To receive email from, add to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Citizens Against Harmful Technology
Share on Facebook Share on Twitter More Share Options
Citizens Against Harmful Technology Newsletter
Actively Participate In Educating the Public
October 15, 2017

MEMBERSHIP:  $25.00/yr

TALKSHOE:  Sunday at 8:30 P.M. E. Coast, 7:30 Central, 6:30 Mountain, 5:30 W. Coast
(724) 444-7444, Call ID for CAHT: 134999 Pin 1#, Moderator: Neal
On Sunday, October 22, 2017, Neal's call will feature a Targeted Individual who has been disabled and lives in a special enclosure due to electro-sensitivity. He knows how to collect information from your environment with meters. He will be explaining which meters to use. He has a lot of information to share. Please join us at 8:30 pm, EST.
Please send this newsletter to one other TI or person who might benefit from education on what's happening to people do to the misuse of technology by the New World Order.  Please help us get a wider circulation of this publication.  Do your part!
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email.
Please print a copy of this newsletter and any newsletters you wish to maintain.  Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.

This is an internet reference newsletter. A link to the original article is provided in the colored title line. We claim no authorship of these references, we only reference so you can consider the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
NEW CITIZENSAHT TI SHOP NOW OPEN-makes it easier to order! now has a store where you can purchase a Membership, Targeted Individual Handbooks, Brochures. All contributions go for support of the TI community, this newsletter, the website and research materials. Thank you for your support.
In This Issue
NEW CITIZENSAHT TI SHOP NOW OPEN-makes it easier to order!
TI TESTIMONIES:  Submit and share your stories for this column.
STALKING:  Light Cancelling Diodes
SHIELDING: Frequencies to use as shielding
SHIELDING:  Absorb heat from ultra/infra sound
BODY MONITORING:  Can you connect to a Wifi in your house? One of them may be being used to monitor you -- violating your privacy!
WEBSITE: like stalking to me!
SMART METER: forms to remove your meter!
SATELLITES/DRONES carrying MICS Comm: Speed of Light Strike
BODY AREA NETWORK:  Radio/Satellites
LAS VEGAS COVERUP:  Forensic acoustic analysis shows 2nd shooter
WEAPON:  Attacks Central Nervous System
ACTIVIST:  Mike Mason
ACTIVIST:  Dr. Millicent Black
Activism/Support Groups
SHIELDING:  Linqstat
TI TESTIMONIES:  Submit and share your stories for this column.
Please share your stories, it doesn't have to be your whole life story, just an incident. What are your torturers doing to you today? Have you been diminished in artificial ways with microwave technology?  Are you having problems with doctors?  Also, please send copies of your injuries, burns, etc. so we can publish.
We are being attacked from  all  sides. Stalking and Electronic harassment takes away our homes and lives, directed energy hurricanes is destroying entire islands, directed energy fires are destroying homes, lives and property in California. This is the testimony of an insurance man who was at Harvey and is looking at California noting that the fires that were set were not normal and couldn't have happened without human help.  The fires are burning individual homes and cars and they have melted like the cars we saw after 9-11 melted from DEW. There are no burn patterns, where fire burned from one area to another. The fire came from the sky!


NorCAL Torch Fires; How the Firestorms Were Created

TESTIMONY TWO:  These are drones over Monrovia, CA.

PLEASE ATTEND! Protest being planned for Washington D.C. On Tuesday, October 17, 2017
Please attend the protest being planned for Washington D.C. On Tuesday, October 17, 2017. Perhaps you can even visit your state’s Congressional offices afterward. It is so important that lawmakers hear your voices in support of repealing section 704 of the 1996 Telecom bill and giving the EPA the authority to set population-based biologically-protective safety limits. Be sure to prepare...
WHO Scientist " Cell Phone and Wireless Radiation is A Carcinogen"
5G Wireless Radiation Dangers
STALKING:  Light Cancelling Diodes

Dark Emitting Diodes used for Cloaking

Technology used for disappearance known as cloaking has been with us for some time. Tonight I go over some of these technologies which proves that infiltration without detection, abductions and even MILABS are completely possible and in use right now. The use of Dark Emitting Diodes is nothing new. However, now with Nanotechnology and other DARPA advancements, that thing you thought you saw in your bedroom may in fact be a human cloaked and not a spirit!
SHIELDING: Frequencies to use as shielding
Targeted Individual Dave Case has kindly prepared a disc of frequencies that are helping TI's. He is an electrical engineer and inventor who came up with these frequencies to help him overcome his own targeting.

