Click on the titles in Blue or the pictures linked to the original articles.
This is a thank you for your support of our projects on behalf of the TI community. We need your support in two ways this month.
Campaign for Yearly Website Renewal
We must renew our website for a year $400.00 so we thought it would be a great time to design a new website which would better serve the community. The new website will have some new features so TI's can participate in commenting on articles and sharing their testimony in a new way. There will be a conference line so you can make an appointment for a conference to talk about your issues. Help with Psychiatric Arrest. You can get help before and after a psychiatric arrest. We want people to call us before, during or after a psychiatric arrest so we can help them. Most people do not know at all what is going on when it happens because this is an NWO program which has never been implemented in this way. There are legal psychiatric holds and then there is the kind where they plan it as part of the assault on the life of the individual and they look for the opportunity and excuse to carry it out and make you pay for it. We can help. It is important that the arrest not happen at all or that you don't go to a hearing. The hearing is where the diagnosis of the criminal doctors become a false record of mental illness. This can be avoided and we want to help with that. We can write letters, send faxes, make phone calls and provide support from other people who want to help. The new website will have an overview slider and a TI news page, news about TI events, rallies, support groups, conference calls. We will have an international TI registry. You can tell your story and record for posterity what happened to you. If they kill you, your testimony will still stand. You can create your own page with documents and evidence.
Please donate to our new website. We will post your name and contribution unless you request that it not be published. We want to thank you for your good will, your appreciation for what we do and your donations.
Campaign to Distribute Booklets
We have a booklet which is designed to educate people on the targeting, not only of individuals but the whole population. People don't realize this takeover of the weather systems, destruction of the food supply and the use of electronic weapons on civilians damage everyone and are politically motivated to control people, just like the TI program. These programs stand against all the concepts of sustaining liberty for people of the earth. People cannot help Targeted Individuals if they do not have an understanding of the big picture - what is happening in politics and military strategies to take over control of everyone and everything with the Internet of Things and the electromagnetic spectrum. We need a sponsor for the printing of this booklet so it can be given out at rallies and support group meetups. Please also let us know if you would like to distribute the booklet at a rally or event and we will try to provide those for you at a lower cost than on the website. We need to step up the involvement of everyone in responsible activism on an individual basis.
Donate on the website or paypal with instructions as to your wishes: CitizensAHT@protonmail.com
Judge rules FBI terror watchlist violates Constitution
"People have rights that can't be taken away".
Comment: That's absolutely false. Targeted Individuals have all their rights away with great ease and they don't know who is doing in many cases. Some people know exactly who is performing their torture but they can't stop them. Hitting people with microwave energy all day long is criminal. It is certainly against the Constitutional Implanting people with a Body Area Network, a cochlear implant and having assholes talk to your brain 24 hours a day is certainly UNCONSTITUTIONAL. The US is torturing people with this V2K all over this country and they can't stop it. WHO IS GOING TO TAKE UP THE CHALLENGE FOR THE PEOPLE? Trump has letters from hundreds of TI's with no answer at all.
The game-changer in Judge Trenga’s case, Elhady v. Kable, is the particular watchlist at issue in the litigation: the Terrorist Screening Database (TSDB). This is a much bigger and more versatile list than the No Fly List. For the first time, the well-shielded TSDB has been held constitutionally unviable. In Judge Trenga’s words: “there is no independent review of a person’s placement on the TSDB by a neutral decisionmaker, and when coupled with the limited disclosures and opportunity to respond by a person who requests that his status be reviewed, there exists a substantial risk of erroneous deprivation, regardless of the internal procedures used to determine whether a nomination to the TSDB is accepted.” Not even Judge Brown’s refinements for the No Fly List satisfied Judge Trenga, who found that “in the context of individuals challenging their placement on the TSDB rather than on the No Fly List, it is a black box – individuals are not told, even after filing, whether or not they were or remain on the TSDB watchlist and are also not told the factual basis for their inclusion.”
This is significant because all the other watchlists used by the United States are created from this central source. Charles H. Kable IV, the lead defendant, is the Director of the Terrorist Screening Center, essentially a component of the FBI, that was conceived in 2003 (in Homeland Security Presidential Directive/HSPD-6) as “an organization to consolidate the Government’s approach to terrorism screening and provide for the appropriate and lawful use of Terrorist Information in screening processes.”
FLYER YOU CAN USE RE WATCHLIST-Karen Stewart's PDF letter to Judge Trenga is on our website under "What we Do" on the first page.
September 6, 2019
Judge Anthony J. Trenga
of the Eastern District of Virginia
ruled in the court case
Elhady et al v. Piehota et al
Case No. 1:16-cv-00375-AJT-JFA.
Terrorist Watch List is
U N C O N S T I T U T I O N A L
Therefore,allFBI / Fusion Center / Infragard / civilian
Stalking harassment, slander-libel, operations and assaults with covert weapons are highly illegal. Those involved can theoretically be prosecuted asenemy combatants, domestic terrorists andtraitors forwarcrimesand crimes against humanity.
Norton vs Shelby (Supreme Court Ruling), -
following an unconstitutionallaw providesnoimmunityfrom prosecution.
10 US Code §950t (2) - forbids attacking non-combatant civilians with weapons of war. 18 USC §2340 (c) - Conspiracy to commit torture. 18 USC §2441 - prohibits the Federal governments and agents thereof from committing acts of war upon unarmed, non-combatant civilians. 18 USC § 2384 - Seditious Conspiracy. 18 USC § 2382 - Misprision of Treason. 18 USC §2381 - Treason.
18 USC § 241 - Conspiracy to Deprive Constitutional Rights. 18 USC § 242 - Deprivation of Constitutional Rights under color of law. 18 USC § 1117 - Conspiracy to commit murder. 18 USC § 1111 - Murder. 18 U.S. Code § 2389 - Recruiting for service against the United States.
The U.S. government has used the post-9/11 war on terror to launch two major wars, mount gunship and drone attacks on several countries, and institute a widespread program oftorture and abuse. Casualties of those conflicts number in the hundreds of thousands. Another casualty of the war on terror iscivil liberties. From theUSA PATRIOT Act, towarrantless surveillance, to theMuslim Ban, to the use ofmetadata to spy on people and target fordrone strikes, the deprivation of constitutional rights has continued during the Bush, Obama and Trump administrations. An additional assault on the Constitution is the terrorism watchlist, a federal government database of “known or suspected terrorists.” In 2013, there were680,000 people on the watchlist, called the Terrorist Screening Database (TSDB). By 2017, the number had swelled to 1.2 million, including 4,600 U.S. citizens.
