|
|
 |
Citizens Against Harmful Technology Newsletter
Actively Participate In Educating the Public
October 15, 2017
MEMBERSHIP: $25.00/yr
TALKSHOE: Sunday at 8:30 P.M. E. Coast, 7:30 Central, 6:30 Mountain, 5:30 W. Coast (724) 444-7444, Call ID for CAHT: 134999 Pin 1#, Moderator: Neal |
|
 | NEWS:
On Sunday, October 22, 2017, Neal's call will feature a Targeted Individual who has been disabled and lives in a special enclosure due to electro-sensitivity. He knows how to collect information from your environment with meters. He will be explaining which meters to use. He has a lot of information to share. Please join us at 8:30 pm, EST.
NOTICE:
Please send this newsletter to one other TI or person who might benefit from education on what's happening to people do to the misuse of technology by the New World Order. Please help us get a wider circulation of this publication. Do your part!
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email.
Please print a copy of this newsletter and any newsletters you wish to maintain. Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.
This is an internet reference newsletter. A link to the original article is provided in the colored title line. We claim no authorship of these references, we only reference so you can consider the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
|
|
|
 |
|
CitizensAHT.org now has a store where you can purchase a Membership, Targeted Individual Handbooks, Brochures. All contributions go for support of the TI community, this newsletter, the website and research materials. Thank you for your support.
|
|
|
|
TI TESTIMONIES: Submit and share your stories for this column.
|
Please share your stories, it doesn't have to be your whole life story, just an incident. What are your torturers doing to you today? Have you been diminished in artificial ways with microwave technology? Are you having problems with doctors? Also, please send copies of your injuries, burns, etc. so we can publish.
TI TESTIMONY ONE:
We are being attacked from all sides. Stalking and Electronic harassment takes away our homes and lives, directed energy hurricanes is destroying entire islands, directed energy fires are destroying homes, lives and property in California. This is the testimony of an insurance man who was at Harvey and is looking at California noting that the fires that were set were not normal and couldn't have happened without human help. The fires are burning individual homes and cars and they have melted like the cars we saw after 9-11 melted from DEW. There are no burn patterns, where fire burned from one area to another. The fire came from the sky!
NorCAL Torch Fires; How the Firestorms Were Created
https://www.youtube.com/watch?v=uqH49-DuH-U


TESTIMONY TWO: These are drones over Monrovia, CA.


|
|
|
 |
|
WIRELESS HEALTH EFFECTS: Cancer, Neuro
|
PLEASE ATTEND! Protest being planned for Washington D.C. On Tuesday, October 17, 2017
Please attend the protest being planned for Washington D.C. On Tuesday, October 17, 2017. Perhaps you can even visit your state’s Congressional offices afterward. It is so important that lawmakers hear your voices in support of repealing section 704 of the 1996 Telecom bill and giving the EPA the authority to set population-based biologically-protective safety limits. Be sure to prepare...
WHO Scientist " Cell Phone and Wireless Radiation is A Carcinogen"
5G Wireless Radiation Dangers
|
|  |
|
|
 | Dark Emitting Diodes used for Cloaking
Technology used for disappearance known as cloaking has been with us for some time. Tonight I go over some of these technologies which proves that infiltration without detection, abductions and even MILABS are completely possible and in use right now. The use of Dark Emitting Diodes is nothing new. However, now with Nanotechnology and other DARPA advancements, that thing you thought you saw in your bedroom may in fact be a human cloaked and not a spirit!
|
|
|
|
 | SHIELDING: Frequencies to use as shielding
|
Targeted Individual Dave Case has kindly prepared a disc of frequencies that are helping TI's. He is an electrical engineer and inventor who came up with these frequencies to help him overcome his own targeting.
Put the CD on or copy the files to your computer. You need to make the recording continuously loop or copy the files enough times to make them play for long periods while you sleep.
These noises are pretty brutal so we put on some different kinds of music to see which ones helped with this problem. We found that flute music in the backgound provides some soothing music that makes it more palatable. Try playing this 6 hr recording at the same time: https://www.youtube.com/watch?v=YNdFu6bnhfU
Dave says after you listen continually for 4-5 days, you become accustomed to the sound and it becomes comforting. Targeting is more about infrasound and ultrasound than we realize. The sounds played in your environment can mask your location and interfere with electronic communication.
Dave can provide testimony from many TI's who testify that it helps a lot. He also has invented a gadget that you put in the plug closest to your electrical box to stop dirty electricity in the whole house.
His phone number is 573-300-1579.
|
|
|
 |
|
SHIELDING: Absorb heat from ultra/infra sound
|
Walmart and Amazon has this mat. As you see, it absorbs heat and sound.
|
|  |
|
|
Design Considerations for Indoor Wireless Transmission between a Body-Worn Physiological Monitoring Device and a Gateway in a Home Environment

|
|
|
|
 | WEBSITE: http://www.iceblackbox.com/
Looks like stalking to me!
|
"You can now use the BlackBox Digital Witness App to report suspicious activity directly to local law enforcement.
