sugar is 141 pounds per person, and 63 pounds of that is high-fructose corn syrup. Americans consume an average of 20 to 30 teaspoons (about ½ cup!) daily of sugar. The number one source of calories in America is soda, in the form of HFCS. High-fructose corn syrup is about 20% sweeter than table sugar. Any sweetener should only be used in moderation and as a treat!
 
Glucose is the form of energy you were designed to run on. Every cell in your body, every bacterium -- and in fact, every living thing on Earth – uses glucose for energy. Glucose also suppresses your appetite, unlike fructose, which stimulates your appetite, encourages overeating and the accumulation of excess body fat.
 
 
Every cell in your body, including your brain, utilizes glucose. Therefore, much of it is "burned up" immediately after you consume it. By contrast, Fructose is turned into free fatty acids (FFAs), VLDL (the damaging form of cholesterol), and triglycerides, which get stored as fat. Consuming fructose is essentially consuming fat! The metabolism of fructose by your liver creates a long list of waste products and toxins. The bottom line is: fructose leads to increased belly fat, insulin resistance, and metabolic syndrome, not to mention the long list of chronic diseases that directly result. Eating sugar may also accelerate the aging process itself.
 

If you want to use a sweetener occasionally, this is what Dr. Mercola recommends:
  1. Use the herb stevia.
  2. Use organic cane sugar in moderation.
  3. Use organic raw honey in moderation.
  4. Avoid ALL artificial sweeteners, which can damage your health even more quickly than fructose.
  5. Avoid agave syrup, since it is a highly processed sap that is almost all fructose. Your blood sugar will spike just as it would if you were consuming regular sugar or HFCS.
  6. Avoid so-called energy drinks and sports drinks because they are loaded with sugar, sodium, and chemical additives. Rehydrating with pure, fresh water is a better choice.
Liuda: After reading this information, start studying food labels at the supermarket and don’t even bring anything to do with fructose into your home. Eat healthy and nutritiously. The balance and harmony of every TIs health is not easy to maintain, under the best of circumstances.
MORGELLONS:  organic/inorganic hybrid self-assembling fiber
Never before in the history of mankind has there been a disease which produced colored fluorescent fibers. These can be made in the laboratory a number of different ways in a laboratory but synthetic molecules conjugated to living molecules produces this unique product in living biological specimens. This is called hybrid organic/inorganic chemistry.  If you use these words and do some searches you come up with a number of articles that show how round molecules self-assemble themselves into chains of living fibers which can be made to sense the environment around them by attaching sensing molecules.
 

Organic-Inorganic Hybrid Nanomaterials

Susheel Kalia, ‎Yuvaraj Haldorai - 2014 - ‎Technology & Engineering
It is noteworthy that self-assembly of anisotropic nanostructures, such as ... Short hybrid fibers of the fluorescent poly (methylmethacrylate-co-vinylanthracene) ...
 
Keep Your Spiritual Thoughts
Proverbs 19:1-3 (NASB)
 
Better is a poor man who walks in his integrity than he who is perverse in speech and is a fool. Also it is not good for a person to be
without knowledge, and he who hurries
his footsteps errs. The foolishness of man ruins his way, and his heart rages against the Lord
 
COMMENT:  Speak what is right and and take the time to think about what you do before you do it.  Speaking or acting too quickly can lead to problems that might otherwise have been avoided.
TARGETED INDIVIDUAL TALK SHOW TIMES
Please email Mail@CitizensAHT.org if you wish to add any call to this list. We want as many listings as possible to keep you in touch with the support you need.
 
 TALKSHOE:  744-7444

SUNDAY
 
 
     Neal for Citizens Against
     Harmful Technology
134999
8:30 p.m. Eastern
     Renata

 
114616
3 pm Eastern
MONDAY
 
 
     Derrick for PACTS
 
115863
 
     Mike
 
641.715.0632
code 116202
6 pm Eastern


TUESDAY
 
 
     Ella
 
141476
9 pm Eastern
WEDNESDAY
 
 
     Su Maya



 
 
 
 
 
 
1 712- 775- 7031
367 668 644#
 
People can call, sign in, or just listen to the show by radio streaming at:
https://www.freeconferencec

all.com/wall/367-668-644
 
THURSDAY
 
 
     Ella
141476
9 pm Eastern
     Mike Mason
641.715.0632 code 116202
6 pm Eastern
FRIDAY
 
