Event 201 Unfolds: COVID-19 Action Platform = Global Government
Two Issues: Please note that Nils Melzer is NOT "the" UN. He is independent of the UN which gives him freedom from censure by individual governments.
ISSUE ONE: There seems to be some confusion on the UN and the Report that Nils Melzer is presenting to the UN. Nils Melzer does not work for the UN. He is not paid by the UN. He is a mandate holder. The following misstates these facts and misleads the reader. "UN starts investigation to ban cyber torture Magnus Olsson, Geneva, Switzerland 8 March, 2020 UN Human Rights Council (HRC) Special Rapporteur on torture revealed during the 43rd HRC that Cyber technology is not only used for internet and 5G. It is also used to target individuals remotely – through intimidation and harassment." Nils Melzer is a mandate holder appointed by the Human Rights Council of the UN. Mandate-holders act independently of governments and as such play an important role in monitoring sovereign nations and democratically elected governments and policies.
Read the advance, unedited version of the report - titled "Torture and other cruel, inhuman and degrading treatment", gives a comprehensive legal framework of the concept. ISSUE TWO:
Medical implants are categorized under "Cybertorture" in Mr. Melzer's draft report. If implants are categorized only in the same category as surveillance by phone call capture or by internet or computer hacking (they can be hacked), implants certainly deserve an expanded explanation because they are not incidental captures of data, they are overwhelmingly invasive and controlling of the human body and mind. They are privacy shattering, soul crushing and devastatingly degrading.They are used in conjunction with the home torture chamber through home occupant location and beam forming systems. Each person has their own MAC address and GPS by which the cell phone system and internet identify them. Medical implants are in another category than computer hacking and phone surveillance. The BAN is a totally new tracking, monitoring, torture, kill system, which is much more serious than listening to a persons phone calls. It is a total muscle, nerve, cellular surveillance of the entire body - the most overwhelming surveillance system ever devised.
Another category sorely missing from the report is Directed Energy. This comes in many forms, light (laser, maser, mm, blue light, plasmas, etc.) microwave, radar, sound. Here is a reference which directly links the words "Directed Energy" to laser energy. This is very important to categorize these things correctly. There is no question as to whether this type of directed energy can be used to injure a person. Lasers are used to burn the eyes of Targeted Individuals, so this technology directly applies to the subject of torture. Directed energy does not appear in the report.
US Army Med Dep J. 2009 Jan-Mar:51-6. Directed Energy (laser) induced retinal injury: current status of safety, triage, and treatment research. Whitmer DL1, Stuck BE. There is no reason to shy away from using the term "directed energy" because it is a valid, researched and well-defined technology.
Another category not included is entomological torture. the recent spate of organisms used to torture people with skin diseases are parasitic flies (Myiasis), parasitic moths, parasitic spiders, rolly pollies, beatles, boll weevils and worms (see video on YT on how they transmit worms) combined with synthetic biology and genetic alterations to incorporate symbiotically, unnatural products in the human body (such as blinking body parts via BioBricks, animal colonies or vegetables like celery sprouting in the body). While these infections are called "delusional parasitosis", they are not treated, thus colonizing the entire body which is indeed torturous and unending with no treatment or cure. https://www.youtube.com/watch?v=ABzXHoVDQgA&t=9s
Another thing you don't see in connection with any mention of human trafficking or rape known as electronic rape of men, women and children. Although this may be in the category of medical implants, it surely deserves a mention somewhere. It is not known to the world and it needs to be exposed for the criminal and torturous thing it is.
Another concept of torture Targeted Individuals are dealing with is being tortured while in a state of unconsciousness. Were you put to sleep with frequencies or drugs while you were implanted? Do you suffer time lapses? Are you radiated and interfered with in your sleep? Do you suffer implanted dreams while you sleep? Do you have to be conscious to be tortured? Absolutely not.
If this first report is finalized without these and other inclusions related to the torture of Targeted Individuals, further encouragement on these subjects is needed and hopefully, when fully apprised of the extent of torture, both physical and psychological, this suffering will be acknowledged.
