To receive email from Citizens Against Harmful Technology, add to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Share on Facebook Share on Twitter More Share Options
Floodwaters from Hurricane Florence Rising

Citizens Against Harmful Technology Newsletter
Actively Participate In Educating the Public

September 23
, 2018

NEW POST OFFICE BOX:  P.O. Box 1125, Edgewater, FL 32141
Make checks payable to CAHT.

If you send a check to the P.O. Box, please notify Skizit by email
also so I know that it has not been stolen. We cannot trust the post office.
MEMBERSHIP:  $30.00/yr
(free booklet, brochure, membership card)

Sunday at 8:30 P.M. E. Coast, 7:30 Central, 6:30 Mountain, 5:30 W. Coast

The new call in # is (605) 475-4779, Access Code: 607080.
ID: electricrose222, Moderator: Neal
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email. 

Please print a copy of this newsletter and any newsletters you wish to maintain.  Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.  

This is an internet reference newsletter. A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
Please help us reach more people to teach them about TI's.
The emails we have sent out are being opened and read. We need more email lists.
PICK A GROUP, find their names and emails and send me a list.
We will send them an email AND a hard copy of the information packet.
We can send info packets for as little as $.18, thats eighteen cents with our bulk mail postal permit, and 500 emails costs $5.00 with our email subscription license.
MEDIA: That's any television, radio, newspaper, magazine, online forum, website.
EDUCATORS:  That's any university or high school, middle school or elementary.
CITY COUNCIL:  That's any city in the USA.
LAWYERS:  That's any lawyer in the USA and INTERNATIONAL, civil rights, personal injury.
CORPORATIONS:  Any corporation that is involved in business, especially those in Infragard and are involved in stalking and hurting TI's.

Create a list like this:,,,
That's all there is to it. If you want to include physical addresses, create a table in microsoft word, putting the email in one column and the physical address in the other and they can be extracted with no problem.
THANK YOU!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
DISCOUNTING TORTURE AND HARASSMENT EXPERIENCE OF TI'S using wrong definition of group stalking with pre-conceived conclusion.
This is travesty against all those being gangstalked, tortured and killed.
Complaints of group-stalking ('gang-stalking'): an exploratory study of their nature and impact on complainants
Journal of Forensic Psychiatry and Psychology June 2015 
David V James, Theseus, llp
Lorraine Sheridan, Curtin University
Stalking primarily concerns the actions of individuals. However, some victims report stalking by organised groups, this being known as ‘group-’ or ‘gang-stalking’. This phenomenon has not been subject to systematic study. An anonymous questionnaire was completed online by self-defined victims of stalking. One thousand and forty respondents met research definitions for stalking, of which 128 (12.3%) reported group-stalking. One hundred and twenty-eight individually stalked cases were randomly selected as a comparison group. All cases of reported group-stalking were found likely to be delusional, compared with 3.9% of individually stalked cases. There were highly significant differences between the two groups on most parameters examined. The group-stalked scored more highly on depressive symptoms, post-traumatic symptomatology and adverse impact on social and occupational functioning. Group-stalking appears to be delusional in basis, but complainants suffer marked psychological and practical sequelae. This is important in assessment of risk in stalking cases, early referral to psychiatric services and allocation of police resources.

(PDF) Complaints of group-stalking ('gang-stalking'): an exploratory study of their nature and impact on complainants. Available from:

Psychiatrists never look at the organ they treat - Don't let them drug you! Carry your psychiatric living will from our website.

The most important lesson from 83,000 brain scans | Daniel Amen | TEDx

THE WIGNER EFFECT:  Fukushima radiation effects and False Flag Airline Bombings

MAYDAY: The Wigner Effect
Cesium 137 from Chernobyl and Fukushima has a half life of 30 years. It is circling the earth affecting airplanes and helicopter machinery. Aircraft is affected by radiation in the atmosphere. The entire northern hemisphere is affected by the Wigner Effect. 
The Wigner effect, discovered by Eugene Wigner is the dislocation of atoms in a solid caused by neutron radiation. Any solid can display the Wigner effect. The effect is of most concern in neutron moderators, such as graphite, intended to reduce the speed of fast neutrons, thereby turning them into thermal neutrons capable of sustaining a nuclear chain reaction involving uranium-235. (Wiki)
TERMS:  Irradiation and Thermal Embrittlement, Fatigue, Relaxation Swelling, Neutron Irradiation, Dislocations, Grain Boundaries, Fusion Controlled Process, Stress, Temperature, Voids inside Metal lead to swelling of structure
Wigner1: Intro to Wigner Effect & Entropy
It takes these guys 5 minutes to get started, so just skip to 5:01.
False flag aircraft bombing, blame it on someone else conceived in 50's.

