Click on the titles in Blue or the pictures linked to the original articles.
Uni-Sex Newsboy Hat $125.00
Insert for hatColors: Black, Navy Blue, Olive Green, Khaki
Protect your brain, wear shielding on your head and cover your cochlear implants. Removable insert is 4 layers metallic fabric, one layer light-blocking rubber and a layer of broadcloth to protect the metal. 2 removable magnets, grounding strap, tracked shipping included, $125, except overseas (calculated by po). Order by emailing CitizensAHT@protonmail.com. We will send you an invoice. Pay to paypal email: CitizensAHT@protonmail.com. Please make sure we have an email for you and a shipping address.
Democracy Going Dark: The Electronic Police State The FBI's Multi-Billion "High-Tech Surveillance" Program By Tom Burghardt Global Research, May 21, 2009 The Federal Bureau of Investigation’s budget request for Fiscal Year 2010 reveals that America’s political police intend to greatly expand their high-tech surveillance capabilities. According to ABC News, the FBI is seeking additional funds for the development of “a new ‘Advanced Electronic Surveillance’ program which is being funded at $233.9 million for 2010. The program has 133 employees, 15 of whom are agents.” Known as “Going Dark,” the program is designed to beef up the Bureau’s already formidable electronic surveillance, intelligence collection and evidence gathering capabilities “as well as those of the greater Intelligence Community,” ABC reports. An FBI spokesperson told the network: “The term ‘Going Dark’ does not refer to a specific capability, but is a program name for the part of the FBI, Operational Technology Division’s (OTD) lawful interception program which is shared with other law enforcement agencies.” “The term applies to the research and development of new tools, technical support and training initiatives.” (Jason Ryan, “DOJ Budget Details High-Tech Crime Fighting Tools,” ABC News, May 9, 2009) Led by Assistant Director Marcus C. Thomas, OTD describes the office as supporting “the FBI’s investigative and intelligence-gathering efforts–and those of our federal, state, and local law enforcement/intelligence partners–with a wide range of sophisticated technological equipment, examination tools and capabilities, training, and specialized experience. You won’t hear about our work on the evening news because of its highly sensitive nature, but you will continue to hear about the fruits of our labor…” According to OTD’s website, the Division possesses “seven core capabilities”: Digital Forensics; Electronic Surveillance; Physical Surveillance; Special Technology and Applications; Tactical Communications; Tactical Operations and finally, Technical Support/Coordination. Under the heading “Electronic Surveillance,” OTD deploys “tools and techniques for performing lawfully-authorized intercepts of wired and wireless telecommunications and data network communications technologies; enhancing unintelligible audio; and working with the communications industry as well as regulatory and legislative bodies to ensure that our continuing ability to conduct electronic surveillance will not be impaired as technology evolves.” But as we have seen throughout the entire course of the so-called “war on terror,” systemic constitutional breeches by the FBI–from their abuse of National Security Letters, the proliferation of corporate-dominated Fusion Centers to the infiltration of provocateurs into antiwar and other dissident groups–the only thing “impaired” by an out-of-control domestic spy agency have been the civil liberties of Americans.
Communications Backdoor Provided by Telecom Grifters While the Bureau claims that it performs “lawfully-authorized intercepts” in partnership with the “communications industry,” also known as telecommunications’ grifters, the available evidence suggests otherwise. [i.e., Your phone provider allows surveillance on your phone.]
