UNWITTING VICTIM
TARGETED INDIVIDUALS = TI

SUPPORT SITE

Standing up for human rights, supporting those who have been used for human experiments



 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 



Please! help us continue the fight by donating they prey on all of our families by keeping it below the awareness threshold ON THIS LEVEL IT DOES MAKE A HUGE DIFFERENCE
LINKED TO CREDIT CARD SERVICE SECURE SERVER


Feel Free to Email Me
We need to communicate without being blocked, edited, and filtered.
Standing up for human rights


Insider Speaks Out: Electromagnetic Effects on Brain
Ret. British military intelligence scientist interview: covering reality and effects of Directed Energy Weapons

Capt. Paul E. Tyler
This is a great declassified explanation of electromagnetic weaponry and human experimentation without subject’s consent.

 

The links below take you directly to the pages containing the applicable laws at Michigan State Legislature’s website.

Brief of Michigan's Electromagnetic Weapon Law


Michigan Law 4513

Paragraph k addresses electronic and electromagnetic weapons Act 256 2003, effective 2004.

Penalties Part 4514

 

INTEL: Developing 'Brain Chip'
Intel states "by 2020, brain chips should be available for the consumer."

 

Missouri Law Against Involuntary Microchipping
Videos of microchipping, Fox News and Australian 60 minutes,
pictures of many removed covert human microchip implants,
and pictures of cancer allegedly cause by implanted human microchips.



Newsweek Cover Story
Gleaning thoughts from the electrical activity of the brain, brain mapping, and injecting thoughts through electromagnetic waves.

They restrict or retard you the reader from information in anyway they can. In this article they would only present, the first few sentences to distract and derail you from the information, which is stating something humorous, conveying the future is here today.


Nuremberg
Code
Extremely important article, it is very short and an easy read.


Some points on the time line of human experimentation

Time Line Electromagnetic Weapons



Actual Statements from Presidential Commission
Children, experimentation, and mind control.



Cointelpro and the Church Hearings
Great Overview. Unsavory and vicious tactics have been employed. The Constitutional system of checks and balances has not adequately controlled intelligence activities. In the final report of the Senate select committee, Cointelpro was castigated in no uncertain terms.



Silent Sound and V2K( Voice to Skull): Confirmed and In Production
Sound bypasses the ear drum.


100 Patents
Inventions that effect thoughts, emotions, memory, and thinking from external sources.

 

Patent that Dates Back to the 70's


US Congressman Kucinich Introduced Legislation in 2001

SSec7 Definitions.(III) & (IV) (II)
The use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations...

 

Decades of CIA Human Experimentation
Includes information on veterans law suit against the CIA. EXTREMELY POSITVE PROCEEDINGS AND COMMENTS from U.S. Magistrate Judge John Larsen

 

GREAT FIND Declassified Documentation MKULTRA and Human Experimentation



Support Site with Conference Calls



Shielding
Includes enclosures, paints, bedding, and absorbers.



Washington Post's statement;
"It is not just science fiction – or the imaginings of the mentally ill"

Many times it is harder for them to minimize, and engage their discrediting machine. Such as when confronting this example.

 

Information From
A Perp

Seems to have validity, and be in line with what is part of a larger whole.

Released 2007
Illegal CIA Activities Human Experiments Spanned Decades



U.S. Code Electromagnetic Weapons
A person who uses, attempts or conspires to use, or possesses and threatens to use. This has a 2 million dollar penalty and a minimum 25 years sentence



French Government Bans WiFi in Schools; Requires that No Child Under the Age of 8 Should Be Exposed to WiFi Electromagnetic Radiation.
It should be noted that some European countries use the age of 16 rather than 8. This helps convey the dangers of EMR even in these amounts, especially to young people.


Russian Law draft describes psychotronic weapons in detail
Helps convey that it is not a victim as an individual, and not exclusive to the U.S. Aiding us when attempting to address technology that is developed to the point that it can adversely effect human-beings brains, minds, and bodies.