HURRICANE FLORENCE held in place with DE

Geoengineering Microwave Transmissions And Their Connection To Hurricane Florence ( Dane Wigington )

WEATHER SERVICE EMPLOYEES UNDER GAG ORDERS - They have a lot to hide so they can keep doing it.
For Immediate Release: Oct 08, 2015
Contact: Kirsten Stade (202) 265-7337


Special Counsel Asked to Reverse Recent Raft of Blanket Nondisclosure Policies
Posted on Oct 08, 2015 | Tags: NOAA
Washington, DC — National Weather Service employees face growing restrictions on their ability to disclose information about the inner workings of their agency, according to a complaint filed today by the National Weather Service Employees Organization (NWSEO) and Public Employees for Environmental Responsibility (PEER). They contend these gag orders are illegal and are pressing U.S. Special Counsel Carolyn Lerner to lift these nondisclosure policies and take action against responsible officials.
A key provision of the Whistleblower Protection Enhancement Act of 2012 curbed the use of blanket nondisclosure policies or agreements, otherwise known as “gag orders,” implemented by federal agencies. The act lays out specific exceptions which must be included as a part of any such confidentiality directive.
“The National Weather Service knows it’s unethical for union representatives to keep critical information from the employees they represent. By the very nature of a union, we are bound to communicate with our members and include their input on decisions affecting their jobs,” said NWSEO Executive Vice President Bill Hopkins. “As a taxpayer, I find it highly disturbing that a government agency continues to push gag orders to hide how they operate. This is the work of the American government, owned by the American public, and should be open to the American public.”
The complaint cites three gag orders issued in recent weeks by the National Weather Service and its parent agencies, the National Oceanic & Atmospheric Administration and the Department of Commerce. These orders forbid disclosure of information arising out of –
  • Organizational planning. This confidentiality order forbids disclosure of anything about the Weather Service Organization Workforce Analysis, which has the effect of muzzling any revelations about agency planning and the rationale for planned actions;
  • Grievance settlements. In July, the Commerce General Counsel instituted a policy that any settlement of grievances must include a nondisclosure clause. While it has an exception for “whistleblower cases” that exception comes nowhere close to meeting requirements of the WPEA and would block release of grievances involving actions by agency managers that constitute violations of law or regulation, waste of funds, mismanagement or abuse of authority; and 
  • Collective Bargaining. The National Weather Service has just added a confidentiality clause to its ground rules for Collective Bargaining Agreement negotiations which requires that all information about the CBA bargaining process must be held “confidential.” 
November 12, 2015
By Suzanne Maher
The Government is imposing illegal jackboot tactics to keep Weather Service employees muzzled and controlled as the COP21 in Paris, France December 2015 looms nearer.  The power structures “Agenda 21/2030 Sustainable Development”, a coup d’état on national sovereignty and freedoms is the end goal;  geoengineering, “the hook” to bring it to fruition.
National Weather Service employees face growing restrictions on their ability to disclose information about the inner workings of their agency, according to a complaint filed on October 8, 2015 by the National Weather Service Employees Organization (NWSEO) and Public Employees for Environmental Responsibility (PEER). They contend these gag orders are illegal and are pressing U.S. Special Counsel Carolyn Lerner to lift these nondisclosure policies and take action against responsible officials.
Washington has now placed “gag orders” on the following agency employees, “The National Weather Service”, the “National Oceanic and Atmospheric Administration”, and the “US Department of Commerce”.
Home Disaster Preparedness Kits
Would they have helped the people who got burned in their beds at 2:00 am in California fires? Would they have helped the people who got flooded out of their homes in N. Carolina?  Absolutely NO!
A FEMA spokesperson says the agency now recommends “at least a three-day supply of food, water, and medications,” but more water if it’s really hot, and “up to two weeks of supplies when preparing for catastrophic events.” A representative from the Centers for Disease Control and Prevention, on point in case of pandemics or bioterror attacks, says his agency’s recommendations echo FEMA’s. Tom Heneghan, senior manager for Disaster Program Development at the American Red Cross (practically a quasi-governmental entity in times of disaster), says households and businesses should have three days of supplies in case people have to evacuate but two weeks’ worth if people are sheltering in place.
Hurricane Florence was engineered in strength, placement and duration. The devastating effects were planned by the three agencies who have issued gag order on their employees so they can't warn anyone that they are going to lose everything they own and possibly their lives.