TI TESTIMONY 1:
Attached please find combined photos of millimeter wave attacks that took place on September 27 and October 2, 2018. I was 66 years old at the time they were taken at a local walk-in health center.
The first millimeter wave attack happened while I was lying down, being examined, at the office of my orthopedic surgeon. I was there because two days before that I had received a microwave blast when I was going down the stairs in my home, rolled all the way down, and broke my wrist. I saw an airplane or drone in the window and the burning began. Since I could not move because I was lying down while the doctor was examining my wrist, I put my hand to protect and cover the burning areas on the right of my body, and as a result, the top of my right hand was also burned.
The second millimeter wave attack happened at my home while I was sitting in front of my computer, and it was also done by an airplane or drone through the window.
My doctor, who often saw the burns with microwave pulses, knew that this was not self-inflicted nor the result of a fall, since the burns appeared in parts of my body which are not affected when you fall or "bump" into something, such as the inside of my legs and arms, because when you fall or bump into something you do so with the outside part of your legs and arms. And finally, he saw burns on my back, and the small of my back, which he knew I couldn't reach -- so he determined that this was coming from "an external source", and privately he told me that he believed it was "radiation." And my Dermatologist determined that my burns were signs of asteatotic dermatitis, which is a dermatitis caused by "prolonged radiation" in cancer treatments -- but I did not have radiation for cancer treatments.
TI TESTIMONY 2:
I just wanted to mention that a girl was sitting in her vehicle in front of my apartment playing her rap music so loud that i couldn't hear my t.v. so i got my camcorder and filmed the whole thing. At that point she got out of her vehicle and started saying that i had no right to film her and then she called me some names.
I notice tonight when i got into my car in front of my apartment a watcher went pass me. Then the minute i pulled up to my apartment with my car the same watcher went pass me again for the second time today. They also use other people to keep an eye on me while I'm home. Certain people in the community will walk pass my apartment with there mobile phone out in plan sight. I have pictures of this as well as the watchers harassing me at times. - Anonymous TI
TI TESTIMONY 3:
Please could you send me 1000 of these booklets and as much information to educate the public, the police, doctors etc. and to make them all unite with the rest of us to do our very best to get these evil things destroying so many innocent lives including mine and yours to stop it all? Your booklet certainly is jam packed explanations of what every TI goes through and impossible to not able to flee from it as there is no escape when we are all satellite tracked. The way I would distribute it would be place it under car windscreen wipers in public car parks, leave some in local libraries, council offices, handing it out to police officers, giving these to all my other fellow UK TI closest friends to guard themselves with, family and non-TI friends and the local newspaper firm. I have already publicly distributed other TI literature thousands of by myself. But your booklet and press release is excellent in educating the sheeples as you clearly have done your homework well done. I live alongside all this TI life and not consume my life dead or I would not be here emailing you still fighting and kicking many arses for my freedom. I am a freedom fighter and my perps have to literally instantly murder me to silence me forever. I am out to get even with all these evil psychopaths by them all to face the legal death sentence for when I do take my case to the Hague Convention Supreme Courts of Human Rights. I will launch my court case for when all the existing lawsuits win victorious and all this comes to full fruition. My perps are covering their arses presently allowing me to sleep and I am healing all the time from all those serious physical illnesses they have caused me. They performed premeditated attempted murder on me last year Christmas time orchestrating it like it was a suicide attempt. I am willing to unite with you to stop all TI’s and ourselves from suffering anymore. These evil bastards perps can even force speech me, by putting me in a confused disorientated state to stop me from getting help. I have spoken to my local police officers and they told me I am not on the government terrorist watchlist. But I am still a real TI suffering and fighting for my freedom. I have 6 synthetic silicone tubes in my chest which I can remember as clear as day like it happened to me only yesterday, they implanted me with and with all the micro and nano-chips throughout my left side. The biggest evidence is my extreme hair loss and very dry skin ageing me before my time. I have the hair follicle test results which indicates I have the majority of different heavy metals in my entire system. I’d love it if you could help me get hold of other TI’s who have done the hair follicle test and their results, so that I can compare theirs with my own. I need to know if anyone else’s matches my own hair follicle results. I’m demanding also to have as many TI’s affidavits they have completes, sworn on oath to send to me via PDF file so it cannot be tampered with please? I am preparing my big court bundle to take to the Hague convention Supreme courts of human rights. But I need my backing to take my evil perps and mastermind on to a high court of law, governing human rights. - Anonymous TI, UK
TI Submission - Use of Smart Appliances in Surveillance
On Wednesday, September 25, 2019 12:22 PM, Rebecca Brewer <firstname.lastname@example.org> wrote:
The diagnostic reports that I take from my android devices are acquired by enabling the secret developer tools. (What you want to look for specifically is the "BUILD NUMBER" - it is slightly different on each android phone dependent on manufacturer.) skizitpowers
For my LG Android: (Settings->About Phone->Software info->Build Number (tap on "build number" 7 times to enable the developer options))
(yes, tap Build Number seven times and after the third tap you'll see a notice informing you that "you're 4 steps away from becoming a developer". Then three steps ten two until you see "Congrats, you are now a developer!" Back out of that information screen and you should see a new option in your settings labeled "Developer Tools")
Once enabled I can open the tools and the option to take a bug report is at the top. That option does not usually work though, so I discovered by scrolling through developer tools there is an option to enable the device to capture a report through the power off function. I enabled that, pushed the power button as if to shut down the device, then I select the Bug Report option.
The android devices won't open their own logs - OR maybe I have just not figured out how to do that yet...so I send the log to my email address and then I access the Android log with my iPhone.
The other log reports (with the black background like the MYALO/Dreamliner evidence, for example) are accessed through the normal settings by tapping Settings->Apps-> Google play services ->Battery -> then tapping "Report", which provides an interface for me to report directly to Google that the application is malfunctioning or whatever. Instead of submitting a report, I choose to access the System Details and Info offered in the small print to the side of the screenshot box.
When the real developers realize what's happening, they remotely access my phone and disable or "gray out" the report features in each of their google applications on my device.
