To receive email from Citizens Against Harmful Technology, add to your safe sender list.
View as Web Page Subscribe Unsubscribe Preferences
Share on Facebook Share on Twitter More Share Options
"The Spirit of Collaboration" (gestural expression art by Skizit)
"A 'gesture' captures the essence of something you cannot hold" - Skizit
As the Targeted Community Learns and Shares, We Become Closer to Exposing Torture
Citizens Against Harmful Technology Newsletter
September 15, 2019
Thank you for all who sent in articles this week.

If you have a support group or conference call and wish to be listed on this newsletter, or If you wish to write to us, please do not reply to this newsletter:  Use

REMEMBER:  You can look at all past newsletters at
Click on the titles in Blue or the pictures linked to the original articles.
The WBAN, Sensor Fusion and the Internet of Things
Society is being divided into torturers and the tortured. As a Targeted Individual, you know how your world has changed. You know you are being observed 24 hours of the day, you feel yourself being controlled with pain. You feel the heating, the pain, the cramping, the endless vibrations and stabs of agonizing torture continuously.

The first article this week will help you understand how a remotely located person and computer has a plan for you as to what kind of torture will happen to you today and has a real-time plan to carry it out. They know exactly where in your home, car or community all your body parts are located at all times. They know what you are feeling, seeing and hearing. They know when you leave your home and have stalkers placed in your path, boots on the ground to provide your GPS away from home. [Picture to the right:  stalker awaits outside door of Publix grocery]

As you see, this plan to connect everyone's brain and body to the Internet of Things is not to help society with lowering the costs of medical care but to control individuals in the smallest detail, down to your very genetic code.  Morgellons is a part of targeting and it is an entomological weapon that weaponizes gene therapy. 
Please share this information with the mass of ignorants playing endless video games, fighting on Twitter and making faces at each other on Instagram.
The greater number of people who know of this, the faster this will come to a tipping point. Meanwhile, our torture continues and our lives are degraded and bodies are disintegrated. Time is of the essence. Stop the traitors of humanity!

WBAN, Sensor Fusion and the Internet of Things-Very important article to understand how your body is providing data.

The Role of Sensor Fusion in the Internet of Things

By Kaivan Karimi, Executive Director - Global Strategy and Business Development, MCUs, Freescale Semiconductor
The age of sensor technology is upon us. These days, it's unusual to experience an electronic consumer product that doesn't use sensors to create new experiences for its users. Sensors are experiencing a renaissance of sorts as micro-electromechanical systems (MEMS) technology becomes less expensive and further miniaturized, in turn fueling penetration of sensors into new applications and creating new potential for the sensor market.


Sensors are now found in a wide variety of applications, such as smart mobile devices, automotive systems, industrial control, healthcare, oil exploration and climate monitoring. Sensors are used almost everywhere, and now sensor technology is beginning to closely mimic the ultimate sensing machine... the human being. The technology that allows this to happen is sensor fusion, which leverages a microcontroller (a "brain") to fuse the individual data collected from multiple sensors to get a more accurate and reliable view of the data than one would get by using the data from each discrete sensor on its own. Sensor fusion creates a situation in which the whole is much greater than the sum of its parts.
Sensor fusion enables context awareness, which has huge potential for the Internet of Things (IoT). Advances in sensor fusion for remote emotive computing (emotion sensing and processing) could also lead to exciting new applications in the future, including smart healthcare. However, these capabilities spark significant privacy concerns that IoT governance will need to address. Massive amounts of context-aware data will become available as use of sensor fusion and REC technologies increases. This data, along with the IoT's access to the "global neural network in the sky" and cloud-based processing resources, will lead to a tremendous expansion in the delivery of context-aware services customized for any given situation. Services could be based on the context of what an individual user is doing, what machines are doing, what the infrastructure is doing, what nature is doing, or all of the above in various combinations.

Human Beings: The Ultimate Sensing Example

To understand how sensor fusion works, let's take a look at how sensing works in the human body. A human being experiences the external environment in many ways. Vision, hearing, chemical sensation (senses of smell and taste) and surface sensation (sense of touch) all provide sensory information about one's surroundings, which travels through the peripheral nervous system (PNS) to the brain. The brain then decides how to respond to a given condition or experience.
The PNS doesn't make complex decisions about the information it transports; these decisions are made by the brain. In response to sensory input, the brain sends out motor information- a human being's response to the input. For example, a pedestrian sees a car driving toward him, and his brain tells his muscles to walk faster to the other side of the road to avoid an accident. Human beings also receive information from their internal organs, some of which is noticeable, such as a stomach ache. There are also other kinds of internal information a person isn't aware of, such as blood pressure, that are used to regulate the body's internal environment.
The brain is the ultimate decision maker. However, without the peripheral nervous system's ability to bring in sensory information and send out motor information, one would not be able to walk, talk or do many of the other functions we often take for granted. The brain often uses several sources of sensory input to validate an event and compensate for a lack of "complete" information to make a decision. For example, a person may not see flames under the hood of a car, but the smell of burning rubber and heat coming from the dash would tell the brain it's time to leave the car because the engine is on fire. In this case, the information causing the brain to react is greater than the sum of the disparate sensory inputs.
Sensor Fusion: The Human Model
Figure 1: Sensory information (vision, hearing, smell, taste, and touch) is gathered from one's surroundings and travels through the peripheral nervous system to the brain for processing and response.
In the world of technology, sensor fusion plays a similar role. By integrating inputs from multiple sensors for more accurate and reliable sensing, sensor fusion can produce much higher levels of recognition and offer new responses. Individual sensors have inherent limitations and can err, which can be corrected or compensated for by complementary sensing nodes. For instance, gyroscopes suffer from offset drifts over time, which can be compensated for using a companion accelerometer. The conclusion is that fused sensor information (from multiple sensors) is more accurate and reliable than individual sensor data.

How Sensor Fusion Works

The most basic sensor fusion example is an e-compass, in which the combination of a 3D magnetometer and 3D accelerometer provides compass functionality. More complex sensor fusion technologies give users an enhanced experience, leveraging and combining 3D accelerometers, 3D gyroscopes and 3D magnetometers (which measure the components of the magnetic field in a particular direction, relative to the spatial orientation of a given device). Each of these sensor types provides unique functionality, but also has limitations:
  • Accelerometer: x-, y- and z-axis linear motion sensing, but sensitive to vibration
  • Gyroscope: pitch, roll and yaw rotational sensing, but zero bias drift
  • Magnetometer: x-, y- and z-axis magnetic field sensing, but sensitive to magnetic interference
Sensor fusion often refers to a combination of a 3D accelerometer, a 3D gyroscope and a 3D magnetometer. This configuration is called a nine-axis system, which affords the user nine degrees of freedom (9-DoF). In 2012, Freescale introduced a 12-axis Xtrinsic sensor platform for Windows 8 that offers a 12-DoF sensor fusion solution. This is accomplished by including a barometer sensor, a thermometer sensor and ambient light sensing functionality.
[Has your body been roboticized?  You know those sensors they put in robots to control movement?  They have put those in Targeted Individuals and they are manipulated remotely just like robots! Someone sits at a distance playing games with real live humans for torture!]