 
     Linda


140091
 
SATURDAY

 
 
     Dr. Millicent Black
      Church Conference Call

140567


6 pm Eastern
     Ella - Activism call

141476
4 pm Pacific
     Derrick
 
115863
9 pm Eastern
 
 
Activism/Support Groups
Chicago, Illinois
The Chicago area Support Group – covering Illinois, Indiana, and Wisconsin will have their next meeting
Saturday, January 14, 2017
Time: 11:00 AM Central Time
Location: Hammond Public Library
564 State Street
Hammond, Indiana
Organizers are requesting an RSVP to Shavon at von.pray@gmail.com

or Candace at cam14395@aol.com
  
Washington, DC Activism Event
 Rally at the National mall during
President-elect Donald Trump's Inauguration
Friday, January 20, 2017

 11:00 AM to 3:00 PM Eastern Time
For more information, contact Spencer Carter at:
spencer.carter1966@gmail.com

 
Seattle, Washington
THE SEATTLE AREA SUPPORT GROUP will have its next meeting on
Sunday, January 22, 2017
Time: 1 - 3 PM Pacific Time
Location: Broadview Branch Library at:

12755 Greenwood Ave.
Seattle, Washington
For more information, you may contact
Laura Solway - 206-365-6139
Curtis Kimble – 817-901-8720
This event is not being sponsored by the Seattle Public Library.

 
Portland, Oregon
The Portland, Oregon Support Group Meeting that was scheduled for last Saturday Jan. 7, has been rescheduled due to inclement weather to: Saturday, February 4, 2017
3:30 to 5:30 PM Pacific Time
Hollywood District Public Library
4040 Northeast Tillamook
Portland, Oregon
Contact person;  Amy – 971-207-3401
 
Hi Friends,

The upcoming TI meeting PDX is soon approaching. I hope you are planning to attend this monthly meeting dedicated to the targeted people of the greater Portland, Oregon metro area. As always, this meeting is welcoming to the new people who attend. I do have some topics for discussion if there's time. I like to leave time for those new and old who want to use this forum for venting and releasing the pent up trauma that may be inside. This is a safe place to do so, as for a lot of us, those we know may be not be a good source to tell our stories. See you there!

Much love, the highest and most powerful of all energies,

Amy
 
TI'S IN CHINA
An Announcement To The Whole World By Chinese Victims Of Electronic And Psychotronic Weapons
SHIELDING:  Linqstat
Please email Neal to order. electricrose22@yahoo.com
 
If you have a tent, you can just tape some pieces of Linqstat together and drape them over the tent. You could make it the exact shape as the rain cover. You can ground it to an outlet, to a ground with a banana clip or attach a TENS electrode to it to create an energy field through the material. Using a tent structure that's already got places to attach the Linqstat make it a lot easier. You can even get a simple one and put it on your bed to drape the Lingstat over. Completely covering an already-made tent  like this one with Linqstat is pretty easy and you can just put the TENS pad on the outside of it and "light it up", keeping the frequencies on the outside. LINK TO GROUNDING CLIPS
 
This is a very high quality RF shielding material. It should be grounded so that any radio frequency will dead end at the ground. It doesn't out gas, does not break down & is completely nontoxic! Linqstat is a very stable carbon loaded product. It is the carbon which blocks microwaves.
 
ORDER YOUR LINQSTAT, email Neal at electricrose22@yahoo.com.
Make payment through PayPal or debit/credit cards at our donate button on our website, or by mail upon request. Be sure to state whether the payment is a donation, membership or Linqstat.
 
LINQSTAT (≤50,000 ohms/sq) Electrically Conductive Film.
Product Part Number:  LINQSTAT MVCF S-Series 
 
We have 3 packages available:
Package 1:  6' (ft) x 3' for $ 30.00 (To make an 8 layer hat ).
Package 2: 12' (ft) x 3' for $ 50.00 (To make an 8 layer hat & 2 layer vest)
Package 3:  24' (ft) x 3' for $ 80.00 (To make a hat, vest & over under blanket for where you sleep ).
(Shipping, tracking & insurance is included in the price).
Disclaimer
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. 

Citizens Against Harmful Technology Inc.  •  P. O. Box 000000  •  New Smyrna Beach, FL 32141

http://CitizensAHT.org

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Share on Facebook Bookmark and Share