Baby swept in floodwaters describes tragedy
Reporter pretending winds are strong!

Weather Channel Reporter in Hurricane Florence Caught FAKING WINDS, storm surge FAKE acting

AI decides you are depressed based on what you say to medical personnel!
Machines know when someone’s about to attempt suicide. How should we use that information?
September 5, 2018, By Olivia Goldhill
A patient goes into the emergency room for a broken toe, is given a series of standardized tests, has their data fed into an algorithm, and—though they haven’t mentioned feeling depressed or having any suicidal thoughts—the machine identifies them as at high risk of suicide in the next week. Though the patient didn’t ask for help, medical professionals must now broach the subject of suicide and find some way of intervening.
This scenario, where an actionable diagnosis comes not from a doctor’s evaluation or family member’s concern, but an algorithm, is an imminent reality. Last year, data scientists at Vanderbilt University Medical Center in Nashville, Tennessee, created a machine-learning algorithm (paywall) that uses hospital-admissions data, including age, gender, zip code, medication, and diagnostic history, to predict the likelihood of any given individual taking their own life. In trials using data gathered from more than 5,000 patients who had been admitted to the hospital for either self-harm or suicide attempts, the algorithm was 84% accurate at predicting whether someone would attempt suicide in the next week, and 80% accurate at predicting whether someone would attempt suicide within the next two years.
Colin Walsh, the Vanderbilt data scientist who led the project, wants to see this algorithm put to widespread use. Currently, most people in the US are only assessed for suicide risk when they actively seek psychiatric help, or exhibit clear-cut symptoms such as self-harm. Walsh hopes his algorithm will one day be applied in all medical settings, in order to catch depressive behavior early on, and give doctors the ability to proactively offer care to those who haven’t yet asked for it or shown obvious symptoms.
Proof "talking to yourself" doesn't mean you are crazy.

Pentagon funds covert communications gear that attaches to your molar tooth and allows you to make cell phone calls from inside your own head

Friday, September 14, 2018 by: Vicki Batts

If you see someone talking to themselves, they might not be crazy: They might just be a secret agent. The Pentagon has just invested a staggering $10 million in a California company’s “Molar Mic” technology. The Molar Mic allows users to send and receive radio transmissions discretely with a device that attaches to the molar tooth. The nearly-invisible device eliminates the need for external microphones, headsets and earpieces.
Once this technology hits the streets, you’ll really never know who’s watching. The investment from the U.S. Department of Defense (DOD) will fund field testing and the deployment of the Molar Mic, which is being heralded as the next Bluetooth.
Sonitus Technologies, the wireless communications tech company behind the Molar Mic, received funding early on from In-Q-Tel, the non-profit investment arm of the CIA. But now, the device is ready for more in-depth testing.
Peter Hadrovic, CEO of Sonitus, won’t say if CIA operatives are already using the device, but did say that Molar Mic has been to Afghanistan and has been used in stateside rescue operations.

How the Molar Mic works

For transmitting audio, the Molar Mic features a mouthpiece that’s equipped with a waterproof microphone, which is tailored to fit the wearer’s teeth.
After it’s put in place, all the wearer has to do is speak normally and the device will send the audio to a radio transmitter, worn on a loop around their neck. The neck transmitter then sends the audio to a second radio unit worn on another body part. The second transmitter will then send the audio to the recipient.
A new company based in UAE is validating everything I have said about replacing natural weather with technocrats controlling the global water cycle. They claim to use “Ionospheric Technology” to steer cyclones, end dust storms, and bring rain to dought filled regions of the Middle East. I have talked many times over the past few years about a company called Aquiess which claimed to steer atmospheric rivers using electromagnetic waves, cloud ionization and “weather resonance technology.” Their website has disappeared from the internet and eerily seems to be related to this new company.
Climate Global Control Trading LLC claims they created and steered Tropical Cyclone Ashobaa (June 7-12, 2015) using their ionspheric technology. The implications of this claim are ASTOUNDING and confirm what many of us have already known: our weather is for sale and hurricanes can be controlled!
Do some of your implants only work when you lay down?  They contain accelerometers!

How an accelerometer works!

