To receive email from Citizens Against Harmful Technology, add to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Share on Facebook Share on Twitter More Share Options
Teaching the children to use their phones in front of TI's house!
Citizens Against Harmful Technology Newsletter
Actively Participate In Educating the Public
May 13, 2018
MEMBERSHIP:  $30.00/yr (free booklet, brochure, membership card)
Sunday at 8:30 P.M. E. Coast, 7:30 Central, 6:30 Mountain, 5:30 W. Coast
(724) 444-7444, Call ID for CAHT: 134999 Pin 1#, Moderator: Neal
NOTICE:  We've redesigned our Home Page on our website. Be sure and take a look. Hopefully, it will be easier to use.
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email. 
Please print a copy of this newsletter and any newsletters you wish to maintain.  Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.  
This is an internet reference newsletter. A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
Note:  This lady really does have a round circular target in the middle of her back from DEW!

Electronic Slavery is taking over America. Thousands of people have been selected for elimination in a government fusion center program designed to take over an individual with electronic harassment and organized stalking. This TI was burned and attacked with biological warfare. You can see the bumps on her back. They were put in her environment to infect her with arthropods. This is the way you get Morgellons.

This woman goes by our house almost every day, stops in front of the house, punches buttons on her phone, waits a few minutes, standing in the street, and then walks back home. This day, it had been raining earlier. She went by with this child, innocent enough, no phone showing. Then they turned back towards her house and the child stops on her bike, punches her phone, waits a while, then they both stop and wait a while, waiting for the "mission complete" message to appear? Do these family members have access to the same system as the first responders who would have control of the implant system Body Area Network that is operated with cell phones. Can just any child operate your medical implants?

My security cameras started showing lines emanating from the light fixtures after the power company did some sort of installation.  In the left picture, the lines are parallel in all directions.  In the right picture, the lines are strictly parallel. This is the day our torturing was stepped up. We think these lights are putting out some harmful energy. We are otherwise heavily targeted as well with laser burns, chemicals, and property damage.

I'm seeing a lot of adults with backpacks and riding on odd looking bicycles, people I've never seen before on my street. The following pictures are from 3 days. There are no colleges here, why are adults wearing such huge packs? Then there is the ever-present phone.

Do you see the phone facing the TI's house?
This is the first time this person has appeared. The flip-flops are not usual riding gear, and its a girls' bike. It appears with various people on it.

Anyone who is familiar knows this sign, the arm hanging out the window, at an angle. Its an identifier.
The age bracket is usually either veteran age or a youth between 20-25.

The veterans usually don't wear backpacks. Here is a veteran who looks innocent enough right?  But WAIT, he passes by again, and he switches his phone to the hip facing the TI's house. Why? Better to connect you with my dear?


If you put your head down and close your eyes while you pass by the TI's house, no one can see you! Do you see this guy's phone?

What is this hanging off the back?  Another bag? This guy went by at least twice.  Some of these people go by once, then turn around and come back by again several times.
Adults on skateboards carrying backpacks, phone in hand. They don't have jobs or cars?

This one couldn't wait to check his phone. His phone was not
displayed while riding past TI's house. However, once he was passed,
he looked at it and almost got hit by a car.                What is wrong with this picture?


There is an endless parade of veterans, dog walkers, skateboarders with backpacks, baby strollers. Some hide their phones, some stop in front of TI's house and punch their phones, OR sometimes, they display it high up in the air so you have to notice their phone.
How can someone control your mind with a beam of energy?
  Those of us TI's who are being affected with radio frequencies beamed into our living quarters from transmitters, cell towers, drones or satellites or have implants which emit frequencies, are well aware that all their thoughts are not theirs.  Sudden feelings of sadness, crying, depression or anger are being induced purposely to never let us have even one good day on this earth.
You can change your own mind in a split second, so its really easy for someone else to do the same. The easiest way to demonstrate how someone else can control your mind is to play music. If someone plays a sad melody, your mood becomes sad. If someone plays a happy tune, your mood becomes happy.  Music is created by the energy of vibrating energy. It all changes depending on the frequency or how far apart the patterns of energy are from each other.
if you understand how sound and music actually change your brain waves, you can use this knowledge to alter your mental and physical performance states

Read more at:
if you understand how sound and music actually change your brain waves, you can use this knowledge to alter your mental and physical performance states

Read more at:
if you understand how sound and music actually change your brain waves, you can use this knowledge to alter your mental and physical performance states

Read more at:
If someone beams a wave of energy that affects your mind to become angry, anger can surge up so fast and furious you cannot control it. If someone beams a wave of RF energy to make you think “No,” you will have a negative attitude. All the many nuances of feelings and thoughts have been studied to a minute degree so that any human feeling can be induced into a human just by beaming the corresponding RF energy into the brain.
Are being induced to hate everyone?  Are you holding grudges and thinking about how to get back at everyone who is hurting you?  Are you seeking revenge and want to hurt someone? Yeah!
It doesn’t take much thinking on this subject to see how dangerous this is for us. Anyone can be turned against us. Anyone can be made to be angry and hateful towards us. The entire program of destroying our psychological health is in full implementation. Not only are our minds being controlled, those people we interact with are being manipulated to destroy us. This is an intentional scripted part of this program. Our thouhts and conversations are recorded and this information is used to degrade us.