Put the CD on or copy the files to your computer.  You need to make the recording continuously loop or copy the files enough times to make them play for long periods while you sleep.
These noises are pretty brutal so we put on some different kinds of music to see which ones helped with this problem. We found that flute music in the backgound provides some soothing music that makes it more palatable. Try playing this 6 hr recording at the same time:
Dave says after you listen continually for 4-5 days, you become accustomed to the sound and it becomes comforting.  Targeting is more about infrasound and ultrasound than we realize. The sounds played in your environment can mask your location and interfere with electronic communication.
Dave can provide testimony from many TI's who testify that it helps a lot. He also has invented a gadget that you put in the plug closest to your electrical box to stop dirty electricity in the whole house.

His phone number is 573-300-1579.

SHIELDING:  Absorb heat from ultra/infra sound
Walmart and Amazon has this mat. As you see, it absorbs heat and sound.
BODY MONITORING:  Can you connect to a Wifi in your house? One of them may be being used to monitor you -- violating your privacy!

Design Considerations for Indoor Wireless Transmission between a Body-Worn Physiological Monitoring Device and a Gateway in a Home Environment

Looks like stalking to me!

"You can now use the BlackBox Digital Witness App to report suspicious activity directly to local law enforcement.

NOTE: This is not a substitute for 911. If you see something urgent, CALL 911 first.

This new version will send suspicious activity directly to participating local law enforcement agencies and state primary fusion centers.
ATTENTION LAW ENFORCEMENT AGENCIES (National and International):  If you would like to receive alerts using the free portal, please send an agency email to  Our team will validate your agency contact and coordinate the subscription.  The basic portal is free. You can also call (703) 436-5885.
This feature was developed in coordination with the National Fusion Center Association via an introduction by The Department of Homeland Security. A portion of all our sales goes to the National Sheriffs’ Association and the National Neighborhood Watch."
  • Setup your Neighborhood Watch Now Portal. You can view monitor videos within your neighborhood as a Captain. [oh la la, you've a title now!]


    E-mail us at, and someone from our anti-terrorism team will contact you directly.
    E-mail must be from a Fusion Center or Anti-Terrorism Agency email address.  All e-mails will be verified before any information is shared.
    Outside countries, please send e-mails in English or Spanish, and provide a contact number to your main agency.  If translation services are needed, please email us and we will set up an online meeting with a translator.
    Due to the sensitivity of this service, all information must be verified completely before service is provided.
    App Allows Muskogee Residents To Send Video To 911, Police BlackBox
SMART METER: forms to remove your meter!