How MEMS Accelerometer Gyroscope Magnetometer Work

Implantable MEMS Pressure Sensor- Those in TI's are much smaller and placed in the feet to come on when you stand up or in the buttocks to come on when you sit down - has to stay in body 10 years or more.

MedTech - Miniaturized implantable pressure sensor

Pressure sensor is wireless implantable sensor with RFID chip and charges wirelessly.
Targeted Testimony 1:
I visited the salt mines near Hutchinson, Kansas to see what TI effects that I would experience at 650 feet below the surface. The mine is still a working mine. but, the part open to the visitors is not a working mine.
I visited there in the past, roughly 2004. It has been expanded since. Note: I was not a TI in 2004.
Anyhow, I plan to go back as soon as I can and stay down there as long as I can. I noticed a difference.

Note: I was disappointed later to learn that there was a wireless hot spot down there; a young kid told me that had a smart phone.

But, I understand; for safety reasons, must have many ways to contact the surface if something were to go wrong.
What improvements did I notice? The LONGER that I stayed the better that I felt. At the end of my stay, which was from 1PM to 5PM, I felt physically GREAT. Not euphoric, normal and good, and of course, cool and relaxed.
Anyhow, It was as though something had been lifted off my head and body. that i had been fighting without knowing I was fighting. Something, that I have not experienced up to this point, with all my gadgets and magnets, etc.
That feeling did not occur right away though. the longer that i stayed and spent time on the salt earth, versus the cement floor, the better.

When I first got to the bottom, I started to just walk away from the elevator towards the back of the giant salt room and then farther into the mine where there was more darkness. During the walk, I was being hit with a directed energy to the head. But, I kept going and kept feeling better as I kept walking and spending time there.
Later, I took a tour on a metal shuttle; wish that I could have just walked the tour; I would have grown closer to the rhythm of the earth.

On that tour, I could see the light at the back of my left eye and the floating particles in my left eye. even in the near dark. But, they were not consistent
After that tour, I stayed at the gift shop and also ate a snack (can't take food and water down into the mine but can buy it down there). I found that I did not want to leave. I was feeling so good, like the old days.
REgarding V2k in the mind, I can say that I heard the voices off and on, but not strong. And, they did not stay the whole time. But, hard to determine 100% with so many other people around.
TI Testimony II:
This equipment appeared on my neighbor's house facing my house, I began to be sick from microwave poisoning.
This is a picture of the man who has this on his house. I believe this is illegal microwave installation.


Curb sitting:  From experience, posture identifies who a person is. They posture themselves somewhere they wouldn't normally such as these fellows who sat down on the curb as I was leaving Publix. They seem to appear when I leave somewhere. These guys sat on the curb in the dark right next to traffic in front of the grocery store. That's not normal. One stares at me as I passed. I was his focus. When I left, they left.

This fellow at right was curb sitting when I came out of a grocery store. He didn't seem to have any reason to sit there and he seemed to be staring at me. I was his focus. When I left the parking lot, he left.
I had checked out at the store. There were no other customers. She alone was minding the store. There was someone sitting in the car waiting for me. This witness said the cashier followed me out of the store pointing her phone at my back and then sat down on the curb while I got in the car. When I sat down in the car, I noticed the same person who just checked me out, now was sitting on the curb with her phone. I asked her why she was sitting on the curb and if she knew she looked like a stalker. She said she's not a stalker and said she came out to smoke a cigarette. She's not doing anything, right?  When we drove out of the parking lot, she immediately got up and went back in the store. - Anonymous TI

Summary of No-Touch Torture Techniques
TI's endure all of these day and night without end.
Based on “The Torture Memos” and the Senate Intelligence Committee’s Declassified “Torture Report” (shortened)