NOTE: This is not a substitute for 911. If you see something urgent, CALL 911 first.
This new version will send suspicious activity directly to participating local law enforcement agencies and state primary fusion centers.
ATTENTION LAW ENFORCEMENT AGENCIES (National and International): If you would like to receive alerts using the free portal, please send an agency email to info@iceblackbox.com. Our team will validate your agency contact and coordinate the subscription. The basic portal is free. You can also call (703) 436-5885.
This feature was developed in coordination with the National Fusion Center Association via an introduction by The Department of Homeland Security. A portion of all our sales goes to the National Sheriffs’ Association and the National Neighborhood Watch."
-
Setup your Neighborhood Watch Now Portal. You can view monitor videos within your neighborhood as a Captain. [oh la la, you've a title now!]
E-mail us at sales@iceblackbox.com, and someone from our anti-terrorism team will contact you directly.
E-mail must be from a Fusion Center or Anti-Terrorism Agency email address. All e-mails will be verified before any information is shared.
Outside countries, please send e-mails in English or Spanish, and provide a contact number to your main agency. If translation services are needed, please email us and we will set up an online meeting with a translator.
Due to the sensitivity of this service, all information must be verified completely before service is provided.
App Allows Muskogee Residents To Send Video To 911, Police BlackBox
|
|
|
 |
|
Smart Meter Data: Privacy and Cybersecurity – Congressional Research Report 2012
By Catherine J. Frompovich
In February of 2012, three attorneys with the Congressional Research Service (CRS) issued a lengthy report “Smart Meter Data: Privacy and Cybersecurity.” AMI Smart Meters, which are retrofitted in place of safe analog meters that have been in exemplary use for decades. The new AMI SMs have one advantage over the safe analog meters, which probably appeals to the United Nations: AMI SMs spy on the occupants inside the homes to which AMI SMs are retrofitted. Those personal rights violations are real and should be of valid concern to consumers who know their U.S. Constitutional and State Constitutional rights are being violated and abrogated.
Apparently, those same issues may have been on the minds of some members of Congress, therefore, the request for a Privacy and Cybersecurity Report.
In the Summary of that report, we find
Fueled by stimulus funding in the American Recovery and Reinvestment Act of 2009 (ARRA), electric utilities have accelerated their deployment of smart meters to millions of homes across the United States with help from the Department of Energy’s Smart Grid Investment Grant program. As the meters multiply, so do issues concerning the privacy and security of the data collected by the new technology. This Advanced Metering Infrastructure (AMI) promises to increase energy efficiency, bolster electric power grid reliability, and facilitate demand response, among other benefits. However, to fulfill these ends, smart meters must record near-real time data on consumer electricity usage and transmit the data to utilities over great distances via communications networks that serve the smart grid. Detailed electricity usage data offers a window into the lives of people inside of a home by revealing what individual appliances they are using, and the transmission of the data potentially subjects this information to interception or theft by unauthorized third parties or hackers. [CJF emphasis]
Rather nonchalantly, in this writer’s opinion, the Report’s authors concede:
Unforeseen consequences under federal law may result from the installation of smart meters and the communications technologies that accompany them. This report examines federal privacy and cybersecurity laws that may apply to consumer data collected by residential smart meters. It begins with an examination of the constitutional provisions in the Fourth Amendment that may apply to the data. As we progress into the 21st century, access to personal data, including information generated from smart meters, is a new frontier for police investigations. The Fourth Amendment generally requires police to have probable cause to search an area in which a person has a reasonable expectation of privacy. However, courts have used the third-party doctrine to deny protection to information a customer gives to a business as part of their commercial relationship. This rule is used by police to access bank records, telephone records, and traditional utility records. Nevertheless, there are several core differences between smart meters and the general third-party cases that may cause concerns about its application. These include concerns expressed by the courts and Congress about the ability of technology to potentially erode individuals’ privacy.
If smart meter data and transmissions fall outside of the protection of the Fourth Amendment, they may still be protected from unauthorized disclosure or access under the Stored Communications Act (SCA), the Computer Fraud and Abuse Act (CFAA), and the Electronic Communications Privacy Act (ECPA). These statutes, however, would appear to permit law enforcement to access smart meter data for investigative purposes under procedures provided in the SCA, ECPA, and the Foreign Intelligence Surveillance Act (FISA), subject to certain conditions. Additionally, an electric utility’s privacy and security practices with regard to consumer data may be subject to Section 5 of the Federal Trade Commission Act (FTC Act). The Federal Trade Commission (FTC) has recently focused its consumer protection enforcement on entities that violate their privacy policies or fail to protect data from unauthorized access. This authority could apply to electric utilities in possession of smart meter data, provided that the FTC has statutory jurisdiction over them. General federal privacy safeguards provided under the Federal Privacy Act of 1974 (FPA) protect smart meter data maintained by federal agencies, including data held by federally owned electric utilities. [CJF emphasis]
How come state public utility commissions, their kangaroo courts and utility companies’ attorneys aren’t held accountable to the legitimate seriousness of the above constitutional issues, let alone the escalating adverse health effects from AMI Smart Meter radiofrequencies non-thermal radiation waves that now scientifically have been proven to break DNA bonds?