Directed Energy (laser) induced retinal injury: current status of safety, triage, and treatment research
Deborah L. Whitmer and Bruce E. Stuck
Directed Energy (DE) in the form of electromagnetic radiation refers to the application of electromagnetic energy at a single or a band of wavelengths (or frequencies) on a target. Sources of DE such as a common flashlight, a laser, or a high powered microwave transmitter can emit electromagnetic radiation at single wavelength (or frequency) or at multiple wavelengths with emission powers from nanowatt to megawatts, and emission durations from femtoseconds to continuous wave. Military uses of DE sources include lasers and high powered microwave or radio frequency radiation. The word laser is actually an acronym for light amplification by stimulated emission of radiation, a process that facilitates the production of a collimated beam of radiation that is easily directed toward a target. Military applications of DE include range finders, target designators, live-fire training devices, illuminators, and battlefield contaminate detection systems. Nonlethal weapons/ deterrent applications of directed energy include the millimeter wave active denial systems or visible laser dazzlers. For some time now, medical specialties have used lasers or "directed energy devices" to cut, heat, ablate, or produce photochemical/phototoxic reactions to produce a desire effect on biological tissues. Medical applications also include numerous diagnostic applications such as pulsed oximeters, otic thermometers, and advanced retinal imaging technologies including scanning laser ophthalmoscopes and optical coherence tomography imaging.
The use of lasers on the modern battlefield has become common in recent years, particularly to assist in the accuracy of target identification and fire control systems. With the maturation of DE technology, additional military applications will emerge (eg, the use of high energy lasers to produce adverse target effects) and DE systems will continue to be an integral part of US military technology.
The most important biological sensor on the modern battlefield, the human eye, is extremely vulnerable to injury from military lasers. (1) In an instant, and without any sound or warning, temporary or permanent visual impairment can be produced at tactical ranges and beyond. Specifically, the retina is extremely susceptible to injury from common military lasers that operate in the retinal hazard wavelength region (400 nm-1400 nm) where direct exposures can produce temporary or permanent visual impairment including blindness. Common military laser rangefinders and designators operating near 1064 nm can produce a vitreous hemorrhage in the unaided eye at a range of several hundred meters and minimal retinal lesions out to nearly 2 km (Figure 1). Optical aids (ie, binoculars, targeting scopes with magnification) in use at the time of the exposure increase the range at which the eye is susceptible to injury. Visible and near infrared laser illuminators are used in Iraq and Afghanistan to illuminate or "point out" specific targets in much the same way a laser pointer is used in a lecture hall. Visible laser illuminators are also used to warn noncombatants and deter suspected combatants from approaching fixed positions such as a checkpoint or the end of a convoy (Figure 2). Persistence in approach might then imply malicious intent and warrant the use of more lethal force.
Washington — The House voted to reauthorize the Foreign Intelligence Surveillance Act (FISA) on Wednesday after reaching a bipartisan deal that includes several reforms just days before the measure is set to expire. The measure was renewed with a bipartisan vote of 278 to 136.
The use of FISA to obtain warrants to surveil American citizens has been under intense scrutiny after an internal watchdog report found multiple instances of misconduct by law enforcement who monitored a former Trump campaign official under the act.
The Justice Department inspector general's report released late last year revealed "significant inaccuracies and omissions" in FISA applications beginning in 2016 for four warrants to surveil Carter Page, a former Trump campaign aide who was erroneously suspected of being a Russian agent. Although the report found no political bias in opening the investigation into the Trump campaign, Republicans and the president railed against the FISA abuses uncovered in the report.
The deal reached by House leaders would require officers overseeing FISA applications to certify that the Justice Department has been fully informed of any issues with the accuracy of the application, and require that agencies submitting applications appoint officers to ensure the applications are compliant with the law.
The bill also includes measures to assuage concerns by Democrats and libertarians worried about government overreach in surveilling of American citizens, such as ending the National Security Agency's to collect call detail records. It also includes measures to increase transparency, requiring the Justice Department to publish reports explaining its positions on how information is derived for FISA applications.
Senators are fighting to make real reforms to surveillance and FISA
Sens. Rand Paul (R-Ky.) and Mike Lee (R-Utah) are working to kill a House deal to reauthorize expiring intelligence programs and reform the surveillance court, throwing up an eleventh hour roadblock to the agreement.
The two libertarian-minded Republicans, who are close allies of President Trump's, are urging Trump to veto the House agreement, which pairs a reauthorization of expiring intelligence programs with broader changes to the court associated with the Foreign Intelligence Surveillance Act (FISA).