Other Examples of Sensor Fusion

Freescale is doing research regarding the use of sensors in medical electronics and multisensor processing for non-medical applications. Dr. Jose Fernandez Villaseor is a medical doctor and electrical engineer combining his work as a Freescale medical product marketer and a hospital physician in his study of the field of emotion analysis using sensors (a large building block of REC technology). Research shows that heart rate increases due to physical activities have a different pattern and slope than increases due to adrenalin from excitation. Hence, one can use algorithms and analyze sensor data to electronically detect the types of emotion a person is displaying.
Here's an example of a gaming platform that can detect emotions electronically by monitoring and data acquisition from physiological variables and states, such as:
  • Muscle relaxation (MR) - via a pressure sensor
  • Heart rate variability (HRV) - via a two-electrode ECG on a chip
  • Sweat (S) - via a capacitive sensor
  • Attitude (A) - via an accelerometer monitoring a person's state of relaxation (jerky movements vs. steady hands)
  • Muscle contraction (MC) - via a pressure sensor
Using the sensor data collected, an MCU in the game platform could, for example, detect emotions and give the gamer feedback during game situations to make the game more exciting. How about making turns faster and more difficult to maneuver in a driving game until the gamer shows a more relaxed state (a less jerky reading from the accelerometer)? Hence, the calm driver with better command over his/her emotions will have a better score (similar to real life). This would be considered local emotive computing if the local console's MCU provided the processing function or remote emotive computing if a cloud-based system provided the processing function. In a cloud-based system, sophisticated "big data" algorithms can be leveraged to provide a more elaborate response to the gaming scenario.
Emotion Sensing
Figure 4: Context Awareness Using Emotion Sensing
In another example, sensors could be used to detect emotion by measuring the way a user holds a cell phone to type or make a call. Furthermore, software algorithms could be used to provide additional context as to the state of mind of the individual by analyzing the way the person texts, how jerky the phone movement is or how many mistakes are made while typing (use of backspace key).

Leveraging Sensor Fusion for the Internet of Things

As discussed in the white paper "What the Internet of Things Needs to Become a Reality," the IoT encompasses many use cases- from connected homes and cities to connected cars and roads to devices that track an individual's behavior and use the data collected for "push" services. The IoT is a sort of universal "global neural network in the sky" that will touch every aspect of our lives. From a technology perspective, the IoT is being defined as smart machines interacting and communicating with other machines, objects, environments and infrastructures, resulting in volumes of data generated and processing of that data into useful actions that can "command and control" things and make life much easier for human beings.
Internet of Things
Figure 5: Internet of Things
Requirements common to all IoT use cases include:
  • Sensing and data collection capability (sensing nodes)
  • Layers of local embedded processing capability (local embedded processing nodes)
  • Wired and/or wireless communication capability (connectivity nodes)
  • Software to automate tasks and enable new classes of services
  • Remote network/cloud-based embedded processing capability (remote embedded processing nodes)
  • Full security across the signal path
The types of sensing nodes needed for the IoT vary widely, depending on the applications involved. Sensing nodes could include a camera system for image monitoring, water or gas flow meters for smart energy, radar vision when active safety is needed, RFID readers sensing the presence of an object or person, doors and locks with open/close circuits that indicate a building intrusion or a simple thermometer measuring temperature. Who could forget the heatseeking mechanical bugs that kept track of the population of a building in the movie Minority Report? Those mechanical bugs represent potential sensing nodes of the future. (I assume they'll be used for fighting crime.)
These nodes all will carry a unique ID and can be controlled separately via a remote command and control topology. Use cases exist today in which a smartphone with RFID and/or near field communication (NFC) and GPS functionality can approach individual RFID/NFC-enabled "things" in a building, communicate with them and register their physical locations on the network. Hence, RFID and NFC will have a place in remote registration, and, ultimately, command and control of the IoT.
The interactions (and interfaces) between human being, nature and environment and machine/infrastructure provide valuable data points for determining context awareness, including:
  1. The human being
    • Motion, posture and strides
    • Reaction to stimuli
    • Emotions under given conditions
    • Biometrics at any given time
  2. The ambient environment
    • Location
    • Altitude
    • Temperature
    • Humidity
    • Light
    • Sound
    • Smell
  3. Infrastructure/machines being used by the person
    • Trajectory
    • Impact
    • Velocity
    • Feedback
    • Vibration and gyration
    • Structural integrity related changes
Functional View of Internet of Things Technologies
Figure 9: Context Data Transferred for Processing
In the IoT, after inputs are collected by the sensing nodes, an embedded processing node processes the context-aware data and either provides feedback for immediate action or passes it on for cloud/network-based processing. In the latter scenario, various connectivity mechanisms are needed to get the data to the core network. For example, within this context, a cellular phone or a connected tablet becomes a "gateway" to connect to a wide area network (WAN).
TI Electronic rape started when she left the doctor's office.

Targeted individual electronic rape torture human trafficking of a black united states citizen

Proof the Body Area Network monitors you head to toe
Critical Data-Based Incremental Cooperative Communication for Wireless Body Area Network


Wireless Body Area Networks (WBANs) are single-hop network systems, where sensors gather the body’s vital signs and send them directly to master nodes (MNs). The sensors are distributed in or on the body. Therefore, body posture, clothing, muscle movement, body temperature, and climatic conditions generally influence the quality of the wireless link between sensors and the destination. Hence, in some cases, single hop transmission (‘direct transmission’) is not sufficient to deliver the signals to the destination. Therefore, we propose an emergency-based cooperative communication protocol for WBAN, named Critical Data-based Incremental Cooperative Communication (CD-ICC), based on the IEEE 802.15.6 CSMA standard but assuming a lognormal shadowing channel model. In this paper, a complete study of a system model is inspected in the terms of the channel path loss, the successful transmission probability, and the outage probability. Then a mathematical model is derived for the proposed protocol, end-to-end delay, duty cycle, and average power consumption. A new back-off time is proposed within CD-ICC, which ensures the best relays cooperate in a distributed manner. The design objective of the CD-ICC is to reduce the end-to-end delay, the duty cycle, and the average power transmission. The simulation and numerical results presented here show that, under general conditions, CD-ICC can enhance network performance compared to direct transmission mode (DTM) IEEE 802.15.6 CSMA and benchmarking. To this end, we have shown that the power saving when using CD-ICC is 37.5% with respect to DTM IEEE 802.15.6 CSMA and 10% with respect to MI-ICC. View Full-Text
Important data in this survey-Programs that run the WBAN.  Be sure to read and print this PDF. It has vital information.
The state-of-the-art wireless body area sensor networks: A survey
Rahat Ali Khan1 and Al-Sakib Khan Pathan

This network can provide stored information or continuous information by transfer to a PDA or cell phone. It could be your own cell phone. Police, firemen and medics in the ambulances seen every time a TI leaves or returns to their house may have access to real-time data from your body as to your location and bioresponses. This diagram does not show the universities involved in the human experimentation studies involved during the ongoing human trials.
You can see from Figure 3 that the Cochlear Implant provides a two-way radio connection with your brain is part of the WBAN.

Wireless body area sensor network is a sub-field of wireless sensor network. Wireless body area sensor network has come into existence after the development of wireless sensor network reached some level of maturity. This has become possible due to the tremendous technological advancement leading to easy-to-use wireless wearable technologies and electronic components that are small in size. Indeed, this field has gained significant attention in recent time due to its applications which mostly are toward healthcare sector. Today, tiny-sized sensors could be placed on[/in] the human body to record various physiological parameters and these sensors are capable of sending data to other devices so that further necessary actions could be taken."
[This system is a violation of your constitutional right to privacy especially if it is implanted without the person's permission, as has been done to thousands of TI's. As noted in this article, anyone can get access to your information.]

