To receive email from CitizensAHT.org, add mail@CitizensAHT.org to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Share on Facebook Share on Twitter More Share Options
Citizens Against Harmful Technology
Actively Participate In Educating the Public
CAHT Newsletter     February 5, 2017
 
CitizensAHT.org

IMPORTANT ANNOUNCEMENTS
This newsletter serves the entire TI community. You can support its publication by subscribing. We have reduced the yearly membership fee to $25.00 for 2017. Please join and support this group of individuals willing to give their time and resources on your behalf.

 
Thank you for your support.
CONFERENCE CALLS
TALKSHOE:  Sunday at 8:30 P.M. East Coast, 7:30 Central, 6:30 Mountain, 5:30 W Coast

(724) 444-7444, Call ID for CAHT: 134999 Pin 1#, Moderator: Neal

PO BOX:  FEDEX PO Box 328, 538 Canal Street, New Smyrna Beach, FL 32168

If you send a donation in the form of a check or money order, please send an email (mail@CitizensAHT.org) to announce your mailing so we can tell if any mail is missing. Or maybe put a tracking number on the envelope. DO NOT SEND CASH.

MEMBERSHIPS:  Membership is $25 per year. http://citizensaht.org/memberships
Membership DOES NOT include mailing of hard copies of the newsletter. Please arrange a payment for hard copies by emailing your request to mail@CitizensAHT.org.

DONATIONS: Donations can be in any amount and can be sent to the PO Box or through PayPal. 100% of your donations go to helping TI's.
 
 
FORUM: CitizensAHT.org
Please get some good discussion of helpful topics going on this forum. Everyone will appreciate your contribution and insights into this serious problem which is affecting the entire world.
BROCHURE: Free to Members and for Events!
This brochure explains directed energy assaults, implants, body sensor networks and phone stalking. Free to members and free for events. Free download on CitizensAHT.org
In This Issue
IMPORTANT ANNOUNCEMENTS
CONFERENCE CALLS
FORUM: CitizensAHT.org
BROCHURE: Free to Members and for Events!
ALL TI's DO THIS: CLEAN UP HOME AND BODY
PDF #5: $80B thug budget to oppress Targeted Individuals
TARGETED INDIVIDUAL TESTIMONY
ARTICLE: Merging Humans and Machines
VIDEO: Capturing People Behind a Wall
Book: Surveillance Society
ACTIVISM:  5G Transmitter approval in Senate now-Protest
ARTICLE: "Click Here to Kill Everyone"
TORTURE:  How to Track People Indoors
WEBSITE: SurveillanceIssues.com
ENVIRONMENT: Cost of Extreme Weather in Europe
MORGELLONS: 
Keep Your Spiritual Thoughts
Activism/Support Groups
SHIELDING:  Linqstat
TARGETED INDIVIDUAL TALK SHOW TIMES
Disclaimer
ALL TI's DO THIS: CLEAN UP HOME AND BODY

Skin & Pore Parasites - Delousing, Detoxing, & Sanitizing Hair & Skin Parasites I - Dr. Robert Cassar

PDF #5: $80B thug budget to oppress Targeted Individuals
Print each document, save it or have it available in some form for easy use in a notebook or folder.
TARGETED INDIVIDUAL TESTIMONY
Have you had experiences where things are moved around and the doors are locked but you don't see anyone in your home? Please share your story and pictures at mail@CitizensAHT.org.

 
TESTIMONY ONE: 
 
For several months now, I have slept in a grow tent one of our generous donors provided for experiments. It is lined with mylar and I have it electrified with a current plugged in to a surge protector on the floor. The first surge protector I had in the enclosure was sabotaged. I had my brand new Dell plugged into it and the battery to the computer was sabotaged. It had to be replace entirely. When I plugged in a flashlight to the surge protector, there was an explosion and a sound and the flashlight will no longer charge. So those three things had to be replaced which includes time and expense.
 

Things happen from time to time, quite often really and either injects me with something or harasses me in some way, moving things around.