"The House FISA deal doesn’t fix what’s wrong with FISA. It would not have stopped the spying that occurred against @realDonaldTrump. I will do everything I can to oppose it in the Senate. If it passes, @realDonaldTrump should veto it," Lee tweeted.
President Trump on Thursday said that “many” Republican senators want him to veto legislation reauthorizing expiring intelligence programs, an indication the president is considering doing so.
“Many Republican Senators want me to Veto the FISA Bill until we find out what led to, and happened with, the illegal attempted ‘coup’ of the duly elected President of the United States, and others!” Trump tweeted Thursday morning, referring to the FBI’s investigation into Russian interference and contacts between his campaign and Moscow, which has not been deemed illegal.
Senate standoff means surveillance programs to lapse
Three soon-to-expire intelligence programs are set to temporarily lapse amid a standoff in the Senate.
The House passed a bill on Wednesday that would pair a reauthorization of those programs with broader changes to the court associated with the Foreign Intelligence Surveillance Act (FISA).
But quick passage of that bill hit a roadblock in the Senate on Thursday, with Sens. Rand Paul (R-Ky.) and Mike Lee (R-Utah) threatening to block any attempt to clear the legislation and send it to President Trump’s desk.
“Senate Republican leaders are trying to ram through fake FISA amendments without any real changes. I will object. I continue to stand with [Trump] in his reservations to this bill,” Paul tweeted Thursday.
A GOP senator said that Lee had also placed a hold on the House bill, a procedural tactic that prevents it from quickly passing.
That stalemate will kick the Senate’s final passage of the legislation into next week, guaranteeing a temporary lapse of the three provisions of the USA Freedom Act, a 2015 law that overhauled the nation’s surveillance programs, that are set to sunset on Sunday night.
The Senate left town on Thursday until Monday. Even once they return, the House bill will still need to overcome a procedural hurdle and be subjected to dozens of hours of debate resulting in a days-long lapse.
Libertarian-minded GOP senators and progressives have warned the surveillance court does not provide transparency and privacy protections.
That concern found support among a broader swath of Republicans after Justice Department Inspector General Michael Horowitz found 17 examples of inaccuracies and omissions in the warrant applications regarding Trump campaign associate Carter Page.
“They spied on the president of the United States. They used the apparatus of the U.S. government agencies to spy on then-candidate Donald Trump, now president of the United States. They did so in a way that was entirely predictable, entirely foreseeable, in some ways avoidable, if in fact we had the right laws on the books,” Lee said on Thursday.
After exposing surveillance errors in Trump probe, inspector general looks for a pattern
The Justice Department watchdog is investigating whether the alarming errors revealed in a wiretap application for one of President Trump’s former campaign aides were one-offs or indicative of systemic flaws in the government’s use of its most intrusive, secretive and powerful surveillance tool.
The probe grew from Inspector General Michael Horowitz’s lengthy review of the FBI’s investigation into Trump’s 2016 campaign, months of work that included the most extensive look ever at a national security surveillance application. His findings, outlined in a newly released report, highlight imperfections in the national security surveillance regime and raise questions about whether a fundamental overhaul is in order.
Although Horowitz did not find evidence that political bias influenced the FBI’s decision in the fall of 2016 to seek a wiretap on the former campaign aide, Carter Page, he identified 17 inaccuracies and omissions in the initial application and three renewal requests, a stunning number for a sensitive case that FBI officials knew would be subject to close scrutiny. He has recommended the entire FBI chain of command be assessed for their performance failures. The revelation has drawn outrage from Republican lawmakers and sparked a robust debate among legal and policy experts.
The power to monitor a suspect on American soil in national security cases dates to 1978, when Congress passed the Foreign Intelligence Surveillance Act, or FISA, to rein in abuses from the domestic spying scandals of the era.
“If this represents a decent percentage of typical errors, then FISA cannot continue without radical reform,” Jack Goldsmith, who headed the Justice Department’s Office of Legal Counsel in the George W. Bush administration, told the Lawfare podcast following the release of Horowitz’s report.
Other former senior Justice Department officials have tried to put the shortcomings in perspective. The monitoring of Page was part of a broader investigation opened by the FBI in July 2016 to ascertain whether Russia was trying to influence that fall’s presidential election through current or former members of the Trump campaign. It was a chilling prospect, and former FBI leaders told Horowitz that the bureau had to see whether there was a serious threat to national security.
