Monitoring, Sabotage, and/or
Gathering Electronic Data
Surveillance Cameras, Bugging, Stalking,
INFO: Communication and/or Sound Projection
||IRRITATE, REPULSE, CRIPPLE, AND/OR PUNISH:
pain, discomfort, or even torture.
(Maybe also sleep
Including Bodymind Control. (Might include
REMOTE CONTROL OF APPLIANCES
Also see the monitor/learn
category for remote control of computer issues.
||POISON OR KILL: Poison, Radiation, or
often this occurs
Daily. Whenever you're connected to the Internet.
Whenever an individual or organization wants to learn about you.
workplaces and other places have routine electronic surveillance.
Daily. TV, newspaper, spam.
Hopefully only very infrequent loud noise disruption.
Daily. When you're watching TV.
Variable. Remote control of your own, or sometimes shared, appliances.
(Usually using infra-red technology.)
Probably never intentionally.|
Rare accidental food poisening. (Est. 5% illness rate/year.)
(can be manually installed on a PC or downloaded from the Internet)
2. Adware (or shareware)
spyware. Often free software
that includes hidden extra programs/ functions.
3. Illegal computer hacking tools
Names, Addresses, & Phone
Numbers Database software.
Street Map software.
and security camera software.
(Infrared webcams/ surveillance
cameras have limited night vision.)
Baby room monitors.
Used spy bugs at eBay.
|Talk, email, phone
call, fax, letter.
Also self-help subliminal tapes.
Music/Behavior, Bad Odors, Graffiti, Vandalism, etc.
electromagnetic rodent/insect repellant technology.)
Verbal and/or physical attack by goons.
|Fun: TV (hypnosis
and ads), alcohol
Getting someone drunk with alcohol
dosing with LSD
V-chip TV content parental control device. Internet filters for
parents and/or employers.
Remote controlled speakers.
Micro FM transmitters.
Computer spyware/ hacking tools.
Beststungun.com sells cheap,
weak stun guns. Legal in many areas.
many areas. Restricted in some areas.
Water often carries disease.|
Disease: contagious disease routinely travels around the planet.
Spoiled/rotten/moldy food must be avoided.
Poison: Many cleaning liquids are poison (and must be kept away from
infants, for example.)
and/or email monitoring software.
Probably ISP monitoring software too.
FBI claimed in 2003 that they use commercial software.)
PI (Private Investigator)
bugs, phone wiretaps, GPS vehicle tracking.
Spy Tech Agency.
Subliminal embeds in ads, TV, music, and video
Micro-transmitters for FM, AM, TV, etc.
Gun M-18 costs $350. The policeman's stun gun. Legal in many
Illegal in many areas. Restricted in some areas.
Computer sabotage of targeted computer(s).
Rare website viewing sabotage.
(Rain=100% chance for rally weather, for
1/14/05 FOIA info
advanced Internet hacking tools and spyware.
2. Probably fancy hardware and software spy tools, including "rootkits".
3. Probably computer driver, software, and/or BIOS modifications.
4. Computer screen viewing tools.
4.1 ISP tools
monitor all Internet activity.
devices that can remotely view CRT (but maybe not LCD) computer
monitors by monitoring CRT EMF emissions.
4.3 Probably computer monitors that radio/transmit screen images
advanced electronic data gathering tools. Probably easier access
to private databases.
Amazing but TRUE: Top secret
technology can sometimes read targeted minds.
some evidence (also
cached by Google) and
more evidence to document how this could technically be true.
Here is a
detailed scientific paper (in MS-Word format).
(It might be possible to combine an improved version of a
1976 Malech patent device for remotely reading brainwaves by
bouncing 2 mixed EMF beams off of a brain and reading filtered
bounced-back EMF data from the brain with other technology that can
translate brainwaves-to-speech. Also see
subliminal suggestion and mind-control patents.)
(It's probably brainwave reading, but it might also work using a
supersensitive mike that records internal "brain chatter".).
Subliminal Sound Technology.
Probably improved acoustic
heterodyne/ hypersonic sound technology.
probably with Microwave Technology. (Very similar to rodent
(and monitoring and maybe even recording.)
Amazing technology feats
include: sound beam technology, subliminal messages, mind reading,
bodymind manipulation probably using brainwaves manipulation,
sleep now attacks, influencing dreams, and/or inflicting pain and/or
Sound sabotage (and video soundtrack sabotage) technology.
ANY WORDS (or even
semi-subliminals) can be swapped in to song or video.
(Often combined with in sync
subliminal or semi-subliminal screwed up messages to the listener/
2. Remote-controlled machines can
be zapped with the correct (often infa-red) remote codes.
3. Computers and other devices can sometimes be partially controlled/
jammed using top-secret electronic zapping,
Electronic warfare disorientation attacks and/or sleep attacks.
research labs. (Fort Dietrich, etc.) Also labs studying
highly infectious disease.|
||Everyone With a
Computer Connected to a Network and/or the Internet.
Employees at Work.
Money, Power, Influence, or access to Sensitive, Classified, or
(or powerful or rich) people receive more communication.
||People living in
crowded urban poverty.
People with power, influence, and/or money.
Employees at Work using an employer's computer.
Kids with controlling parents.
Anyone connected to the Internet without quality firewall and
threaten police armed with stun guns.
||An est.1 billion
people without clean drinking water.|
Disease, spoiled food: Everyone's at Risk.
Poison: infants are at risk.
||1. Computer access
2. Hardware Firewalls
3. Software Firewalls
5. Anti-Spyware software
6. Log off from the Internet when you're you not using it.
7. Hard Drive and
8.WiFi (wireless networks) passwords
9. Also anti-spam software.
number (and/or street address).
If bugs concern you, consider buying a bug detector and/or a frequency
scanner in order to maybe find any hidden bugs.
(Full scale spectrum analyzers are
probably way too expensive for you.)
(A cheap basic bug detector might
cost approx. $50 at ebay or $100 or more new and hopefully extend up
to 6 GHz. Excellent RF detectors cost more.)
3. Top secret locations might use expensive TEMPEST computers and/or
EMF shielded rooms.
Soundproofing rooms for privacy. (Add more insulation between
Microwave detectors/Bug detectors/RF detectors might be able to
document what is probably microwave pulsebeaming.
(Also, standard straight-line antennas
have the strongest signal when they point directly at the EMF
Also at-risk people should be aware of capability of top-secret
mind-control technology in case they are ever hit with it.
Computer security: a quality firewall and anti-virus scanner, etc.
Technology design suggestion: redesign wireless remotes so that they
can be wireless or wired with an optional cable attachment.
Banning/regulating stun guns.
(On the other hand, stun guns might be used for non-lethal
|Only drink good drinking water.|
Basic food safety and personal hygiene.
Refrigerating food, freezing meat.
Also water purification plants for society.