 
On February 6, 2017, I woke up and left the bedroom and came back and noticed a big hole at the top of the zippered enclosure. 
 
I examined the hole and found the thread that holds the zipper o the bottom panel had been cut. I am very familiar with sewing so I know a seam has two threads, one on top and one on bottom. If a thread has worn out or been cut, there will be two threads that are no longer together. 
 
 found only one thread on one side. It was a black thread about 12 inches long.  It had been cut at both ends. If it had been worn, causing the seam to fail, only one end would have failed at the weak point and the other thread would have been on the other side of the seam. This thread was deliberately cut at both ends as you can see in the picture. This is absolute evidence that a real human being had been in my room and performed this sabotage of my enclosure.
 

I have wondered if, when things happen,
 
a real person has entered upon the premises and performed criminal acts upon my person or if I have been transported somewhere. From this evidence, it looks like a real human comes into my home, but the door is locked and either has something stacked in front of it or it has a "Screamer" that sounds an alarm if it is moved under it. In this instance, the "Screamer" was still under the door. It cannot be put in place from outside the door. Other technology seems to be at work here. Was teleportation used to place someone in my room?
 
These things have happened in the last month. Before the above instance, I did not know how this was being done.  Now I know, a real human is coming in my enclosure and performing criminal acts upon my person and property every couple of days. Since they don't come in the door, I can only assume they are being teleported into my room. This is meant to make you look insane, when in fact, the evidence shows a real person or persons are doing these things to psychologically harass you and infect and implant you.. Right Arm. I received an injection in my right arm.
 
2. I woke up and a blanket had been placed over me. I don't use this blanket, it is too hot. Thursday January 26, 2017.
 
3. My left sock had been removed and put at the end of the bed.
 
4. Both socks were pulled halfway down on both feet.
 
5. One pink sock was off and was outside the enclosure. February 2, 2017
 
 
 
 
6. Right Hip, 10 injections January 2017. I received about 20 injections total and a sore developed at each site. Multiple injections at right and left hips and buttocks. Each injection contains an implant which vibrates when pressed, like when you lay on it or sit on it. This really is torture.

 
This is right hip.                   This is on left hip.

 

 
 
 
 
 
 
 
 
 
 
 
ARTICLE: Merging Humans and Machines
This woman knows all about the torture program and how it operates, who operates it and the fact that it is being used on Americans. What is involved?  The internet, computer/phones and AI, Brain Radios and Satellite controlled implants.
 
The merging of humans and machines is happening now
By Arati Prabhakar, director of the US Defense Advanced Research Projects Agency

 
"My particular vantage point on the future comes from leading the Defense Advanced Research Projects Agency (DARPA), the US government agency whose mission is to create breakthrough technologies for national security. Over six decades, we've sparked technological revolutions that ultimately led to some of today's most advanced materials and chip technologies, wave after wave of artificial intelligence, and the internet.
 
Type in a new idea they have about the interactions among three proteins, based on a mix of clinical evidence, their deep scientific expertise, and good old human intuition. The system instantly considers the team's thinking and generates hundreds of new differential equations, enriching and improving its previous analytical model of the myriad activities inside drug-treated cells. And then it spits out new results. The distinction between us (humans) and them (the machines) will become almost imperceptible."
 
 
What DARPA has given us
The internet
 
Inspired by the vision of computer scientist JCR Licklider, DARPA in 1969 demonstrated the first computer-to-computer communication system: a four-node network. It was the first in a long series of advances that led to today's global internet Technology has long served as a window into our tangled inner nature. With every advance - from the earliest bone tools and stone hammers to today's jet engines and social media - our technologies have revealed and amplified our most creative and destructive sides.

For a long time, while technology was characterised primarily as "tools to help us do", the fear was that machines would turn ourselves into machines, like the blue-collar automatons in Charlie Chaplin's Modern Times. More recently have come "tools to help us think", and with them the opposite fear: that machines might soon grow smarter than us - or at least behave as though they are our boss.