On page 2 of that Report, the CRS lawyers say,
General federal privacy safeguards provided under the Federal Privacy Act of 1974 (FPA) protect smart meter data maintained by federal agencies, including data held by federally owned electric utilities. Section 5 of the Federal Trade Commission Act (FTC Act) allows the Federal Trade Commission (FTC) to bring enforcement proceedings against electric utilities that violate their privacy policies or fail to protect meter data from unauthorized access, provided that the FTC has statutory jurisdiction over the utilities.
It is unclear how Fourth Amendment protection from unreasonable search and seizures would apply to smart meter data, due to the lack of cases on this issue. However, depending upon the manner in which smart meter services are presented to consumers, smart meter data may be protected from unauthorized disclosure or unauthorized access under the Stored Communications Act (SCA), the Computer Fraud and Abuse Act (CFAA), and the Electronic Communications Privacy Act (ECPA). If smart meter data is protected by these statutes, law enforcement would still appear to have the ability to access it for investigative purposes under procedures provided in the SCA, ECPA, and the Foreign Intelligence Surveillance Act (FISA). [CJF emphasis]
Page 3 addresses Smart Meter Data: Privacy and Security Concerns
Residential smart meters present privacy and cybersecurity issues 19 that are likely to evolve with the technology.20 In 2010, the National Institute of Standards and Technology (NIST) published a report identifying some of these issues, which fall into two main categories: (1) privacy concerns that smart meters will reveal the activities of people inside of a home by measuring their electricity usage frequently over time;21and (2) fears that inadequate cybersecurity measures surrounding the digital transmission of smart meter data will expose it to misuse by authorized and unauthorized users of the data. [CJF emphasis]
While addressing specific details, the Report claims
Smart meters offer a significantly more detailed illustration of a consumer’s energy usage than regular meters. Traditional meters display data on a consumer’s total electricity usage and are typically read manually once per month.23
In contrast, smart meters can provide near real-time usage data by measuring usage electronically at a much greater frequency, such as once every 15 minutes.24
Current smart meter technology allows utilities to measure usage as frequently as once every minute.25
By examining smart meter data, it is possible to identify which appliances a consumer is using and at what times of the day, because each type of appliance generates a unique electric load “signature.”26 [which will tie into the Internet of Things.]
NIST wrote in 2010 that “research shows that analyzing 15-minute interval aggregate household energy consumption data can by itself pinpoint the use of most major home appliances.” 27
A report for the Colorado Public Utilities Commission discussed an Italian study that used “artificial neural networks” to identify individual “heavy-load appliance uses” with 90% accuracy using 15-minute interval data from a smart meter.28
Similarly, software-based algorithms would likely allow a person to extract the unique signatures of individual appliances from meter data that has been collected less frequently and is therefore less detailed.29 [One algorithm program is “ONZO” (2).]
By combining appliance usage patterns, an observer could discern the behavior of occupants in a home over a period of time.30 For example, the data could show whether a residence is occupied, how many people live in it, and whether it is “occupied by more people than usual.”31
According to the Department of Energy, smart meters may be able to reveal occupants’ “daily schedules (including times when they are at or away from home or asleep), whether their homes are equipped with alarm systems, whether they own expensive electronic equipment such as plasma TVs, and whether they use certain types of medical equipment.”32
Figure 1, which appears in NIST’s report on smart grid cybersecurity, shows how smart meter data could be used to decipher the activities of a home’s occupants by matching data on their electricity usage with known appliance load signatures. [CJF emphasis]
Here is the part about AMI SMs that really needs to be understood and factored in to the privacy and security paradigm the microwave industry, utility companies and even state public utility commissions, which should know better, are not paying attention to nor dealing with: Potential for Theft or Breach of Data, like we had with the Equifax data breach affecting about half of the country’s consumers.
Increased Potential for Theft or Breach of Data
Smart grid technology relies heavily on two-way communication to increase energy efficiency and reliability, including communication between smart meters and the utility (or other entity) that stores data for the grid.46 Many different technologies will transmit data to the grid, including “traditional twisted-copper phone lines, cable lines, fiber optic cable, cellular, satellite, microwave, WiMAX, power line carrier, and broadband over power line.”47 Of these communications platforms, wireless technologies are likely to play a “prominent role” because they present fewer safety concerns and cost less to implement than wireline technologies.48 According to the Department of Energy, a typical utility network has four “tiers” that collect and transmit data from the consumer to the utility.49 These include “(1) the core backbone—the primary path to the utility data center; (2) backhaul distribution—the aggregation point for neighborhood data; (3) the access point—typically the smart meter; and, (4) the HAN—the home network.”50 Energy usage data moves from the smart meter,51 and then to an “aggregation point” outside of the residence such as “a substation, a utility pole-mounted device, or a communications tower.”52 [CJF emphasis]
Two U.S. Supreme Court decisions, Kyllo v United States [1] and United States v Karo, have defended “the home as a sacred site at the core of the Fourth Amendment.”