"Fig. 6:  Security threats
There are different types of threats and attacks by which the BAN data can be stolen and compromised.The threats are categorized as either active or passive, as shown in Figure 6.125The attacks are mainly eaves-dropping, message corruption, modification of the data, replaying and impersonation attacks. As the information is regarding the health of a human being, if it is stolen, it could be used for activities that may beharmful..."
Drones Are Used to Operate the WBAN
Analysis of Efficient Health Data Transmission Methods based on the Fusion of WBAN and FANET
FANET is an ad hoc network formed among the unmanned aircraft in the three-dimensional space for data transfer. Most of the research on FANET application has focused on the use of the camera sensor mounted on the unmanned aircraft to collect data from the ground, and process and delivery of the data for a specific purpose. However, the research on the fusion of WBAN and FANET that collects the data of the human body and passes through the FANET has not been studied much until now. Therefore, in this study, we study the data transmission system that collects the human body data of people working in the areas that are vulnerable to communication difficulties and passes the collected data through the FANET. In particular we analyze the possible methods to transfer the emergency data of the body in the fusion network of WBAN and FANET and provide a data transfer model that can be transmitted most efficiently.
Unmanned Aerial Vehicles-based Health Monitoring System for Prevention of Disaster in Activities of the Mountain
DARPA advisor says he receives complaints of people already implanted

DARPA advisor reveals conscious AI supercomputers utilized for mind control

9/11 Lies provided the basis for extreme surveillance of TI's

9/11 Truth: Why Do Good People Become Silent About the Documented Facts that Disprove the Official 9/11 Narrative

Global Research, September 06, 2019
The question posited by the title of this article, explores the dilemma faced by truth-seekers who have the facts that totally refute the Big Lies about 9/11/2001 about which the mainstream media, their elected representatives in Congress, their presidents and the Deep State refuse to debate.
Cognitive Dissonance and 9/11
One major psychological factor that helps explain why the Cheney/Bush White House’s official conspiracy theory has become so ingrained is the concept of cognitive dissonance. A good YouTube discussion of the title question – by a number of psychologist colleagues of Frances Shure – can be seen here. I highly recommend watching it.
I wrote a Duty to Warn column devoted to the subject of cognitive dissonance in 2013. It has been archived here.
Here are a couple of paragraphs from the article:
“Cognitive dissonance refers to the psychological or emotional discomfort felt when one is confronted with new information or a new reality that contradicts one’s deeply held beliefs.
“When there are conflicting, mutually exclusive beliefs, intelligent, open-minded and thoughtful people that have not been victimized by significant psychological trauma during their upbringing, are usually willing to change their minds by re-evaluating their prior stances, looking carefully and honestly at the new evidence, reassessing the credibility of both positions and then making a decision to adopt or reject the new information, depending on the evidence before them.
“Close-minded, distracted, uninformed, addicted, ignorant, too-busy, overly obedient, uber-patriotic, co-opted or radically conservative people may not have the time, inclination, intelligence or political will (or courage) to look at the available new evidence that runs contrary to their old, ingrained beliefs. Therefore, they may unconsciously or reflexively reject the new information, even if the evidence is overwhelmingly and provably true.”
Chiliead Software - The result of 9-11 Fusion of Agencies connected to the Cloud to share data collected on you.

Chiliad Discovery/Alert - Analyze Big Data Across Clouds, Agencies and Other Stovepipes

Mark of the Beast
Know your Cell Phone:  What is GPRS?
GPRS (General Packet Radio Services)
General Packet Radio Services (GPRS) is a packet-based wireless communication service that promises data rates from 56 up to 114 Kbps and continuous connection to the Internet for mobile phone and computer users. The higher data rates allow users to take part in video conferences and interact with multimedia Web sites and similar applications using mobile handheld devices as well as notebook computers. GPRS is based on Global System for Mobile (GSM) communication and complements existing services such circuit-switched cellular phone connections and the Short Message Service (SMS).
In theory, GPRS packet-based services cost users less than circuit-switched services since communication channels are being used on a shared-use, as-packets-are-needed basis rather than dedicated to only one user at a time. It is also easier to make applications available to mobile users because the faster data rate means that middleware currently needed to adapt applications to the slower speed of wireless systems are no longer be needed. As GPRS has become more widely available, along with other 2.5G and 3G services, mobile users of virtual private networks (VPNs) have been able to access the private network continuously over wireless rather than through a rooted dial-up connection.
GPRS also complements Bluetooth, a standard for replacing wired connections between devices with wireless radio connections. In addition to the Internet Protocol (IP), GPRS supports X.25, a packet-based protocol that is used mainly in Europe. GPRS is an evolutionary step toward Enhanced Data GSM Environment (EDGE) and Universal Mobile Telephone Service (UMTS).

UMTS (Universal Mobile Telecommunications Service)

UMTS (Universal Mobile Telecommunications Service) is a third-generation (3G) broadband, packet-based transmission of text, digitized voice, video, and multimedia at data rates up to 2 megabits per second (Mbps). UMTS offers a consistent set of services to mobile computer and phone users, no matter where they are located in the world. UMTS is based on the Global System for Mobile (GSM) communication standard. It is also endorsed by major standards bodies and manufacturers as the planned standard for mobile users around the world. Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities. Users will have access through a combination of terrestrial wireless and satellite transmissions. Until UMTS is fully implemented, users can use multi-mode devices that switch to the currently available technology (such as GSM 900 and 1800) where UMTS is not yet available.
LED Weaponized Flashlight

The Incapacitating Flashlight

An LED flashlight makes culprits vomit.