I continue to purchase new android devices periodically so I can take a new report before they disable my ability to do so.
For iPhone reports I simply open Settings->Privacy -> Analytics -> Analytics Data--> then I pick a log and peruse it.
I hope this answers your question sufficiently. Let me know if you need further explanation.
I think they are remotely accessing the appliances to "sense" occupancy of my home - like the grant info details. I know my stoves would only work if I'm standing in the room...if I walk away, the burners stopped working.I know for a fact that they've been analyzing my movements through my speakers, and this new info confirms that they're doing it through other methods too.I don't think they are trying to ruin my devices and appliances necessarily, they're just using them in ways they're not designed to be used.
"Cyber operations military police said people being hacked remote neural monitoring, remotely controlled like remote control toy car! was strictly cyber operations military on all Americans in every state !!! SOCOM inspector general Allen Miller was replaced. Even officials in the white house are effected like presidential correspondents and workers not giving Trump the reports nor Congress is getting citizens support, since everyone is cyber operations effected votes,crime rates, department of defense employees and national security Nsa fort Mead people of all bases, all jobs and FYSA WARRANTS ARE REMOTELY CONTROLLED INTO APROVALS BY CRYPTOCRACY TERROR CELLS IN OUR GOVERNMENT." _____________________________________________________________________________
NEXXTIME PODCAST vol.14 Featuring Cyber Reconn & Due Hass
Former Army Ranger Justin Pitts was attacked by non-lethal weapons by the US Army’s Program Executive Office Simulation, Training, and Instrumentation (PEO STRI). They are located at 12211 Science Drive, Orlando, FL 32826. Justin was a personal friend, we were both what is termed Targeted Individuals. This is a new program run by our government. If you are unlucky enough to be put in this program, your life as you knew it will NEVER be the same.
Justin and I met on YouTube. He was a kind, skinny, short southern Army Ranger that was targeted during his last year as a recruiter for the military. While he was still Active-Duty, the Army base in Orlando, FL started targeting him. Justin started hearing voices receiving Synthetic Telepathy. This is not too different to my targeting; however, Justin could not keep weight on his body. He was constantly eating junk food. Justin also had severe EMF attacks where his entire body would shake. His targeting increased when he, through microwave hearing, heard someone blow their nose into a trash can while he was not at work. This gesture is common among military men. He had heard the guys at the recruiting office make that noise before and identified it. This was the first time he realized that someone had tapped into his brain. Justin’s targeting would start to escalate at that time.
We decided to take our information and put it together to figure out a way to help expose the targeting of US citizens. We knew these were crimes against humanity not unlike the Nazi treatment of anyone they deemed unfit. These non-lethal weapons were designed in the last 40 years. Justin and I interviewed on YouTube to get information out about how individuals are targeted.
Justin was targeted with gang stalking. He had military helicopters and planes fly over his home in South Carolina. Justin was smart and had the ability to review the Army’s Cyberspace and EMF Operations FM 3-12 Manual that is available online. Justin’s targeting would continue and his hearing one person turned into a classroom of Army soldiers exchanging paperwork and talking. He would be in his home and hear the classroom become animated. He saw cars drive into his neighborhood with Florida license plates at this time. Justin continued to also be targeted throughout his body with electromagnetic-frequency-attacking causing him to shake uncontrollably. No matter how much they attacked Justin, he continued to fight back going up the Army’s chain of command to expose the National Security violations.
The Congressional hearing dated September 30, 2015 stated that definition of cyber included “emerging technologies, drones, nanotechnology, and a slew of other technologies which the term cyber is inadequate to define.” This is true and is why Targeted Individuals have a hard time trying to explain what is going on with them. Targeted Individuals will be labelled a psychological dysfunction by uneducated citizens. However, these crimes are really happening.
Justin was able to start to file complaints with numerous military and intelligence agencies. He went up the Army’s chain of command and this went nowhere. Then, he was harassed by the military planes in his neighborhood, so Justin filed a report with the Oconee County, South Carolina Sheriff’s Department. This was not enough to stop the program. Justin went to US Army Special Operations and Military Police to file complaints. However, people including military and intelligence agents do not know about technologies torturing US citizens on US soil. This is by the very definition treason, punishable by death.
Justin then was clever enough to start recording phone conversations when he filed complaints. His perpetrators told him where they lived and their names. Justin had one of them come near him. This perpetrator told Justin his name over the Acoustic Microwave Hearing from the base in Florida. The man’s name is Joshua Pierce, Sergeant 1st Class, Non-Commission Officer. This perpetrator had a complaint filed by Justin to the FBI.
Justin contacted the NSA and filed a report with them since the Army was violating National Security with the Cyber and Electromagnetic Warfare tools at their disposal. Next, he contacted an UN journalist and NATO’s biomedical military command.
Justin talked with Presidential correspondents, however, he could never get his computer secure enough to send the information to the White House. Finally, when all these attempts to stop the targeting did not succeed, he went to Washington, DC. Justin tried to have Congress listen as well as the Pentagon. Unfortunately, this technology is so powerful that people at all levels are mind controlled with electromagnetic frequencies. Functional MRIs are also used to read and change people’s thoughts and minds.
Our world is no longer a free will society. We can be mind controlled without our knowledge at anytime. That is how truly powerful these weapons are becoming. All of Justin’s complaints fell on deaf ears, and he started to become very depressed. I did not see Justin at that time. If he was feeling that way it was probably an inserted frequency and not actual depression.
In December 2018 around Christmas, Justin supposedly took his own life; I do not believe that to be true. I cannot believe it when the soldiers at the US Army Base in Orlando, FL have the power to insert frequencies to make you feel how they wish. It is extremely unfortunate that I lost my friend, but he has left us the ability to stop the PEO STRI. This base is threatening our National Security by causing a substantial and specific danger to public health and safety. This is one of thousands of crimes they commit hiding behind a security clearance that needs revocation. We can together stop this base from taking all Americans’ free will. The 5G network will only enhance the crimes they are already commit daily. The PEO STRI is abusing their authority, causing gross mismanagement of military assets and wasting taxpayer funds.