“In general, if you look at any complex, fast-moving, high-stakes, high-stress process under a microscope after the fact, you will find errors,” said David Kris, an assistant attorney general for national security during the Obama administration and an associate deputy attorney general in the Bush administration, speaking on the same podcast. “Turn over all the rocks, and you’re going to find some worms. . . . But these worms found here, I think, are worse than you would normally find.”
He said Horowitz’s broader review of FISA applications in espionage and terrorism probes will be “a good litmus test” of whether the Page case is “an outlier” or whether the process is broken.
In response to Horowitz’s findings, FBI Director Christopher A. Wray has announced measures to tighten the rules for FISA surveillance requests. Among other things, he’s requiring that all information bearing on the reliability of a confidential informant be included in the FBI’s wiretap application and verified by the informant’s handler.
Such steps don’t go far enough, say critics who have long contended that the FISA process lacks important safeguards to prevent abuse.
“If the inspector general identified such serious concerns about an investigation that everyone knew was so sensitive, just think what happens in less politically charged cases, especially those involving Muslims, other racial minorities and activists,” said Hina Shamsi, director of the American Civil Liberties Union’s National Security Project. “FBI oversight of its own activities is not enough to guard against the secrecy and one-sided approval process that characterizes the system and breeds abuse.”
Congress, she said, needs to transform the FISA process to make it more transparent and to ensure “meaningful opportunity” to challenge the government’s allegations in applications and in cases in which wiretap evidence is used in a criminal prosecution.
Senate Judiciary Committee Chairman Lindsey O. Graham (R-S.C.) indicated that Congress may have to act, saying during a hearing to dissect Horowitz’s findings that lawmakers “have a task at hand here to make sure this never happens again — to hold people accountable, change our laws, save the FISA court if we can.”
To obtain a FISA order, the government must persuade a judge it has probable cause to believe the target is an agent of a foreign power. The proceedings are classified, and no one stands before the judge to argue on behalf of the target. So over the years, procedures have been created to ensure that the information in the applications, prepared with the help of Justice Department attorneys, is accurate.
But Horowitz found that the FBI agents who prepared the application and renewals made significant errors. For one thing, the application relied in large part on allegations about Russian contacts with Page. Those allegations appeared in a dossier compiled by a former British spy, Christopher Steele, whose research was financed by the Democratic Party.
Steele had provided tips to the FBI in the past. FBI officials said Steele’s reporting had been “corroborated and used in criminal proceedings,” which overstated the significance of his work. That statement was not approved by Steele’s FBI handler, either.
A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.
Method of and apparatus for inducing desired states of consciousness
Improved methods and apparatus for entraining human brain patterns, employing frequency following response (FFR) techniques, facilitate attainment of desired states of consciousness. In one embodiment, a plurality of electroencephalogram (EEG) waveforms, characteristic of a given state of consciousness, are combined to yield an EEG waveform to which subjects may be susceptible more readily. In another embodiment, sleep patterns are reproduced based on observed brain patterns during portions of a sleep cycle; entrainment principles are applied to induce sleep. In yet another embodiment, entrainment principles are applied in the work environment, to induce and maintain a desired level of consciousness. A portable device also is described.
Trauma programming manual. This manual is an overview on how to create a dissociated subject. The manual lists tactics to use in trauma based programming.
1 Trauma-based Programming
Trauma-based Programming can be defined as systematic and calculated torture that blocks the subject’s capacity for conscious processing. Trauma Programming employs suggestion, hypnosis and/or classical and operant conditioning to implant thoughts, directives, and perceptions in the unconscious mind. The behaviours are implanted in trauma-induced dissociated identities (parts/alters) that force the subject to do, feel, think, or perceive things for the purposes of the programmer. The objective is for the subject to follow directives with no conscious awareness, including execution of acts in clear violation of the subject’s moral principles, spiritual convictions, and volition.
The primary factor for the trauma-based programming is the ability to disassociate. Dissociation is used as a defence to protect a subject from overwhelming pain and trauma. It is a natural ability of the brain. Installation of Trauma programming relies on the subject’s capacity to dissociate, pain threshold, and imagination which permits the creation of new walled-off personalities to hold and hide programming. Genically predisposition dissociative children are prime candidates for programming.