Russia Wants Ban on HAARP Testing
Piece from Provda, a Russian Newspaper

Great Technical Information Link


These Are the People Who Research and Develop What Adversely Affects the General Public


Neuroscience-EGE Report: Implants in the Human Body
This report a good report on the subject; it describes a spectrum of human implantable microchip technology.


Boston Globe's Article on Brain Computer Interface and Funding


Decades of Published Evidence of Microchip Technology and Symptoms



Personal note: I am under mind-bending effects from what they employ.
I do suffer on an ongoing basis.

I have included the following statement, due to those inflicting the harm and hardship continually attempting to preempt, and mirror me, while suppressing me and 'information'. This is in their continually attempt to keep the information below the awareness threshold of those who would scrutinize, or recognize their behavior. They also steal and sloth my work (much of my work as I stated elsewhere on this site is for other purposes, such as legal action) this is in part not only to minimize the impact, but also to bolster their fraudulent behavior.

Very importantly they will admit to something employed, or a minimized version to accomplish what they present.

When these thing are scrutinized they will attempt to play another side of the fence garnering a response, or decision that is devoid of what they were stating, or presenting a moment earlier. Hold them accountable for what they presented earlier or later.

That they have anything employed is what is instrumental. Who has these things employed is as concerning as what they employ.

Their addressing it at all is in response to what I am working on.

They are involved in being on top of me like glue, and at times there will be a direct association with me through the years. How much of my other work is in the same place in a minimize hidden way.

Lastly, this site will include voice files in the near future to save visitor time.

 

 

 

 

 
 

 

 

 

 

 

 

 

 


Senator Glenn "You just think about your family, your own son, your own daughter, or grandchildren
who might be, the next time they got to a doctor, the subject of some medical experiment that they
are not even told about."

Senator Glenn's Statement floor U.S. Senate


JFK Speaks Against Secret Societies
Short video
Spacer video

 

President Eisenhower's Farewell Address
Eisenhower warns of threat to liberties from VAST MILITARY COMPLEX
Extremely important part 50 seconds into video

Clinton Public Apology for human experiments (NEW)
IMPORTANT VIEW AT LEAST THIS ONE VIDEO
Those who cross the lines from legal to illegal, ethical to unethical, not only hide under the professions as whole, but also have well greased mechanisms in place to ensure that it remains hidden form scrutiny. Those who had the propensity to act in this hideous way, along with anyone involved, have the ability to use these mechanisms (systems). Rockefeller Commission

 

Essential Awareness Building Material For All Including Ti's & Ti's Families
Good Awareness Foundation Overview
The Bridge of Information and Link to Citizens
New video faster paced.

 

The more we become aware the more we have the realization that the technologies, methods, and techniques employed are no longer in the hands of those who originally developed or participated in the programs.
The point that needs to be mentioned at this juncture is that those on the side of the fence who are acting legally, morally, and ethically have a hard time grasping that someone would act that immorally, unethically, and illegally. And this is why at times the statements and apologies from the highest levels are needed. This ensures it is remembered that it is in society, and there are those who are acting in such ways. Who is engaged in these acts is as concerning as what they are engaged in.
Their organization is described by using the analogy of an onion. The layers hide, or shield, the core. At its epicenter is the use of human beings for human experimentation. As you move in from the "peripheral layers" of the onion, which will be addressed later, towards the epicenter, the primary function of the layers is geared towards targeting unwitting victims. It is designed, as it becomes more and more engrossed in targeting the unwitting victim, to make and keep the victim vulnerable for the use of the human organism, unwitting victim. What makes most of us in society susceptible, especially their victims, is the lack of awareness that they are, and have the ability to, act as surreptitiously as they do while engaging in such egregious and unconscionable behavior. They are surreptitiously on top of the victim, regardless of whether the victim is aware or not.