If a man stands behind a woman "with a purpose of intimidation", the woman can feel it. Normal people just go about their business and don't pay any attention to you, but stalkers stand too close or stand right behind you instead of giving you a space. They pretend you don't exist to alienate you. They act like statues in a place so they can't be ignored. Their presence is made known needlessly. That's a stalker. A man doing it to a woman is especially egregious. Its a creepy feeling the female has for a long time and remembers. Its a psychological purposeful event. Its nice to see a woman explain this.
Explaining litigation, recently wins by default; No show
John shows there is factual evidence when schizophrenia is present. The diagrams he shows his brain is normal and a doctor's opinion shows his brain is normal. He also has a log of strikes to his eyes and genitals showing his has been abused sexually with directed energy.
What the hell is happening... you must be thinking that, as well as being dazed and confused in the least which is the purpose of this web site. Your unfortunate lack of critical thinking skills leaves you without the ability to see the unseeable. You watch, but you fail to see. Fear not my less informed friend - whether your being chemtrailed, body/mind controlled, hearing voices or stalked by the public, this web site connects the final high level dots concerning this otherwise complicated puzzle of insanity currently before you. 'Logic and proportion have fallen sloppy dead, and the White Knight is talking backwards'. This is what they are doing to you and your family, andthis is how they do it.
The US Military Is Genetically Engineering New Life Forms To Detect Enemy Subs
By Patrick Tucker, December 1, 2018
How do you detect submarines in an expanse as large as the ocean? The U.S. military hopes that common marine microorganisms might be genetically engineered into living tripwires to signal the passage of enemy subs, underwater vessels, or even divers. It’s one of many potential military applications for so-called engineered organisms, a field that promises living camouflage that reacts to its surroundings to better avoid detection, new drugs and medicines to help deployed forces survive in harsh conditions, and more. But the research is in its very early stages, military officials said. The Naval Research Laboratory, or NRL, is supporting the research. Here’s how it would work: You take an abundant sea organism, likeMarinobacter, and change its genetic makeup to react to certain substances left by enemy vessels, divers, or equipment. These could be metals, fuel exhaust, human DNA, or some molecule that’s not found naturally in the ocean but is associated with, say, diesel-powered submarines. The reaction could take the form of electron loss, which could be detectable to friendly sub drones. “In an engineered context, we might take the ability of the microbes to give up electrons, then use [those electrons] to talk to something like an autonomous vehicle. Then you can start imagining that you can create an electrical signal when the bacteria encounters some molecule in their environment,” NRL researcher Sarah Glavensaid at a November eventput on by the Johns Hopkins University’s Applied Physics Lab.
The Obama administration has quietly approved a substantial expansion of the terrorist watchlist system, authorizing a secret process that requires neither “concrete facts” nor “irrefutable evidence” to designate an American or foreigner as a terrorist, according to a key government document obtained by The Intercept. The “March 2013 Watchlisting Guidance,” a166-page document issued last year by the National Counterterrorism Center, spells out the government’s secret rules for putting individuals on its main terrorist database, as well as the no fly list and the selectee list, which triggers enhanced screening at airports and border crossings. The new guidelines allow individuals to be designated as representatives of terror organizations without any evidence they are actually connected to such organizations, and it gives a single White House official the unilateral authority to place entire “categories” of people the government is tracking onto the no fly and selectee lists. It broadens the authority of government officials to “nominate” people to the watchlists based on what is vaguely described as “fragmentary information.” It also allows for dead people to be watchlisted. Over the years, the Obama and Bush Administrations have fiercely resisted disclosing the criteria for placing names on the databases—though the guidelines are officially labeled as unclassified. In May, Attorney General Eric Holder even invoked the state secrets privilege to prevent watchlisting guidelines from being disclosed in litigation launched by an American who was on the no fly list. Inan affidavit, Holder called them a “clear roadmap” to the government’s terrorist-tracking apparatus, adding: “The Watchlisting Guidance, although unclassified, contains national security information that, if disclosed … could cause significant harm to national security.”
The rulebook, which The Intercept is publishing in full, was developed behind closed doors by representatives of the nation’s intelligence, military, and law-enforcement establishment, including the Pentagon, CIA, NSA, and FBI. Emblazoned with the crests of 19 agencies, it offers the most complete and revealing look into the secret history of the government’s terror list policies to date. It reveals a confounding and convoluted system filled with exceptions to its own rules, and it relies on the elastic concept of “reasonable suspicion” as a standard for determining whether someone is a possible threat. Because the government tracks “suspected terrorists” as well as “known terrorists,” individuals can be watchlisted if they are suspected of being a suspected terrorist, or if they are suspected of associating with people who are suspected of terrorism activity. “Instead of a watchlist limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,” says Hina Shamsi, the head of the ACLU’s National Security Project. “On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven’t carried out.” Shamsi, who reviewed the document, added, “These criteria should never have been kept secret.” The document’s definition of “terrorist” activityincludes actions that fall far short of bombing or hijacking. In addition to expected crimes, such as assassination or hostage-taking, the guidelines also define destruction of government property and damaging computers used by financial institutions as activities meriting placement on a list. They also define as terrorism any act that is “dangerous” to property and intended to influence government policy through intimidation.
This combination—a broad definition of what constitutes terrorism and a low threshold for designating someone a terrorist—opens the way to ensnaring innocent people in secret government dragnets. It can also be counterproductive. When resources are devoted to tracking people who are not genuine risks to national security, the actual threats get fewer resources—and might go unnoticed.
“If reasonable suspicion is the only standard you need to label somebody, then it’s a slippery slope we’re sliding down here, because then you can label anybody anything,” says David Gomez, a former senior FBI special agent with experience running high-profile terrorism investigations. “Because you appear on a telephone list of somebody doesn’t make you a terrorist. That’s the kind of information that gets put in there.” The fallout is personal too. There are severe consequences for people unfairly labeled a terrorist by the U.S. government, which shares its watchlist data with local law enforcement, foreign governments, and “private entities.” Once the U.S. government secretly labels you a terrorist or terrorist suspect, other institutions tend to treat you as one. It can become difficult to get a job (or simply to stay out of jail). It can become burdensome—or impossible—to travel. And routine encounters with law enforcement can turn into ordeals.
A chart from the “March 2013 Watchlisting Guidance”
In 2012 Tim Healy, the former director of the FBI’s Terrorist Screening Center,described to CBS News how watchlists are used by police officers. “So if you are speeding, you get pulled over, they’ll query that name,” he said. “And if they are encountering a known or suspected terrorist, it will pop up and say call the Terrorist Screening Center…. So now the officer on the street knows he may be dealing with a known or suspected terrorist.” Of course, the problem is that the “known or suspected terrorist” might just be an ordinary citizen who should not be treated as a menace to public safety.