The subject’s ability to dissociate is a major requirement and it is readily found in subjects that come from families with multiple generations of abuse. Mental dissociation enables the handlers to create walled-off parts in the subject’s psyche, which can then be programmed and triggered. The subject cannot be traumatized indiscriminately or they will be killed. The master programmer has to know what they are doing. There will be doctors, heart monitoring equipment, and other medical tools used in programming. Programming foundation is completed in a clinically controlled environment to ensure entire control of the subject.
The type of programming which is placed in a subject varies. The subject’s creativity and their purpose in life would contribute to the uniqueness of the programming. Each subject visualizes differently and the programmer works with the subject’s creativity. Some parts will be formed solely by the subject in order to cope with life.
Each subject exists in their own circumstances; there are often common features in how they are controlled. The common features of control in subjects are: symbols, colours, and scripts.
The foundation of trauma-based programming is fear. A deep spirit of fear cripples a subject spiritually and emotionally. Guilt and shame are two more foundations for programming. The guilt will bind the subject to the programmer, handler, and other individuals that have been selected. This will lead to a loyalty that will make the subject less willing to disclose activities, and past trauma.
Programmers cause intense trauma to individuals through the use of electroshock, torture, abuse and mind games in order to force them to dissociate from reality.
Programmed individuals are used for different purposes, the sex industry, military, occult practices, and cults to name a few. Organizations have programmed subjects that are expendable. These are individuals are used in smut films, one-time use saboteurs, breeders, soldiers, drug couriers, used in rituals, and for training and traumatizing other subjects. Read entire Document here.
That’s right. Congress could reauthorize the draconian surveillance powers embedded in the Patriot Act for the Trump administration. Worse still, some Democrats have joined Republicans in this effort. They want to give invasive spying powers that endanger vulnerable communities — like people of color, trans folks, activists and journalists — to a president they just impeached for abuse of power.
“I’m a constituent, and I’m calling to say that reauthorizing the Patriot Act, and the invasive spying powers within it, is unacceptable. I need my elected officials to stand up for my privacy rights. Congress should not give President Trump even more power to spy on people like me.”
Targeted Individual Needs Help - Please donate
The court case didnt go well. I tried to get adjournment but judge defaulted with a warrant of eviction. I'm very stressed out over this. I started calling tv news stations and newspapers about the landlord, who is a corporation, and breached my lease allowing neighbors to make noise daily night causing more health, pain problems and sleep loss.
I will use the go fund me money also for movers (and storage unit if needed) and shielding material, microwave scanning being done on victims in USA, and food, travel costs. I don't eat 3 meals a day, due to trauma, sometimes I don't eat for days because they try to take over me and they also drug my delivered food. I don't want to eat and they choke me to try and force me too.
Treasonous policies have been put in place by the DOJ, FBI, law enforcement, Fusion Centers to legally permit covert use of radiation weapons and neuroweapons in Vendetta, Surveillance, non-consensual experimentation, electronic warfare field weapons testing on citizens. Are we in the middle of a cold civil war? Do we still have a Fourth Amendment and is the United States being run by an unconstitutional secret government? https://drive.google.com/file/d/1rhLI89vXu4s9Hg0MYFvIhib0OwtPCrrw/view
INTERNATIONAL APPEAL Stop 5G on Earth and in Space
There are 182,894 signatories from 207 nations and territories as of December 1st, 2019
To the UN, WHO, EU, Council of Europe and governments of all nations
We the undersigned scientists, doctors, environmental organizations and citizens from (__) countries, urgently call for a halt to the deployment of the 5G (fifth generation) wireless network, including 5G from space satellites. 5G will massively increase exposure to radio frequency (RF) radiation on top of the 2G, 3G and 4G networks for telecommunications already in place. RF radiation has been proven harmful for humans and the environment. The deployment of 5G constitutes an experiment on humanity and the environment that is defined as a crime under international law.
Just letting you know I have a monthly public outreach and awareness campaign going. It's every monday starting in Oct - Aug in Nj. Please let people know if they are interested. Best Regards, Krissy
Targeted Individual NJ Activism Schedule
Starting in October the first Monday of every month we will be spreading awareness in the most populated cities in NJ. This is an eleven month campaign leading to next years annual Targeted Individual day. On August 28, 2020 we will hold a protest/ rally in Trenton, NJ at the capitol and attend the NYC rally the next day.