As Antifascist Callingreported last year, security consultant and whistleblower Babak Pasdar, in a sworn affidavit to the Government Accountability Project (GAP), provided startling details about the collusive–and profitable alliance–between the FBI and America’s wireless carriers. Pasdar furnished evidence that FBI agents have instantly transferred data along a high-speed computer circuit to a Bureau technology office in Quantico, Virginia. The so-called Quantico Circuit was provided to the FBI by Verizon, The Washington Post revealed. According to published reports, the company maintains a 45 megabit/second DS-3 digital line that allowed the FBI and other security agencies virtually “unfettered access” to the carrier’s wireless network, including billing records and customer data “transferred wirelessly.” Verizon and other telecom giants have supplied FBI technical specialists with real-time access to customer data. “The circuit was tied to the organization’s core network,” Pasdar wrote. Such access would expose customers’ voice calls, data packets, even their physical movements and geolocation to uncontrolled–and illegal–surveillance. In April, Wired obtained documents from the FBI under a Freedom of Information Act request. Those files demonstrate how the Bureau’s “geek squad” routinely hack into wireless, cellular and computer networks. Although the FBI released 152 heavily-redacted pages, they withheld another 623, claiming a full release would reveal a “sensitive investigative technique.” Nevertheless, Wired discovered that the FBI is deploying spyware called a “computer internet protocol address verifier,” or CIPAV, designed to infiltrate a target’s computer and gather a wide range of information, “which it sends to an FBI server in eastern Virginia.” While the documents do not detail CIPAV’s capabilities, an FBI affidavit from a 2007 case indicate it gathers and reports, a computer’s IP address; MAC address; open ports; a list of running programs; the operating system type, version and serial number; preferred internet browser and version; the computer’s registered owner and registered company name; the current logged-in user name and the last-visited URL. After sending the information to the FBI, the CIPAV settles into a silent “pen register” mode, in which it lurks on the target computer and monitors its internet use, logging the IP address of every server to which the machine connects. (Kevin Poulsen, “FBI Spyware Has Been Snaring Extortionists, Hackers for Years,” Wired, April 16, 2009) “Going Dark” is ostensibly designed to help the Bureau deal with technological changes and methods to intercept Voice Over Internet Protocol (VOIP) phone calls facilitated by programs such as Skype. But a tool that can seamlessly target hackers and cyber-criminals can just as easily be deployed against political opponents. The FBI also intends to continue their use of automated link- and behavioral analysis derived from data mining as investigative tools. As a subset of applied mathematics, social network theory and its derivatives, link- and behavioral analysis, purport to uncover hidden relationships amongst social groups and networks. Over time, it has become an invasive tool deployed by private- and state intelligence agencies against political activists, most recently, as Antifascist Calling reported in February, against protest groups organizing against the Republican National Convention. These methods raise very troubling civil liberties’ and privacy concerns. The Electronic Privacy Information Coalition (EPIC) filed a Freedom of Information Act request, demanding that the General Services Administration (GSA) turn over agency records “concerning agreements the GSA negotiated between federal agencies and social networking services, including Flickr, YouTube, Vimeo, Blip.tv, and Facebook.” With the proliferation of social networking sites, applications allow users to easily share information about themselves with others. But as EPIC points out, “Many online services relay information about online associations as users create new relationships. While government agencies may use social networking, cloud computing, and Internet services to create greater transparency on their activities, it remains unclear if there are data collection, use, and sharing limitations.” And with “information discoverability” all the rage amongst spooky security agencies ranging from the FBI to the NSA, “connecting the dots,” particularly when it comes to dissident Americans, “is gaining increasing attention from homeland security officials and experts in their ongoing attempt to corral anti-terrorism information that resides across federal, state and local jurisdictions,” Federal Computer Weekreports. Will an agreement between Facebook and the FBI facilitate “dot connecting” or will it serve as a new, insidious means to widen the surveillance net, building ever-more intrusive electronic case files on dissident Americans? The Electronic Police State As Antifascist Callingreported earlier this month, citing the Electronic Frontier Foundation’s (EFF) dossier on the FBI’s Investigative Data Warehouse (IDW), the office had “transitioned to the operations and maintenance phase during FY 2008” and now possesses some “997,368,450 unique searchable documents,” ready for data mining. But as study after study has revealed, most recently the comprehensive examination of various programs by the National Research Council, automated data mining is “likely to generate huge numbers of false leads.” Because the mountainous volumes of data “mined” for “actionable intelligence” are drawn from dozens of disparate sources on terrorism or criminal suspects, “they have an enormous potential for privacy violations because they will inevitably force targeted individuals to explain and justify their mental and emotional states.” EFF documented that the Bureau’s Telephone Application (TA) “provides a central repository for telephone data obtained from investigations.” TA allegedly functions as an “investigative tool … for all telephone data collected during the course of FBI investigations. Included are pen register data, toll records, trap/trace, tape-edits, dialed digits, airnet (pager intercepts), cellular activity, push-to-talk, and corresponding subscriber information.” Additionally, the civil liberties’ group revealed that “records obtained through National Security Letters are placed in the Telephone Application, as well as the IDW by way of the ACS [Automated Case] system.” It would appear that “Going Dark” will serve as a research subsystem feeding the insatiable appetite of the Investigative Data Warehouse. In fact, these programs are part and parcel of what the security websiteCryptohippie refers to as the Electronic Police State. Far from keeping us safe from all manner of dastardly plots hatched by criminals and/or terrorists, Cryptohippie avers: An electronic police state is quiet, even unseen. All of its legal actions are supported by abundant evidence. It looks pristine. An electronic police state is characterized by this: State use of electronic technologies to record, organize, search and distribute forensic evidence against its citizens. The two crucial facts about the information gathered under an electronic police state are these:
It is criminal evidence, ready for use in a trial.