If you understand how sound and music actually change your brain waves, you can use this knowledge to alter your mental and physical performance states with laser accuracy.
Your brain is made up of billions of brain cells called neurons, and your neurons (just like the rest of your body) use electricity to communicate with each other. As you can probably imagine, these millions of neurons sending signals all at once produces an enormous amount of electrical activity in your brain, and this can actually be detected using medical equipment like an electroencephalography (EEG), which measuring electricity levels over areas of your scalp. When you graph the electrical activity of your brain using EEG, you generate what is called a brainwave pattern, which is called a “wave” pattern because of its cyclic, wave-like nature.
And the brainwave patterns are generally categorized like this: Brain Waves Most of us live the majority of our lives in a state of primarily beta brain waves – aroused, alert, concentrated, but also somewhat stressed. When we lower the brain wave frequency to alpha, we can put ourselves in an ideal condition to learn new information, perform more elaborate tasks, learn languages, analyze complex situations and even be in what sports psychologists call “The Zone”, which is a state of improved focus and performance in athletic competitions or exercise. Part of this is because being the slightly decreased electrical activity in the brain can lead to significant increases in feel-good brain chemicals like endorphins, noroepinephrine and dopamine.
So, for example, when you meditate, you are focusing on something, whether it’s a candle flame or your breath going in or out, or a mantra or a prayer. When you focus like that, the electrical patterns in your brain slow down and relax, and the amplitude of your brain-waves generally stabilizes in the alpha wave range.
What is used to change our frequencies?  A concept called “brainwave entrainment”. Brainwave entrainment is any method that causes your brainwave frequencies to fall into step with a specific frequency. It’s based on the concept that the human brain has a tendency to change its dominant EEG frequency towards the frequency of a dominant external stimulus (such as music, or sound). The type of sound frequencies that are typically used in brainwave entrainment are called “binaural” beats. The way that these work is that two tones close in frequency generate a beat frequency at the difference of the frequencies.
The brain does not operate in just one single frequency;
the full spectrum of brainwave frequencies are always running, all the time.
The dominant frequency determines our mental state –
and entrainment temporarily shifts our mental state by
boosting one frequency to be louder than the others. 
The human brain has been hacked. Brainwave entrainment is being used on Targeted Individuals to create a synthetic condition which is not natural to the individual.  This creates discord in our thinking, stops us from solving problems, seeks us from seeking help in the right way, i.e., everything gets screwed up.

Therefore, listening to music that creates an elevated atmosphere in your home is one of the best ways to raise your mental energy. Listen to binaural beats that return your rhythms to natural frequencies. You can listen to these on YouTube or pay a service to provide them for you. Or just play music continually in the background at home, in your car, even while you walk around, play it so people can hear it.
Music communicates good will, it puts people in a good mood.  Play it out loud. It will connect you again.

The FEAR Frequency: Infrasound

ARTICLE:  Smart Cities make you a "Thing"

With Smart Cities, Your Every Step Will Be Recorded

Written By: Sara Degli-Esposti, Siraj Ahmed Shaikh May 5, 2018
Sensor networks are being installed across America and will ultimately be ubiquitously connected together in real-time by the emerging 5G wireless communication technology. Note that all of this is created by scientists and engineers. Promising benefits to citizens is akin to the United Nations [The United Nations is the New World Order] boasting that they are going to eliminate poverty worldwide. ⁃ TN Editor [However, 5G will operate the Body Area Network without stalkers on foot. It will control every human body.]