 

Electromagnetic (EM) weapons, or directed-energy weapons (DEW), we do not see, hear, taste, or smell, although we are grossly affected by them as citizens. They utilize the various frequencies of the electromagnetic spectrum to disable or kill the target. Among electromagnetic weapons are psychotronic weapons. These EM weapons interact with the nervous system of the target. Silence Sound Weapons are weapons affecting our subconscious, but can be raised above our awareness threshold. Having the below graphic as a mental picture helps convey what it is that an exposed person encounters.

 

 

Electromagnetic Spectrum


US Army War College Quarterly "The Mind Has No Firewall"
Great Awareness Foundation Building Piece.

The "data" the body receives from external sources--such as electromagnetic, vortex, or acoustic energy waves--or creates through its own electrical or chemical stimuli can be manipulated or changed just as the data (information) in any hardware system can be altered.

 

PSYCHO-ELECTRONIC WEAPON ATTACKS on HUNDREDS of THOUSANDS of INNOCENT U.S. CITIZENS and NON ALIKE




Capitol Office
State Capitol
Jefferson City Mo.
573-751-0246



District Office
Second Street
King City Mo.
660-535-6664

May21,2009

To Whom It May Concern,

This letter is to ask for your help for the many constituents in our country who are being affected unjustly
by electronic weapons torture and covert harassment groups. Serious privacy rights violation and physical
injuries have been caused by the activities of these groups and their use of so-called non-lethal weapons on
men, women, and even children.

I am asking you to play a role in helping these victims and also stopping the massive movement in the use
of Veri-chip and RFID technologies in tracking Americans.

Long before Veri-chip was known we were testing these devices on Americans, many without their
knowledge or consent.

There are new revelations of the cancer risk besides the privacy and human rights problems with the use of
Veri-chip and RF signals.

I am asking for your help in stopping these abuses and aiding those already affected.


Sincerely,

Rep. Jim Guest

 


Implantable microchips are just one of the technologies, methods, and techniques they employ.
The sizes of these devices have become too small for the human eye to see.

Deep Brain Nanowire Electrode Inserted in blood vessels More

Nanotechnology (Actual Chips)

Microchips on a Penny

Brain Implant Receive and Send Electrical Activity of Brain Nanotechnology Nanotechnology2 Brain Implant Receive and Send Electrical Activity of Brain

 

These technologies represent some of the many ways they have to monitor us unwitting victims and monitor how our brains and bodies are reacting to what they employ. They will cause what affects us their victims, including employing these chips and nanobots, and then use them to detect how the subjects are affected. These graphics are intended to convey this small part of what these organizations use, their ever-evolving sophisticated capabilities and the exponentially ever-decreasing size of the technology, now so small it cannot be detected by the naked eye. Both body and brain implants are in existence. Those who are unethical are using technologies, methods and techniques to experiment using human-beings, attempting to affect and control their victims brains and bodies from afar. These technologies, methods, and techniques are in part how we bleed at the gills as a nation economically. Those who are unscrupulous in their business enterprises have obtained this technical knowledge through the years, and have benefited by keeping it under the awareness radar of society as a whole. As we trace the time lines, we can see the evolution of what they employ.

 

Without Invasiveness

Mind Eye What The Mind SeeMind Eye What The Mind See

(Courtesy of Shinji Nishimoto)
UofC Berkeley

What The Mind Sees Vs. What The Eye Sees


Short list of symptoms

chilling of Skin/ Instant Coldness
-daytime discernible "microwave hot spots" on skull
thermal heating
- nighttime, severe night sweats
intense itching
sensation of electric current running through the body
induced sleep
hyperactive bladder
deterioration of cognitive abilities
jaw or tooth pain
sleep deprivation
severe disorientation while driving
lesions on internal organs
dream manipulation
memory loss
electroshocks
tingling
numbness