Until 2001, the government did not prioritize building a watchlist system. On 9/11, the government’s list of people barred from flying included just 16 names. Today, the no fly list has swelled to tens of thousands of “known or suspected terrorists” (the guidelines refer to them as KSTs). The selectee list subjects people to extra scrutiny and questioning at airports and border crossings. The government has created several other databases, too. The largest is the Terrorist Identities Datamart Environment (TIDE), which gathers terrorism information from sensitive military and intelligence sources around the world. Because it contains classified information that cannot be widely distributed, there is yet another list, the Terrorist Screening Database, or TSDB, which has been stripped of TIDE’s classified data so that it can be shared. When government officials refer to “the watchlist,” they are typically referring to the TSDB. (TIDE is the responsibility of the National Counterterrorism Center; the TSDB is managed by the Terrorist Screening Center at the FBI.)
In a statement, a spokesman for the National Counterterrorism Center told The Intercept that “the watchlisting system is an important part of our layered defense to protect the United States against future terrorist attacks” and that “watchlisting continues to mature to meet an evolving, diffuse threat.” He added that U.S. citizens are afforded extra protections to guard against improper listing, and that no one can be placed on a list solely for activities protected by the First Amendment. A representative of the Terrorist Screening Center did not respond to a request for comment.
The system has been criticized for years. In 2004, Sen. Ted Kennedycomplainedthat he was barred from boarding flights on five separate occasions because his name resembled the alias of a suspected terrorist. Two years later, CBS Newsobtaineda copy of the no fly list and reported that it included Bolivian president Evo Morales and Lebanese parliament head Nabih Berri. One of the watchlists snared Mikey Hicks,a Cub Scoutwho got his first of many airport pat-downs at age two. In 2007, the Justice Department’s inspector general issued a scathing report identifying “significant weaknesses” in the system. And in 2009, after a Nigerian terrorist was able to board a passenger flight to Detroit and nearly detonated a bomb sewn into his underwear despite his name having been placed on the TIDE list, President Obama admitted that there had been a “systemic failure.”
Obama hoped that his response to the “underwear bomber” would be a turning point. In 2010, he gave increased powers and responsibilities to the agencies that nominate individuals to the lists, placing pressure on them to add names. His administration also issued a set of new guidelines for the watchlists. Problems persisted, however. In 2012, the U.S. Government Accountability Officepublisheda report that bluntly noted there was no agency responsible for figuring out “whether watchlist-related screening or vetting is achieving intended results.” The guidelines were revised and expanded in 2013—and a source within the intelligence community subsequently provided a copy to The Intercept.
“Concrete facts are not necessary”
The five chapters and 11 appendices of the “Watchlisting Guidance” are filled with acronyms, legal citations, and numbered paragraphs; it reads like an arcane textbook with a vocabulary all its own. Different types of data on suspected terrorists are referred to as “derogatory information,” “substantive derogatory information,” “extreme derogatory information” and “particularized derogatory information.” The names of suspected terrorists are passed along a bureaucratic ecosystem of “originators,” “nominators,” “aggregators,” “screeners,” and “encountering agencies.” And “upgrade,” usually a happy word for travellers, is repurposed to mean that an individual has been placed on a more restrictive list.
The heart of the document revolves around the rules for placing individuals on a watchlist. “All executive departments and agencies,” the document says, are responsible for collecting and sharing information on terrorist suspects with the National Counterterrorism Center. It sets a low standard—”reasonable suspicion“—for placing names on the watchlists, and offers a multitude of vague, confusing, or contradictory instructions for gauging it. In the chapter on “Minimum Substantive Derogatory Criteria”—even the title is hard to digest—the key sentence on reasonable suspicion offers little clarity:
“To meet the REASONABLE SUSPICION standard, the NOMINATOR, based on the totality of the circumstances, must rely upon articulable intelligence or information which, taken together with rational inferences from those facts, reasonably warrants a determination that an individual is known or suspected to be or has been knowingly engaged in conduct constituting, in preparation for, i n aid of, or related to TERRORISM and/or TERRORIST ACTIVITIES.”
The rulebook makes no effort to define an essential phrase in the passage—”articulable intelligence or information.” After stressing that hunches are not reasonable suspicion and that “there must be an objective factual basis” for labeling someone a terrorist, it goes on to state that no actual facts are required:
“In determining whether a REASON ABLE SUSP ICION exists, due weight should be given to the specific reasonable inferences that a NOMINATOR is entitled to draw from the facts in light of his/her experience and not on unfounded suspicions or hunches. Although irrefutable evidence or concrete facts are not necessary, to be reasonable, suspicion should be as clear and as fully developed as circumstances permit.”
While the guidelines nominally prohibit nominations based on unreliable information, they explicitly regard “uncorroborated” Facebook or Twitter posts as sufficient grounds for putting an individual on one of the watchlists. “Single source information,” theguidelines state, “including but not limited to ‘walk-in,’ ‘write-in,’ or postings on social media sites, however, should not automatically be discounted … the NOMINATING AGENCY should evaluate the credibility of the source, as well as the nature and specificity of the information, and nominate even if that source is uncorroborated.”
There are a number ofloopholes for putting people onto the watchlists even if reasonable suspicion cannot be met.
One is clearly defined: The immediate family of suspected terrorists—their spouses, children, parents, or siblings—may be watchlisted without any suspicion that they themselves are engaged in terrorist activity. But another loophole is quite broad—”associates” who have a defined relationship with a suspected terrorist, but whose involvement in terrorist activity is not known. A third loophole is broader still—individuals with “a possible nexus” to terrorism, but for whom there is not enough “derogatory information” to meet the reasonable suspicion standard.
Americans and foreigners can be nominated for the watchlists if they are associated with a terrorist group, even if that group has not been designated as a terrorist organization by the U.S. government. They can also be treated as “representatives” of a terrorist group even if they have “neither membership in nor association with the organization.” The guidelines do helpfully note that certain associations, such as providing janitorial services or delivering packages, are not grounds for being watchlisted.