It is gathered universally and silently, and only later organized for use in prosecutions.
In an Electronic Police State, every surveillance camera recording, every email you send, every Internet site you surf, every post you make, every check you write, every credit card swipe, every cell phone ping… are all criminal evidence, and they are held in searchable databases, for a long, long time. Whoever holds this evidence can make you look very, very bad whenever they care enough to do so. You can be prosecuted whenever they feel like it–the evidence is already in their database. (“The Electronic Police State, 2008 National Rankings,” Cryptohippie, no date) Unfortunately, this is not the stuff of paranoid fantasies, but American reality in the year 2009; one unlikely to change in the foreseeable future. In addition to “Going Dark,” the FBI is busily constructing what ABC News refers to as the “development of the Biometric Technology Center, a Joint Justice, FBI and DoD program.” At a cost of $97.6 million, the center will function as a research and development arm of the Bureau’s Biometric Center of Excellence (BCOE), one which will eventually “be a vast database of personal data including fingerprints, iris scans and DNA which the FBI calls the Next Generation Identification (NGI).” The program is closely tied with technology under development by West Virginia University’s Center for Identification Technology Research (CITeR). As the FBI’s “lead academic partner in biometrics research” according to a Bureau press release, CITeR provides “biometrics research support to the FBI and its law enforcement and national security partners and serve as the FBI liaison to the academic communityof biometric researchers nationwide.” Indeed, CITeR director Lawrence A. Hornak, “a visionary of the Big Brother school of technology” told The Register, he awaits the day “when devices will be able to ‘recognize us and adapt to us’.” The “long-term goal,” Hornak declared, is the “ubiquitous use of biometrics.” But as The Register pointed out when the program was publicly rolled-out, “civil libertarians and privacy advocates are not amused.” They claim that the project presents nightmare scenarios of stolen biometric information being used for ever-more outlandish forms of identity theft, which would be nearly impossible to correct. Correcting an inaccurate credit report is already an insulting and hair-raising experience in America, and critics contend that the use of biometrics would make correcting inaccurate credit reports or criminal histories nearly impossible. Besides, they argue, the US government does not exactly have a sterling record when it comes to database security–what happens when, as seems inevitable, the database is hacked and this intimate and allegedly indisputable data is compromised? … Databases usually become less accurate, rather than more, the older and bigger they get, because there’s very little incentive for the humans that maintain them to go back and correct old, inaccurate information rather than simply piling on new information. Data entry typically trumps data accuracy. Furthermore, the facial recognition technology in its current iteration is woefully inaccurate, with recognition rates as low as 10 per cent at night. All in all, there is ample reason for skepticism–not that it will make much of a difference. (Burke Hansen, “FBI preps $1bn biometric database,” The Register, December 24, 2007) But WVU’s CITeR isn’t the only partner lining-up to feed at the FBI’s trough. ABC reports that the Bureau “has awarded the NGI contract to Lockheed Martin to update and maintain the database which is expected to come online in 2010. After being fully deployed the NGI contract could cost up to $1 billion.” However, Federal Computer Weekreported in 2008 that although the initial contract will “consist of a base year,” the potential for “nine option years” means that “the value of the multiyear contract … could be higher.” You can bet it will! Additional firms on Lockheed Martin’s “team” as subcontractors include IBM, Accenture, BAE Systems, Global Science & Technology, Innovative Management & Technology Services and Platinum Solutions. In other words, NGI is yet another in a gigantic herd of cash cows enriching the Military-Industrial-Security Complex. Democracy “Going Dark” The “vast apparatus of domestic spying” described by the World Socialist Web Site, greatly expanded under the criminal Bush regime is a permanent feature of the capitalist state; one that will continue to target political dissent during a period of profound economic crisis. That the Obama administration, purportedly representing fundamental change from the previous government, has embraced the felonious methods of the Bush crime family and its capo tutti capo, Richard Cheney, should surprise no one. Like their Republican colleagues, the Democrats are equally complicit in the antidemocratic programs of repression assembled under the mendacious banner of the “global war on terror.” From warrantless wiretapping to the suppression of information under cover of state secrets, and from the waging of imperialist wars of conquest to torture, the militarist mind-set driving capitalist elites at warp speed towards an abyss of their own creation, are signs that new political provocations are being prepared by America’s permanent “shadow government”–the military-intelligence-corporate apparatus.