04/2015, By Robert Duncan, A.B., S.M., M.B.A., Ph.D.
                Torture is a horrific topic and most minds will turn away from it because it can’t be comprehended that humans can be motivated, or computer programs can be run to do this to other sentient beings. Just when we believed we were becoming more civilized as a culture, the technology for torture has advanced more than a hundred fold in recent decades.
                The purpose of this report is to draw the parallels between physical torture techniques and no-touch torture methods used in secret by governments who possess the technologies that still go on today. This is a brief summary of offensive psychological and information warfare methods using traditional methods and modern cybernetic techniques while exploring hyper-game theory to walk the target to the desired path: leak intelligence, commit assassinations, or change beliefs.
  1. Induction of Depressive/Manic states
The idea is to shake up the emotional states of the target because different information can be accessed at each state. Making the target feel despair and helplessness is the objective. This cycle of hope building and then breaking is done in many ways. The techniques between the physical methods and the no-touch technological methods are similar. Speech is very important during this process of emotional manipulation.
  1. Memory Erasure
The military and CIA have been researching memory erasing drugs for half a century.  The focus of this summary report is on interrogation. Memory erasure is an important technique during interrogation. It is used in combination with sleep deprivation. There are many drugs that have been developed for physical memory erasure. One such interrogation method requires acquiring information from the target while on these drugs and recording the subject. After a sleeping cycle, the interrogator claims that the target has confessed. Of course the target remembers nothing of their conversation. The interrogator will play samples of the subject’s conversation back to them making the subject believe that the interrogator knows more than they do. Similar techniques are used in the wireless, no-touch torture and interrogation programs. The cybernetic methods of memory erasure have additional purposes. The memory erasure can be used on the cybernetic target to make the target believe people have broken in and moved their belongings. While physical black bag jobs do occur, it is a way to make the target more paranoid.
  1. Electricity and Shocks
Pain and fear of death are common tactics during interrogation. Shocking by electricity is a traditional method of torture and exposed in the CIA’s secret prisons. Shocking the testicles and nipples are the most common due to their sensitivity. Interestingly, the thousand of interviews of no-touch torture involves “stings” and “shocks” to various parts of their bodies over long durations.
  1. Fear and Terror
There are many techniques to induce extreme fear in the target. In physical renditions dogs, power drills, guns, insects, mutilation, blow torches, water boarding, suffocation, mock burials, and mock executions are just a few the United States government have used. Remember that many targets of torture die from the physical effects. It is torture to death.
Let us compare the no-touch torture methods used to inflict the same terror and mental anguish. In several of these techniques the target needs to hear their handler’s voice [V2K]. This report does not describe the technologies used to broadcast voices to the target at a distance. While the subject can be broadcast mental images to their mind using hypnosis and other suggestions as well as visual entrainments, the more invasive controls of the brain manipulation technologies can be used to entrained the brain’s autonomic nervous systems such as not breathing causing the target to not be able to sleep from fear of suffocation equivalent to water boarding. The neural linguistic programming can add fears such as heart attack, stroke, and cancer threats. Even motor cortex mapping can cause twitches in any part of the body. One example used a swift neck movement with a voice transmission, “We are trying to break your neck.” Directed energy effects such as Active Denial System can make the target feel that they are on fire indefinitely without the target dying from burns. Maximum pain and torture weapons have been evolving. Every drug effect can be artificially induced into the target mind including those of poisons.
  1. Imprisonment and Isolation
Isolation is commonly used as punishment in prisons. Many whistleblowers like Bradley Manning suffer this condition. In soft interrogation it is used to get the target to talk to their interrogator since humans have the need for companionship. In no-touch torture the target is driven from their friends and family using different techniques in order to isolate them so that the electronic mind control has more effect on their psyche. Like in Guantanamo, the target becomes isolated losing their job and medical care. Part of the method involves slander in their community. They end up on the most part in poverty and paranoid about doctors and other people from false correlations that are purposefully induced into their lives. Isolation is also a form of sensory deprivation which will be discussed later. Days and weeks lose their meaning.
  1. Sexually Disturbing Tailored Pornography
The Summary of the Senate Torture Report disclosed the disgusting revelations that in the secret torture prisons the targets were forced to perform homosexual acts on each other against their will and religion in order not to be beaten or killed. This is a common break down tactic of belief systems and the human will. In no-touch torture the techniques are more psychologically specialized for each target. Most common examples include homosexual targets that are forced with voices that are derogatory to their lifestyle and similar mental images. Almost all targets are forced to view child pornography in their minds. And vice versa is true, that heterosexual targets are forced to view homosexual sexual acts like in the secret U.S. torture prisons.
  1. Mutilation
Also mentioned in the declassified report on torture was mutilation of the human. Cutting the naked target’s penis and scrotum, pulling nails or teeth is common. In no-touch torture mutilation is done by trickery. Let us look at a couple examples. There have been several targets who believed that the microwave hearing effect and other voice induction methods were done by microchips implanted in their teeth or ears. They had all their teeth pulled because they believed it was a technology called bone conductance. Others have poked out their ear drums in the belief they had micro implants in their ears. There are many more examples of trickery used to make the targets mutilate themselves.
  1. Personal and Spiritual Defamation
In physical torture the CIA and other groups use propaganda and defamation of character for those they oppose. For detainees they try to disenfranchise the target from their religion. They will defecate on their Bible or Koran for example. They might say, “Why is your God not saving you?” In no touch torture and behavior modification they might try to make an atheist believe in god. It is just a mechanism to alter belief systems for control and experimentation. Perhaps the target may wish to confess their secrets to a “voice of god weapon”. Information warfare covers the gamut of electronic communication as well. The government training exercise uses language like “befriend”, “infiltrate”, “mask/mimic”, “ruse”, “set-up”, “disrupt”, “create cognitive stress”, “use deception”, “ruin business relationships”, and “post negative information on appropriate forums” - in a malicious effort to target bloggersactivistsjournalists, social event organizers and anyone else deemed to be a ‘emerging leader’ or voice in the public sphere.