The nomination system appears to lack meaningful checks and balances. Although government officials have repeatedly said there is a rigorous process for making sure no one is unfairly placed in the databases, the guidelines acknowledge that all nominations of “known terrorists” are considered justified unless the National Counterterrorism Center has evidence to the contrary. In a recentcourt filing, the governmentdisclosedthat there were 468,749 KST nominations in 2013, of which only 4,915 were rejected–a rate of about one percent. The rulebook appears to invert the legal principle of due process, defining nominations as “presumptively valid.”
Profiling categories of people
While the nomination process appears methodical on paper, in practice there is a shortcut around the entire system. Known as a “threat-based expedited upgrade,” it gives a single White House official the unilateral authority to elevate entire “categories of people” whose names appear in the larger databases onto the no fly or selectee lists. This can occur, the guidelines state, when there is a “particular threat stream” indicating that a certain type of individual may commit a terrorist act.
This extraordinary power for “categorical watchlisting”—otherwise known as profiling—is vested in the assistant to the president for homeland security and counterterrorism, a position formerly held by CIA Director John Brennan that does not require Senate confirmation.
The rulebook does not indicate what “categories of people” have been subjected to threat-based upgrades. It is not clear, for example, whether a category might be as broad as military-age males from Yemen. The guidelines do make clear that American citizens and green card holders are subject to such upgrades, though government officials are required to review their status in an “expedited” procedure. Upgrades can remain in effect for 72 hours before being reviewed by a small committee of senior officials. If approved, they can remain in place for 30 days before a renewal is required, and can continue “until the threat no longer exists.” “In a set of watchlisting criteria riddled with exceptions that swallow rules, this exception is perhaps the most expansive and certainly one of the most troubling,” Shamsi, the ACLU attorney, says. “It’s reminiscent of the Bush administration’s heavily criticized color-coded threat alerts, except that here, bureaucrats can exercise virtually standard-less authority in secret with specific negative consequences for entire categories of people.” The National Counterterrorism Center declined to provide any details on the upgrade authority, including how often it has been exercised and for what categories of people.
Pocket litter and scuba gear
The guidelines provide the clearest explanation yet of what is happening when Americans and foreigners are pulled aside at airports and border crossings by government agents. The fifth chapter, titled “Encounter Management and Analysis,” details the type of information that is targeted for collection during “encounters” with people on the watchlists, as well as the different organizations that should collect the data. The Department of Homeland Security is described as having the largest number of encounters, but other authorities, ranging from the State Department and Coast Guard to foreign governments and “certain private entities,” are also involved in assembling “encounter packages” when watchlisted individuals cross their paths. The encounters can be face-to-face meetings or electronic interactions—for instance, when a watchlisted individual applies for a visa. In addition to data like fingerprints, travel itineraries, identification documents and gun licenses, the rules encourage screeners to acquire health insurance information, drug prescriptions, “any cards with an electronic strip on it (hotel cards, grocery cards, gift cards, frequent flyer cards),” cellphones, email addresses, binoculars, peroxide, bank account numbers, pay stubs, academic transcripts, parking and speeding tickets, and want ads. The digital information singled out for collection includes social media accounts, cell phone lists, speed dial numbers, laptop images, thumb drives, iPods, Kindles, and cameras. All of the information is then uploaded to the TIDE database.
Screeners are also instructed to collect data on any “pocket litter,” scuba gear, EZ Passes, library cards, and the titles of any books, along with information about their condition—”e.g., new, dog-eared, annotated, unopened.” Business cards and conference materials are also targeted, as well as “anything with an account number” and information about any gold or jewelry worn by the watchlisted individual. Even “animal information”—details about pets from veterinarians or tracking chips—is requested. The rulebook also encourages the collection of biometric or biographical data about the travel partners of watchlisted individuals. The list of government entities that collect this data includes the U.S. Agency for International Development, which is neither an intelligence nor law-enforcement agency. As the rulebook notes, USAID funds foreign aid programs that promote environmentalism, health care, and education. USAID, which presents itself as committed to fighting global poverty, nonetheless appears to serve as a conduit for sensitive intelligence about foreigners.According to the guidelines, “When USAID receives an application seeking financial assistance, prior to granting, these applications are subject to vetting by USAID intelligence analysts at the TSC.” The guidelines do not disclose the volume of names provided by USAID, the type of information it provides, or the number and duties of the “USAID intelligence analysts.”
A USAID spokesman told The Intercept that “in certain high risk countries, such as Afghanistan, USAID has determined that vetting potential partner organizations with the terrorist watchlist is warranted to protect U.S. taxpayer dollars and to minimize the risk of inadvertent funding of terrorism.” He stated that since 2007, the agency has checked “the names and other personal identifying information of key individuals of contractors and grantees, and sub-recipients.”
Death and the watchlist
The government has been widely criticized for making it impossible for people to know why they have been placed on a watchlist, and for making it nearly impossible to get off. The guidelines bluntly state that “the general policy of the U.S. Government is to neither confirm nor deny an individual’s watchlist status.” But the courts have taken exception to the official silence and footdragging: In June, a federal judge described the government’s secretive removal process as unconstitutional and “wholly ineffective.”
The difficulty of getting off the list is highlighted by a passage in the guidelines stating that an individual can be kept on the watchlist, or even placed onto the watchlist, despite being acquitted of a terrorism-related crime. The rulebook justifies this by noting that conviction in U.S. courts requires evidence beyond a reasonable doubt, whereas watchlisting requires only a reasonable suspicion. Once suspicion is raised, even a jury’s verdict cannot erase it.
Not even death provides a guarantee of getting off the list. The guidelines say the names of dead people will stay on the list if there is reason to believe the deceased’s identity may be used by a suspected terrorist–which the National Counterterrorism Center calls a “demonstrated terrorist tactic.” In fact, for the same reason, the rules permit the deceased spouses of suspected terrorists to be placed onto the list after they have died. For the living, the process of getting off the watchlist is simple yet opaque. A complaint can be filed through the Department of Homeland Security Traveler Redress Inquiry Program, which launches an internal review that is not subject to oversight by any court or entity outside the counterterrorism community. The review can result in removal from a watchlist or an adjustment of watchlist status, but the individual will not be told if he or she prevails. The guidelines highlight one of the reasons why it has been difficult to get off the list—if multiple agencies have contributed information on a watchlisted individual, all of them must agree to removing him or her.