BEHIND THE SCENES FBI Experts Deliver Technical Tools
11/07/08 Folks in our Operational Technology Division, located in rural Virginia, are charged with developing and deploying state-of-the-art investigative technological tools that support our intelligence and investigative priorities. Marcus Thomas, Assistant Director of our Operational Technology Division, explains the role of his office this way: “You won’t hear about our work on the evening news because of its highly sensitive nature, but you will continue to hear about the fruits of our labor—the terrorist plot averted, the spy caught red-handed, the rescued kidnapping victim, the dismantled child pornography ring.” We provide these technologies, and the training to use them properly, to FBI field personnel across all of our programs—counterterrorism, counterintelligence, cyber, and criminal. We also use the technologies to assist our local, state, and federal partners. Much of the work of our Operational Technology Division is extremely sensitive, but here are a few general examples of our capabilities: * Court-authorized electronic surveillance. [What court?] One of the most tried-and-true methods of catching criminals and terrorists is lawfully intercepting their conversations to learn of their plans. Our electronic surveillance experts excel at constructing and deploying microphones, body recorders, and transmitters, as well as intercepting the content of phone calls, e-mails, audio and video streams, instant messaging, and the like. * Physical surveillance. In addition to listening to their conversations, we also want to see where the subjects of our investigations go and who they’re meeting with. Our experts design and build concealment devices that help us track these individuals (somewhat along the lines of the proverbial pen or briefcase with a hidden camera, but much more advanced these days!). * Collection and analysis of digital evidence. Crooks use computers and other electronic devices like the rest of us, so there’s often a wealth of incriminating evidence stored on these devices that we’ve become adept at recovering and analyzing. Our Computer Analysis and Response Team provides expert forensics assistance to field investigators, while FBI-sponsored Regional Computer Forensics Laboratories around the country provide full-service support to our state and local partners. * Tactical operations. Our criminal and national security investigations sometimes require court-authorized surreptitious entries and searches to obtain evidence. Our specialists not only develop the tools, systems, and equipment used during these operations, they also sometimes deploy as part of the “covert entry teams.” * Tactical communications. During operations, law enforcement personnel have to communicate with one another, so we have experts who design, implement, and provide logistics support for secure FBI radio systems around the world. And since we don’t work in a vacuum, these experts also make sure our communications systems work with those operated by our local, state, and federal partners. Because technological advances continue at warp-speed and terrorists and criminals make use of these advances, Assistant Director Thomas assures us that “the Operational Technology Division’s highly-skilled personnel are working every day to ensure that the FBI and its partners maintain their technological edge.”