Short list of their tactics /organized stalking

appliance tampering
helicopter/airplane home fly overs
being followed
blacklisting
car tampering
home monitoring workplace harassment activity
mail tampering
computer tampering
noise campaigns
e-mail monitoring/interference
street theater
targeting of pets
unexplained sounds in home
wiretapping/electronic surveillance
food tampering

Control of another human-being's normal brain and body function, by electromagnetic energy and radiation, dates back to the 60's. By means of electrical stimulation of the brain, the rhythm of breathing and heart beat [this was even stopped for several pulses] was affected, as well as the function of most of the viscera -- like the secretion of the gall bladder. Also resulting were frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, and dizziness, and epileptic seizures were induced in healthy persons.


They have been on us like flies in a horse barn through the years for different reasons. Their primary reason is to monitor how we acted and reacted to what they employed, without our knowledge, long before we become aware. Unlike many of us who have become aware there are those who are unaware and may never become aware. How horrifying it is to find out that someone is adversely affecting our lives, but it’s twice as horrifying to find out they have been acting in this way for decades. They have burned bridges of support many times before we knew we needed to cross those bridges of support. With their less than one sided view the only view heard, they are continually attempting to predispose those who would be support for us their victims, or would scrutinize their behavior. Once we become aware or obtain too much information for their liking, they use their monitoring abilities to keep us from obtaining independent support, ensuring that the information we have and what we prepare is intercepted and watered down. This minimizes the impact of my work and ensures that the answers I have found do not get to someone independent, or a group of independent people before they have their covers and smoke screens in place.


Organized Criminal Involuntary Servitude, Stalking, and Intimidation (OCISSI)

It is commonly known that the violent criminal element (their organization) has gotten a hold of these technologies, methods, and techniques. People have infiltrated their groups and they have confirmed they are a violent organization that inflicts harm and hardship on us, their victims, which is the definition of violent. They employ these things for their personal gain; this does not have to be monetary gain, it can be things such as information for research and development, including R&D of new, even more sophisticated technologies, or it can be simple curiosity.

You begin to recognize who is involved when you can recognize how they function and operate. This includes things such as who has, and has had, their fingers on the information 'block,' 'edit,' and 'filter' buttons controlling the information flow that is being presented. Who has their hands on the slander and misinformation machine, which is a well known part of their program. And, who is demonstrating and employing these technologies, methods, and techniques

With their ability to present whatever view they want to, they supply bad information and data or only the information that ensures they get the decision or response they want. When there is information that reveals, proves, they presented bad information and bad data, they will stop at nothing to create a smoke screen that they can hide behind. This ensures they will need to have their well greased block, edit, and filter mechanism control all new information, or it would reveal this fact.

As I prepare material, they will confiscate and present it in a watered down way that minimizes their behavior and minimizes the technology, methods, and techniques they dare to use. They should present it as they presented their less than one-sided view through the years, not when I find a way to counter their less than one sided view. They literally have stolen and altered both my paper and electronic files at times as soon as I was done preparing them.

They are on top on me. It is obvious that the material comes from me. If it is presented by those who are privy to the information from being on top of me, then they are preempting me and the information. The source, being me, cannot be questioned. Those who take credit for my work, minimizing the impact, will attempt to leave the room, or hide behind a smoke screen, when light is being put on their involvement. This light leads to scrutiny that begins to unravel their deceit and fraudulent behavior. This is the type of behavior that identifies them and their gross involvement in inflicting the harm and hardship on us, their victims.

 

SEE THROGH THE WALL TECHNOLOGY
Video: N.Y. City Police Commissioner to deploy see through clothes terahertz technology THIS YEAR
These links are simply used to convey technology that is available and evolving, and has been around for decades. Those who are engaged in the use of human being against their will, knowledge, or want, as well as being surreptitiously involved in an unwitting victims life, recklessly use this and much more crude technologies. They do not have the well being of the victim in mind.

 

Increase your website traffic with Attracta.com