Kyllo and Karo demonstrate that the Supreme Court “has defended the home as a sacred site at the ‘core of the Fourth Amendment.’”169 Although neither the Supreme Court nor any lower federal court has ruled on the use of smart meters, a few propositions can be deduced from Kyllo and Karo bearing on this question. Because smart meters allow law enforcement to access information regarding intimate details occurring inside the home, a highly invasive investigation that could not otherwise be performed without intrusion into the home, a court may require a warrant to access this data. In Kyllo, the police merely obtained the relative temperatures of a house,170 and in Karo the police only generally located the beeper in the house.171 Although this information was limited, the Court nonetheless prohibited such investigatory techniques. Smart meters have the potential to produce significantly more information than that derived in Kyllo and Karo, including what individual appliances we are using; whether our house is empty or occupied; and when we take our daily shower or bath.172 Further, a look at Figure 1, supra, makes it clear that this level of information is much more intimate than prior technologies used by law enforcement. This depth of intrusion suggests that customers may have a reasonable expectation of privacy in smart meter data. [CJF emphasis]
The CRS lawyers thought there is/was Statutory Protection of Smart Meter Data!
Question: Which law school courses did they take that utility company lawyers and public utility commissions judges somehow missed during law school?
This section discusses federal statutory protections that may be applicable to the contents of communications sent by a smart meter, independent of the Fourth Amendment, while they are either stored within the smart meter prior to transmission, during transmission, or after they have been delivered to the utility. Three federal laws, the Electronic Communications Privacy Act (ECPA),199 the Stored Communications Act (SCA),200 and the Computer Fraud and Abuse Act (CFAA)201 may be applicable to these situations and are discussed in more detail below. [CJF emphasis]
How come public utility commission administrative law judges don’t recognize those federal laws, enforce them from the bench and in their decisions by automatically ruling in favor of consumers who reject AMI SMs? Good question?
Since AMI SMs basically are sophisticated computers that will have to be replaced every five to six years with updated meters, the Computer Fraud and Abuse Act may be applied to AMI SMs privacy issues:
The Computer Fraud and Abuse Act (CFAA)
The Computer Fraud and Abuse Act (CFAA) prohibits intentionally accessing and obtaining information from a computer used in or affecting interstate commerce, without authorization or in excess of a granted authorization.246 The definition of a computer for purposes of the CFAA is “an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device” excluding “an automated typewriter or typesetter, a portable hand held calculator, or other similar device….”247
The servers on a utility’s network would likely fall squarely within the definition of a computer under the CFAA. Similarly, smart meters themselves also appear to meet the definition of a computer, insofar as they store customers’ energy usage data and also perform logical operations by routing transmissions across the utility’s network. Additionally, in light of the significant role that energy utilities play in the modern economy, the smart meter network would also likely be considered to have an effect on interstate commerce, even if they operate entirely within one state. Therefore, intentionally gaining access to the utility’s servers or smart meters to obtain customer data would likely constitute a violation of the CFAA if done without the utility’s authorization or in excess of an authorization granted by the utility. [CJF emphasis]
Here’s a nice part about the CFAA: the fines, which should be incentive enough for everyone to file complaints against utility companies with their state Attorney General or state public utility commission:
The criminal penalties for violating the unauthorized access provisions of the CFAA have a three tier sentencing structure. Simple violations are punished as misdemeanors, imprisonment for not more than one year and/or a fine of not more than $100,000 ($200,000 for organizations).248
Another law that comes into play is Section 5 of the Federal Trade Commission Act.
Section 5 of the FTC Act prohibits “unfair or deceptive acts or practices in or affecting commerce”251 and gives the Federal Trade Commission (FTC) jurisdiction to bring enforcement actions against “persons, partnerships, or corporations” that engage in these practices.252 In the past, the FTC has used its authority under Section 5 to take action against businesses that violate their own privacy policies or that fail to adequately safeguard a consumer’s personal information.253 Although there do not appear to be any cases in which the FTC has taken action against an electric utility for failing to protect consumer smart meter data, the Commission would have authority to enforce Section 5 against a utility that fell within its statutory jurisdiction.