Attack on the Brain: Neurowars and Neurowarfare Armin Krishnan
"Targeting Like cyber warfare bypasses the battlefield, neurowarfare bypasses the state altogether and might target individual civilians (political leaders), societal subgroups, or entire societies. As a result, the traditional distinction between combatants and noncombatants may become meaningless. There is already a legal debate over the question whether and under what conditions civilians can be targeted with nonlethal weapons, for example, in the context of counter terrorism and counterinsurgency operations.103This debate is bound to intensify once neuroweapons mature. A further complication with respect to noncombatant targeting arises from the tendency that neuroweapons may be employed covertly without the target of the attack ever being aware of the attack.104A neurowarfare attack may not even cause any physical harm to a person subjected to it and may in this respect be akin to targeting civilians with propaganda, however, with more drastic and immediate effects. Enemy leaders could be targeted to degrade their ability to make sound decisions or to steer their decisions into a particular direction. Individuals may be driven insane and manipulated into random acts of violence. Societal subgroups may be manipulated into rising against their government, and whole societies may be thrown into political turmoil and chaos. While such methods of war seem intuitively objectionable from an ethical point of view, they increasingly represent the current reality of ‘hybrid warfare’, ‘political warfare’, and other forms of societal destabilization that are being employed with great effectiveness by several major nations.105There is currently no legal protection against mind manipulation, although 103
John W. Lango, “Nonlethal Weapons, Noncombatant Immunity, and Combatant Nonimmunity: A Just War Theory,” Philosophia38 (2010): 475-497.104McCreight, “Brain Brinkmanship,” p. 117.105U.S. Special Operations Command, Counter-Unconventional Warfare, p. 3. one can argue that covert mental coercion would violate human dignity and by extension human rights.10"
A Survey of Routing Protocols in WBAN for Healthcare Applications:
The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks, stimulates many research activities. Designing such a scheme of critical events while preserving the energy efficiency is a challenging task, due to the dynamic of the network topology, severe constraints on the power supply, and the limited computation power. The design of routing protocols becomes an essential part of WBANs and plays an important role in the communication stacks and has a significant impact on the network performance. In this paper, we briefly introduce WBAN and focus on the analysis of the routing protocol, classify, and compare the advantages and disadvantages of various routing protocols. Lastly, we put forward some problems and suggestions, which provides ideas for the follow-up routing design.
We describe an experimental system that combines a wireless body area network (WBAN) with satellite communication links to enable remote medical treatment and healthcare services. One main advantage of WBAN is that it enables automatic biosignal collection in real time which is essential in medical treatment and healthcare vigilance. The WBAN is implemented using ultra-wideband technology. Multi-hop mechanism is adopted to guarantee reliable connection. In case of less of medical resources such as in emergency, in rural or isolated areas, the system can send the corresponding biosignal to a remote hospital in real time to help patient management by introducing satellite communication links. In this paper, the whole experimental system is illustrated. Some basic experiments are carried out. It is confirmed that the multi-hop mechanism of WBAN works well and the relative delay of WBAN data delivery via satellite links is dependent on the satellite link capacity. [I don't have access to this whole white paper at this time, will be sent later.]
Technically, VSAT refers to amy two-way satellite ground mounted or a stabilized maritime VSAT antenna with an antenna (dish) that is smaller than 3 meters; people generally use the term VSAT to refer to any two-way satellite Internet terminal that is not a teleport Earth Station.
VSAT antennas can be vehicle mounted, maritime stabilized, fixed, or portable.
There are a number of different manufactures of VSAT hardware within each category above, so that each satellite company can design a VSAT to meet their customers specifications and the requirements of a the selected satellite network.
Satellite networks each have their own individual characteristics which vary from network to network, and each network has its own requirements as to dish size and transmit power. Scientific calculations based on geographic location, desired IP data rate, and circuit reliability and survivability from environmental conditions are called Link Budgets.
The minimum size of a VSAT antenna that will meet a particular customer's needs is determined by each satellite network operator’s Link Budget calculations.
Portable VSATs are commonly called Flyaway Units. For every size VSAT there are a number of different manufacturers, and just like automobiles (weight class, wheelbase, etc.) there can be huge differences between the features, quality, and cost of the different brands.
Generally, within any particular antenna size class the more portable (light weight, small size) the Flyaway VSAT antenna, is the more it will cost. This is due to the additional engineering necessary to achieve the smaller form factor, and the additional costs for the Mil-Spec quality quick-disconnect components that allow it to assemble and disassemble without any tools.