Neither of these two fears has proven completely unfounded: witness, respectively, the daily hordes of zombie-like commuters staring at their phones, and today's debates about how and when to grant autonomy to driverless cars or military systems. But, although we're still grappling with these ideas, today, a third wave of technological innovation is starting, featuring machines that don't just help us do or think. They have the potential to help us be.

For some, this new symbiosis will feel like romance, and for others it will be a shotgun wedding. But either way it's worth understanding: how did we get here?

"A third wave of technological innovation is starting, featuring machines that don't just help us do or think - they have the potential to help us be"
 
All the way back in 1960, the visionary psychologist and computer pioneer JCR Licklider wrote with remarkable prescience of his hope "that, in not too many years, human brains and computing machines will be coupled together very tightly, and that the resulting partnership will think as no human brain has ever thought and process data in a way not approached by the information-handling machines we know today."

The first of these trends is a direct outgrowth of that information revolution: today's big-bang-like expansion of capabilities in data science and artificial intelligence is coming into confluence with an unprecedented ability to incorporate in these systems human insights, expertise, context and common sense.

 
We humans have been very good, it turns out, at creating hugely complex systems - consider the multibillion-node internet, chips with billions of transistors, aircraft that have millions of individual components - and at collecting data about complex naturally occurring systems, from microbial interactions to climate dynamics to global patterns of societal behaviour.
 
 
What DARPA has given us
Microsystems
 
From the micro-electromechanical chips that tell your phone when it has moved to the gallium arsenide circuits that transmit radio signals to cell towers, DARPA-initiated technologies have enabled the hand-held devices we so depend on today.
 
It wasn't that long ago when everything we knew about the brain was basically learned by doctors "one stroke at a time", as they correlated medical injuries with functional deficits. With an estimated 80 or 100 or 120 billion neurons in the human brain - no one really knows how many - and trillions of interconnections among them, there was little reason to believe we would be cracking deep neurological secrets any time soon.
 
Yet in just the past few years, neuroscientists armed with new, high-resolution neural recording and stimulating devices have begun to decode the electrochemical signals in the brain and, perhaps more astonishing, compose and deliver instructions that direct neurons to respond in precisely desired ways.
 
What DARPA has given us

Artificial intelligence
 
DARPA has been a force behind the core artificial intelligence and machine- learning technologies that are now powering a dizzying array of applications, including personal assistants such as Siri and Alexa, face recognition in photos, robotics and genomics
It's easy to picture how the expansion and convergence of new capabilities such as complex causal reasoning and neurotechnology are catalysing a bio-info-electro-mechanical symbiosis that changes what's possible in domains as diverse as health, entertainment, design, education, research, and national security. But what is most exciting about this new relationship is what it is already starting to do to us.
 
By surprising us with their increasingly rich perspectives, our machines are starting to trigger in us new ways of thinking and imagining - even new ways of dreaming. Imagine experiencing an entirely new palette of colours that never existed before, or adding a fourth physical dimension in space. Looking back, our current reality will feel like black and white.

ut with the ability not only to move a virtual hand but to feel what that digital image is "feeling", his world changed and he stepped on to an evolutionary path populated by a growing number of others who are creating digital extensions of themselves, in ways as small as Fitbits and as big as wiring their brains to computers.

 
Will this symbiotic transformation lead to problems? For sure. The meanings of individual identity, personal agency and authenticity will all require recalibration. We might even have to rethink objective reality. There will be abuses and mistakes.

VIDEO: Capturing People Behind a Wall

Get X-ray vision for $300
tps://www.techpowerup.com/forums/threads/get-x-ray-vision/

[If a TI had this system, you might catch intruders even if they were cloaked. Please let us know if anyone tries this.]
 
The device displays the signal on a screen, where the person's movements can be tracked in real time.

It depicts the target as a red dot moving around the room, occupying a chair and speeding up or slowing down.

The wireless signals used to track a person's motions also can measure the individual's breathing and heart rate — and potentially identify the person based on the shape of his or her skeleton, said researcher Zach Kabelac.