  1. Psychological Intimidation
This is a topic for a target at the beginning of the trials and programs. Physical break-ins are common even if the target has an alarm system. The NSA has used stalking of foreign officials in the past for economic gain. The FBI does black bag jobs to invade a home without a warrant. The point is to let the target know they are being watched and to increase their paranoia. The NSA easily hacks all computer systems and causes harm to the victim’s intellectual property and their relationships from that endpoint. In the no touch torture false correlations between pain and a neighbor coming home can be induced.
  1. Rape
Rape is a common practice in torture. It causes much psychological trauma. In the United States methods of rape in their military and CIA secret prisons it is often relabeled. It is commonly done by prods but “rectal rehydration” is the more common misnomer. Often they call it forced feeding through the rectum but it is meant to induce psychological scaring and trauma. Several have died from the technique due to rectal bleeding. In no-touch torture the psychological trauma of simulated rape takes on different forms. Using technique often called EEG-heterodyning the targets will receive molestation effects of their genitals. In men this can be the anus and genitals. Similarly women can be wirelessly raped by the analogous function of perception.
  1. Dietary Manipulation, Forced Weakness and Sickness
The idea behind dietary manipulation is to weaken the target. This is easily done in a physical setting but in no-touch the hunger trigger needs to be suppressed. Sometimes a false correlation between eating food and sickness is induced to make the target believe they are being poisoned. However, poisoning is common in physical renditions too.
  1. Repetition
Verbal breakdown is most important during interrogations and torture. Obviously speaking the language of the target is necessary. This is why there are interrogators in all languages. Repetition is an important neural linguistic programming interrogation tactic to influence the target mind. During the breakdown process, threats to kill and to torture the target’s family or friends are common. Repetitious questioning and breakdown phrases are automated in both the physical and no-touch versions of torture. An interesting technology that is used for no-touch torture is called chatter bots. Chatter bots, an artificial intelligence program, automate much of the repetition so that the interrogators don’t drive themselves crazy during the neural linguistic torture and programming phases. Let us not forget the Chinese Water Torture, a single drop of water on the forehead of the detainee for months. Repetition is a form of torture.
  1. Sensitization of Pain Impulses
While the reverse can be obtained, optimizing perceived pain and misery is the objective in torture. Each trauma adds to the overall misery throughout life. Optimization of pain has been studied by the military and intelligence agencies. In the past the CIA has used drugs such as LSD to enhance fear and terror in the subject. Other methods such as hypnosis can increase perceived pain and the power of suggestion such as telling the subject his pinky finger is going to be cut off before it is done. In no-touch torture the same psychological manipulations are exerted. Subliminal and overt suggested are often told to the subject before the directed energy or EEG heterodyning pain inductions in order to maximize their effectiveness.
  1. Sensory Overload and Deprivation
Again, this technique of overloading or depriving the human of sensory stimulus is ubiquitous in torture around the world not just in U.S. secret prisons. Torture subjects in the United States have reported the use of repetitive bad music and noise campaigns. An unusual torture technique used in the U.S. secret prisons was of a use of a plastic suit filled with ice while they beat the target. Ultra bright lights for days on end in the prison and hot/cold temperature changes in the environment are frequent. In no-touch torture, the target’s brain is forced to release dopamine which causes pupil dilatation. This acts as a sensory overload. For example the non-lethal microwave weapons research done by a professor in University of Nevada has shown this capability. Body metabolism can be altered with these weapons causing cold and hot flashes. Targets of no-touch torture often hear endless tinnitus.
  1. Sexual Humiliation and Lack of Privacy
Often used in common prisons is a lack of privacy. It is both necessity for security and a form of sexual humiliation. Also in prison many people are raped. No-touch torture offers the same sexual humiliation and lack of privacy by using through wall radar, cameras, and EEG visual cloning to let the target know they are being watched. Degrading comments are often used on the no-touch torture subjects while they are naked or in the bathroom.
  1. Maximum Sensory Pain Techniques
Basic torture involves brutalization, i.e. physical strikes, kicks in the groin, pepper spray or tear gas, etc. Anything that involves maximum pain is the objective. Amazingly, these same basic tortures can be done wirelessly into the human mind. All forms of sickness have been reported without any real illness behind the suffering. All suffering can be entrained into the minds of no-touch torture subjects.
  1. Sleep Deprivation
This is the number one torture method along with the popularity in the press of water boarding. This is done in every country that uses torture. The United States is number one in torture since they are currently the world’s only superpower. A repetitive sleep deprivation cycle is generally done 180 hrs/7.5 days at a time in the physical renditions, or in no-touch torture five days awake and two days of sleep. Sleep deprivation accomplishes the objective of memory loss during interrogation and induces hallucinations which help with the interrogation process. In behavior modification and programming it is necessary too.
  1. Stress Positions
Keeping detainees handcuffed above their head and to walls so that they must stand for days is a common ploy in torture. These types of poses are called stress positions. They can be mimicked in no-touch torture. An example of one such trick requires the target to believe they can deflect radar energy using pots or pans and that it is directional. The target is being given an ample amount of pain until their hands and arms are spread apart holding the pans trying to block the signals. They must maintain that position in order to get any relief from the torture signals. However the stress position itself is physical torture. Often accompanying this technique are voices saying to the target, “You are doing it to yourself.”
We will finish off this summary of U.S. and its allies’ torture, interrogation, and behavior modification experimentation with ideas of why they are done to the general public and falsely accused detainees. Anyone can be put into these programs. Justice and rule of law does not exist at the highest levels of government. Treaties are worthless because the #1 agreement in the rules of war, a ban against torture, is not obeyed. This creates a more brutal and barbaric society lead by example.