For most Flyaway VSATs, the objective is for each case to be airline checkable.
Marine VSATs are gyroscopically stabilized so that no matter how the boat moves, the VSAT antenna “tracks” and maintains a precise aim to the desired satellite.
Marine VSAT antennas are all housed within a special fiberglass radome designed to prevent the very delicate and precise aiming of the antenna from being affected by wind or other environmental conditions, as well as to protect the sensitive electronics from the harsh and unforgiving environments that maritime VSAT antennas sometimes operate in.
Vehicle-mounted auto-acquire VSATs also come in a variety of sizes, with a model to fit almost every satellite network and need. Vehicle mounted VSAT systems normally start as small as .75 meters and go up to 1.2 meters, which is enough for most non-news or broadcast applications. For broadcast applications there is another type of VSAT called an SNG antenna, short for satelite news gathering.
Vehicle-mounted auto-acquire VSATs all deploy and stow with the push of a single button on the automatic satellite controller that is located inside of the vehicle, and are typically deployed and online within just a few minutes. Vehicle mounted VSAT antennas are very popular with Emergency Management professionals, as they allow quickly establishment of on-scene voice, video, and data communications.
There are also 1.8 and 2.4 meter auto-deploy vehicle-mount VSAT antennas, but these are so large that they normally require that the reflector be made with removableside panels so as to reduce the overall width of the antenna as the vehicle goes down the road so that it is no wider than the vehicle that it is mounted on.
For a fixed location, VSAT antennas are the very best and sometimes only way to bring broadband to areas that are underserved by landline, cellular, or other technologies. As long as the fixed VSAT antenna can be installed in a location that has a clear view of the Southern sky, it will deliver have high speed Internet. For commercail buildings with flat roofs there are non-penetrating roof mount that are ballasted by concrete blocks, and there are also non-penetratingridge-mount mounts for peaked roofs. For ground mounting it is normally best to mount a steel pole into buried concrete. For fixed antennas that will be exposed to harsh winter conditions, it is recommended to also install a de-icing system so that the dish and essential electronic components do not freeze over. VSAT broadband service plans are always available in different service levels, with less expensive packages for smaller consumer usage up to larger packages to support dozens of workers, with options like Voice over IP and managed Virtual Private Network that can be added.
Accurate Fourth Order Debye Model for the Head Tissues Across the 0.1 to 1 GHz Band Using Metaheuristic Genetic Algorithm
Over the past couple of years, there has been a growing interest in implantable medical devices (IMDs) for diagnostic, monitoring and therapeutic applications. Wireless power transfer (WPT) to IMDs enables the removal of batteries for further miniaturization of the overall IMDs footprint. Accurate modeling of the dielectric properties is therefore essential and inevitable for dosimetry studies to investigate the safety considerations of the WPT to IMDs. In this paper, a highly accurate 4th-order Debye model is derived based on a metaheuristic genetic algorithm to represent the dispersive nature of the head tissues across the 0:11 GHz, which includes the popular sub-bands for IMDs. The 46 head tissues are reduced to 20 tissues based on the similar dielectric properties and categorized into four different groups based on the major organs in the head. The developed Debye model shows a better fitting for the measured data compared with the Cole-Cole model for all the tissue groups. Predominantly, the achieved error function between the measured dielectric properties and the fitted Debye model is less than 0:07% for tissue groups. In general, a total error reduction of more than 60% is obtained for the developed Debye model compared with the Cole-Cole model for all tissue groups. The proposed Debye model can be incorporated in the available computational methods, such as the finite difference time domain (FDTD) method to calculate the distribution of the electromagnetic (EM) fields inside the brain with a less computational complexity and more accuracy than the Cole-Cole model.