Smart Meter Data: Privacy and Cybersecurity – Congressional Research Report 2012

By Catherine J. Frompovich
In February of 2012, three attorneys with the Congressional Research Service (CRS) issued a lengthy report “Smart Meter Data: Privacy and Cybersecurity.” AMI Smart Meters, which are retrofitted in place of safe analog meters that have been in exemplary use for decades.  The new AMI SMs have one advantage over the safe analog meters, which probably appeals to the United Nations: AMI SMs spy on the occupants inside the homes to which AMI SMs are retrofitted.  Those personal rights violations are real and should be of valid concern to consumers who know their U.S. Constitutional and State Constitutional rights are being violated and abrogated.
Apparently, those same issues may have been on the minds of some members of Congress, therefore, the request for a Privacy and Cybersecurity Report.
In the Summary of that report, we find
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy’s Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. This Advanced Metering Infrastructure (AMI) promises to increase energy efficiency, bolster electric power grid reliability, and facilitate demand response, among other benefits. However, to fulfill these ends, smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. [CJF emphasis]
Rather nonchalantly, in this writer’s opinion, the Report’s authors concede:
Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters. It begins with an examination of the constitutional provisions in the Fourth Amendment that may apply to the data. As we progress into the 21st century, access to personal data, including information generated from smart meters, is a new frontier for police investigations. The Fourth Amendment generally requires police to have probable cause to search an area in which a person has a reasonable expectation of privacy. However, courts have used the third-party doctrine to deny protection to information a customer gives to a business as part of their commercial relationship. This rule is used by police to access bank records, telephone records, and traditional utility records. Nevertheless, there are several core differences between smart meters and the general third-party cases that may cause concerns about its application. These include concerns expressed by the courts and Congress about the ability of technology to potentially erode individuals’ privacy.
If smart meter data and transmissions fall outside of the protection of the Fourth Amendment, they may still be protected from unauthorized disclosure or access under the Stored Communications Act (SCA), the Computer Fraud and Abuse Act (CFAA), and the Electronic Communications Privacy Act (ECPA). These statutes, however, would appear to permit law enforcement to access smart meter data for investigative purposes under procedures provided in the SCA, ECPA, and the Foreign Intelligence Surveillance Act (FISA), subject to certain conditions. Additionally, an electric utility’s privacy and security practices with regard to consumer data may be subject to Section 5 of the Federal Trade Commission Act (FTC Act). The Federal Trade Commission (FTC) has recently focused its consumer protection enforcement on entities that violate their privacy policies or fail to protect data from unauthorized access. This authority could apply to electric utilities in possession of smart meter data, provided that the FTC has statutory jurisdiction over them. General federal privacy safeguards provided under the Federal Privacy Act of 1974 (FPA) protect smart meter data maintained by federal agencies, including data held by federally owned electric utilities. [CJF emphasis]
How come state public utility commissions, their kangaroo courts and utility companies’ attorneys aren’t held accountable to the legitimate seriousness of the above constitutional issues, let alone the escalating adverse health effects from AMI Smart Meter radiofrequencies non-thermal radiation waves that now scientifically have been proven to break DNA bonds?
On page 2 of that Report, the CRS lawyers say,
General federal privacy safeguards provided under the Federal Privacy Act of 1974 (FPA) protect smart meter data maintained by federal agencies, including data held by federally owned electric utilities. Section 5 of the Federal Trade Commission Act (FTC Act) allows the Federal Trade Commission (FTC) to bring enforcement proceedings against electric utilities that violate their privacy policies or fail to protect meter data from unauthorized access, provided that the FTC has statutory jurisdiction over the utilities.
It is unclear how Fourth Amendment protection from unreasonable search and seizures would apply to smart meter data, due to the lack of cases on this issue. However, depending upon the manner in which smart meter services are presented to consumers, smart meter data may be protected from unauthorized disclosure or unauthorized access under the Stored Communications Act (SCA), the Computer Fraud and Abuse Act (CFAA), and the Electronic Communications Privacy Act (ECPA). If smart meter data is protected by these statutes, law enforcement would still appear to have the ability to access it for investigative purposes under procedures provided in the SCA, ECPA, and the Foreign Intelligence Surveillance Act (FISA). [CJF emphasis]
Page 3 addresses Smart Meter Data: Privacy and Security Concerns
Residential smart meters present privacy and cybersecurity issues 19 that are likely to evolve with the technology.20 In 2010, the National Institute of Standards and Technology (NIST) published a report identifying some of these issues, which fall into two main categories: (1) privacy concerns that smart meters will reveal the activities of people inside of a home by measuring their electricity usage frequently over time;21and (2) fears that inadequate cybersecurity measures surrounding the digital transmission of smart meter data will expose it to misuse by authorized and unauthorized users of the data. [CJF emphasis]
While addressing specific details, the Report claims