When word came to Sanballat, Tobiah, Geshem the Arab and the rest of our enemies that I had rebuilt the wall and not a gap was left in it—though up to that time I had not set the doors in the gates— Sanballat and Geshem sent me this message: “Come, let us meet together in one of the villages on the plain of Ono.” But they were scheming to harm me; so I sent messengers to them with this reply: “I am carrying on a great project and cannot go down. Why should the work stop while I leave it and go down to you?” Four times they sent me the same message, and each time I gave them the same answer.

Then, the fifth time, Sanballat sent his aide to me with the same message, and in his hand was an unsealed letter in which was written: "It is reported among the nations—and Geshem says it is true—that you and the Jews are plotting to revolt, and therefore you are building the wall. Moreover, according to these reports you are about to become their king and have even appointed prophets to make this proclamation about you in Jerusalem:  ‘There is a king in Judah!’ Now this report will get back to the king; so come, let us meet together.” I sent him this reply: “Nothing like what you are saying is happening; you are just making it up out of your head.” They were all trying to frighten us, thinking, "Their hands will get too weak for the work, and it will not be completed.” But I prayed, “Now strengthen my hands.”
COMMENT: Whatever work God gives you to do, do it to the best of your ability and, like Nehemiah, don't let the lies of evil people distract you.
"Please join us every Tuesday & Thursday on Free Conference Call
Call-in  515.739.1285
enter PIN 400014#
Online Meeting ID: Tiangel2016
You can also find support information on our website:
under the support tab
You can listen to our recorded shows on our YouTube channel:
For further information you can email Ella at"
Thank you Skizit

Ella Free
Coordinator, Media Outreach & Podcast Host
Board Member & Director of Promotions
NEW SUPPORT GROUP-British Columbia, Canada
Vancouver, BC meetings¨will be held at:Location: Vancouver Public Library
Meeting Room
350 West Georgia Street
Vancouver, BC V6B 6B1
Contact:  Genet -
OREGON CONFERENCE CALL Saturday 12:30 PM Pacific Dial-in number: 515-739-6045 Access code number 874647 On Free Conference Call. This conference call is for all those targeted in Oregon. Please participate. Amy 971-207-3401
ACTIVIST:  Dr. Millicent Black