The willingness to prioritize power above all else, including the welfare of their fellow human beings, ruthlessness, callousness and an utter lack of conscience are among the defining traits of the sociopath. When our own government no longer sees us as human beings with dignity and worth but as things to be manipulated, maneuvered, mined for data, manhandled by police, conned into believing it has our best interests at heart, mistreated, jailed if we dare step out of line, and then punished unjustly without remorse—all the while refusing to own up to its failings—we are no longer operating under a constitutional republic. Instead, what we are experiencing is a pathocracy: tyranny at the hands of a psychopathic government, which “operates against the interests of its own people except for favoring certain groups.” Worse, psychopathology is not confined to those in high positions of government. It can spread like a virus among the populace. As an academic study into pathocracy concluded,
"Tyranny does not flourish because perpetuators are helpless and ignorant of their actions. It flourishes because they actively identify with those who promote vicious acts as virtuous."
Today, while everyone is distracted by the impeachment drama, Congress will vote to extend warrantless data collection provisions of the #PatriotAct, by hiding this language on page 25 of the Continuing Resolution (CR) that temporarily funds the government. To sneak this through, Congress will first vote to suspend the rule which otherwise gives us (and the people) 72 hours to consider a bill. The scam here is that Democrats are alleging abuse of Presidential power, while simultaneously reauthorizing warrantless power to spy on citizens that no President should have… in a bill that continues to fund EVERYTHING the President does… and waiving their own rules to do it. I predict Democrats will vote on a party line to suspend the 72 hour rule. But after the rule is suspended, I suspect many Republicans will join most Democrats to pass the CR with the Patriot Act extension embedded in it.
Massie was right: Republicans and Democrats have no problem joining forces in order to maintain their joint stranglehold on power.
Bauerle cites 'invisibility cloaking' technology in surveillance of his home
Tom Bauerle this month opened up about his 2014 evaluation at Erie County Medical Center’s psychiatric ward, contending the episode stemmed from “graduate university students” and “people from certain entities” conducting invisible surveillance operations in his back yard. He claims he was confronting them with a loaded gun when Amherst police arrived.
The WBEN talk show host provided his account to a conservative internet publication called Canada Free Press, and in lesser detail during his afternoon show on Oct. 19. Bauerle told his story to Canada Free Press, the article said, because he decided to “set the record straight once and for all.” [The engineer and ex-cop who stand behind Bauerle's 'cloak of invisibility' theory]
CALL TO ALL FLORIDA TI'S
THE COUNTRY IS MISUSING MEDICAL AND PSYCHIATRIC ARRESTS TO CATEGORIZE PEOPLE AS BEING MENTALLY ILL. WHY?
Please contact us at CitizensAHT@protonmail.com. We are going to present evidence from every TI in Florida who contacts us that we are under going the same medical arrests and asset seizures and torture, directed energy attacks, implantation and get the ABC I team to do a story for us. firstname.lastname@example.org.
The reason the State of Florida is arresting people and MISUSING the BAKER ACT IS to arrest people and label them as being DELUSIONAL, PSYCHOTIC and SCHIZOPHRENIC is so that later on down the line, they can have their rights and property taken without question. THIS IS A CRIMINAL AND INEXCUSABLE ABUSE OF ALL PEOPLE IN THE STATE OF FLORIDA, however, THIS IS BEING DONE IN EVERY STATE IN THE UNITED STATES OF WHAT USED TO BE AMERICA. THERE IS NO CONSTITUTION WORKING FOR US. WE ARE THE IMPLANTED!!!!!!
Court date: 12 December 2019 | Location: Royal Courts of Justice, London - Court 37 | Note: Day of the UK general election
https://youtu.be/gqPo7NUe3Ck?t=7830: "My court case is on the 12th of December 2019 in London. People ask me at what time. The answer is I have no idea, that will be announced closer to the date, but the court hearings typically take place between 10:00 am and 4:00 pm. So at some point in that six hour period.
Targeted Individuals Court Case, Time: December 6, 2019, 10am to 7pm
INTERNATIONAL APPEAL Stop 5G on Earth and in Space
There are 182,894 signatories from 207 nations and territories as of December 1st, 2019
To the UN, WHO, EU, Council of Europe and governments of all nations
We the undersigned scientists, doctors, environmental organizations and citizens from (__) countries, urgently call for a halt to the deployment of the 5G (fifth generation) wireless network, including 5G from space satellites. 5G will massively increase exposure to radio frequency (RF) radiation on top of the 2G, 3G and 4G networks for telecommunications already in place. RF radiation has been proven harmful for humans and the environment. The deployment of 5G constitutes an experiment on humanity and the environment that is defined as a crime under international law.