Modern cities are brimming with objects that receive, collect and transmit data. This includes mobile phones but also objects actually embedded into our cities, such as traffic lights and air pollution stations. Even something as simple as a garbage bin can now be connected to the internet, meaning that it forms part of what is called the internet of things (IoT). A smart city collects the data from these digital objects, and uses it to create new products and services that make cities more liveable.
Although they have huge potential to make life better, the possibility of increasingly smarter cities also raises serious privacy concerns. Through sensors embedded into our cities, and the smartphones in our pockets, smart cities will have the power to constantly identify where people are, who they are meeting and even perhaps what they are doing.
Smarter cities
Across the world, cities are rapidly becoming smarter. Cities as different as SingaporeLondon and San Francisco use technologies such as urban sensing (which captures how people interact with each other and their surroundings), geotracking (which records the movement of people), and real-time analytics (which processes the vast amount of collected data). Smart cities use these technologies to better manage energy and water supply, reduce contamination and traffic jams, optimise garbage collection routes or help people park their cars. A good example is Chicago’s Array of Things project.
Smart city initiatives don’t just have the potential to help make life more liveable, they can help us better the world. In 2013, the Greek academic Vassilis Kostakos introduced interactive LCD screens, which encouraged people waiting at a bus stop to help identify malaria-infected blood cells.
Big data and privacy concerns
In the last few months, following the Cambridge Analytica and Facebookrevelations, concerns over how companies use accumulated data has grown exponentially.
Back in 2009, experts were already aware that stakeholders could collect personal information from unaware users. Opaque privacy policies and complex data-sharing agreements allowed companies to bypass data protection law and use collected data for undeclared purposes.
Because of the huge and detailed information collected by internet of things (IoT) devices, smart city projects could lead to similar worries. Take for example, the Cityware project, which demonstrated the possibility of mapping not just digital but also physical encounters between Facebook friends. Cityware was able to track the movement and interaction of 30,000 people using their Facebook profiles and smartphone bluetooth signals. [NOTE WHERE THE COORDINATOR NODE IS!  CAN YOU STOP PAIN OF IMPLANTS BY INTERFERING WITH THIS NODE ALONE?  DO SOME EXPERIMENTS!]

SURVEILLANCE:  Community Oriented Policing
"Community Policing" is Gangstalking
The Office of Community Oriented Policing Services (COPS Office) is the component of the U.S. Department of Justice responsible for advancing the practice of community policing by the nation's state, local, territorial, and tribal law enforcement agencies through information and grant resources.
Community policing begins with a commitment to building trust and mutual respect between police and communities. It is critical to public safety, ensuring that all stakeholders work together to address our nation's crime challenges. When police and communities collaborate, they more effectively address underlying issues, change negative behavioral patterns, and allocate resources.
The COPS Office awards grants to hire community policing professionals, develop and test innovative policing strategies, and provide training and technical assistance to community members, local government leaders, and all levels of law enforcement. Since 1994, the COPS Office has invested more than $14 billion to help advance community policing.
Office of Community Oriented Policing Services Leadership Information
SURVEILLANCE:  Holographic Brain Device
"Holographic Brain Device Would Edit Our Senses And Memories" - UC Berkeley via
Neuroscientists are building equipment to edit the sensations we feel, paste images we’ve never seen into our brains, insert non-existent scents into memory, and even cut out unwanted pain.
The researchers are using holographic projection into the brains of mice to activate or suppress dozens and ultimately thousands of neurons at once, hundreds of times each second, copying real patterns of brain activity to fool the brain into thinking it has felt, seen, or sensed something.
The goal is to read neural activity constantly and decide, based on the activity, which sets of neurons to activate to simulate the pattern and rhythm of an actual brain response, so as to replace lost sensations after peripheral nerve damage, for example, or control a prosthetic limb.
“This has great potential for neural prostheses, since it has the precision needed for the brain to interpret the pattern of activation. If you can read and write the language of the brain, you can speak to it in its own language, and it can interpret the message much better,” says Alan Mardinly, a postdoctoral fellow in the University of California, Berkeley lab of Hillel Adesnik, an assistant professor of molecular and cell biology..
...To focus the light onto just the cell body—a target smaller than the width of a human hair—of nearly all cells in a chunk of brain, they turned to computer generated holography, a method of bending and focusing light to form a 3D spatial pattern. The effect is as if a 3D image were floating in space.
In this case, the holographic image was projected into a thin layer of brain tissue at the surface of the cortex, about a tenth of a millimeter thick, though a clear window into the brain...
... the laser holography setup could eventually shrink to fit in a backpack a person could haul around.
As they improve their technology, they plan to start capturing real patterns of activity in the cortex in order to learn how to reproduce sensations and perceptions to play back through their holographic system.
Engineering Dreams in the Dream Lab at MIT
Article about the Dream Labs work to keep individuals in the hypnagogic state or hypnagogic consciousness which I believe is the state that the perps work to keep us in when they are interfering with our sleep. This state is likely most vulnerable to hypnotic suggestion. 
Getting Nano Tattoos Right
PDF:  ACLU on Government Watchlisting
US Government Watchlisting:  Unfair Process and Devastating Consequences
The 166-page “sensitive security information” document that details how the government decides whether someone should be on a terrorist watchlist has been leaked to the press.
“The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place ‘entire categories’ of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to ‘nominate’ people to the watchlists based on what is vaguely described as ‘fragmentary information’.” - The Blaze

SURVEILLANCE:  How do local cops get around the law?