Smart meters offer a significantly more detailed illustration of a consumer’s energy usage than regular meters. Traditional meters display data on a consumer’s total electricity usage and are typically read manually once per month.23
In contrast, smart meters can provide near real-time usage data by measuring usage electronically at a much greater frequency, such as once every 15 minutes.24
Current smart meter technology allows utilities to measure usage as frequently as once every minute.25
By examining smart meter data, it is possible to identify which appliances a consumer is using and at what times of the day, because each type of appliance generates a unique electric load “signature.26  [which will tie into the Internet of Things.]
NIST wrote in 2010 that ““research shows that analyzing 15-minute interval aggregate household energy consumption data can by itself pinpoint the use of most major home appliances.”” 27
A report for the Colorado Public Utilities Commission discussed an Italian study that used “artificial neural networks” to identify individual “heavy-load appliance uses” with 90% accuracy using 15-minute interval data from a smart meter.28
Similarly, software-based algorithms would likely allow a person to extract the unique signatures of individual appliances from meter data that has been collected less frequently and is therefore less detailed.29   [One algorithm program is “ONZO” (2).]
By combining appliance usage patterns, an observer could discern the behavior of occupants in a home over a period of time.30 For example, the data could show whether a residence is occupied, how many people live in it, and whether it is “occupied by more people than usual.”31
According to the Department of Energy, smart meters may be able to reveal occupants’ “daily schedules (including times when they are at or away from home or asleep), whether their homes are equipped with alarm systems, whether they own expensive electronic equipment such as plasma TVs, and whether they use certain types of medical equipment.”32
Figure 1, which appears in NIST’s report on smart grid cybersecurity, shows how smart meter data could be used to decipher the activities of a home’s occupants by matching data on their electricity usage with known appliance load signatures. [CJF emphasis]
Here is the part about AMI SMs that really needs to be understood and factored in to the privacy and security paradigm the microwave industry, utility companies and even state public utility commissions, which should know better, are not paying attention to nor dealing with: Potential for Theft or Breach of Data, like we had with the Equifax data breach affecting about half of the country’s consumers.
Increased Potential for Theft or Breach of Data
Smart grid technology relies heavily on two-way communication to increase energy efficiency and reliability, including communication between smart meters and the utility (or other entity) that stores data for the grid.46 Many different technologies will transmit data to the grid, including ““traditional twisted-copper phone lines, cable lines, fiber optic cable, cellular, satellite, microwave, WiMAX, power line carrier, and broadband over power line.””47 Of these communications platforms, wireless technologies are likely to play a ““prominent role”” because they present fewer safety concerns and cost less to implement than wireline technologies.48 According to the Department of Energy, a typical utility network has four “tiers”” that collect and transmit data from the consumer to the utility.49 These include “(1) the core backbone—the primary path to the utility data center; (2) backhaul distribution—the aggregation point for neighborhood data; (3) the access point—typically the smart meter; and, (4) the HAN—the home network.”50 Energy usage data moves from the smart meter,51 and then to an “aggregation point” outside of the residence such as “a substation, a utility pole-mounted device, or a communications tower.””52  [CJF emphasis]
Two U.S. Supreme Court decisions, Kyllo v United States [1] and United States v Karo, have defended “the home as a sacred site at the core of the Fourth Amendment.”
Kyllo and Karo demonstrate that the Supreme Court “has defended the home as a sacred site at the ‘core of the Fourth Amendment.’””169 Although neither the Supreme Court nor any lower federal court has ruled on the use of smart meters, a few propositions can be deduced from Kyllo and Karo bearing on this question. Because smart meters allow law enforcement to access information regarding intimate details occurring inside the home, a highly invasive investigation that could not otherwise be performed without intrusion into the home, a court may require a warrant to access this data. In Kyllo, the police merely obtained the relative temperatures of a house,170 and in Karo the police only generally located the beeper in the house.171 Although this information was limited, the Court nonetheless prohibited such investigatory techniques. Smart meters have the potential to produce significantly more information than that derived in Kyllo and Karo, including what individual appliances we are using; whether our house is empty or occupied; and when we take our daily shower or bath.172 Further, a look at Figure 1, supra, makes it clear that this level of information is much more intimate than prior technologies used by law enforcement. This depth of intrusion suggests that customers may have a reasonable expectation of privacy in smart meter data. [CJF emphasis]
The CRS lawyers thought there is/was Statutory Protection of Smart Meter Data!
Question: Which law school courses did they take that utility company lawyers and public utility commissions judges somehow missed during law school?
This section discusses federal statutory protections that may be applicable to the contents of communications sent by a smart meter, independent of the Fourth Amendment, while they are either stored within the smart meter prior to transmission, during transmission, or after they have been delivered to the utility. Three federal laws, the Electronic Communications Privacy Act (ECPA),199 the Stored Communications Act (SCA),200 and the Computer Fraud and Abuse Act (CFAA)201 may be applicable to these situations and are discussed in more detail below. [CJF emphasis]