April. 6 - 11am - 7pm - Trenton City Offices, 319 E State St, Trenton, NJ 08608
May. 4 - 11am - 7pm - City Hall - Train Station, Camden, NJ 08102
Jun. 1 - 11am - 7pm - Passaic City Hall - 330 Passaic St, Passaic, NJ 07055
Jul. 6 - 11am - 7pm - City Hall Union City - 3715 Palisade Ave # 2, Union City, NJ 07087, NJ
Aug. 3 - 11am - 7pm - Cherry Hill Mall - 2000 NJ-38, Cherry Hill, NJ 08002
*** Aug. 28 - Capital Building - Trenton, NJ Targeted Individual Rally *** *** Aug. 29 - Targeted Individual Day - NYC ***
$75 with shipping. Protect your brain! Cap with 4 layers of metal and one layer of blackout rubber fabric, two magnets and grounding strap and rubber mouse pad comes with hat.
The new cap has a tab connected to the metal fabric for grounding. You can put a grounding clip on this and the other end on a magnet or a piece of carbon and it is grounded. You can use it without a grounding strap. You can put more magnets on it and move them around to where your implants are or over your ears. If you get hot, you can put an ice pack inside. The head is the best place to cool the body. It comes with a large round rubber mouse pad you can take out if you want. The shielding works best if it blocks EMF and sound, so you need metal and rubber.
This is not guaranteed to stop V2K. If you hear voices, you may have a radio connection, a real radio connected to your brain and it is always connected. A hat will probably not stop that, but it may reduce the feedback they get.
Email: CitizensAHT@protonmail to order if overseas because extra shipping is incurred for tracking overseas and going through customs. Overseaes tracked and insured through customs is about $35-54. Uninsured is $24-27.
M size best fit for 58-59cm 22.8-23.2in 7 1/4-7 3/8; L size best fit for 60-61cm 23.6-24in 7 1/2-7 5/8
This hat has been chosen for shielding because it is large enough to come down over your ears to cover ear implants.
Protect your brain, wear shielding on your head and cover your cochlear implants. Metal fabrics block tuning of implants and return signals. Has been noted to stop subliminal intrusion and electronic dreams.
Removable insert is 4 layers metallic fabric, one layer light-blocking rubber and a layer of broadcloth to protect the metal. 2 removable magnets, grounding strap, tracked shipping included, $110, except overseas (calculated by post office $17-$50).
INSERT ONLY: $95, shipping included, except overseas has an added fee. 4 layers of metal and light and sound blocker + protective cover
Order on CAHT website or by emailing CitizensAHT@protonmail.com. We will send you an invoice.
Pay to paypal email: CitizensAHT@protonmail.com. Please make sure we have an email for you and a shipping address. 30 day delivery.
NEW BOOKLET: "How Are You Being Targeted?" Comes with free copy of WBAN press release
Booklet is $8.00 + $2.00 shipping. Overseas is $7.00 for shipping total $15.00. You will also receive a copy of the Press Release on the Body Area Network. You can support our organization's activities by ordering by email. We will send you an invoice. Pay by Paypal or debit/credit card at CitizensAHT@protonmail.com.
We focus on education/raisingpublic awarenessabout the RICO crimes of organized stalking, directed energy torture and other violations of physical/mental sovereignty andactionsyou can take to help win this war.
Hope Franklin, Research and Communications Director
SoundEnemy via ActionNetwork.org<firstname.lastname@example.org>
Come out to the second Targeted Activism NJ meeting at Barnes & Nobles in Paramus, NJ on Feb. 18. Please come out meet others and join in the the discussion. We can only make a difference with numbers and actions.