On page 40 of the Report, the lawyers mention another issue that can be relevant:
“Unfair” Failure to Secure Consumer Data
Failure to Protect Against Common Technology Threats or Unauthorized Access
The FTC may consider it an “unfair” practice when an electric utility fails to safeguard smart meter data from well-known technology threats as the data travels across the utility’s communications networks. [CJF emphasis]
Furthermore and even more importantly, all parties involved in the AMI SM legal debacles must realize what the CRS lawyers have to say about AMI SM data protection:
Smart Meter Data as a Protected “Record”
The Privacy Act protects the type of electricity usage data gathered by smart meters, provided that the data pertains to U.S. citizens or permanent residents, is personally identifiable, and is retrievable by the individual’s name or another personal identifier. The Privacy Act “governs the collection, use, and dissemination of a ‘record’ about an ‘individual’ maintained by federal agencies in a ‘system of records.’”368 Under the statute, a “record” is “any item, collection, or grouping of information about an individual that is maintained by an agency … that contains his name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a finger or voice print or a photograph.”369
An “individual” is defined as “a citizen of the United States or an alien lawfully admitted for permanent residence.”370 A “system of records” is “a group of any records under the control of any agency from which information is retrieved by the name of the individual” or other personal identifier “assigned to the individual.”371
Smart meter data held by an agency certainly fits within the broad definition of a “record” because it is a grouping of information about an individual, namely, data on that individual’s electricity usage. The data is typically stored along with a consumer’s account information, which usually includes a consumer’s name, social security number, or other “identifying particular.”372 Thus, smart meter data would constitute a protected “record” under the Privacy Act, assuming that it pertains to a citizen of the United States or lawful permanent resident and is retrievable by a personal identifier such as a consumer’s name or account number. [CJF emphasis]
All the above only confirms why The Energy Policy Act of 2005 (Public Law 109-58) Section 1252 Smart Metering does not mandate or make AMI Smart Meters mandatory. That would be unconstitutional, yet public utility commissions don’t respect the foremost law of the land, the U.S. Constitution.
Apparently, there is a copy of a Member of Congress letter circulating on the Internet wherein that Congressperson says “As you may know, provisions within the 2005 Energy Policy Act allow for consumers to opt out of smart meter programs that are run at the state level.”
|
|
|
 |
|
SATELLITES/DRONES carrying MICS Comm: Speed of Light Strike
|
Medical Device Radiocommunications Service
From Wikipedia, the free encyclopedia
History
The FCC created the Medical Implant Communication Service (MICS) in 1999 "in response to a petition for rule making by [Medtronic, Inc.] to permit use of a mobile radio device, implanted in a patient, for transmitting data in support of the diagnostic and/or therapeutic functions associated with an implanted medical device."[5][6] This set aside the 402–405 MHz band and designated a low maximum transmit power, EIRP=25 microwatt, in order to reduce the risk of interfering with other users of the same band. Ten channels of 300 kHz each were assigned to the bandwidth. MICS provided additional flexibility to medical device developers compared to previously used inductive technologies, which required the external transceiver to touch the skin of the patient.[5][6][7] MICS was later adopted by the ETSI in 2002.[8]:652
In 2006, the FCC reevaluated the spectrum requirements at the prompting of Medtronic, which sought to expand the spectrum "to support advances in medical sensor technology and the expected proliferation of such devices, especially those used for lower-cost medical monitoring and non-emergency reporting applications."[9] A similar process was initiated by the ETSI in Europe in July 2004, with both the FCC and ETSI considering the 401–402 and 405–406 MHz ranges. The ETSI formalized the proposal into a standard called MEDS (with the core MICS bands remaining under that name and the new "wing" bands being referred to as MEDS) in December 2007,[3] while the FCC added the same additional spectrum to MICS and dubbed the expanded plan the Medical Device Radiocommunications Service or MedRadio in May 2009.[1][10][11] The FCC expanded MedRadio's spectrum again in November 2011, adding 24 megahertz in the 413-419 MHz, 426-432 MHz, 438-444 MHz, and 451-457 MHz ranges as part of an "effort to recognize and facilitate the significant advances in wireless medical technologies that are revolutionizing treatment for a wide variety of medical conditions."[1][12]
The FCC allocated additional spectrum (2360-2400 MHz) specifically for MBAN devices in May 2012, effective on October 10, citing "significant public interest benefits associated with the development and deployment" of MBAN devices.[1][13] Additional modifications to the MBAN rules were released in August 2014, including the "narrowing [of] the definition of health care facilities that may use MBAN devices in the 2360-2390 MHz band" and relaxing MBAN network topology restrictions among others.[14][15]
Operational parameters
In the United States, the FCC states that:[1]
- MedRadio devices can only be operated by an authorized health care providers such as a physician or legally authorized entity able "to provide health care services using medical implant devices";
- MedRadio device manufacturers and representatives can only operate the device "for the purpose of demonstrating, installing and maintaining the equipment" for authorized health care providers; and
- MedRadio devices are only "authorized on a secondary status" and must accept any interference created by devices of primary status.
Operational parameters in other parts of the world may vary slightly based on local law. In Canada, for example, devices that fall under the MEDS standard also fall under secondary status, but they are classified nationally as Category I equipment that require a technical acceptance certificate (TAC) or equally recognized certificate before they can be used.[16]
See also
References
"Medical Device Radiocommunications Service (MedRadio)". Federal Communications Commission. Retrieved 24 February 2016.
- Elwar, E. (19 May 2012). "Op-Ed: Microchip medicine destroys privacy". Digital Journal. Digital Journal, Inc. Retrieved 24 February 2016.
- Farlow, C.S. (20 June 2011). "An Overview of the Medical Device Radiocommunications Service (MedRadio) and Future Telemetry Considerations" (PDF). Medtronic, Inc. Retrieved 24 February 2016.
- "ETSI EN 301 489-29 V1.1.1" (PDF). European Telecommunications Standards Institute. February 2009. Retrieved 24 February 2016.