Aug 6, 2007
Soon cops’ flashlights might not only temporarily blind bad guys: they might also stop them in their tracks by disorienting them and making them nauseatingly sick. When suspects turn away or reel, cops or border-security agents can nab and handcuff them.
nlethal weapon: A flashlight (above) contains layers of electronic control circuitry, multicolored LEDs, and special optics that together produce disorienting and nausea-inducing patterns of ultrabright flashing colors.
The flashlight, which is being developed for the Department of Homeland Security (DHS), uses a range finder to measure the distance to the target’s eyes so that it can adjust the energy of the light to a level that won’t cause permanent damage. Then it rapidly shoots out pulses of light from an array of ultrabright light emitting diodes (LEDs).
The flashes incapacitate a person in two different ways, says Robert Lieberman, CEO of Intelligent Optical Systems, based in Torrance, CA, which is making the device. The flashes temporarily blind a person, as any bright light would, and the light pulses, which quickly change both in color and duration, also cause what Lieberman calls psychophysical effects. These effects, whose effectiveness depends on the person, range from disorientation to vertigo to nausea, and they wear off in a few minutes.
It’s not clear why the changing light pulses cause this effect, even though the effect has been well documented, Lieberman says. Helicopter pilots, for example, have been known to crash because they get disoriented by the choppy flashes of sunlight coming through the chopper’s spinning blades.
The DHS is funding research on the new nonlethal weapon. According to a DHS press release, cops, border-security agents, and the National Guard could be armed with the new flashlight by 2010. The device is part of a larger effort to develop nonlethal weapons that can help law-enforcement and military personnel control crowds and riots, both in antiterrorist actions and in hostage situations.
The LED flashlight comes with a few caveats. The person being targeted could easily look away, or he or she might be wearing heavily tinted glasses. And the device would not be useful to, say, a security agent who is chasing a suspected attacker. “It is designed to be used on someone coming at you,” Lieberman says. Also, the flashlight’s effects are less during the day. But Lieberman notes that security agents will more likely face situations in which they need the device at night.
From: Rebecca Brewer <>
Date: Sunday, September 8, 2019
Subject: Sensor fusion platform
(Note: all of my evidence is taken directly from computer generated diagnostic logs and can be provided via screenshots or the actual diagnostics logs themselves)
I am reaching out to the Washington post to tell them that the mental health monitoring  programs that The White House has been "considering" to help with gun violence are already being tested on Americans in the USA.
I am a USMC veteran who served in Operation Iraqi Freedom and Operation Enduring Freedom. My unit was awarded a campaign medal for engaging in combat during this deployment. As a "protected veteran" with such status I am entitled to utilize the Department of Veterans Affairs Health system for the rest of my life. Though I came back from war unscathed, uninjured and free of PTSD and other mental health conditions, I do use the VA's health services regularly for wellwoman checkups and reproductive / family planning services. 
Four years ago my personal laptop informed me that it had been hijacked and every device I owned was suddenly compromised; life, as I knew it, was fundamentally altered.
After a years worth of Apple's experts, my cellular phone providers, and antivirus companies not addressing the persistent issues that my personal devices were laden with I realized that I was going to have to rely on myself to get to the truth. Logically, I turned to the devices - the source of my problems - for answers. I began to monitor the diagnostic logs of my devices and what I discovered frightened me enough to flee the state of Kansas and travel to Wyoming to the safety of my parent's basement. I had discovered "Pegasus" a remotely enabled spyware, sold exclusively to government agencies. 
Why might my government feel the need to spy on me? I held a job as a medical courier: I delivered human biological specimen from two Topeka hospitals to Kansas City International Airport to go to a corporation called "Neogenomics".  That job title might be enough to justify all the hacking and spyware. The government was watching me because they thought I was a possible or suspected terrorist. The techniques they used for spying affected my devices and communications to the point that I lost my job because I couldn't communicate with my dispatcher effectively. But the spying didn't stop.
In March of 2017 a new type of diagnostic log showed up in my iPhone. "Differential Privacy" was the name of the diagnostic entry and it said that my blood glucose level and sleep analysis "had updates". That log sparked my curiosity (and fear) and the resulting years of research have revealed many disturbing things. 
Let me tell you about MYALO!!!
But quickly I wanted to recap the part of the article that is crucial to understanding exactly what I'm about to assert:
"The idea is for the agency to develop a “sensor suite” using advanced artificial intelligence to try to identify changes in mental status that could make an individual more prone to violent behavior..." 
"The attempt to use volunteer data to identify “neurobehavioral signs” of “someone headed toward a violent explosive act” would be a four-year project costing an estimated $40 million to $60 million, according to a founding director of DARPA’s Biological Technologies Office."
MYALO is a program made by Verily Life Sciences (a subsidy of Google).  I found MYALO surreptitiously whitelisted in my Android's diagnostic logs. The application is installed with other programs classified as "sleep APIs". 
MYALO's purpose:
 "Providing temporary use of on-line non-downloadable software used in connection with mental health assessments and the monitoring and treatment of various mental health conditions." (
The article mentions a "Sensor Suite" and I have direct evidence of a "Sensor Fusion" platform in the logs of my Android device. My sensor fusion platform monitors 500 particles. 
It monitors the speed with which I exit my vehicle on foot, has multiple geofences set up, and communicates with both indoor and outdoor devices.
I can show evidence that my phones relay information from multiple devices, some of them federally protected laptops. A personal area network, or PAN - was set up by someone other than myself: the devices, many with their own MAC addresses use Bluetooth and BTLE protocols including mesh networks, WiMAX and Bluetooth Direct to send sensor payloads to remote databases and websites like and SERVICE NOW IS WHAT THE DEPARTMENT OF VETERANS AFFAIRS USES ACROSS THEIR VAST ENTERPRISE.
Credentials and authentication methods used by the government researchers and networking personnel are a dead giveaway too: "they" authenticate their identities with FIDO/FIDO2 and FeliCa - those are federal government authentication and payment systems. Why are they logged on my devices? I have evidence of the VA's direct involvement in blocking my research efforts: the source of the blocking came directly from the VA's Office of Research Oversight.
Finally, I want to mention the absurd presence of multiple IP addresses, from all over the world, that are connected to my devices. The list of addresses that I have traced is extensive so I'll just name a few:
Places that IP addresses have traced to include:
The White House,
European Parliament, 
Bluetooth Special Interest Group,
NASA AMES Research Center
European Bioinformatics Institute, 
The Department of Defense,
The European Ministry of Defence,
The Sandler Neuroscience Center,
Kaiser Permanente Hospital,
And some foreign universities and hospitals.
The article says the program they're considering a four year program. This nightmare started about 4 years ago. 
I have so much more evidence to back my assertions: molecular imaging programs installed in my devices, references to a venture capitol agency "scaleIt", a google app called Dreamliner, "tiny cameras", " companion cameras" and a log that states that the CDC is using CDC Obex to install bulk devices. 
"OBEX's purpose is to meet the needs of healthcare professionals with the supply of minimally invasive consumable and implantable devices which will enable the delivery of the best diagnosis and therapy to ensure best outcomes for  patients."
 Many different aspects and tid-bits all point to the same conclusion: that my government is using biotechnology and functionalized nanotechnology platforms to monitor every aspect of my existence. 
I need exposure.  And I need a professional forensics examination of each of my devices to validate - in a court-acceptable format - my evidence. And obviously I'm gonna need a law firm with enough clout to stand up against governments around the world.
Thanks for your time.
Rebecca Brewer 
On Fri, Sep 13, 2019 at 8:24 AM Tony Yang <> wrote:
07:16 Sep. 13, 2019  Starbucks near UK parliament London.
In late 2001, I lived in the first(ground)-floor one-room flat in 9 Havelock Road, Luton, UK (the first room/flat I rented in Luton UK as a student).  One evening, some very very very load continuing foot-stamping-floor sound came from the second floor(wooden floor), together with continuing strong vibration.  I looked up at the ceiling and was afraid it was a murder and blood would drop from the ceiling which might be only one layer of wood.
One day later, this thing happened again.  Then another one or two days later, this thing happened again.  I went out my flat(first/ground floor) and went upstairs a little.  I found there was a small hole on the wood wall.  When I just looked into it, the sound and vibration suddenly stopped.
For one week in 2011, UK secret police(Intelligence) used electromagnetic weapons(radio waves) to attack my head/brain extremely strongly.  During this one-week attacks, UK secret police sent movies to my eyes, showing I went upstairs that evening.
At 03:23 Sep. 13, 2019(earlier this morning), UK secret police woke me up(only had several hour sleep, woke me up around same time the night before) when I was sleeping in sleepbag in the small park near UK parliament, and attacked my sex nerve and penis end(poked/pressed) and urethral opening(poked) very strongly,  attacked/poked/pressed my chest(2 sides) and lower chest(2 sides) and upper stomach and chest(heart position) very strongly, attacked my head/brain to confuse my brain very very strongly, trying again to force me to admit that I went up to see some people having sex(the above thing - in 9 Havelock Road, Luton), saying if I can stand beating by police.
04:19, UK secret police asked me to make suicide.  Many attacks on me.
04:30, UK secret police asked me about Mr. Yang Jiechi. (attacked my lungs).  Many attacks on me.
05:50, UK secret police sent movie to my eyes, in this movie UK Prime Minister Boris Johnson came and made one-knee-on-ground (单腿下跪) and begged me to give up complaining about this political persecution case. 
07:08 in Starbucks, UK secret police asked me where my cousin Yang Jialing (US citizen, worked in UN World Bank before) got money or if she had money when she wanted to set up English school in China many many years ago(I had not met her for decades before 2014 (in 2014, met her for 30 mins at her home in Shanghai under China secret police surveillance, and met her in New Jersey to borrow money from her in 2015 or 2016 under CIA surveillance).
UK secret police is attacking my sex nerve, penis head, and sex organ very very strongly trying to attack my semen out, attacking my chest(2 sides) and lower chest(2 sides) and upper stomach and chest(heart position) vey very strongly, attacking my head/brain to confuse my brain to confuse my brain very strongly, replacing my English words/sentences all the time, while I writing this email.  asking me not to write this email.
I will protest before US Embassy in London later this morning.
08:11  Sep. 13, 2019  Starbucks near UK parliament
At 08:08 when I started to send the above email to public media organizations, UK secret police said "Are you a man of this country(UK)?!", asking me not to send this email.
On Wed, Sep 11, 2019 at 7:13 PM Tony Yang <> wrote:
17:45 Sep. 11, 2019  Starbucks near UK parliament
At 15:10 Sep. 11, 2019, UK secret police has been attacking/pressing for 20 minutes my lower chest(2 sides) and chest(2 sides) and upper stomach very strongly, attacking my head/brain to confuse my brain very strongly, attacking my head/brain and sending low-volume words and loud words/sentences to my ears/head/brain to replace my own English words/sentences while I talking with another man, attacking my sex nerve very strongly, saying I went up that evening in 9 Havelock Road Luton to look other people having sex, threatening me to give up complaining about this big political persecution case and extremely-cruel tortures on me.  UK secret police then said they always watched/surveyed me beginning from my renting this room/flat(one room flat).
At 15:45, UK secret police said if I put this thing in email they will not let me sleep tonight and also said "兄弟,我求你了“(Brother, I beg you).
From 14:50 to 16:45, UK secret police attacked/pressed my lower chest (2 sides) and chest (2 sides) and upper stomach very very strongly, attacked my head/brain to confuse my brain very very strongly, attacked my sex nerve very very strongly, talking about this thing.
At 16:45, UK secret police attacked/poked my urethral opening hurting me a lot, minutes later attacked the place between urethral opening and penis end, and said they want to make me difficult to describe the attacks.
Trying to force me to admit I went up to look other people having sex.
Then attacking my urethral opening and penis end and sex for 10 minutes, arousing my sex desire very strongly.
On my way to Starbucks, UK secret police said they are wrong and asked me not to write this email.
In fact, one night in Luton, one of my school (Business school University of Luton) Chinese girl called me and I ignored her.  One of my class girl(Indian) chased me and asked an Indian classmate to tell me she liked me, and I ignored her.
At 17:43, I could not connect to Starbucks internet.
At 17:44, Starbucks website showed I connected to Internet, but no internet
Graphene-Based Sensors