Below is a link to the details - Please RSVP -
If you can't make it, but still would like to contribute make a donation using links at the bottom. ** Please Join Us **
[ soundenemy ] @soundenemyx
Freedom For Targeted Individuals Time: 9 pm Eastern/ 8 pm Central/ 7 pm Mountain/ 6 pm Pacific Call-in number: 515-606-5187 Access Code: 400014# Moderator: Ella Moderator: Kate Ryan New England Support Group Time: 7:00 p.m. EST Call-In Number:(605) 562-0444 Access Code: 133472#, Pin: #1
Pastor Chief Daymond Jones Time: 9:00 PM Eastern Call-in number: 605-313-5111 Access code: 712679# Moderator: Chief Daymond Jones
Targeted Massachusetts - STARS, International Time: 9:00 pm Eastern Call-in Number: 515-604-9715 Access Code: 708922 Moderator: Frank
FFTI & Targeted Justice Open Support Call Time: Begins at 9pm EST / 6pm PST every Thursday Call In #: 1-515-739-1285 Call ID: 400014# www.freeconferencecall.com
Targeted Massachusetts - STARS, International Time: 9:00 pm Eastern Call-in Number: 515-604-9715 Access Code: 708922 Moderator: Frank
Church Conference Call Pastor: Dr. Millicent Black Time: 6 pm Eastern/ 5 pm Central/ 4 pm Mountain/ 3 pm Pacific Call-in number: 605-562-0444 Call ID: 140567 Pin number: 1#
Time 12:30 PM Pacific Call-in number: 515-739-6045 Access code number 874647 On Free Conference Call. Amy 971-207-3401 Moderator: Janey Time 8:00 PM EST Call-In number: 605-313-5569 Access code number 516-586 On Free Conference Call ID: janeyw
Sunday Service with Rev. Dr. Ralph and Catherine Sept Time: 4 PM Eastern/ 3 PM Central/ 2 PM Mountain/ 1 PM Pacific Call-in number: (605) 313-5111 Access code: 403529# Moderators: Rev. Dr. Ralph and Catherine Sept
TAX DEDUCTIBLE DONATION WITH PAYPAL: CitizensAHT@protonmail.com If you donate, please request the IRS Tax Number.
If you are having problems receiving your newsletter, try submitting another email address. Also, look in spam or trash folders or change settings in your email.
Please print a copy of this newsletter and any newsletters you wish to maintain. Just having them in your email won't save them. You can also copy them into a Word Document with .2 margins.
This is an internet reference newsletter.A link to the original article is provided in the colored title line. Articles are referenced based on the subject matter that may be of interest to victims of civil rights abuses, including electronic harassment and stalking. We claim no authorship, of these references, they are presented for your education and consideration of the information. The purpose is for TI education only. The reference may contain only part of the original article due to space limitations here. CAHT neither agrees with nor disagrees with any opinions or information contained herein. Please go to the link to read the complete article. Thank you.
A GOOD WAY TO DONATE TO CAHT
What is AmazonSmile?
AmazonSmile is a simple way for you to support your favorite charitable organization every time you shop, at no cost to you. When you shop at smile.amazon.com, you’ll find the exact same low prices, vast selection and convenient shopping experience as Amazon.com, with the added benefit that Amazon will donate 0.5% of your eligible purchases to the charitable organization of your choice. You can choose from over one million organizations to support.
How do I shop at AmazonSmile?
To shop at AmazonSmile simply go to smile.amazon.com from the web browser on your computer or mobile device. You may also want to add a bookmark to smile.amazon.com to make it even easier to return and start your shopping at AmazonSmile.
The information provided on this web site and those it links to, including embedded videos and other content from other web sites, is for educational purposes only. The information and products made available through this web site are not intended to provide medical advice, diagnose, treat, or cure any health conditions, or be construed as a therapeutic recommendation or prescription for any disease or symptom. The US Food and Drug Administration has not evaluated products or statements about specific products, health topics, or any suggested methods presented. Viewers should not attempt self-diagnosis or self-treatment of any kind, and should not discontinue any medication or therapy or make any health-related decisions without the advice of a licensed medical physician. You should consult with a physician or healthcare professional before starting any diet, exercise, or supplementation program, before taking any medication or nutritional supplement, or if you have or suspect you might have a health problem. Each person is different, and the way you react to a particular product may be significantly different from the way other people react to such product. You should consult your physician or healthcare professional regarding any potential adverse interactions between medication you are currently taking and nutritional supplements before taking any such supplements. Citizens Against Harmful Technology disclaim any liability, loss, or risk incurred, directly or indirectly, as a result of the use and application of the contents of this site. If you are unwilling to be bound by this disclaimer, you should not view this site or newsletter. All content posted on this site is commentary or opinion and is protected under Free Speech. We are not responsible for content written by and hosted on third-party websites. The information on this site is provided for educational and entertainment purposes only. It is not intended as a substitute for professional advice of any kind. We assume no responsibility for the use or misuse of this material. All trademarks, registered trademarks and servicemarks mentioned on this site are the property of their respective owners.