- Dortch, M.H. (25 February 2003). "Federal Communications Commission 03-32" (PDF). Federal Communications Commission. p. 7. Retrieved 24 February 2016.
- Federal Communications Commission (2003). Communications Regulation. 28. Silver Springs, MD: Pike & Fischer, Inc. p. 680. Retrieved 24 February 2016.
- "ETSI EN 301 839-1 V1.3.1" (PDF). European Telecommunications Standards Institute. October 2009. Retrieved 24 February 2016.
- Nikita, K.S., ed. (2014). Handbook of Biomedical Telemetry. John Wiley & Sons. p. 736. ISBN 9781118893425. Retrieved 24 February 2016.
- Dortch, M.H. (18 July 2006). "Federal Communications Commission 06-103" (PDF). Federal Communications Commission. p. 29. Retrieved 24 February 2016.
- Knapp, J.P. (6 May 2009). "Federal Communications Commission 09-1027" (PDF). Federal Communications Commission. p. 29. Retrieved 24 February 2016.
- Kalahasty, G.; Alimohammed, R.; Mahajan, R.; Morjaria, S.; Ellenbogen, K.A. (2013). "A Brief History of Remote Cardiac Monitoring". In Asirvatham, S.J.; Venkatachalam, K.L.; Kapa, S. Remote Monitoring and Physiologic Sensing Technologies and Applications. Philadelphia, PA: Elsevier, Inc. pp. 275–282. ISBN 9780323188463. Retrieved 24 February 2016.
- Dortch, M.H. (30 November 2011). "Federal Communications Commission 11-176" (PDF). Federal Communications Commission. p. 56. Retrieved 24 February 2016.
- Versel, N. (13 September 2012). "FCC finalizes MBAN rule, still must appoint coordinator". MobiHealthNews. HIMSS Media. Retrieved 24 February 2016.
- Dortch, M.H. (21 August 2014). "Federal Communications Commission 14-124" (PDF). Federal Communications Commission. p. 34. Retrieved 24 February 2016.
- Primosch, R.D. (16 February 2015). "What the FCC’s new rules mean for wireless body sensors". iMedicalApps. Retrieved 24 February 2016.
"RSS-243 — Medical Devices Operating in the 401–406 MHz Frequency Band". Industry Canada, Government of Canada. February 2010. Retrieved 24 February 2016.link
|
|
|
 |
|
 |
13cm Band Rules Expanded to Allow MedRadio Adjacent to Satellites
The ARRL is reporting in a First Report and Order and a Further Notice of Proposed Rulemaking (ET 08-59) released on May 24, the FCC decided to expand the Part 95 Personal Radio Service rules to allow medical devices to operate on a secondary basis in the 2360-2400 MHz band. International amateur satellite operations are allocated between 2400-2450 MHz, adjacent to the new devices.
The new allocation is Medical Body Area Networks (MBAN) which provide a way for health care facilities to monitor their patients via wireless networks. Because use of these frequencies will be on a secondary basis, MBAN stations will not be allowed to cause interference to, and must accept interference from, primary services, including US radio amateurs who operate on a terrestrial primary basis in the 2390-2395 MHz and 2395-2400 MHz bands.
The ARRL has posted their full analysis and report at: http://tinyurl.com/13cm-Medical-Allocation (arrl.org)
FCC Expands Part 95 MedRadio Rules to Allow Devices in 2360-2400 MHz Band
http://www.arrl.org/news/fcc-expands-part-95-medradio-rules-to-allow-devices-in-2360-2400-mhz-band
|
|
|
 |
|
LAS VEGAS COVERUP: Forensic acoustic analysis shows 2nd shooter
|
Forensic acoustic analysis confirms existence (and range) of second Las Vegas shooter
Monday, October 09, 2017 by: Mike Adams
Las Vegas / Mandalay Bay bombshell: Watch the presentation below for the full, astonishing details of how a forensic acoustic analysis proves the existence of a second shooter at roughly 250 – 270 yards from where mass shooting victims were filming the tragedy as it unfolded.
In essence, because of the differences in the speed of sound vs. the speed of the bullets from a known cartridge (.223 Remington, in this case), the time lag between the last bullet hitting the pavement and the last audible report of the rifle muzzle can be used to very accurately calculate the range of the shooter (relative to the position of the person recording the video).
More importantly, when the audio from the Las Vegas shooting is analyzed, it reveals TWO shooters operating at the same time, not just one shooter. Shooter #1 is operating at 425 – 475 yards, which is consistent with the Mandalay Bay hotel, but shooter #2 is operating at approximately 250 – 270 yards.
This fact is encoded in the audio of numerous videos posted on YouTube. This is all explained in the video below, with detailed whiteboard calculations and diagrams:

|
|
|
 |
|
Putin targets foes with 'zombie' gun which attack victims' central nervous system
- Could be used against Russia's enemies and perhaps its own dissidents
- ‘The development of weaponry based on new physics principles – direct-energy weapons, geophysical weapons, wave-energy weapons, genetic weapons, psychotronic weapons, and so on – is part of the state arms procurement program for 2011-2020.’