Local Cops Can Skirt State Limits on Surveillance By Joining Federal Task Forces

May 8, 2018
By Michael Maharrey
Joining a federal task force means being deputized as a federal officer, which allows state and local cops to ignore local limits on surveillance.
By joining joint law enforcement task forces run by the federal government, local cops can often ignore stringent state and local laws governing surveillance and engage in warrantless spying.
It’s well-known that a federal program known as “Equitable Sharing” allows local prosecutors and police to bypass more restrictive state asset forfeiture laws by passing cases off to the federal government through a process known as adoption. A Department of Justice directive issued last summer by Attorney General Jeff Sessions reiterates full support for the equitable sharing program, directs federal law enforcement agencies to aggressively utilize it, and sets the stage to expand it in the future.
Through the adoption process, local police claim cases are federal in nature to justify transferring them to federal jurisdiction. Under these arrangements, state officials simply hand cases over to a federal agency, participate in the case, and then receive up to 80 percent of the proceeds.
Participation in federal joint law enforcement task forces gives state and local police a similar means to circumvent restrictive state surveillance laws and conduct warrantless spying with immunity.

How Local Cops Can Ignore Local Laws

When state or local law enforcement officers join a federal joint task force, they are deputized as federal agents. As a result, they can operate under the exact same parameters as an FBI or DEA agent. That means they are no longer bound by state laws governing surveillance. In practice, this allows local cops to ignore state laws as they collect information on people in their communities.
For instance, last year, Illinois passed the most restrictive law on cell site simulators in the country. Commonly referred to as “stingrays,” these devices essentially spoof cell phone towers, tricking any device within range into connecting to the stingray instead of the tower. This allows law enforcement to sweep up communications content, as well as locate and track the person in possession of a specific phone or other electronic device.
Under the Illinois law, police must get a warrant before using a stingray to track an individual’s location in most situations, and they are barred from using the devices to access data on electronic devices or listen to conversations. But an Illinois police officer serving on a joint task force can ignore the warrant requirement and deploy a stingray despite the state law.
According to a report by the Century Foundation, Joint Terrorism Task Forces (JTTFs) are particularly invasive due to their broad and sweeping mandate to “prevent terrorism.”

The War on Terror Expands Law Enforcement’s Reach

Prior to 9/11, there were about 30 JTTFs scattered around the US. Today, more than 180 such task forces operate all across the US. According to memoranda of understanding (MOUs) obtained by the ACLU, state and local law enforcement officers assigned to JTTFs follow federal rules for intelligence gathering
According to the New Century report, these JTTFs also allow state and local cops to operate in virtual secrecy and with little or no local oversight.
Partnerships on JTTFs may also enable local and state police to conduct activities in secret, under cover of federal law protecting ‘classified information,’ where their activities would otherwise be subject to public scrutiny through state open records laws. Sometimes, local officers deputized to work as federal agents on JTTFs aren’t even subject to ordinary chain-of-command requirements, for example, if their local commanding officer doesn’t have security clearance to access information held by the JTTF member. These frameworks make it impossible to hold local and state law enforcement officials accountable for their work on JTTFs.
In 2008, the DOJ established rules allowing FBI agents to conduct “assessments”—essentially an investigation without any indication of terrorist or criminal activity. Any FBI agent can unilaterally initiate an assessment for up to 30 days without any oversight. After 30 days, the agent must report to a supervisor. From that point, the supervisor can renew the assessment every 30 days. An agent does not have to have probable cause or even reasonable suspicion to open an assessment. He only needs to have an “authorized purpose” and a “clearly defined objective.” According to the Brennan Center for Justice, agents can engage in the following activities, among others, during the assessment phase.
  • Recruit informants to monitor the subject.
  • Question people without revealing their identity.
  • Search commercial and government databases.
  • Conduct physical surveillance of a person’s public movements.
When operating within a JTTF, a local law enforcement officer can engage in all of these activities, regardless of state law or department policy.

The Warrantless Collection of Data

Deputization and membership in a JTTF also opens the door for local cops to access federal databases holding information that was collected without a warrant.
Local and state police assigned to JTTFs and deputized as federal agents may even have access to information collected by the CIA, NSA, or foreign intelligence agencies, as their FBI counterparts do. Indeed, FBI guidelines allow agents to ask the CIA and NSA for information on people agents are investigating during an assessment. Again, agents and task force members do not even need to suspect someone of involvement in criminal activity before opening such an assessment. Local police assigned to the JTTF may therefore have access to information about Americans that was collected by the NSA without any judicial process, even if the targets of the spying aren’t suspected of any crime—let alone a serious offense connected to terrorism.
The FBI calls JTTFs “our nation’s front line on terrorism: small cells of highly trained, locally based, passionately committed investigators, analysts, linguists, SWAT experts, and other specialists from dozens of U.S. law enforcement and intelligence agencies.”
The New Century report came up with a much less glowing assessment.
Communities and individuals who have been monitored, harassed, or threatened by JTTF operations or their task force officers may see their role differently. To those groups, the JTTFs likely appear more interested in solidifying and expanding the power of their own bureaucracy, and protecting the political, social, and economic status quo—often at the expense and on the backs of marginalized communities. And despite the FBI’s claim that the JTTFs are the nation’s “front line on terrorism,” the FBI doesn’t have much to show, in terms of benefits to public safety, for the vast expenditures of public funds poured into them.