How come public utility commission administrative law judges don’t recognize those federal laws, enforce them from the bench and in their decisions by automatically ruling in favor of consumers who reject AMI SMs?  Good question?
Since AMI SMs basically are sophisticated computers that will have to be replaced every five to six years with updated meters, the Computer Fraud and Abuse Act may be applied to AMI SMs privacy issues:
The Computer Fraud and Abuse Act (CFAA)
The Computer Fraud and Abuse Act (CFAA) prohibits intentionally accessing and obtaining information from a computer used in or affecting interstate commerce, without authorization or in excess of a granted authorization.246 The definition of a computer for purposes of the CFAA is “an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device” excluding “an automated typewriter or typesetter, a portable hand held calculator, or other similar device….””247
The servers on a utility’s network would likely fall squarely within the definition of a computer under the CFAA. Similarly, smart meters themselves also appear to meet the definition of a computer, insofar as they store customers’ energy usage data and also perform logical operations by routing transmissions across the utility’s network. Additionally, in light of the significant role that energy utilities play in the modern economy, the smart meter network would also likely be considered to have an effect on interstate commerce, even if they operate entirely within one state. Therefore, intentionally gaining access to the utility’s servers or smart meters to obtain customer data would likely constitute a violation of the CFAA if done without the utility’s authorization or in excess of an authorization granted by the utility. [CJF emphasis]
Here’s a nice part about the CFAA: the fines, which should be incentive enough for everyone to file complaints against utility companies with their state Attorney General or state public utility commission:
The criminal penalties for violating the unauthorized access provisions of the CFAA have a three tier sentencing structure. Simple violations are punished as misdemeanors, imprisonment for not more than one year and/or a fine of not more than $100,000 ($200,000 for organizations).248
Another law that comes into play is Section 5 of the Federal Trade Commission Act.
Section 5 of the FTC Act prohibits “unfair or deceptive acts or practices in or affecting commerce”251 and gives the Federal Trade Commission (FTC) jurisdiction to bring enforcement actions against “persons, partnerships, or corporations” that engage in these practices.252 In the past, the FTC has used its authority under Section 5 to take action against businesses that violate their own privacy policies or that fail to adequately safeguard a consumer’s personal information.253 Although there do not appear to be any cases in which the FTC has taken action against an electric utility for failing to protect consumer smart meter data, the Commission would have authority to enforce Section 5 against a utility that fell within its statutory jurisdiction.
On page 40 of the Report, the lawyers mention another issue that can be relevant:
“Unfair” Failure to Secure Consumer Data
Failure to Protect Against Common Technology Threats or Unauthorized Access
The FTC may consider it an “unfair” practice when an electric utility fails to safeguard smart meter data from well-known technology threats as the data travels across the utility’s communications networks. [CJF emphasis]
Furthermore and even more importantly, all parties involved in the AMI SM legal debacles must realize what the CRS lawyers have to say about AMI SM data protection:
Smart Meter Data as a Protected “Record”
The Privacy Act protects the type of electricity usage data gathered by smart meters, provided that the data pertains to U.S. citizens or permanent residents, is personally identifiable, and is retrievable by the individual’s name or another personal identifier. The Privacy Act “governs the collection, use, and dissemination of a ‘record’ about an ‘individual’ maintained by federal agencies in a ‘system of records.’””368 Under the statute, a “record” is “any item, collection, or grouping of information about an individual that is maintained by an agency … that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph.””369
An “individual” is defined as “a citizen of the United States or an alien lawfully admitted for permanent residence.””370 A “system of records” is “a group of any records under the control of any agency from which information is retrieved by the name of the individual” or other personal identifier “assigned to the individual.”371
Smart meter data held by an agency certainly fits within the broad definition of a “record” because it is a grouping of information about an individual, namely, data on that individual’s electricity usage. The data is typically stored along with a consumer’s account information, which usually includes a consumer’s name, social security number, or other “identifying particular.”372 Thus, smart meter data would constitute a protected “record” under the Privacy Act, assuming that it pertains to a citizen of the United States or lawful permanent resident and is retrievable by a personal identifier such as a consumer’s name or account number. [CJF emphasis]
All the above only confirms why The Energy Policy Act of 2005 (Public Law 109-58) Section 1252 Smart Metering does not mandate or make AMI Smart Meters mandatory.  That would be unconstitutional, yet public utility commissions don’t respect the foremost law of the land, the U.S. Constitution.
Apparently, there is a copy of a Member of Congress letter circulating on the Internet wherein that Congressperson says “As you may know, provisions within the 2005 Energy Policy Act allow for consumers to opt out of smart meter programs that are run at the state level.”
SATELLITES/DRONES carrying MICS Comm: Speed of Light Strike