31 March 2012
Mind-bending ‘psychotronic’ guns that can effectively turn people into zombies have been given the go-ahead by Russian president Vladimir Putin. The futuristic weapons – which will attack the central nervous system of their victims – are being developed by the country’s scientists.
They could be used against Russia’s enemies and, perhaps, its own dissidents by the end of the decade.
|
|  |
|
|
 | Psalm 27:7-10 (NIV)
Hear my voice when I call, LORD;
be merciful to me and answer me.
My heart says of You, "Seek His face!"
Your face, LORD, I will seek.
Do not hide Your face from me,
do not turn Your servant away in anger;
You have been my helper.
Do not reject me or forsake me,
God my Savior.
Though my father and mother forsake me,
the LORD will receive me.
8
COMMENT: David says above that even
if his father and mother forsake him, God
never will. What a wonderful, encouraging
thought and such an important thing to
remember, No matter what we go through,
God loves us and He is always with us.
That doesn't mean that we will never go
through hard times, but it does mean that
we will never go through hard times alone. |
|
|
|
 | Freedom for Targeted Individuals International Call:
Every Saturday we invite you to join us for Freedom for Targeted Individuals International Podcast * To call in Internationally, use your country's international call in number first (link), after the automated prompt, you enter 541.275.1131#
www.freedomfortargetedindividuals.org Starting at 3 pm EST/ 12 pm PST 1.541.275.1131 (no pins required) International Dial -in Numbers To join online https://www.uberconference.com/tiangel201
Ella Free's Podcast
Tuesdays & Thursdays
Beginning at 9 pm EST/ 6 pm PST, you can join us live by calling into 724.444,7444, enter ID 141476#, then 1#
We want every targeted individual to participate in the Bill Binney and Kirk Wiebe Global TI Survey.
To get involved, please view the short video link below.
To get a better understanding who these noble men are and more details on the survey, please listen to the link below.
with your name, address. country and phone number in order to get the process going
*WE NEED YOU TO HELP STOP THESE CRIMES AGAINST HUMANITY*
|
|
|
 |
|
 | ACTIVIST: Dr. Millicent Black
|
|
|
|
TARGETED INDIVIDUAL COMMUNITY CONFERENCE CALLS
|
Sunday
Moderator: Neal
Citizens Against Harmful Technology
Time: 8:30 p.m. Eastern
Talkshoe: 724-444-7444, Pin #134999
Moderator: Renata
Time: 3 p.m. Eastern
Talkshoe: 724-444-7444, Pin #114616
|
Thursday
Moderator: Mike Mason
Time: 6:00 pm Eastern
641-715-0632
ID 116202#
Moderator: Ella
Time: 9:00 p.m. Eastern
Talkshoe: 724-444-7444, Pin# 141476
After Ella's Podcast:
Vulcan Wolverine
Talkshoe: 724-444-7444, 142394#
Moderator: Kyle
Time: After Ella’s call
Talkshoe: 724-444-7444, Pin #142394
|
Monday
Moderator: Derrick
Time: 9:00 p.m. Eastern
Free Conference:
319-527-2701, Code 248671
Moderator: Mike Mason
Time: 6:00 p.m. Eastern
Free Conference: 641-715-0632,
Code 116202
|
Friday
Moderator: Frank Allen
Time: 6:00 pm. Eastern
646-749-3112
450-414-3112#
Moderator: Linda
John W: 92703
Time: 9:00 pm Eastern
On Reverse Engineering Mind
Control Technologies
Talkshoe: 724-444-7444, 140091#
After Linda's Podcast
Moderator: Ken
Talkshoe: 724-444-7444, 142298#
Moderator: Beth
Time:
Talkshoe:
Moderator: Loren W.
Time: 9:00 p.m.