State and Local Governments Need to Step Up

Joint task forces further detach local peace officers from the communities they ostensibly serve. Federal deputization allows your local cops to operate outside of state law with virtually no local or state oversight or accountability. They can surveil you with impunity, even if your state has passed laws to protect your privacy.
Joint task forces should not serve as a vehicle to circumvent state law. State and local governments need to take steps to regain control over their police departments. They should refuse to lend their officers to any joint task force that does not operate within the limits of state surveillance laws. They should also insist on having an oversight role when any of their officers are involved in joint investigations.
Despite revelations by Edward Snowden and other whistleblowers revealing the total disregard of the Fourth Amendment by federal agencies like the NSA, Congress has shown no inclination to rein in the federal surveillance state. State and local government may not be able to completely shut down the federal surveillance state, but they certainly don’t have to participate.
Michael Maharrey is the national communications director at the Tenth Amendment Center. This article was sourced from
BOOK:  The CIA as Organized Crime

The CIA as Organized Crime: How Illegal Operations Corrupt America and the World

Jan 15, 2017
This book provides a cross-section of Douglas Valentine's investigations into CIA engagement in terrorism, drugs, and propaganda. Author of three books on CIA operations, Valentine's research into CIA activities began when CIA Director William Colby gave him free access to interview CIA officials who had been involved in various aspects of the Phoenix program in South Vietnam. It was a permission Colby was to regret. The CIA would rescind it, making every effort to impede publication of The Phoenix Program, which documented the CIA's elaborate system of population surveillance, control, entrapment, imprisonment, torture and assassination in Vietnam.
While researching Phoenix, Valentine learned that the CIA allowed opium and heroin to flow from its secret bases in Laos, to generals and politicians on its payroll in South Vietnam. His investigations into this illegal activity focused on the CIA's relationship with the federal drugs agencies mandated by Congress to stop illegal drugs from entering the United States. Based on interviews with senior officials, Valentine wrote two subsequent books, The Strength of the Wolf and The Strength of the Pack, showing how the CIA infiltrated federal drug law enforcement agencies and commandeered their executive management, intelligence and foreign operations staffs in order to ensure that the flow of drugs continues unimpeded to traffickers and foreign officials in its employ.
[Phoenix program patch] Ultimately, portions of his research materials would be archived at the National Security Archive, Texas Tech University's Vietnam Center, and John Jay College.
This book includes excerpts from the above titles along with subsequent articles and transcripts of interviews on a range of current topics, with a view to shedding light on the systemic dimensions of the CIA's ongoing illegal and extra-legal activities. These terrorism and drug law enforcement articles and interviews illustrate how the CIA's activities impact social and political movements abroad and in the United States. A common theme is the CIA's ability to deceive and propagandize the American public through its impenetrable government-sanctioned shield of official secrecy and plausible deniability.
Though investigated by the Church Committee in 1975, CIA praxis then continues to inform CIA praxis now. Valentine tracks its steady infiltration into practices targeting the last population to be subjected to the exigencies of the American empire: the American people.
SURVEILLANCE:  Thru the Wall Radar
Seeing Through Walls With a Wireless Router
By David Hambling August 1, 2012
Look ! what RADIO WAVES can do! through one foot thick walls!!! It picks up my breath rate by measuring my rib cage moving (while I am sleeping) and my heart beat at my wrist (while I am sleeping) and it can't be detected or shielded!
Of course everyone knows by now that RADAR can locate a target, lock onto a target and TRACK a target. (The definition of the acronym RADAR means radio detection and radio direction and ranging.) NO CHIPS NEEDED TO LOCATE A TARGET
Once a target is located, the radio wave power can be increased and beam focused to pin point accuracy, that can stimulate nerve endings (feels like electrocution - i.e. rapid firing of a synapse); burn a body part; vibrate a discrete body part (including down to the accuracy of vibrating a single tooth); IT HURTS; IT IS TORTURE!
The MECHANICAL vibration of radio waves and radio wave SHOCK WAVES and PRESSURE WAVES cause concussions and sub-concussions and other bodily trauma.
The FCC call these RADAR devices that use radio waves as RADIOLOCATORS & INTENTIONAL RADIATORS. They are also known as TTWS (Through-The-Wall-Surveillance); a.k.a. STTW (Sense-Through-The-Wall); a.k.a. TWS (Through-Wall-Sensors).
There is one case that I know of that has gone as far as the 10th Circuit Appellate Court, where a home was searched using RADAR radio waves: US v. Denson.
In 'Sneeking Past Kyllo', USA TODAY commented that the warrantless search using RADAR radio waves, was allowed in the DENSON case, whereas the evidence gathered in KYLLO v US, using a FLIR (forward looking infrared heat sensing devise that measured the heat escaping from a home), was not allowed. The majority opinion was written by Justice Scalia, Supreme Court.
If you click through all the links in the USA TODAY article, you will find Marshal Moffet's testimony transcribed.
The Supreme Court in May 2015 denied the petition for review of the DENSON case: 
Denson v. United States, 556 US 568 - Supreme Court 2009
Supreme Court of United States, June 15, 2009. 
The petition for a writ of certiorari is denied. 
The U.S. Department of Justice had waived any response to the petition.
In the 1930s, U.S. Navy researchers stumbled upon the concept of RADAR when they noticed that a plane flying past a radio tower reflected radio waves. Scientists have now applied that same principle to make the first device that tracks existing Wi-Fi signals to spy on people through walls.
Wi-Fi radio signals are found in 61 percent of homes in the U.S. and 25 percent worldwide, so Karl Woodbridge and Kevin Chetty, researchers at University College London, designed their detector to use these ubiquitous signals. When a radio wave reflects off a moving object, its frequency changes—a phenomenon called the Doppler effect. Their RADAR prototype identifies frequency changes to detect moving objects. It's about the size of a suitcase and contains a radio receiver composed of two antennas ¬and a signal-processing unit. In tests, they have used it to determine a person's location, speed and direction—even through a one-foot-thick brick wall. Because the device itself doesn't emit any radio waves, it can't be detected.
Wi-Fi RADAR could have domestic applications ranging from spotting intruders to unobtrusively monitoring children or the elderly. It could also have military uses: The U.K. Ministry of Defence has funded a study to determine whether it could be used to scan buildings during urban warfare. With improvements, Woodbridge says, the device could become sensitive enough to pick up on subtle motions the ribcage makes during breathing, which would allow the RADAR to detect people who are standing or sitting still.
See image above for how it'll work.
When Wi-Fi radio waves bounce off a moving object, their frequency changes. If, for example, a person is moving toward the Wi-Fi source, the reflected waves' frequency increases. If a person is moving away from the source, the frequency decreases.
A Wi-Fi Internet router already in the room fills the area with radio waves of a specific frequency, usually 2.4 or 5 gigahertz.
One antenna of the RADAR system tracks the baseline radio signal in the room.
A second antenna detects radio waves that have reflected off of moving objects, which changes their frequency.
By comparing the two antennas' signals, the computer calculates the object's location to within a few feet as well as its speed and direction.
CRIMINALS:  First Implanters Responders
ITACG Intelligence Guide for First Responders
How to run an electronic implant operation.
How to run a drug operation. How to steal cars.
How to electronically harass people.
How to slander people and make everyone hate them.
How to kill people with microwaves and get away with it.
How to pay citizens to hurt other citizens using gift cards.
How to take the will out of a human and make them suicide.
[This is Ian, the Moraman stalker from Brigham City, Utah.]
ENVIRONMENT:  Legal Action to Enforce FOIA request for Documents