If a U.S. citizen is placed on the no fly list while abroad and is turned away from a flight bound for the U.S., the guidelines say they should be referred to the nearest U.S. embassy or consulate, which is prohibited from informing them why they were blocked from flying. According to the rules, these individuals can be granted a “One-Time Waiver” to fly, though they will not be told that they are traveling on a waiver. Back in the United States, they will be unable to board another flight.
The document states that nominating agencies are “under a continuing obligation” to provide exculpatory information when it emerges. It adds that the agencies are expected to conduct annual reviews of watchlisted American citizens and green card holders. It is unclear whether foreigners—or the dead—are reviewed at the same pace. As the rulebook notes, “watchlisting is not an exact science.”
Josh Begley, Lynn Dombek, and Peter Maass contributed to this story. Photo credits: TSA: G.J. McCarthy/Dallas Morning News/Corbis (2); Guidance: Josh Begley; White House: Win McNamee/Getty Images; Airport: Nick Ut/AP Photo
Possible Treatment for Your Myiasis
Comment: When you go to a doctor for treatment for Morgellons in America, you get diagnosed with "delusional parasitosis". However, if you will culture your specimen and find out exactly what animals you are dealing with, you can self-treat with care.
Myiasis is treated with Mebendazole which is difficult to find without a prescription. Albendazole treats a larger variety of parasites. Good luck trying to get a prescription of Mebendazole or Albendazole in America. Both of these can be found on Ebay for animals but humans can't get treatment. Myiasis doesn't exist here - right? You can try to get either of these through an online pharmacy or on Ebay sometimes.
TI's are all delusional even though your legs look like this - right (sarcasm). These pictures were sent to us by a TI who is also implanted with a robotic implant system which moves her face, hands, legs and feet automatically. She suffers noise campaigns constantly and has V2K. She is constantly being harassed in some way but still miraculously finds a way to help other TI's. This is entomological warfare and illegal assault and harassment in America.
Megaselia scalaris, commonly known as scuttle fly, is widely distributed all over the world. It is easily cultured in the laboratory condition making it a potential model organism.
Why is it a "model organism" Because it shares 44% genes with humans which govern the growth and structure of both insects and mammals. Why is that important? Because these flies can be easily genetically altered to live symbiotically in the human. This is why it is being used in the entomological warfare on the American people to torture, humiliate, degrade and rob people of their lives. It can be engineered to have all the qualities needed to live in a human and evade the immune system. It can be engineered to produce synthetic products which continue to assemble in the human skin. It is a weapon.
This fly can be made to produce only female offspring. It can be genetically altered to be extremely potent in egg production. It can be genetically altered to respond precisely with the insect hormone ecdysone to control its life cycle. In one article from Harvard said that when ecdysone could be controlled, the entomoligical weapon would be ready. Its been readied.
This entomological weapon is being put in Target's clothing, bedding, especially when they stay in motels. It is distributed in packets that have the logo MORG on it. Morgellons is precisely calculated and prepared so it would not be distributed in chemtrails that are used for weather warfare. The chemical reactions and heating that occur during these combustion events in cloud seeding would kill the animals. However, it is possible that it and other pathogens could be dropped and distributed in bundles of fibers people have found being dropped from the sky.
The rational treatment of genitourinary myiasis is to remove the offending larvae. In many cases when the diagnosis is done the maggot has already been expelled. Several substances such as antiseptic and anesthetic solutions have been used in the form of lavage (Francesconi and Lupi 2012). It seems, in our case, oral administration of 2 mg mebendazole and washing the urogenital area with solution of xylocain (2%) and iodine (1%), cured the myiasis. Since the urogenitoury tract has inaccessible area, removed of maggots is difficult by conventional instruments, to overcome this problem we used urogenital lavage with xylocaine and iodine solution in our patient. Xylocaine causes spastic paralysis in parasites straight muscles and this way the paralyzed larva was easily removed.
Medical personnel should take care of susceptible patients especially those with nocturnal enuresis, need to bear in mind the possibility of infestation with scuttle flies larvae, be able to make a prompt diagnosis of myiasis and implement relevant intervention to prevent tissue infestation. Prevention of this condition is important and involves use of insect repellents and insecticides for control of fly population, adequate protective clothing, good skin and wound hygiene to keep flies from reaching the skin, covering open wounds, change dressing daily, hang clothes to dry in bright sunlight and/or iron them and improve hygiene and sanitation. Because the size of gravid flies is very small, window screening and mosquito nets cannot effect on personal protection. Besides, so much attention is paid to large muscoid flies that may cause myiasis, it is likely that the small phorids are unnoticed or ignored, which may lead to an increase in the occurrence of phorid myiasis. We need to emphasize that this myiasis rarely occurs in healthy individuals and neglected personal hygiene is the single most important factor in human infestation.
Comment: In the case of Morgellons, it does not result from poor hygiene. It was purposely designed to create a disease condition in an individual for political purposes, to degrade the life enjoyment, to torture a person every day. It is purposely being denied treatment. TI's are suffering this disgrace designed by the governments involved in creating genetically altered insects and worms for use in warfare against their own citizens.
Activism: Resolution Against the Use of Radiating Type Weapons for People
In September, October, November and December 2019, a number of events are planned at the United Nations in the Human Rights Committee and the Committee Against Torture.
The Moscow Committee for Housing Ecology sent to the UN a resolution of the International Conference (December 1-2, 2018) “Against the Use of Radiating Type Weapons for People”. The resolution contains a requirement for the UN - “to develop and adopt a Convention on the prohibition of weapons of a radiating type (non-lethal, psychotronic), as WMD”.
The draft Convention “On the Prohibition of the Development, Production, Stockpiling and Use of Radiating Type Weapons on Their Destruction” is attached to the resolution.
The UN sent the committee an invitation to the Conference on Events for Sustainable Development and Peace, held in December 2019.
We are asking you to: send a requirement to the UN: to adopt the Convention "On the Prohibition of Radiating Type Weapons".
This will be the most important UN event "to achieve sustainable development and peace on the planet."
Please forward our appeal to other human rights organizations.