From: ikqbot<email@example.com> Sunday, September 22, 2019 9:11 PM Just letting you know I have a monthly public outreach and awareness campaign going. It's every monday starting in Oct - Aug in Nj. Please let people know if they are interested. Best Regards, Krissy
Targeted Individual NJ Activism Schedule
Starting in October the first Monday of every month we will be spreading awareness in the most populated cities in NJ. This is an eleven month campaign leading to next years annual Targeted Individual day. On August 28, 2020 we will hold a protest/ rally in Trenton, NJ at the capitol and attend the NYC rally the next day.
Activism: Resolution Against the Use of Radiating Type Weapons for People
In September, October, November and December 2019, a number of events are planned at the United Nations in the Human Rights Committee and the Committee Against Torture.
The Moscow Committee for Housing Ecology sent to the UN a resolution of the International Conference (December 1-2, 2018) “Against the Use of Radiating Type Weapons for People”. The resolution contains a requirement for the UN - “to develop and adopt a Convention on the prohibition of weapons of a radiating type (non-lethal, psychotronic), as WMD”.
The draft Convention “On the Prohibition of the Development, Production, Stockpiling and Use of Radiating Type Weapons on Their Destruction” is attached to the resolution.
The UN sent the committee an invitation to the Conference on Events for Sustainable Development and Peace, held in December 2019.
We are asking you to: send a requirement to the UN: to adopt the Convention "On the Prohibition of Radiating Type Weapons".
This will be the most important UN event "to achieve sustainable development and peace on the planet."
Please forward our appeal to other human rights organizations.
$85 with shipping. Protect your brain! Cap with 4 layers of metal and one layer of blackout rubber fabric, use with magnets and grounding strap and rubber mouse pad (comes with hat)
The new cap has a tab connected to the metal fabric. You can put a grounding clip on this and the other end on a magnet or a piece of carbon and it is grounded. You can use it without a grounding strap. You can put more magnets on it and move them around to where your implants are or over your ears. If you get hot, you can put an ice pack inside. The head is the best place to cool the body. It comes with a large round rubber mouse pad you can take out if you want. The shielding works best if it blocks EMF and sound, so you need metal and rubber.
This is not guaranteed to stop V2K. If you hear voices, you may have a radio connection, a real radio connected to your brain and it is always connected. A hat will probably not stop that, but it may reduce the feedback they get.
Email: CitizensAHT@protonmail to order if overseas because extra shipping is incurred for tracking overseas and going through customs. Overseaes tracked and insured through customs is about $35-54. Uninsured is $24-27.
NEW BOOKLET: "How Are You Being Targeted?" Comes with free copy of WBAN press release (18 pages)
Booklet is $8.00 + $2.00 shipping. Overseas is $7.00 for shipping total $15.00. You will also receive a copy of the Press Release on the Body Area Network. You can support our organization's activities by ordering by email. We will send you an invoice. Pay by Paypal or debit/credit card at CitizensAHT@protonmail.com.
Linqstat - available on website now
Linqstat is available packaged in 3 different lengths.
Package 3 feet x 6 feet
Package 3 feet x 12 feet
Package 3 feet x 24 feet
3' x 6' 8 ml (twice as thick as LessEMF's)
(Shipping, tracking & insurance is included in the price except if you are out of the US).
LINQSTAT (≤50,000 ohms/sq) Electrically Conductive Film. Product Part Number: LINQSTAT MVCF S-Series
We focus on education/raisingpublic awarenessabout the RICO crimes of organized stalking, directed energy torture and other violations of physical/mental sovereignty andactionsyou can take to help win this war.
Hope Franklin, Research and Communications Director
TAX DEDUCTIBLE DONATION WITH PAYPAL: CitizensAHT@protonmail.com If you donate, please request the IRS Tax Number.
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email.
Please print a copy of this newsletter and any newsletters you wish to maintain. Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.
This is an internet reference newsletter.A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.