Legal Action Update: Government Controlling Weather Forecasts To Cover Climate Engineering Crimes

By Dane Wigington
How much longer can our government continue to hide the global climate engineering assault in plain sight? How much longer will populations continue to blindly accept the official government narrative of lies and denial in regard to the clearly visible and rationally undeniable ongoing geoengineering operations? How is it possible for the power structure to create and maintain the official denial of fully deployed climate intervention programs? By completely controlling the flow of information, including the weather forecasts themselves. and Stop Geoengineering Minnesota are relentlessly continuing with our legal efforts to force disclosure of the ongoing illegal climate engineering operations. The statement below (full statement on the website) was made by the lead attorney for our Legal Alliance to Stop Geoengineering, Julio Gomez, Esq. The statement is a response to a handful of National Oceanic and Atmospheric Administration (NOAA) documents that have finally been released to us as a direct result of the lawsuit that we filed to force NOAA to release the information. Though thousands of documents have been promised for release, to date only a few have actually been disclosed and received. The documents we have been able to acquire make it clear that the US government is doing all they can to completely control weather forecasts all the way down to the local level. Why? So that forecasts are based on the scheduled weather produced by the climate engineering operations, not by nature. In order to help hide the ongoing climate engineering crimes, the government is desperate to enforce consistent and completely controlled weather “forecasts”.
Last week the NOAA – The National Oceanic and Atmospheric Administration released a series of documents concerning the restructuring of the National Weather Service under a program entitled Operations and Workforce Analysis. The documents were released pursuant to a Freedom of Information Act Request made by Stop Geoengineering Minnesota in collaboration with and was filed last year. The documents are being released because Stop Geoengineering Minnesota filed a legal suit against the US Department of Commerce for failing to respond adequately to the FOIA request.