Talkshoe: 724-444-7444, 798056#
712-432 3900
|
Tuesday
Moderator: Terry
Time: 3:00 pm PST/6 pm EST to
6:00 pm PST/9:00 EST
Bring Awareness about Gangstalking
Talkshoe: (724)-444-7444 Call ID: 143944
Moderator: Ella
Time: 9:00 Eastern
Talkshoe: 724-444-7444, 141476
Moderator: Kyle (Vulcan Wolverine)
Time: After Ella’s call
Talkshoe: 724-444-7444, 142394
Wednesday
Moderator: Frank Allen
Targeted Individual Massachusetts Time: 9:00 pm Eastern Call-in Number: 646-749-3112 Access Code: 450-414-301 Join by Computer: https://global.gotomeeting.com/join/450414301
Moderator: Julia
Engage in Prayer
Time: 9 pm Eastern/ 8 pm Central/ 7 pm Mountain/ 6 pm Pacific Call-in number: (515) 739-1405
International Dial-in Numbers: https://www.freeconferencecall.com/
wall/julia1113#international
Call ID: 141476
Access Code: 381878
|
Saturday
Moderator: Terry
Time: 12:00 am Eastern
Talkshoe: 724-444-7444, 143944
Moderator: Dr. Millicent Black
Church Conference Call
Time: 6:00 pm Eastern
Talkshoe: 140567
Moderator: Frank Allen
Phone: 646-749-3112
450-414 3112#
Moderator: Ella
Freedom for Targeted Individuals
International Activism
Time: 7:00 pm Eastern
Free Conference: 541-275-1131
Moderator: Lauron
8:00 pm. Eastern
Talkshoe: 142124
Moderator: Scott Snitzer
Time: 5:00 pm Eastern
Snitzer's TI Contact Call
Talkshoe: 724-444-7444, 138602
Moderator: Derrick
Time: 9:00 pm Eastern
Phone: 319-527-2701
ID: 248671#
|
|
|
|
 |
|
 | Denver, Colorado
Area Support Group
Contact: Xontu Garcia
Email: xontu44@icloud.com
Atlanta, Georgia
Support Group Meeting
Contact: Carol Dimas
Phone: 470-312-6578
Email: jamesdimas45@gmail.com
Chicago, Illinois
The Chicago area Support Group – Illinois, Indiana, Wisconsin Location: Hammond Public Library 564 State Street Hammond, Indiana Contact Shavon at von.pray@gmail.com
or Candace at cam14395@aol.com
New York City Support Group
Contact: Angel Acevedo
Email: sorasuarez6@gmail.com
Phone: 646-806-8654
Houston, Texas For more information, you may contact Tereza Dutta - terezaxdutta@gmail.com
Seattle, Washington Location: Broadview Branch Library at:
12755 Greenwood Ave. N. Seattle, Washington 98133-7901
For more information, you may contact Laura Solway - 206-365-6139 Curtis Kimble – 817-901-8720
Portland, Oregon Saturday, November 11, 2017
3:30-5:30 PM
Hollywood District Public Library 4040 Northeast Tillamook Portland, Oregon Contact person; Amy – 971-207-3401
South Carolina For more information, you may contact Gail - mhisinhim4evr@gmail.com
TI'S IN CHINA
An Announcement To The Whole World By Chinese Victims Of Electronic And Psychotronic Weapons
|
|
|
 |
|
October 8, 2017
October 1, 2017
September 23, 2017
September 17, 2017
September 10, 2017
September 3, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413127360
|
|
|
August 27, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413124046 |
August 20, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413115736
|
August 13, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413110148
|
August 6, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413096706
|
|
July 23, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413089482
|
July 16, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413089458
|
July 9, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413081814
|
July 2, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413075672
|
|
June 25, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413075658
|
June 18, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413044960
|
June 11, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413040968
|
June 4, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413030644
|
|
May 28, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413026066
|
May 21, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413021020
|
May 14, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413003854
|
May 7, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1413003786
|
|
April 1, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412978182
|
April 23, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412969942
|
April 16, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412952886
|
April 2, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412937668
|
|
March 26, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412932370
|
March 19, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412926716
|
March 12, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412921638
|
March 5, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412908194
|
|
February 26, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412903686
|
February 19, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412897936
|
February 12, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412892880
|
February 5, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412873198
|
|
January 29, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412863308
|
January 22, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412859022
|
January 15, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412850596
|
January 8, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412840908
|
January 1, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412828054
|
|
December 18, 2017
|
https://www.mynewsletterbuilder.com/email/newsletter/1412819558
|
|
October 9, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412728854
|
October 2, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412721414
|
|
September 25, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412711414
|
September 18, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412700914
|
September 11, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412695944
|
September 4, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412692718
|
|
August 28, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412684952
|
August 21, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412679272
|
August 14, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412672734
|
August 7, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412670116
|
|
July 31, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412667822
|
July 24, 2016
|
https://www.mynewsletterbuilder.com/email/newsletter/1412656346
|
July 17, 2016
|
https://www.mynewsletterbuilder.com/email/newsletter/1412654598
|
July 10, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412656346
|
July 3, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412648084
|
|
June 26, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412645586
|
June 19, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412640846
|
June 12, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412635390
|
June 5, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412632520
|
|
May 29, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412626348
|
May 22, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412626330
|
May 15, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412615204
|
May 8, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412612962
|
May 1, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412608314
|
|
April 24, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412604122
|
April 17, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412615204
|
April 10, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412595488
|
April 3, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412594890
|
|
March 27, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412590396
|
March 20, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412578970
|
March 13, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412573746
|
March 6, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412572388
|
|
February 28, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412572982
|
February 21, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412563986
|
February 14, 2016
|
http://www.mynewsletterbuilder.com/email/newsletter/1412557150
|
February 1, 2016
|
|
|
January 24, 2016
|
|
January 17, 2016
|
http://beta.mynewsletterbuilder.com/email/newsletter/1412540862
|
January 10, 2016
|
http://beta.mynewsletterbuilder.com/email/newsletter/1412539652
|
January 3, 2016
|
http://beta.mynewsletterbuilder.com/email/newsletter/1412531748
|
|
December 27, 2015
|
http://beta.mynewsletterbuilder.com/email/newsletter/1412531462
|
|
|
|
 |
|
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. |
|
|
 |
|
|
|
|
|
|
|
|