Graphene-Based Sensors for Human Health Monitoring

Since the desire for real-time human health monitoring as well as seamless human-machine interaction is increasing rapidly, plenty of research efforts have been made to investigate wearable sensors and implantable devices in recent years. As a novel 2D material, graphene has aroused a boom in the field of sensor research around the world due to its advantages in mechanical, thermal, and electrical properties. Numerous graphene-based sensors used for human health monitoring have been reported, including wearable sensors, as well as implantable devices, which can realize the real-time measurement of body temperature, heart rate, pulse oxygenation, respiration rate, blood pressure, blood glucose, electrocardiogram signal, electromyogram signal, and electroencephalograph signal, etc. Herein, as a review of the latest graphene-based sensors for health monitoring, their novel structures, sensing mechanisms, technological innovations, components for sensor systems and potential challenges will be discussed and outlined.
Microwave Hearing-Phase Cancel

Microwave Hearing or RF Hearing Measured Signals by Tom Lee


What is OPSEC?

What is operational security?
OPSEC is short for operations or operational security. Basically, the better your OPSEC, the more difficult it is for outsiders to find out what you’re up to, whatever that may be.
One of the most vital aspects of OPSEC is situational awareness. That is, the ability to actively evaluate one’s surroundings and make detailed assessments about one’s environment.
All of the encryption in the world won’t save you if the thought police get their hands on you while you’re logged in and signed on. All of your careful planning amounts to nothing if a common street criminal lethally stabs you for your phone and wallet.
Situational awareness is a skill that can be practiced and developed. Take the time to practice this in your everyday life. Here’s a link for one page that has some exercises, but many more can be found with some basic research.
Part of situational awareness is an accurate sense of self awareness. Know where your strengths and weaknesses lie. Learn how to amplify your strengths and compensate for your weaknesses. You might not be aware of these traits yet, but others notice them and can take advantage.
Don’t be a target. Bad actors look for people who are unconfident and wrapped up in their own thoughts. When you’re in public, keep your chin up and your head on a swivel. Don’t walk around with earbuds in and/or staring at your phone. [This is what stalkers do!]

This would probably include not letting people see your phone as you stalk them in the grocery store.

OPSEC Training Manual Excerpt:
Keep Activated Charcoal on Hand for Poisonings

Activated Charcoal An Effective Treatment for Poisonings

The Bottom Line
Activated charcoal keeps swallowed drugs and poisons from being absorbed from the gut into the bloodstream. Its a highly effective treatment for many poisons.

Activated charcoal is a special form of carbon that can bind other substances on its surface (adsorption). That is why it is used for water filtration. It is also used to adsorb drugs in the gut so the drugs don't enter the body. Activated charcoal is made by burning carbon-rich materials, such as wood, at very high temperatures to create charcoal. The resulting product is a black, odorless powder. The charcoal is then "activated" through a special process that makes lots of holes and crevices on the charcoal particles to increase surface area and available binding sites. One teaspoonful of activated charcoal has about the same total surface area as a football field! In the emergency room, the black powder is mixed with a liquid and given to a poisoned patient to drink. It is typically mixed with water but it can be mixed with a sweet beverage for children. Some activated charcoal products contain a sweetener called sorbitol that adds sweetness and is also a laxative. Some studies show that pushing the poison or drug through the gut faster might also decrease the amount that is absorbed into the body.
The efficacy of activated charcoal depends on how quickly it is given and the poisonous substance swallowed. The sooner activated charcoal is given after a drug or chemical is swallowed, the better it works.
The few adverse effects of activated charcoal are:
  • nausea and vomiting after drinking it, often in response to the gritty feeling of the mixture, and 
  • vomiting and inhaling (aspirating) the activated charcoal. This could happen if the patient is very drowsy.
Pela Soto, PharmD, BSHS, BS
Certified Specialist in Poison Information
Apps to help you sleep

2019 Roundup of Sleep Apps

Sleep Cycle monitors your cycle and wakes you at the proper moment. Sleep inertia occurs when you wake up at the wrong time in your sleep cycle. Studies have shown that caffeine and light can help reverse the problem. The app is available for Apple users, and limited features are currently available to Android users.
Relax Melodies relaxes you with sounds, music and a guided meditation session to lull you to sleep. The app has more than 100 sound and music programs. Relax Melodies is available for Apple and Android users.
Power Nap monitors your sleep and movements and wakes you just before you fall into a deep sleep, which prevents sleep inertia and after-nap grogginess. The app is only available to Apple users.
Pzizz creates instrumental and acoustic soundtracks that can help you fall asleep fast and stay asleep. The more you use it, the better it works because your brain starts to associate the soundtracks with sleep.
Pzizz is available to both Apple and Android users.
White Noise disguises the ambient sounds that can keep our minds active. 76 uniquely relaxing sounds, including waves, chimes, campfire and guitar, the app allows you to listen to one sound at a time or create a custom soundtrack. The app is available to both Apple and Android users.
Relax and Sleep Well Hypnosis guides you in self-hypnosis so you can attain mental and physical relaxation. In addition to a bedtime session, the app includes a wake-up session that you can use in the mornings.
Relax and Sleep Well Hypnosis is available to both Apple and Android users.
Awoken may help you become more mindful during sleep and may even help you remember your dreams. The app utilizes a combination of sounds and a digital dream journal that you can use to become more lucid during your dreams.
Light Bulbs

Worried About Your Brain, Heart, Kidneys, Liver, and Nervous System? Your Energy Saving Light Bulbs May Be Poisoning Them

September 12, 2019
By B.N. Frank
The US Environmental Protection Agency has even released an emergency advisory for the product. This is mainly because they are full of poisonous gas, which is released when they break.