White House to create artificial intelligence committee

By Ali Breland - 05/10/18 02:25 PM EDT
The White House announced Thursday that it will establish a panel of federal government officials to look at artificial intelligence (AI) issues. The Trump administration announced the new Select Committee on Artificial Intelligence on the same day that it held a major AI summit with business leaders in Washington. The AI panel will include officials from the White House Office of Science and Technology Policy, the National Science Foundation and the Defense Advanced Research Projects Agency (DARPA). The committee’s representatives will also include officials from the National Security Council (NSC), the Office of the Federal Chief Information Officer and the Office of Management and Budget (OMB).
The panel aims to examine U.S. priorities and investments on AI development, according to prepared remarks from Michael Kratsios, Deputy Assistant to the President for Technology Policy. The White House's moves come after prodding from the technology industry for the administration to offer more support for the development of AI technology.
Some have expressed worries about China’s rapid advancement in AI technology, and have urged the U.S. to make the area a bigger focus. American tech companies have said they are concerned the U.S. could eventually cede its dominant position in AI markets if the White House did not step in to help the industry. Tech figures welcomed the White House’s new efforts on the topic Thursday. “Today's White House meeting is critical to ensuring the potential of AI is achieved and advanced in a fashion that is broadly beneficial to Americans,” said Dean Garfield, the President of Information Technology Industry Council, a lobbying group for major technology firms. “The White House’s new artificial intelligence advisory committee is a great first step to forge better collaboration between industry, government, and academia.”

PROVERBS 15:21-26 (NIV)

Folly brings joy to one who has no sense, but whoever has understanding keeps a straight course. Plans fail for lack of counsel, but with many advisers they succeed.

A person finds joy in giving an apt reply—and how good is a timely word! The path of life leads upward for the prudent to keep them from going down to the realm of the dead.
The Lord tears down the house of the proud, but he sets the widow’s boundary stones in place. The Lord detests the thoughts of the wicked,but gracious words are pure in his sight.
COMMENT: Proverbs is known as the book of wisdom. Some people read a chapter each day of the month. There is so
much to think about in this one book! Above are a few wise words to guide our way.
Resources for Florida TI's
Any TI's in the State of Florida who have become homeless or need some type of assistance can open this document and hopefully find what you need. This newsletter software will not let me put a pdf in this document so I will put a link to the home page of our website. The Florida Resource Guide is in the first section on the left hand side in the blue box.
NEW SUPPORT GROUP-British Columbia, Canada
Vancouver, BC Public Library 
April,  14, 2018
Time: 3.00PM - 5.00PM
350 West Georgia Street
Vancouver, BC V6B 6B1
Contact- Genet at email -
Since becoming a victim of electronic torture over the past two years I have had the honor of getting to know Dr Milicent Black. She is one of my favorite people in the targeted individual community. Her strength and desire to help other victims is unparalleled. She is such a genuine, sincere and caring person and a blessing to the community. If anyone reaches out to her for help or support she is always available and helps any way she can. She reminds me a lot of Karen Stewart in that way. She is on the Techno Crime Fighters Forum, does many interviews and does a church call for victims on Saturdays.
Dr. Millicent Black’s Church Podcast @ 6 pm EST
ID 140567#, pin 1#
Dr Black is asking for our support now with this new campaign. I believe by uniting and supporting each other we can be in a better position to fight so I encourage anyone who has the time to help Black with this initiative.
Stopgangstalkingcrimes newsletter
Volunteers are not professionals they are just people willing to help others out.
Terry Oregon  -  (503)-388-2902  9am-12pm Pacific Time
Linda California  -  (209)-728-8803   10am-9pm Pacific Time
Amy Oregon  -  (971)-207-3401   11am-11pm Pacific Time
Looking for others to join our Volunteers
Remember the fallen ones
May GOD BLESS all Targeted Individuals with the end to these crimes. Amen
TI's:  Class Action Lawsuit
Christi Duncan (a TI victim) is looking to organize a class action for victims of electronic harassment and organized gang stalking. If anyone is interested in working with her on this or being involved she is asking that you email her directly at She has almost 100 people involved with her on this, but looking for more. The idea and hope is to combine efforts of those like Spencer Carter and others who are taking on similar initiatives.  Please help spread the word.  We have lots of great motivated people working on this!
ACTIVIST:  Mike Mason
OREGON CONFERENCE CALL Saturday March 3, 2018 12:30 PM Pacific Dial-in number: 515-739-6045 Access code number 874647 On Free Conference Call. This conference call is for all those targeted in Oregon. Please participate. Amy 971-207-3401
Freedom for Targeted Individuals International Call:
Every Saturday we invite you to join us for
Freedom for Targeted Individuals International Podcast
* To call in Internationally, use  your country's international call in number first (link), after the automated prompt, you enter 541.275.1131#
Starting at 3 pm EST/ 12 pm PST
(no pins required)
International Dial -in Numbers
To join online
Ella Free's Podcast
Tuesdays & Thursdays
Beginning at 9 pm EST/ 6 pm PST, you can join us live by calling into 724.444,7444, enter ID 141476#, then 1#
Link to podcast schedule:
Don't forget to check our current action and events tab to get involved with activism events.