Your new dial-in number for Talkshoe is 605-562-0444
Moderator:  Neal
Citizens Against Harmful Technology
Time:  8:30 p.m. Eastern
Talkshoe:  605-562-0444,  Pin #134999
Moderator:  Renata
Time:  3 p.m. Eastern
Talkshoe:  605-562-0444, Pin #114616

Moderator:  Mike Mason
Time:  6:00 pm Eastern

ID 116202#
Moderator:  Ella
Time:  9:00 p.m. Eastern
Talkshoe:  605-562-0444, Pin# 141476
After Ella's Podcast:
Vulcan Wolverine
Talkshoe:  605-562-0444, 142394#
Moderator:  Kyle
Time:  After Ella’s call
Talkshoe:  605-562-0444, Pin #142394
Moderator:  Derrick
Time:  9:00 p.m. Eastern
Free Conference:
319-527-2701, Code 248671
Moderator:  Mike Mason
Time:  6:00 p.m. Eastern
Free Conference:  641-715-0632,
Code 116202
Moderator:  Frank Allen
Time:  6:00 pm. Eastern
Moderator:  Loren W.
Time:  9:00 p.m.
Talkshoe:  605-562-0444, 798056#
712-432 3900
Moderator:  Terry
Time:  3:00 pm PST/6 pm EST to
6:00 pm PST/9:00 EST
Bring Awareness about Gangstalking
Talkshoe: 605-562-0444 Call ID: 143944
Moderator:  Ella
Time:  9:00 Eastern
Talkshoe: 605-562-0444, 141476
Moderator:  Kyle (Vulcan Wolverine)
Time:  After Ella’s call
Talkshoe:  605-562-0444, 142394
Moderator: Frank Allen

Targeted Individual Massachusetts
Time: 9:00 pm Eastern
Call-in Number: 646-749-3112
Access Code: 450-414-301
Join by Computer:
Moderator:  Julia
Engage in Prayer
Time:  9 pm Eastern/ 8 pm Central/
7 pm Mountain/ 6 pm Pacific
Call-in number: (515) 739-1405

International Dial-in Numbers:                   

Call ID: 141476
Access Code: 381878
Moderator:  Terry
Time:  12:00 am Eastern
Talkshoe:  605-562-0444, 143944
Moderator:  Dr. Millicent Black
Church Conference Call
Time:  6:00 pm Eastern
Talkshoe:  140567
Moderator:  Frank Allen
Phone:  646-749-3112
450-414 3112#
Moderator:  Ella
Freedom for Targeted Individuals
International Activism
Time:  7:00 pm Eastern
Free Conference:  541-275-1131
Moderator:  Lauron
8:00 pm. Eastern
Talkshoe:  605-562-0444, 142124
Moderator:  Scott Snitzer
Time:  5:00 pm Eastern
Snitzer's TI Contact Call
Talkshoe:  605-562-0444, 138602
Moderator:  Derrick
Time:  9:00 pm Eastern
Phone:  319-527-2701
ID:  248671#
Activism/Support Groups
Denver, Colorado
Area Support Group
Contact:  Xontu Garcia
Atlanta, Georgia
Support Group Meeting

Contact:  Carol Dimas
Phone:  470-312-6578
New York City Support Group
Contact:  Angel Acevedo
Phone: 646-806-8654
Houston, Texas
  For more information, you may contact
  Tereza Dutta -

Seattle, Washington
Location: Broadview Branch Library at:

12755 Greenwood Ave. N.
Seattle, Washington 98133-7901

For more information, you may contact
Laura Solway - 206-365-6139
Curtis Kimble – 817-901-8720


Hollywood District Public Library
Please attend the next Portland, Oregon Targeted Individual Next Meeting Saturday October 13, 2018
4040 Northeast Tillamook
Portland, Oregon
Contact person;  Amy – 971-207-3401

Vancouver, BC V6B 6B1, Canada
Location: Vancouver Public Library
  1428 Cedar Cottage Mews, V5N 5Z1
       Meeting Room
Time: 3.00PM - 5.00PM
350 West Georgia Street
Contact- Genet at email
The West Coast Society For All Victims Of Organized Stalking And Electronic Harassment
PO Box 534
Heriot Bay, British Columbia V0P 1H0
South Carolina
  For more information, you may contact
  Gail -

An Announcement To The Whole World By Chinese Victims
Of Electronic And Psychotronic Weapons

The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners. 
Please enable images

Citizens Against Harmful Technology  •  P.O. Box 1125  •  Edgewater, FL 32141

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Please enable images
Please enable images