From Wireless Tech to Superpowers
https://www.youtube.com/watch?v=qggW-15i-hg

Book: Surveillance Society
SURVEILLANCE SOCIETY
by David Lyon
 
  • In what ways does contemporary surveillance reinforce social divisions?
  • How are police and consumer surveillance becoming more similar as they are automated?
  • Are we forced to choose between classical and poststructuralist approaches in explaining surveillance?
  • Why is surveillance both expanding globally and focusing more on the human body?
ACTIVISM:  5G Transmitter approval in Senate now-Protest
Below is an important message from Cece Doucette in Ashland, MA about the Mobile Now and Digit Acts currently in the U.S. Senate. Updated and accurate phone numbers and e-mail forms for all 100 US Senators are below- please take 10 minutes to call right now, if you haven't already.

It is urgent and imperative that all adults in your household make these calls today.

Thanks,
Josh
---------------------------------
Dear EMF Stakeholders,

The FCC and industry are fast-tracking legislation that would take authority away from our municipalities in deciding whether or not we want the infrastructure needed for 5G and the Internet of Things. They did this back in 1997 too when they circumvented safety testing on cell phone technology then got the Telecommunications Act passed. That left our local authorities powerless as the industry put cell towers near homes, schools, hospitals, churches and senior housing. Many have become very ill, with no recourse.

Now the FCC and industry are trying to push through two bills in D.C. that will put small but extremely hazardous cell antennas in our neighborhoods on utility poles right outside our homes, schools, offices, everywhere. The 5G signal will carry huge doses of data faster, but not very far so the industry wants to install millions of these small cell antennas to carry the data from pole to pole. 5G will also use 3G and 4G technology so existing towers won't come down; 5G will add to the electrosmog. These small cell antennas will pulse biologically hazardous microwave radiation at us 24/7 at close range.

The way the Telecom Act is written today, industry is supposed to submit an application to town officials to put in antennas, and these new bills are trying to override this control measure for local authorities. Why is the FCC and industry in such a rush? The U.S. National Toxicology Program is in the middle of reporting out findings from a $25M multi-year study that has already found this radiation causes DNA damage, brain and heart tumors. More findings will come out in 2017.

The industry leaders are not concerned with public health, they just want to be first to market. As soon as the NTP findings came out, they pushed to get approval to use the 5G spectrum. The Cellular Telephone Industry Association (CTIA-The Wireless Association) did its own big cancer study in the 1990s which showed the same findings, but they didn't inform the public. Instead, they crafted the Telecom Act and pushed cell phones and infrastructure on an unsuspecting public. Then they introduced wi-fi which exposes us even further indoors, and now they plan to roll out the Internet of Things and blanket our neighborhoods in radiation.

Please, don't take my word on all of this, when you have time I encourage you to investigate on your own (thank you, Katie Singer, author of Invisible Silent Spring, and others for this great resource on these two bills, and thank you world scientists for the EMF Scientists website which presents the facts on wireless radiation).

But for today, we need your voice (and every adult's in your house) in two ways:

1. Call your U.S. Senators' office with the following message; you can read it to the person who answers the phone, or leave it in voice mail. Phone numbers are given at the end of this email:

My name is ______ from (city/state) and I am calling to ask the Senator to Vote NO on MOBILE Now Act S.19 and DIGIT Act S.88 to stop 5G infrastructure and rollout of the Internet of Things. The National Toxicology Program has found the electromagnetic radiation used by wireless technology causes DNA damage, and brain and heart tumors. Non-industry funded studies all over the world report other short-and long-term biological effects, ranging from infertility, Alzheimer’s and autism to digital addiction, insomnia, headaches, skin rashes, learning disabilities, behavioral issues, depression, anxiety and more. Please VOTE NO on the MOBILE Now Act S.19 and DIGIT Act S.88. Please insist on public hearings, and send a clear message to industry that they need to work with non-industry funded scientists to develop biologically safe technology. Thank you.