Mercury Is Just The Beginning

Scientists at the Fraunhofer Wilhelm Klauditz Institute found that if these energy saving light bulbs break indoors, they could fill the air with 20 times the upper safety limit of mercury in the environment.
This could lead to the following medical conditions:
  • Migraines
  • Dizziness
  • Seizure
  • Cluster headaches
  • Anxiety
  • Difficulty concentrating
  • Fatigue

What Are The Other Risks?

Mercury is a neurotoxin. It’s specifically dangerous for the brain, kidneys, liver and the nervous system, but can also damage the reproductive, immune and cardiovascular systems.
Additionally, according the The Daily Mail, “German scientists claimed that several carcinogenic chemicals and toxins were released when the environmentally-friendly compact fluorescent lamps (CFLs) were switched on, including phenol, naphthalene and styrene.”

Here’s a Breakdown of Each of These Chemicals:

Phenol – A mild carcinogen which is known to be highly irritating to the skin, eyes, and mucous membranes in humans after short term inhalation.
It can cause irregular breathing, muscle weakness and tremors, loss of coordination, convulsions, coma, and respiratory arrest at high doses. via Environmental Protection Agency
Naphthalene – According to the National Pesticide Information Center, Naphthalene is made from crude oil or coal tar. It can be found in things like cigarette smoke and car exhaust.
The World Health Organization (WHO) concluded that naphthalene is possibly carcinogenic to humans.
Styrene – People exposed to styrene are at a high risk of developing lymphohematopoietic cancers, such as leukemia and lymphoma.
It can cause irregular breathing, muscle weakness and tremors, loss of coordination, convulsions, coma, and respiratory arrest at high doses. via Environmental Protection Agency
Naphthalene – According to the National Pesticide Information Center, Naphthalene is made from crude oil or coal tar. It can be found in things like cigarette smoke and car exhaust.The World Health Organization (WHO) concluded that naphthalene is possibly carcinogenic to humans.
Styrene – People exposed to styrene are at a high risk of developing lymphohematopoietic cancers, such as leukemia and lymphoma.
They may also suffer from genetic damage to their white blood cells, severely affecting their immune system. via National Toxicology Program
And if that’s not enough, researchers at Stony Brook University in New York studying CFL bulbs concluded “… [we] measured the amount of UV emissions and the integrity of each bulb’s phosphor coatings. Results revealed significant levels of UVC and UVA, which appeared to originate from cracks in the phosphor coatings, present in all CFL bulbs studied.” via NaturalSociety
These rays are potentially hazardous for both the eyes and skin. They also impact your immune system, damage your skin and interfere with your body’s production of vitamin D-3.

Emergency Protocol for Broken Energy Saving Light Bulbs

The EPA-recommended process for cleaning up broken bulbs is the following:
  • Move everyone out of the room – including pets.
  • Let fresh air flow into the room for 10 minutes by opening all doors and windows.
  • Switch off heating and/or cooling systems.
Gather the following materials for the cleaning process:
  • Cardboard
  • Damp paper towels
  • Sticky tape
  • Glass jar with a metal lid
Cleaning Process
  1. Avoid vacuuming because it can spread the vapors or powders of mercury.
  2. Make sure to collect all the broken pieces of glass and powder. Large pieces can be scooped up using the cardboard whereas the tiny pieces of glass and powder can be removed by using the duct tape. The tape should be carefully placed into the glass jar.
  3. Place all the cleaning materials into a sealed container.
  1. Place all the bulb pieces, powder and cleaning materials in a seal-able trash container for further disposal. Don’t leave any debris or cleaning material indoors.
  2. Contact your local government authorities to take the bulbs to the proper recycling facility.
  3. Make sure to air out the room while keeping the heating and/or cooling systems off for a few hours.
Weaponized Lighting to Dehydrate or Blind?
Several people have sent information regarding unusual lighting that has been installed at their home or happens when a vehicle is parked nearby.  What could these unusual lights mean? 
They could be performing some sort of biological test on the subject or possibly be purposely causing dehydration.  If you find something relevant to this subject, please send an email to
One TI sent us a video from an outside camera. A car parked a block away and shows an ultra-bright light towards her home. The light on the right is the light. The light stayed on for a while, then flashed on and off at intervals. This is the "off" and the light to the left is the "on". She has also experienced a bright white light coming down from above her house at night and filling the house. The use of light as a weapon is unusual but it is obviously done.
Thank you for your input.

Sensing body dehydration

  • Light-based detection: Non-invasive light patterns cast through the skin with a laser can measure changes in blood glucose that happen with decreasing water volume. As with other biological indicators, the concern here is in filtering out other confounding bodily conditions that can induce glucose increase/decrease (diabetes, nutrition, etc.).
  • Sweat analysis: The technique most commonly used to measure dehydration is chemical analysis of sweat. Mineral content (sodium, potassium) decreases with dehydration. Conductivity of sweat varies with sodium concentration and can be an indirect measurement of dehydration. Another indication of dehydration is the density of sweat which has a direct relation to water volume in the body.
  • pH level of skin: Dehydrated skin has a pH level similar to that of water and a device that can identify this condition should have adequate sensitivity to detect the transition from acidic (normal skin) to slightly basic(dehydrated). Alkaline skin can also be induced by natural dryness or eczema which makes it more challenging to identify dehydration as the sole cause.
What Does Urine Color Say About Your Hydration?
Urine color says a lot about our hydration status. Generally, the lighter the color, the more hydrated you are. But why is that? Well, dehydration is caused when the volume of water in the body is depleted. And when we’re dehydrated, our kidneys, which filter waste, tell the body to retain water. Therefore, we have less water in our urine, which causes it to become more concentrated and darker.
TI's are having chemicals delivered to them through air vents, on surfaces in home and vehicle, on clothing to make them sick
From: Janet Phelan <>
There are an increasing number of targets who are getting chemical attacks. Pursuant to this, I am working on a project to get their evidence over to the OPCW. Evidence may include lab reports, hair analysis and more.
Janet Phelan
Targeted Individual News and Information
You can order Custom Made Shielding Jacket now.
Keep your frequencies to yourself.  This jacket keeps stalkers from reading your implants. We will sew shielding into a NON-STRETCHY garment of your choice. One layer of metallic fabric blocks a cell phone from ringing, but we put two layers of metallic fabric and a lining into the garment to separate the metal from the skin.
We ask that you purchase a new garment, try it on, pin it or tell us what changes you want and then send it to us.  We will sew in the shielding and a lining to protect the metal. These will be non-returnable as they will be made specifically to order. Make sure it fits first.

Consider a nurse's or doctor's coat because they are generic fitting. They can be short, 1/4 length or long sleeved. The metal fabric is $15 per yard for metallic (nickel/copper). The lining is $6.00 per yd. So the price will be calculated on how much fabric is used and the number of hours it takes to construct. Hourly sewing is $15.00 an hour. Estimated price $250.00-$350.00.

Please contact us at CitizensAHT@protonmail for more information.
Send us your hat and we will line it for you $120.00 (4 layers).  Aviator hat lined for $150.00.
Uni-Sex Newsboy Hat  $85.00

People are loving this hat!

