My Life as an Independent Journalist, Volume 2 – The World as Reported 8/7/2022

My Life as an Independent Journalist, Volume 2 – The World as Reported 8/7/2022

Once again I must clear my browser to keep it functional. There’s no way that I can research all of this so I will put it here so that my subscribers can pick and choose what they’d like to see. Do keep in mind that most of these stories and videos are waiting for my review. Also, keep in mind that I’ve been doing this kind of research for at least ten years in my attempts to save humanity, and I’ve been taken down financially because of it, so if you can contribute to my survival you’ll find contact information on my “About” page. Thank you, keep the faith, we WILL win this war that we’re in. As always, knowledge is our weapon.

LINK BELOW: WHISTLEBLOWERS INSIDE THE UN

https://www.bbcselect.com/watch/the-whistleblowers-inside-the-un?utm_source=fb&utm_medium=cpc&utm_campaign=BBC%20Select%20%7C%20FB_US_D%20%7C%20Whistleblowers%20%7C%20Video&utm_content=UN%20Documentary_Whistleblowers%20Social%20Clip&fbclid=IwAR1qOdIVoTk7dCSYTBn5UJC_AMfnRASlJS99wXofs-tFSVCPr-Jn9IrAp54

LINK ABOVE – INFORMATION WEAPON – Russia’s Nonnuclear Strategic Weapons of Choice

LINK BELOW – TARGETED INFORMATION LIBRARY

https://tilibrary.com/?fbclid=IwAR2CyUUTKWOJUVEzgQoKE628H_D6PSAiU2zd9a_JX88UzU6IpqMd7g1TdEg

LINK BELOW – RECLAIM FREE THOUGHT – CATHY O’BRIEN

https://rumble.com/v1etmt1-ep-141-reclaim-free-thought-and-spirit-with-mk-ultra-survivor-cathy-obrien.html

LINK BELOW – JESSE VENTURA – SECRET SOCIETIES

https://rumble.com/v1d63vh-2009-conspiracy-theory-jesse-ventura-secret-societies-the-bilderbergs-globa.html?fbclid=IwAR2FwLRiIa4HBKAa364NrJoBOlHONWiKOLCOEIVLW7B9qQuZGGTXfLwSupM

LINK BELOW – THERE IS WAY MORE TO THE STORY OF DESTROYED GEORGIA GUIDESTONES

https://rumble.com/v1bnlb9-there-is-way-more-to-the-story-of-destroyed-georgia-guidestones.html?fbclid=IwAR30JzqFLHE4g5XP_NqAIv-xwBJUfJhJuPth905wABH-T9ViJrxZutTO8oM

LINK ABOVE – WEAPONS OF MASS DISRUPTION – NEUROWEAPONS

https://www.greenstreetradio.com/post/electromagnetic-sensitivity-ems-and-wireless-radiation-part-one?fbclid=IwAR3xMAPaG_4NKBbvSspl4IyqYmYtGg6QUiCWYQVW1HGx_9f_JPzyLDk9WLA

LINK ABOVE – EMF SENSITIVITY AND WIRELESS RADIATION

LINK ABOVE – CIA MKULTRA DOCUMENTS
LINK ABOVE – IQ IS DROPPING AROUND THE WORLD

LINK BELOW – NAPHAZOLINE NITRATE TREATS FREY EFFECT OF MICROWAVE AND OTHER SONIC WEAPONS

https://www.heighpubs.org/hbse/abse-aid1004.php?fbclid=IwAR2F-E4CKGO3y4n5MEB9acA8OGoPgfiUiMudHYssBnmDaJaycu4T5mO-S7c

LINK BELOW – AN INVISIBLE ASSAULT, OR IS IT?

http://shoutout.wix.com/so/8LVZfIgA?cid=0adb6c6f-8046-4d30-a322-d4a5b0ae0dc0&fbclid=IwAR2f5P-RxJbb8Gb0JVkpMxPJyGkSyv6ookubcLqBD_cPOClt0Yjai0qi-hY#/main

LINK BELOW – THE TESTIMONY OF SAMUEL LUDWICK

https://awftint.wixsite.com/targetedint/survivor-stories?fbclid=IwAR3LGVPQN2klXMQanFiF4sf7aVdarT-c9BP7O_xhHcDMdxqxecYif6dWkBM

LINK BELOW – THE GREAT RESET EXPLAINED IN 17 MINUTES

https://rumble.com/v1b7btl-the-great-reset-the-entire-great-reset-explained-in-17-minutes.html?fbclid=IwAR3xkN8tFMw2oLf6Q6IsaazkR02McwsyXP-4ohddcJghb8W1GUKFXnXEO-A