2. Email your U.S. Senators with the following message; email links are given below:

Subject: Please Vote NO on MOBILE Now Act S.19 and DIGIT Act S.88
The National Toxicology Program has found the electromagnetic field (EMF) of radiation emitted by wireless technology causes DNA damage, and brain and heart tumors. Non-industry funded studies all over the world report other short-and long-term biological effects, ranging from infertility, Alzheimer’s and autism to digital addiction, insomnia, headaches, nausea, nose/ear bleeds, skin rashes, cognitive impairment, learning disabilities, behavioral issues, depression, anxiety and more. Children, fetuses, the elderly and those with known health compromises are especially vulnerable. See www.emfscientist.org.

If this subject is new to you, you will likely have questions as we have all rapidly adopted wireless technology into our lives. Please read this high-level three-page overview titled, "EMF Points of Confusion vs. Fact" at TinyURL.com/EMF-Facts.

The FCC and industry are trying to fast-track these bills which will take away local authority from communities to decide whether they want toxic 5G/Internet of Things infrastructure installed at the street-level on poles right outside homes, schools, and offices. Please insist on public hearings, and send a clear message to industry that they need to work with non-industry funded scientists to develop biologically safe technology. Retired Microsoft Canada President Frank Clegg assures us they can, if given a nudge. See https://vimeo.com/134411701.

Please VOTE NO on the MOBILE Now Act S.19 and DIGIT Act S.88. Thank you.

This is how the system works. They log your call, then print out your email for the legislator. Multiple calls and emails get their attention. If there is no activity, or very little, the industry wins.

Thank you for taking the time to read this email. I hope you will take another ten minutes to call and send an email to your legislators before your head hits the pillow tonight. The Senate will vote on this any day now, and most do not even know wireless is hazardous yet. They've only heard the benefits from persuasive industry lobbyists.

Thank you for the courage to use your voice in a way that might really make a difference in our world!

Warm regards,

Cece Doucette
508-881-3878
ARTICLE: "Click Here to Kill Everyone"
Click Here to Kill Everyone
By Bruce Schneier
January 27, 2017
 
All computers are hackable. Our only solution will be regulation, and that regulation will be foisted on us by a government desperate to “do something” in the face of disaster.  Regulation might be a dirty word in today’s political climate, but security is the exception to our small-government bias. We also need to reverse the trend to connect everything to the internet. And if we risk harm and even death, we need to think twice about what we connect and what we deliberately leave uncomputerized.
 
We wear computers: fitness trackers and computer-enabled medical devices — and, of course, we carry our smartphones everywhere. The internet is no longer a web that we connect to. Instead, it’s a computerized, networked, and interconnected world that we live in. This is the future, and what we’re calling the Internet of Things.
 
Broadly speaking, the Internet of Things has three parts. There are the sensors that collect data about us and our environment: smart thermostats, street and highway sensors, and those ubiquitous smartphones with their motion sensors and GPS location receivers. Then there are the “smarts” that figure out what the data means and what to do about it. This includes all the computer processors on these devices and — increasingly — in the cloud, as well as the memory that stores all of this information. And finally, there are the actuators that affect our environment. The point of a smart thermostat isn’t to record the temperature; it’s to control the furnace and the air conditioner. Driverless cars collect data about the road and the environment to steer themselves safely to their destinations.
You can think of the sensors as the eyes and ears of the internet. You can think of the actuators as the hands and feet of the internet. And you can think of the stuff in the middle as the brain. We are building an internet that senses, thinks, and acts.
This is the classic definition of a robot. We’re building a world-size robot, and we don’t even realize it.
 
Computer security is now everything security. There’s one critical difference, though: The threats have become greater. But threats come in many forms. Availability threats: computer viruses that delete our data, or ransomware that encrypts our data and demands payment for the unlock key. Integrity threats: hackers who can manipulate data entries can do things ranging from changing grades in a class to changing the amount of money in bank accounts.
 
Once computers start affecting the world in a direct and physical manner, there are real risks to life and property. There is a fundamental difference between crashing your computer and losing your spreadsheet data, and crashing your pacemaker and losing your life. This isn’t hyperbole; recently researchers found serious security vulnerabilities in St. Jude Medical’s implantable heart devices. Give the internet hands and feet, and it will have the ability to punch and kick.
 