Insert for hat
Colors most chosen:
Black, Blue Denim, Navy Blue

Removable insert is 4 layers metallic fabric and a layer of broadcloth to protect the metal. Comes with Grounding strap, 2 removable magnets.  $85.00.
This hat comes down over the ears, covers the forehead and back of head. It is larger than the usual baseball cap so we have chosen this for building shielding inside.
This will be assembled per order so it may take 30 days to arrive. Price includes priority 2 day mail, tracked and insured.
Order on the website You will just pay for the hat online and we will send you an email for your color choice, size choice and your address. Our website menu doesn't let us list these as choices in the cart.  If the website does not ask for your mailing address, we also need that. Thank you for your order.
If you have a hat you would like like lined, please contact and we will consider it.
Get a free booklet and Press Release with a hat.

$65 with shipping. Protect your head! Cap with 4 layers of metal and one layer of blackout fabric, use with magnets and grounding strap and rubber mouse pad (comes with hat)

The new cap has a tab connected to the metal fabric. You can put a grounding clip on this and the other end on a magnet or a piece of carbon and it is grounded. You can use it without a grounding strap. You can put more magnets on it and move them around to where your implants are or over your ears. If you are being struck with heating energy, you can put an ice pack inside. It comes with a large round rubber mouse pad you can take out if you want. The shielding works best if it blocks EMF and sound, so you need metal and rubber.
Also, the hat may be worn for consecutive hours to see any change. Wear it to sleep to effect blocking the dreams, it will help block direct stimulation of implants in the head and a field of attack. Remember that your face is open, your eyes, nose and mouth provide an opening for EMF. So unless you are in a Faraday cage, there will not be a total blockage, but you can protect your head with this hat shielding method.
The hat is $57 + $8 shipping and handling in the US and made upon order. We expect feedback as to how it helped you with your particular problem. Many people are saying that the hat helps, especially where the moods are being affected, subliminal thoughts, or dreams are being implanted, which may be frequencies targeting you with a field of frequencies. You can let out the tie cord and let it drape down over your neck to cover more area. This is the best version to date.

This is not guaranteed to stop V2K. If you hear voices, you may have a radio connection, a real radio connected to your brain and it is always connected. A hat will probably not stop that, but if you used it in a certain way, it may affect it, or reduce the feedback they get.
Email:  CitizensAHT@protonmail to order if overseas because extra shipping is incurred for tracking overseas and going through customs. Overseaes tracked and insured through customs is $35. Uninsured is $17-28.

NEW BOOKLET:  "How Are You Being Targeted?"
Unite the TI community with a community understanding
Booklet is $8.00 + $2.00 shipping.
Overseas is $7.00 for shipping. You will also receive a copy of the Press Release on the Body Area Network. You can support our organization's activities by ordering by Paypal at
Keep Cool - Heating destroys your cells $13.79

ThermaFreeze Reusable Ice Pack Sheet Ice Blanket, Cut to Size, 6 x 20 Cells, 50"

How to use an Anti-Static Wrist Strap/Wristband
How to use an Anti Static Wrist Strap / Wristband?

Last updated on May 29, 2019 by Juzel Albert Padilla
Protect your legs!

Inerzen Shin and Calf Support Hot and Cold Gel Therapy Wrap - Includes Hot or Cold Gel Pack for Pain Relief - Microwavable, Freezable, Reusable (One Size Fits All)

Are they hitting your knees?
Protect your Knees - put some ice in these knee coverings

2 Pack Knee Brace Knee Sleeves Knee Support for Women or Men for Running MUBYTREE

Don't miss any of your targeting!

Forestfish Camera Glasses Video Recording Sunglasses 1080P HD Video Recording Camera with 16GB TF Card

Wyze Cam 1080p HD Indoor Camera

Wyze Cam 1080p HD Indoor Wireless Smart Home Camera with Night Vision, 2-Way Audio, Person Detection, Works with Alexa & the Google Assistant

Find the transmitters in your home!

YOUYOUTE Anti-Spy Amplification signal detector RF Spy Bug camera wireless Detector Frequency Scanner Sweeper GSM CDMA GPS Tracker Finder

Listen to Dave Case's CD with Koss

Koss KTXPRO1 Titanium Portable Headphones with Volume Control

Neodymium Magnets for Hats

Strong Neodymium Disc Magnets Stronger Than N35 Rare Earth Magnets - 1.26 inch x 0.08 inch, Pack of 24

Block EMF with Mouse Pad

Reflex Lab Extra Large Extended Gaming Mouse Pad Mat XXXL, Stitched Edges, Waterproof, Ultra Thick 5mm, Wide & Long Mousepad 36"x18"x.20" White

If you have heating from below you while sleeping, this will bock it all. Stick this on the back of the mouse pad:

Noico 80 mil 36 sqft car Sound deadener

Canned Fruit

Powerful Portable DDS Multi-band System

Linqstat - Please email
Linqstat is available packaged in 3 different lengths.
Package 3 feet x 6 feet
Package 3 feet x 12 feet
Package 3 feet x 24 feet
3' x 6' 8 ml (twice as thick as LessEMF's)
(Shipping, tracking & insurance is included in the price except if you are out of the US).
Please contact if you have shipping out of the United States. The shipping is approximately $14.00 in the US which is included in the price (base product $24,00). The package must be weighed and a special price including insurance will be added to the price of the product depending on the delivery address out of the US). thank you
If you have a tent, you can just tape some pieces of Linqstat together and drape them over the tent. You could make it the exact shape as the rain cover. You can ground it to an outlet with a banana clip or attach a TENS electrode to it to create a field across the surface to confuse any frequencies coming at you. Using a tent structure that's already got places to attach the Linqstat make it a lot easier. You can even get a simple one and put it on your bed to drape the Lingstat over. LINK TO GROUNDING CLIPS
LINQSTAT (≤50,000 ohms/sq) Electrically Conductive Film.
Product Part Number: LINQSTAT MVCF S-Series
CAPLINQ LINQSTAT™ MVCF-Series is a black, carbon-filled, electrically conductive polyethylene plastic film designed to provide both physical and static protection. Having a surface resistance of <50,000 ohm-cm, (5 x 10^4 Ω-cm) it offers medium-level static protection which means it effectively avoids accumulation of electric charge on itself and the products which it protects. Its easy-grounding nature makes it ideal for packaging where electrostatic contamination is a problem. Please note that of the Caplinq Linqstat MVCF-Series the MVCF-8S10K-Series is only surface conductive and not volume conductive.
CAPLINQ LINQSTAT™ MVCF-Series is useful in applications where the key is to balance cost versus performance. As a medium-level conductive plastic, the carbon-loading is such that it is low-enough to be cost-effective, while being high enough to meet the electrical requirements of military specification MIL-PRF-81705D Type II and MIL-P-82646A.
CAPLINQ LINQSTAT™ MVCF-Series film and its conductivity are unaffected by humidity and age. The film is heat-sealable, flexible and offers exceptional abrasion resistance. The film gives good thermal stability and has outstanding chemical resistance. It has a standard thickness range from 65μm to 200μm (0.0025” to 0.008”) and is available in sheeting, tubing, V-fold and C-fold versions. Roll lengths and widths vary depending on thickness and application.

Product Applications

In sheet form (LINQSTAT MVCF-S Series), the conductive polyethylene is used as a weak pressure sensor making it useful for applications that have large surface areas and expect large pressure applications. For more sensitive pressure sensor applications, CAPLINQ recommends LINQSTAT XVCF-Series, which is a more-conductive series of polyethylene plastics. As an antistatic packaging plastic, it is also used as a antistatic interleaver for Smartcard (micromodule) applications to separate subsequent layers of smartcard chips in micromodule production.