Medical Device Radiocommunications Service

From Wikipedia, the free encyclopedia
The Medical Device Radiocommunications Service (MedRadio) is a specification and communication spectrum created for and set aside by the U.S. Federal Communications Commission (FCC) for the communication needs of diagnostic and therapeutic medical implants and body-worn medical devices. Devices operating on MedRadio include cardiac pacemakers, defibrillators, neuromuscular stimulators, and drug delivery systems.[1][2] As of February 2016, communications spectrum for these and other similar devices is set aside at various points in the 400 MHz frequency band, as well as the 2360-2400 MHz band, though specifically for medical body area network (MBAN) devices. The specification supersedes and incorporates a previous specification called the Medical Implant Communication Service (MICS).[1]
The specification and nearly identical spectrum have also been created by the European Telecommunications Standards Institute (ETSI), with the specification largely referred to as MICS/MEDS (Medical Data Service) in Europe and other parts of the world.[3][4]




The FCC created the Medical Implant Communication Service (MICS) in 1999 "in response to a petition for rule making by [Medtronic, Inc.] to permit use of a mobile radio device, implanted in a patient, for transmitting data in support of the diagnostic and/or therapeutic functions associated with an implanted medical device."[5][6] This set aside the 402–405 MHz band and designated a low maximum transmit power, EIRP=25 microwatt, in order to reduce the risk of interfering with other users of the same band. Ten channels of 300 kHz each were assigned to the bandwidth. MICS provided additional flexibility to medical device developers compared to previously used inductive technologies, which required the external transceiver to touch the skin of the patient.[5][6][7] MICS was later adopted by the ETSI in 2002.[8]:652
In 2006, the FCC reevaluated the spectrum requirements at the prompting of Medtronic, which sought to expand the spectrum "to support advances in medical sensor technology and the expected proliferation of such devices, especially those used for lower-cost medical monitoring and non-emergency reporting applications."[9] A similar process was initiated by the ETSI in Europe in July 2004, with both the FCC and ETSI considering the 401–402 and 405–406 MHz ranges. The ETSI formalized the proposal into a standard called MEDS (with the core MICS bands remaining under that name and the new "wing" bands being referred to as MEDS) in December 2007,[3] while the FCC added the same additional spectrum to MICS and dubbed the expanded plan the Medical Device Radiocommunications Service or MedRadio in May 2009.[1][10][11] The FCC expanded MedRadio's spectrum again in November 2011, adding 24 megahertz in the 413-419 MHz, 426-432 MHz, 438-444 MHz, and 451-457 MHz ranges as part of an "effort to recognize and facilitate the significant advances in wireless medical technologies that are revolutionizing treatment for a wide variety of medical conditions."[1][12]
The FCC allocated additional spectrum (2360-2400 MHz) specifically for MBAN devices in May 2012, effective on October 10, citing "significant public interest benefits associated with the development and deployment" of MBAN devices.[1][13] Additional modifications to the MBAN rules were released in August 2014, including the "narrowing [of] the definition of health care facilities that may use MBAN devices in the 2360-2390 MHz band" and relaxing MBAN network topology restrictions among others.[14][15]

Operational parameters

In the United States, the FCC states that:[1]
  • MedRadio devices can only be operated by an authorized health care providers such as a physician or legally authorized entity able "to provide health care services using medical implant devices";
  • MedRadio device manufacturers and representatives can only operate the device "for the purpose of demonstrating, installing and maintaining the equipment" for authorized health care providers; and
  • MedRadio devices are only "authorized on a secondary status" and must accept any interference created by devices of primary status.
Operational parameters in other parts of the world may vary slightly based on local law. In Canada, for example, devices that fall under the MEDS standard also fall under secondary status, but they are classified nationally as Category I equipment that require a technical acceptance certificate (TAC) or equally recognized certificate before they can be used.[16]

See also


 "Medical Device Radiocommunications Service (MedRadio)". Federal Communications Commission. Retrieved 24 February 2016.
"RSS-243 — Medical Devices Operating in the 401–406 MHz Frequency Band". Industry Canada, Government of Canada. February 2010. Retrieved 24 February
BODY AREA NETWORK:  Radio/Satellites

13cm Band Rules Expanded to Allow MedRadio Adjacent to Satellites

The ARRL is reporting in a First Report and Order and a Further Notice of Proposed Rulemaking (ET 08-59) released on May 24, the FCC decided to expand the Part 95 Personal Radio Service rules to allow medical devices to operate on a secondary basis in the 2360-2400 MHz band. International amateur satellite operations are allocated between 2400-2450 MHz, adjacent to the new devices.
The new allocation is  Medical Body Area Networks (MBAN) which provide a way for health care facilities to monitor their patients via wireless networks. Because use of these frequencies will be on a secondary basis, MBAN stations will not be allowed to cause interference to, and must accept interference from, primary services, including US radio amateurs who operate on a terrestrial primary basis in the 2390-2395 MHz and 2395-2400 MHz bands.
The ARRL has posted their full analysis and report at: (

FCC Expands Part 95 MedRadio Rules to Allow Devices in 2360-2400 MHz Band
LAS VEGAS COVERUP:  Forensic acoustic analysis shows 2nd shooter

Forensic acoustic analysis confirms existence (and range) of second Las Vegas shooter

Monday, October 09, 2017 by: Mike Adams
Las Vegas / Mandalay Bay bombshell: Watch the presentation below for the full, astonishing details of how a forensic acoustic analysis proves the existence of a second shooter at roughly 250 – 270 yards from where mass shooting victims were filming the tragedy as it unfolded.
In essence, because of the differences in the speed of sound vs. the speed of the bullets from a known cartridge (.223 Remington, in this case), the time lag between the last bullet hitting the pavement and the last audible report of the rifle muzzle can be used to very accurately calculate the range of the shooter (relative to the position of the person recording the video).
More importantly, when the audio from the Las Vegas shooting is analyzed, it reveals TWO shooters operating at the same time, not just one shooter. Shooter #1 is operating at 425 – 475 yards, which is consistent with the Mandalay Bay hotel, but shooter #2 is operating at approximately 250 – 270 yards.
This fact is encoded in the audio of numerous videos posted on YouTube. This is all explained in the video below, with detailed whiteboard calculations and diagrams:

WEAPON:  Attacks Central Nervous System

Putin targets foes with 'zombie' gun which attack victims' central nervous system

  • Could be used against Russia's enemies and perhaps its own dissidents
  • ‘The development  of weaponry based on new physics principles – direct-energy weapons, geophysical weapons, wave-energy weapons, genetic weapons, psychotronic weapons, and so on – is part  of the state arms procurement program for 2011-2020.’
 31 March 2012
Mind-bending ‘psychotronic’ guns that can effectively turn people into zombies have been given the go-ahead by Russian president Vladimir Putin. The futuristic weapons – which will attack the central nervous system of their victims – are being developed by the country’s scientists.
They could be used against Russia’s enemies and, perhaps, its own dissidents by the end of the decade.
Psalm 27:7-10 (NIV)
Hear my voice when I call, LORD;
be merciful to me and answer me.
My heart says of You, "Seek His face!"
Your face, LORD, I will seek.
Do not hide Your face from me, 
do not turn Your servant away in anger;
You have been my helper.
Do not reject me or forsake me, 
God my Savior.
Though my father and mother forsake me,
the LORD will receive me.
COMMENT:  David says above that even
if his father and mother forsake him, God
never will.  What a wonderful, encouraging
thought and such an important thing to
remember,  No matter what we go through,
God loves us and He is always with us.  
That doesn't mean that we will never go 
through hard times, but it does mean that 
we will never go through hard times alone.
ACTIVIST:  Mike Mason
Freedom for Targeted Individuals International Call:
Every Saturday we invite you to join us for
Freedom for Targeted Individuals International Podcast
* To call in Internationally, use  your country's international call in number first (link), after the automated prompt, you enter 541.275.1131#
Starting at 3 pm EST/ 12 pm PST
(no pins required)
International Dial -in Numbers
To join online
Ella Free's Podcast
Tuesdays & Thursdays
Beginning at 9 pm EST/ 6 pm PST, you can join us live by calling into 724.444,7444, enter ID 141476#, then 1#
We want every targeted individual to participate in the Bill Binney and Kirk Wiebe Global TI Survey.
To get involved, please view the short video link below.

To get a better understanding who these noble men are and more details on the survey, please listen to the link below. 

You can also email
with your name, address. country and phone number in order to get the process going
ACTIVIST:  Dr. Millicent Black

Moderator:  Neal
Citizens Against Harmful Technology
Time:  8:30 p.m. Eastern
Talkshoe:  724-444-7444,  Pin #134999
Moderator:  Renata
Time:  3 p.m. Eastern
Talkshoe:  724-444-7444, Pin #114616

Moderator:  Mike Mason
Time:  6:00 pm Eastern

ID 116202#
Moderator:  Ella
Time:  9:00 p.m. Eastern
Talkshoe:  724-444-7444, Pin# 141476
After Ella's Podcast:
Vulcan Wolverine
Talkshoe:  724-444-7444, 142394#
Moderator:  Kyle
Time:  After Ella’s call
Talkshoe:  724-444-7444, Pin #142394
Moderator:  Derrick
Time:  9:00 p.m. Eastern
Free Conference:
319-527-2701, Code 248671
Moderator:  Mike Mason
Time:  6:00 p.m. Eastern
Free Conference:  641-715-0632,
Code 116202
Moderator:  Frank Allen
Time:  6:00 pm. Eastern
Moderator:  Linda
John W:  92703
Time: 9:00 pm Eastern

On Reverse Engineering Mind
Control Technologies
Talkshoe:  724-444-7444, 140091#
After Linda's Podcast
Moderator:  Ken
Talkshoe:  724-444-7444, 142298#
Moderator:  Beth
Moderator:  Loren W.
Time:  9:00 p.m.
Talkshoe:  724-444-7444, 798056#
712-432 3900
Moderator:  Terry
Time:  3:00 pm PST/6 pm EST to
6:00 pm PST/9:00 EST
Bring Awareness about Gangstalking
Talkshoe:  (724)-444-7444    Call ID: 143944
Moderator:  Ella
Time:  9:00 Eastern
Talkshoe:  724-444-7444, 141476
Moderator:  Kyle (Vulcan Wolverine)
Time:  After Ella’s call
Talkshoe:  724-444-7444, 142394
Moderator: Frank Allen

Targeted Individual Massachusetts
Time: 9:00 pm Eastern
Call-in Number: 646-749-3112
Access Code: 450-414-301
Join by Computer:
Moderator:  Julia
Engage in Prayer
Time:  9 pm Eastern/ 8 pm Central/
7 pm Mountain/ 6 pm Pacific
Call-in number: (515) 739-1405