At a recent hacker conference, a security researcher analyzed 30 home routers and was able to break into half of them. In August, two security researchers demonstrated a ransomware attack on a smart thermostat. Even worse, most of these devices don’t have any way to be patched. Companies like Microsoft and Apple continuously deliver security patches to your computers. [Hackers use updates to crash our computers.]
TORTURE:  How to Track People Indoors

MIT turns Wi-Fi Into Indoor GPS

Global Positioning System (GPS) satellite technology comes in handy for tracking cruise missiles, doing in-car navigation, and finding secluded restaurants. But step inside an airport, museum, or mall, and you’re often relegated to studying a paper map or asking for directions.
 
There are positioning systems designed for indoors, but they rely either on GPS-like radio or magnetic beacons, or on mapping the ever-shifting morass of Wi-Fi access points. Such methods have proved expensive to install and difficult to scale. What’s more, these indoor GPS systems are far from accurate enough to let you do cool things like a have a robot follow or avoid you.
 
Now researchers at MIT’s Computer Science and Artificial Intelligence lab (CSAIL) have developed a way for adjacent Wi-Fi devices, including smartphones, to locate each other within centimeters. The technology, called Chronos, relies on making the devices emulate multi-gigahertz wideband radios.
img
Image: MIT CSAIL
Chronos starts by having two Wi-Fi devices, a transmitter and receiver, hop simultaneously between all 35 frequency bands in the 2.4 gigahertz to 5.8 GHz Wi-Fi range. At each frequency, the rate at which signals accumulate phase naturally varies. The transmitter skips between bands every 2 to 3 microseconds, with the receiver comparing the phase differences at each step. Chronos can then calculate the time of flight of signals—and thus the distance—between the devices.
 
If one of the devices has multiple Wi-Fi antennas, as do most modern smartphones and laptops, Chronos can also calculate the angle between the two devices, and locate them in space. In experiments in everyday environments like an apartment or coffee shop, Chronos was able to localize devices to within 65 cm (or about 10 times the accuracy of GPS) using only off-the-shelf Wi-Fi cards.
 
The MIT researchers, PhD student Deepak Vasisht and Professor Dina Katabi, envisage Chronos being used to count people in smart homes for lighting control, to offer password-free Wi-Fi in cafés (while excluding freeloaders outside), and for robots to operate safely around humans.
 

Navisens Promises Indoor Navigation

 
How they do it?
How is it possible knowing that WiFi-based systems only detect location within two metres High resolution is achieved by measuring motion rather than radio frequency signals as wifi does, and is based on where and how the person moves through an environment over time. Navisens claims it can trace where a person is heading, the direction they are facing (to an accuracy of 1cm), track if a person turns a corner, moves slow or fast, walks upstairs or downstairs. Navisens also knows if you have stopped moving.
WEBSITE: SurveillanceIssues.com
This site contains information relating to advanced satellite surveillance and “harassment” technologies which are made available to covert government agencies and organised crime syndicates.
 
The secret technologies in question are covered by military/agency secrecy orders, mostly obtained under the US Inventions Secrecy Act, 1951. There are currently over 5,000 hidden devices, many computer – based and satellite facilitated, all with military / criminal applications. A list of known patents is available on the “Surveillance” page after the article on “Social Engineering”. Neurophones, brain scanners and brain wave vocabulary software, directed energy and E-M weapons are amongst these as are technologies to affect the weather, cause earthquakes etc etc. Undemocratically, and to protect powerful criminals from scrutiny,various other Secrecy, National Security and Defamation legislation has been enhanced in recent years.
 
The US Patriot Act, for example, protects governments and connected criminals from criticism and/or detection and prosecution. Under this act anyone whistleblowing or fighting the system on a major concern is arbitrarily deemed to be unpatriotic (when it’s the criminals they criticise who betray us). They can then be listed (by a senior politician or at the request, through them, of a connected criminal) as a security risk and harassed covertly; using secret technologies.
 