Ella Free
Coordinator, Media Outreach & Podcast Host
ACTIVIST:  Dr. Millicent Black

Moderator:  Neal
Citizens Against Harmful Technology
Time:  8:30 p.m. Eastern
Talkshoe:  724-444-7444,  Pin #134999
Moderator:  Renata
Time:  3 p.m. Eastern
Talkshoe:  724-444-7444, Pin #114616

Moderator:  Mike Mason
Time:  6:00 pm Eastern

ID 116202#
Moderator:  Ella
Time:  9:00 p.m. Eastern
Talkshoe:  724-444-7444, Pin# 141476
After Ella's Podcast:
Vulcan Wolverine
Talkshoe:  724-444-7444, 142394#
Moderator:  Kyle
Time:  After Ella’s call
Talkshoe:  724-444-7444, Pin #142394
Moderator:  Derrick
Time:  9:00 p.m. Eastern
Free Conference:
319-527-2701, Code 248671
Moderator:  Mike Mason
Time:  6:00 p.m. Eastern
Free Conference:  641-715-0632,
Code 116202
Moderator:  Frank Allen
Time:  6:00 pm. Eastern
Moderator:  Loren W.
Time:  9:00 p.m.
Talkshoe:  724-444-7444, 798056#
712-432 3900
Moderator:  Terry
Time:  3:00 pm PST/6 pm EST to
6:00 pm PST/9:00 EST
Bring Awareness about Gangstalking
Talkshoe:  (724)-444-7444    Call ID: 143944
Moderator:  Ella
Time:  9:00 Eastern
Talkshoe:  724-444-7444, 141476
Moderator:  Kyle (Vulcan Wolverine)
Time:  After Ella’s call
Talkshoe:  724-444-7444, 142394
Moderator: Frank Allen

Targeted Individual Massachusetts
Time: 9:00 pm Eastern
Call-in Number: 646-749-3112
Access Code: 450-414-301
Join by Computer:
Moderator:  Julia
Engage in Prayer
Time:  9 pm Eastern/ 8 pm Central/
7 pm Mountain/ 6 pm Pacific
Call-in number: (515) 739-1405

International Dial-in Numbers:                   

Call ID: 141476
Access Code: 381878
Moderator:  Terry
Time:  12:00 am Eastern
Talkshoe:  724-444-7444, 143944
Moderator:  Dr. Millicent Black
Church Conference Call
Time:  6:00 pm Eastern
Talkshoe:  140567
Moderator:  Frank Allen
Phone:  646-749-3112
450-414 3112#
Moderator:  Ella
Freedom for Targeted Individuals
International Activism
Time:  7:00 pm Eastern
Free Conference:  541-275-1131
Moderator:  Lauron
8:00 pm. Eastern
Talkshoe:  142124
Moderator:  Scott Snitzer
Time:  5:00 pm Eastern
Snitzer's TI Contact Call
Talkshoe:  724-444-7444, 138602
Moderator:  Derrick
Time:  9:00 pm Eastern
Phone:  319-527-2701
ID:  248671#
Activism/Support Groups
Contact- Genet at email -
Denver, Colorado
Area Support Group
Contact:  Xontu Garcia
Atlanta, Georgia
Support Group Meeting

Contact:  Carol Dimas
Phone:  470-312-6578
New York City Support Group
Contact:  Angel Acevedo
Phone: 646-806-8654
Houston, Texas
  For more information, you may contact
  Tereza Dutta -

Seattle, Washington
Location: Broadview Branch Library at:

12755 Greenwood Ave. N.
Seattle, Washington 98133-7901

For more information, you may contact
Laura Solway - 206-365-6139
Curtis Kimble – 817-901-8720


Hollywood District Public Library
Please attend the next Portland, Oregon Targeted Individual Next Meeting Saturday May 12, 2018
4040 Northeast Tillamook
Portland, Oregon
Contact person;  Amy – 971-207-3401

Vancouver, BC V6B 6B1, Canada
Vancouver, BC Public Library 
Meeting: ________, 2018
Time: 3.00PM - 5.00PM
350 West Georgia Street
Contact- Genet at email -
The West Coast Society For All Victims Of Organized Stalking And Electronic Harassment
PO Box 534
Heriot Bay, British Columbia V0P 1H0
South Carolina
  For more information, you may contact
  Gail -

An Announcement To The Whole World By Chinese Victims
Of Electronic And Psychotronic Weapons

The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners. 
Please enable images

Citizens Against Harmful Technology  •  P.O. Box 1125  •  Edgewater, FL 32141

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Please enable images
Please enable images