Product Applications

  • EMI/RF Shielding
  • Large Pressure Sensors
  • Faraday Cages

Product Features and Benefits

  • Volume-conductive plastic
  • Black Opaque - Printable
  • Provides Anti-Static protection to electronics components
  • Groundable
  • Humidity independent conductivity
  • Meets military specification MIL-P-82646A

Chemical Susceptibility

  • Methanol: Resistant
  • Ethanol: Resistant
  • Isopropanol: Resistant
  • Weak Acids: Resistant
  • Ketones (Acetone): Slow Attack
  • Weak Alkalines: Slow Attack
  • Hydrocarbons: Non-Resistant

Product Nomenclature

  • MVCF: Low-Level Conductive (Static Dissipative) Film
  • 4: Thickness in mils (0.001")
  • 0036: Roll width in inches
  • BT10K: 10,000 ohms/square Surface Resistivity
  • S: Sheeting
  • /2: Length of Roll(m): 2=46m, 3=400m, 5=500m/li>
Miriam Snyder Prayer Warriors
Dial: +1 605-562-0444Show ID: 120423
Prayer and Scriptures for Peace When the Devil Attacks
Scriptures to Stop Discouragement and Build Determination to Believe God
What is a Targeted Individual? What is the Targeted Individual Program?
Greetings to the Illegally Targeted Community!
We focus on education/raising public awareness about the RICO crimes of organized stalking, directed energy torture and other violations of physical/mental sovereignty and actions you can take to help win this war.
Hope Franklin, Research and Communications Director
Jack Christiana, Legal Director
Karen Stewart, Adviser
Targeted Individuals of Central Oregon
TICO (Targeted Individuals of Central Oregon)
Tobin Blake
Ella Free Channel
"Please join us every Tuesday & Thursday on Free Conference Call
 515-606-5187, ID 400014#
Online Meeting ID: Tiangel2016
Freedom Fighters for America
Freedom Fighters For America
optional link
Mile-Hi TIs
Monday call 10pm mountain time. And Thursday 9pm or after Ella, both call different numbers.
Monday. 10 pm 641-715-0872 Access 198 158 voice call

Thurday after Ella is our free conference call, 605-472-5439 pin 66 41 49 online pin
Stop Gangstalking Crimes Newsletter
Sign up for Stop Gangstalking Newsletter
ACTIVIST:  Dr. Millicent Black

Targeted Individual Get-Together 
Lake Forest, Orange County
T.I. Get-Together
Saturday, September 14th 1:00 PM
Lucille's Restaurant
24760 El Toro Road
Lake Forest, CA
Please RSVP Tricia:
Targeted Individual Get-Together 
Mission Bay Park, San Diego
T.I. Get-Together
Saturday, September 21st 1:00 PM
This is a grassy park area located on San Diego Bay.  Plenty of free parking, areas to walk and playground for children.   Barbecue available.  Potluck, details to follow.  Come Relax, hang-out with us!  RSVP  Heather:
Submit your Targeted Individual Statement by Tuesday,  Sept. 10th   
These events and more are posted on Twitter at:
T.I. Get-Together:  CLEVELAND
Saturdays, 11:00 am till 1:00 pm
Lakewood Public Library
15425 Detroit AVE
Lakewood Ohio 44107.
Details, Contact The Organizer:
Event updates and other news on Twitter:
Phoenix Targeted Individual Rally
Phoenix Targeted Individual Rally
Every Saturday
10:00 am to 5:00 pm
Central and Washington, across from Urban Outfitters
We have flyers, microphone, gazebo tent with table.
Please come join us to promote public awareness.
T.I. Get-Together
Sunday, September 15th, 2019
2:00 PM
2845 N Central Ave.
Phoenix, AZ 85012
If you would like to be added to list, please email
For more information, please contact Armin Aryan
​Phone:  602-563-4750

​For more information, please contact Constance Rose.
For more information, please contact Doug Cruz.
When: Every Thursday at 6:00pm EST
Call-in number: 1-515-739-6265 (FreeConferenceCall)
Access code: 272676#
For questions or topic suggestions, contact Vickie at (346) 410-7047.
When: Wednesdays at 6:30pm Central Time
Call-in number:
1-724-444-7444 (Talkshoe)

Access code: 136067#
Location:  TICO's Launch Meeting:  Wednesday, April 17, 5:00 pm - 6:30 pmHollywood
Downtown Bend Library, Hutchinson Room
601 NW Wall Street, Bend, Oregon 97703
Location: Hollywood District Public Library,

4040 NE Tillamook Street, Portland, OR 97212
When: Saturdays from 3:30pm - 5:30pm
NEXT MEETING:  Saturday October 26, 2019
*An optional inexpensive restaurant gathering follows the meeting.

For more information, please contact Amy at 1-971-207-3401
Location: Montlake Library Meeting Room, 2401 24th Ave E, Seattle, WA 98112
When: Sundays from 1:00pm - 3:00 pm
For more information, please contact Curtis at 1-817-901-8720.

Connect with this group by joining the Targeted Individuals Sacramento Meetup.
For information, please contact Justin at

Connect with this group by contacting Julie at
Vancouver Public Library
1428 Cedar Cottage Mews, V5N 5Z1
350 West Georgia Street
Vancouver, BC V6B 6B1
contact:  Genet -
Conference Calls for TI's
If you would like to be added to list, please email
Sunday at 8:30 P.M. E. Coast, 7:30 Central, 6:30 Mountain, 5:30 W. Coast

The new call in # is (605) 475-4779, Access Code: 607080#
Moderator: Neal
Moderator:  Miriam Snyder
 Moderator Denise
Time 7:30 PM Every Monday night
Call In 1-867-292-3030 Access # 522 5726
Moderator:  Derrick of PACTS Int'l
Time:  9:00 EST
Call-In #:  1-319-527-2701
Access Code:  248671

Moderator:  Kate Ryan
New England Support Group
Time: 7:00 p.m. EST
Call-In Number:(605) 562-0444
Access Code:  133472#, Pin:  #1

Moderator:  Julia
Engage in Prayer
Time:  9 pm Eastern/ 8 pm Central/
7 pm Mountain/ 6 pm Pacific
Call-in number: (515) 739-1405

International Dial-in Numbers:
Call ID: 141476
Access Code: 381878
FFTI & Targeted Justice Open Support Call
Time:  Begins at 9pm EST / 6pm PST every Thursday
Call In #:  1-515-739-1285
Call ID:   400014#
Moderator:  Miriam

Moderator:  Derrick Robinson
Time:  9:00 EST
Call-In #:  1-319-527-2701
Access Code:  248671

Moderator: Amy

Time 12:30 PM Pacific
Call-in number: 515-739-6045
Access code number 874647
On Free Conference Call.
Amy 971-207-3401
Citizens Against Harmful Technology
We have no P.O. Box right now.

Make checks payable to CAHT, ask for a physical address by writing an email to

Membership is $30.00, comes with 60 page free booklet “How Are you BeingTargeted?”, directed energy brochure, psychiatric living will, Press Release on BAN, membership card.
Booklet: $10 includes $2 shipping. We have a supply of the newly edited 60 page booklet. Order one and receive a free copy of the Press Release on the Body Area Network.

If you donate, please request the IRS Tax Number.
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email. 

Please print a copy of this newsletter and any newsletters you wish to maintain.  Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.  

This is an internet reference newsletter. A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners. 
Please enable images

Citizens Against Harmful Technology  •  P.O. Box  •  Edgewater, FL 32141

Subscribe  •  Preferences  •  Send to a Friend  •  Unsubscribe  •  Report Spam
Powered by MyNewsletterBuilder
Please enable images
Please enable images