In fact a Dep’t Of Defense Directive, Directive 5240 1-R, 1994, gives open permission for those under surveillance to be used for remote experimentation. It’s no coincidence that this particularly undemocratic and evil move was followed in 1996 by a significant increase in the number of satellites deployed for the purpose of civilian surveillance and harassment. Over 20,000 satellites currently target and silence countless people worldwide (est. 500,000 plus) as a result of such bad laws.
 
The victims are not openly confronted as that would remove any feigned excuses and leave the perpetrators open to all manner of accusation. Instead the methods used are covert; employing high tech’ to remotely torment and deceive victims without leaving evidence. Often targets are tricked into believing they are having psychic, medical, psychiatric, religious or even alien experiences (which they are not). This leaves them discredited as they vainly seek help from ignorant or complicit authorities (police, MPs, doctors, media etc). This leaves them neutralised and possibly even silenced on the issue they originally raised.
ENVIRONMENT: Cost of Extreme Weather in Europe
Extreme climate events cost Europe €400 billion between 1980 and 2013, a report by the European Environment Agency has found. And the cost is rising. EurActiv’s partner Journal de l’Environnement reports.
 
“Climate change poses increasingly severe risks for ecosystems, human health and the economy in Europe,” the European Environment Agency’s (EEA) four-yearly report, published on Wednesday (25 January), stated.
 
Extreme climate events, such as flooding and heatwaves, are among the most obvious effects of climate change. According to the EEA, the combined cost of these episodes to 33 European countries reached €393 billion between 1980 and 2013.
MORGELLONS: 

This formal statement on Morgellons is accurate and substantiated science.
http://www.cdc-morgellons.com/
 
So the Morgellons fibers are caused by a gene mutation that is caused by a Bartonella infection. Everyone who has Lyme also has Bartonella and that was just proved by Dr. Klinghardts new testing method; http://www.chronicwellnesssummits.com/klinghardt-develops-more-accurate-lyme-disease-test/
 
Bartonella causes a cancer like condition called Infectious Angiogenisis and that causes Bacillary Angiomatosis isn the skin and that is what the fibers grow from. The Morgellons version of Bartonella is a special strain and When they started researching Bart 15 years ago there were only a few species , now there are about 40 that they know of and there are many strains for each species. When treating a Bartonella infection you have to treat the Bacterial infection but you also have to treat the Infectious Angiogenisis which is like treating cancer. Here is the protocol for that, This will take some time to remove form your body because it infects every part of your body including the bone marrow. Regular ABX don't work because ABX have molecules that are too big to get everywhere and ABX don't cure cancer. http://www.lyme-morgellons.com/nb-protocol.html
Keep Your Spiritual Thoughts
Psalm 49:13-15 (NIV)
 
This is the fate of those who trust in themselves, and of their followers, who approve their sayings. 
 
They are like sheep and are destined to die;
death will be their shepherd (but the upright
will prevail over them in the morning).
 
Their forms will decay in the grave, far from their princely mansions.  But God will redeem me from the realm of the dead; He will surely take me to Himself.
 
COMMENT:  Material things and those who
use them for evil will pass away.  But God
will redeem those who love Him. 
 
Activism/Support Groups
Chicago, Illinois
The Chicago area Support Group – covering Illinois, Indiana, and Wisconsin will have their next meeting
Saturday, January 14, 2017
Time: 11:00 AM Central Time
Location: Hammond Public Library
564 State Street
Hammond, Indiana
Organizers are requesting an RSVP to Shavon at von.pray@gmail.com

or Candace at cam14395@aol.com
  
Washington, DC Activism Event
 Rally at the National mall during
President-elect Donald Trump's Inauguration
Friday, January 20, 2017

 11:00 AM to 3:00 PM Eastern Time
For more information, contact Spencer Carter at:
spencer.carter1966@gmail.com

 
Seattle, Washington
THE SEATTLE AREA SUPPORT GROUP will have its next meeting on
Sunday, January 22, 2017
Time: 1 - 3 PM Pacific Time
Location: Broadview Branch Library at:

12755 Greenwood Ave.
Seattle, Washington
For more information, you may contact
Laura Solway - 206-365-6139
Curtis Kimble – 817-901-8720
This event is not being sponsored by the Seattle Public Library.