International Dial-in Numbers:                   

Call ID: 141476
Access Code: 381878
Moderator:  Terry
Time:  12:00 am Eastern
Talkshoe:  724-444-7444, 143944
Moderator:  Dr. Millicent Black
Church Conference Call
Time:  6:00 pm Eastern
Talkshoe:  140567
Moderator:  Frank Allen
Phone:  646-749-3112
450-414 3112#
Moderator:  Ella
Freedom for Targeted Individuals
International Activism
Time:  7:00 pm Eastern
Free Conference:  541-275-1131
Moderator:  Lauron
8:00 pm. Eastern
Talkshoe:  142124
Moderator:  Scott Snitzer
Time:  5:00 pm Eastern
Snitzer's TI Contact Call
Talkshoe:  724-444-7444, 138602
Moderator:  Derrick
Time:  9:00 pm Eastern
Phone:  319-527-2701
ID:  248671#
Activism/Support Groups
Denver, Colorado
Area Support Group
Contact:  Xontu Garcia
Atlanta, Georgia
Support Group Meeting

Contact:  Carol Dimas
Phone:  470-312-6578
Chicago, Illinois
The Chicago area Support Group – Illinois, Indiana, Wisconsin
Location: Hammond Public Library
564 State Street
Hammond, Indiana
  Contact Shavon at

or Candace at
New York City Support Group
Contact:  Angel Acevedo
Phone: 646-806-8654
Houston, Texas
  For more information, you may contact
  Tereza Dutta -

Seattle, Washington
Location: Broadview Branch Library at:

12755 Greenwood Ave. N.
Seattle, Washington 98133-7901

For more information, you may contact
Laura Solway - 206-365-6139
Curtis Kimble – 817-901-8720

Portland, Oregon
Saturday, November 11, 2017

3:30-5:30 PM
Hollywood District Public Library
4040 Northeast Tillamook
Portland, Oregon
Contact person;  Amy – 971-207-3401

South Carolina
  For more information, you may contact
  Gail -

An Announcement To The Whole World By Chinese Victims
Of Electronic And Psychotronic Weapons

SHIELDING:  Linqstat
A Linqstat order is here. If you are interested, please email Neal to order.
If you have a tent, you can just tape some pieces of Linqstat together and drape them over the tent. You could make it the exact shape as the rain cover. You can ground it to an outlet, to a ground with a banana clip or attach a TENS electrode to it to create an energy field through the material. Using a tent structure that's already got places to attach the Linqstat make it a lot easier. You can even get a simple one and put it on your bed to drape the Linqstat over. Completely covering an already-made tent like this one with Linqstat is pretty easy and you can just put the TENS pad on the outside of it and "light it up", keeping the frequencies on the outside.
                      LINK TO GROUNDING CLIPS
October 8, 2017
October 1, 2017
September 23, 2017
September 17, 2017
September 10, 2017
September 3, 2017
August 27, 2017
August 20, 2017
August 13, 2017
August 6, 2017
July 23, 2017 
July 16, 2017 
July 9, 2017   
July 2, 2017   
June 25,  2017
June 18, 2017 
June 11, 2017 
June 4, 2017   
May 28, 2017  
May 21, 2017  
May 14, 2017  
May 7, 2017    
April  1, 2017   
April 23, 2017    
April 16, 2017  
April 2, 2017   
March 26, 2017
March 19, 2017
March 12, 2017
March 5, 2017 
February 26, 2017
February 19, 2017
February 12, 2017
February 5, 2017
January 29, 2017
January 22, 2017
January 15, 2017
January 8, 2017
January 1, 2017
December 18, 2017
October 9, 2016
October 2, 2016
September 25, 2016
September 18, 2016
September 11, 2016
September 4, 2016
August 28, 2016
August 21, 2016
August 14, 2016
August 7, 2016 
July 31, 2016   
July 24, 2016  
July 17, 2016   
July 10, 2016    
July 3, 2016     
June 26, 2016  
June 19, 2016  
June 12, 2016  
June 5, 2016    
May 29, 2016   
May 22, 2016   
May 15, 2016   
May 8, 2016    
May 1, 2016 
April 24, 2016   
April 17, 2016  
April 10, 2016  
April 3, 2016   
March 27, 2016
March 20, 2016
March 13, 2016
March 6, 2016
February 28, 2016
February 21, 2016
February 14, 2016
February 1, 2016

January 24, 2016

January 17, 2016
January 10, 2016
January 3, 2016
December 27, 2015
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. 

Citizens Against Harmful Technology Inc.  •  P. O. Box 000000  •  New Smyrna Beach, FL 32141

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Share on Facebook Bookmark and Share