From: ikqbot<email@example.com> Sunday, September 22, 2019 9:11 PM Just letting you know I have a monthly public outreach and awareness campaign going. It's every monday starting in Oct - Aug in NJ. Please let people know if they are interested. Best Regards, Krissy
Targeted Individual NJ Activism Schedule
Starting in October the first Monday of every month we will be spreading awareness in the most populated cities in NJ. This is an eleven month campaign leading to next years annual Targeted Individual day. On August 28, 2020 we will hold a protest/ rally in Trenton, NJ at the capitol and attend the NYC rally the next day.
Keep your frequencies to yourself. This jacket keeps stalkers from reading your implants. We will sew shielding into a NON-STRETCHY garment of your choice. One layer of metallic fabric blocks a cell phone from ringing, but we put two layers of metallic fabric and a lining into the garment to separate the metal from the skin. We ask that you purchase a new garment, try it on, pin it or tell us what changes you want and then send it to us. We will sew in the shielding and a lining to protect the metal. These will be non-returnable as they will be made specifically to order. Make sure it fits first.
Consider a nurse's or doctor's coat because they are generic fitting. They can be short, 1/4 length or long sleeved. The metal fabric is $15 per yard for metallic (nickel/copper). The lining is $6.00 per yd. So the price will be calculated on how much fabric is used and the number of hours it takes to construct. Hourly sewing is $15.00 an hour. Estimated price $250.00-$350.00.
Please contact us at CitizensAHT@protonmail for more information.
Get a free booklet and Press Release with a hat.
$65 with shipping. Protect your head! Cap with 4 layers of metal and one layer of blackout fabric, use with magnets and grounding strap and rubber mouse pad (comes with hat)
The new cap has a tab connected to the metal fabric. You can put a grounding clip on this and the other end on a magnet or a piece of carbon and it is grounded. You can use it without a grounding strap. You can put more magnets on it and move them around to where your implants are or over your ears. If you are being struck with heating energy, you can put an ice pack inside. It comes with a large round rubber mouse pad you can take out if you want. The shielding works best if it blocks EMF and sound, so you need metal and rubber.
Also, the hat may be worn for consecutive hours to see any change. Wear it to sleep to effect blocking the dreams, it will help block direct stimulation of implants in the head and a field of attack. Remember that your face is open, your eyes, nose and mouth provide an opening for EMF. So unless you are in a Faraday cage, there will not be a total blockage, but you can protect your head with this hat shielding method.
The hat is $57 + $8 shipping and handling in the US and made upon order. We expect feedback as to how it helped you with your particular problem.Many people are saying that the hat helps, especially where the moods are being affected, subliminal thoughts, or dreams are being implanted, which may be frequencies targeting you with a field of frequencies. You can let out the tie cord and let it drape down over your neck to cover more area. This is the best version to date.
This is not guaranteed to stop V2K. If you hear voices, you may have a radio connection, a real radio connected to your brain and it is always connected. A hat will probably not stop that, but if you used it in a certain way, it may affect it, or reduce the feedback they get.
Email: CitizensAHT@protonmail to order if overseas because extra shipping is incurred for tracking overseas and going through customs. Overseaes tracked and insured through customs is $35. Uninsured is $17-28.
Uni-Sex Newsboy Hat $85.00
People are loving this hat!
Insert for hat
Colors most chosen: Black, Blue Denim, Navy Blue
Removable insert is 4 layers metallic fabric and a layer of broadcloth to protect the metal. Comes with Grounding strap, 2 removable magnets. $85.00. This hat comes down over the ears, covers the forehead and back of head. It is larger than the usual baseball cap so we have chosen this for building shielding inside. This will be assembled per order so it may take 30 days to arrive. Price includes priority 2 day mail, tracked and insured. Order on the website CitizensAHT.org. You will just pay for the hat online and we will send you an email for your color choice, size choice and your address. Our website menu doesn't let us list these as choices in the cart. If the website does not ask for your mailing address, we also need that. Thank you for your order.
Send us your hat and we will line it for you $95.00 (4 layers). Aviator hat lined for $150.00. If you have a hat you would like like lined, please contact CitizensAHT@protonmail.com and we will consider it.
NEW BOOKLET: "How Are You Being Targeted?" Unite the TI community with a community understanding
Booklet is $8.00 + $2.00 shipping. Overseas is $7.00 for shipping. You will also receive a copy of the Press Release on the Body Area Network. You can support our organization's activities by ordering by Paypal at CitizensAHT@protonmail.com.
TARGETED INDIVIDUAL SHIELDING
Keep Cool - Heating destroys your cells $13.79
ThermaFreeze Reusable Ice Pack Sheet Ice Blanket, Cut to Size, 6 x 20 Cells, 50"
THIS IS A BIBLE STUDY AND PRAYER WARRIORS NEEDED CONFERENCE, WHERE WE COME TOGETHER TO PRAY, EDUCATE OURSELVES, FAST AND PRAY. THE FOCUS IS ON PRAYER AND SUPPORT FOR TARGETED INDIVIDUALS. WE PRAY, READ, WRITE, EXPOSE AND WORK TOWARDS: BANNING ALL EUTHANASIA PROJECTS, ALL CRIMINAL AND DEADLY NON CONSENTED HUMAN RESEARCH EXPERIMENTATION, BANNING DEADLY MIND CONTROL TECHNOLOGIES, BANNING THE CRIMINAL AND MALICIOUS USE OF THE LEGAL SYSTEM TO INDUCE OPPRESSION, RETARD LAW AND ORDER, AND COVERTLY ASSASSINATE INNOCENT PEOPLE. WE SEEK TO ERADICATE SATANISM DISGUISED AND FUNDED AS SCIENCE
CHECK US OUT HERE:
Prayer and Scriptures for Peace When the Devil Attacks
We focus on education/raisingpublic awarenessabout the RICO crimes of organized stalking, directed energy torture and other violations of physical/mental sovereignty andactionsyou can take to help win this war.
Hope Franklin, Research and Communications Director
This is a grassy park area located on San Diego Bay. Plenty of free parking, areas to walk and playground for children. Barbecue available. Potluck, details to follow. Come Relax, hang-out with us! RSVP Heather: TargetedCalifornia@protonmail.com
Submit your Targeted Individual Statement by Tuesday, Sept. 10th
TAX DEDUCTIBLE DONATION WITH PAYPAL: CitizensAHT@protonmail.com If you donate, please request the IRS Tax Number.
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email.
Please print a copy of this newsletter and any newsletters you wish to maintain. Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.
This is an internet reference newsletter.A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.