 
Portland, Oregon
The Portland, Oregon Support Group Meeting that was scheduled for last Saturday Jan. 7, has been rescheduled due to inclement weather to: Saturday, February 4, 2017
3:30 to 5:30 PM Pacific Time
Hollywood District Public Library
4040 Northeast Tillamook
Portland, Oregon
Contact person;  Amy – 971-207-3401
 
 
TI'S IN CHINA
An Announcement To The Whole World By Chinese Victims Of Electronic And Psychotronic Weapons
SHIELDING:  Linqstat
Please email Neal to order. electricrose22@yahoo.com
 
If you have a tent, you can just tape some pieces of Linqstat together and drape them over the tent. You could make it the exact shape as the rain cover. You can ground it to an outlet, to a ground with a banana clip or attach a TENS electrode to it to create an energy field through the material. Using a tent structure that's already got places to attach the Linqstat make it a lot easier. You can even get a simple one and put it on your bed to drape the Lingstat over. Completely covering an already-made tent  like this one with Linqstat is pretty easy and you can just put the TENS pad on the outside of it and "light it up", keeping the frequencies on the outside. LINK TO GROUNDING CLIPS
 
This is a very high quality RF shielding material. It should be grounded so that any radio frequency will dead end at the ground. It doesn't out gas, does not break down & is completely nontoxic! Linqstat is a very stable carbon loaded product. It is the carbon which blocks microwaves.
 
ORDER YOUR LINQSTAT, email Neal at electricrose22@yahoo.com.
Make payment through PayPal or debit/credit cards at our donate button on our website, or by mail upon request. Be sure to state whether the payment is a donation, membership or Linqstat.
 
LINQSTAT (≤50,000 ohms/sq) Electrically Conductive Film.
Product Part Number:  LINQSTAT MVCF S-Series 
 
We have 3 packages available:
Package 1:  6' (ft) x 3' for $ 30.00 (To make an 8 layer hat ).
Package 2: 12' (ft) x 3' for $ 50.00 (To make an 8 layer hat & 2 layer vest)
Package 3:  24' (ft) x 3' for $ 80.00 (To make a hat, vest & over under blanket for where you sleep ).
(Shipping, tracking & insurance is included in the price).
TARGETED INDIVIDUAL TALK SHOW TIMES
Please email Mail@CitizensAHT.org if you wish to add any call to this list. We want as many listings as possible to keep you in touch with the support you need.
 
 TALKSHOE:  744-7444

SUNDAY
 
 
     Neal for Citizens Against
     Harmful Technology
134999
8:30 p.m. Eastern
     Renata

 
114616
3 pm Eastern
MONDAY
 
 
     Derrick for PACTS
 
115863
 
     Mike
 
641.715.0632
code 116202
6 pm Eastern


TUESDAY
 
 
     Ella
 
141476
9 pm Eastern
WEDNESDAY
 
 
     Su Maya



 
 
 
 
 
 
1 712- 775- 7031
367 668 644#
 
People can call, sign in, or just listen to the show by radio streaming at:
https://www.freeconferencec

all.com/wall/367-668-644
 
THURSDAY
 
 
     Ella
141476
9 pm Eastern
     Mike Mason
641.715.0632 code 116202
6 pm Eastern
FRIDAY
 
 
     Linda


140091
 
SATURDAY

 
 
     Dr. Millicent Black
      Church Conference Call

140567


6 pm Eastern
     Ella - Activism call

141476
4 pm Pacific
     Derrick
 
115863
9 pm Eastern
 
 
Disclaimer
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. 

Citizens Against Harmful Technology Inc.  •  P. O. Box 000000  •  New Smyrna Beach, FL 32141

http://CitizensAHT.org

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Share on Facebook Bookmark and Share