LINK BELOW – DHS – CIVIL RIGHTS COMPLAINT PAGE

https://www.dhs.gov/file-civil-rights-complaint?fbclid=IwAR0soonaoEMwuWDB8NcwtO3cPwZrstf0HuGC49L1QxYldJQ_8owPpJMv1hk

LINK BELOW – CATHY O’BRIEN – MKULTRA

https://rumble.com/v18sxel-cathy-obrien-americas-mk-ultra-mind-control.html

The Life of an Independent Journalist Covering Electromagnetic Weaponry

The Life of an Independent Journalist Covering Electromagnetic Weaponry

It’s another sleepy Sunday afternoon in Northern California. While most people are clipping their shrubs, watering their lawns and preparing their lunches I am sifting through tabs and tabs of information on my browser. There are so many open tabs on my browser that my browser is no longer working properly. Something must be done with this information so I’ve decided to put it all in my blog.

This is information waiting for my review so none of it’s been verified. I wanted to give the reader out there some idea of my life, and why independent journalists sometimes get overwhelmed. After going through all of this I deleted some, bookmarked some, left some on my browser from trusted sources to listen to later. There was one video that I could not post here. It was a group of Constitutional sheriffs discussing how to save our country. I guess that they’re terrorists now so never mind. I’ve got it down to 17 tabs.

In general I publish 5% of the information that I’m exposed to. Even if you choose to ignore everything here you can kind of pick up the gist of what’s happening in our world. All of these reports can’t be faulty. In my opinion, after years and years of research, we are very quickly heading into a world of technological slavery, in fact some people would say that we’re already there.

I know that money’s really tight right now but if you can donate a little something for my efforts then please do. Like most people out there trying to expose the truth I am financially sabotaged and about to lose my home and I take tremendous risks by exposing global agendas and their mindless slaves within our country. You’ll find my PayPal address on the “about ” page. Thank You!

It’s July 17th, 2022 and here are the open tabs on my browser.

https://www.discerningthemystery.com/2016/04/voice-to-skull-what-you-need-to-know.html?fbclid=IwAR2NvBJLw3hgaeK89jmlvQ1qbuaNwjtgmF_fCGbUwuK2-4xrHcWEcXIOUYQ

Above link – Voice to Skull – What You Need to Know

https://blogs.scientificamerican.com/observations/we-have-no-reason-to-believe-5g-is-safe/?fbclid=IwAR2yusf0kFfTSjitGPEbvytZK307kWeqWVh_QwhmqRGMPMGK1KnEV0BY0AA

Above link – We Have No Reason to Believe 5g is Safe

https://www.army.mil/article/199368/raven_claw_augments_battle_management_for_electronic_warfare_operations?fbclid=IwAR18xjcpR_unf4cbwDOk5YR3ECCfIN7Pt7wxoYir1SG2UIqyxLHLMHDq9S4

Above link – Raven Claw Augments Battle Management for Electronic Warfare Operations

https://www.thenation.com/article/archive/how-big-wireless-made-us-think-that-cell-phones-are-safe-a-special-investigation/?fbclid=IwAR1SSAoOTeFJsX32DFSHykOC05CQN0fokN6W3kUD7T73zo2L_njUYI3AAE0

Above link – How Big Wireless Made Us Think that Cell Phones are Safe

https://rumble.com/v1awjj1-transhuman-nightmare-graphene-nanowires-torturing-the-vaxxed-and-the-uinvax.html?fbclid=IwAR1cdjPhBrc6C3vTPCbetJTxp3a-aHT6hpVEgmLYlhHfFUX19x-_IORwBp4

Above link – Transhumanism Nightmare – Graphine Nanowires Torturing the Vaxxed

https://bigthink.com/the-present/secretive-agency-uses-ai-human-forecasters-to-predict-future/#Echobox=1656784506

Above link – Secretive Agency Uses AI Human Forecasters to Predict Future

https://thenewamerican.com/understanding-radiation-risks-benefits/?fbclid=IwAR0cCAzpeHiwavTchYcBiBMn975L-g4E2vAGyPcaU5PlkIecOmhvIzx_2pY

Above link – Understanding Radiation Risks

https://www.theguardian.com/commentisfree/2022/jun/29/sherwood-spy-cops-police-undercover-officer-tv-series?CMP=Share_iOSApp_Other

Above link – Spy Cops

https://medcraveonline.com/IPMRJ/the-secret-program-of-us-mind-control-weapons-is-it-developing-in-latin-america.html?fbclid=IwAR3GfCD_TR-LOMpuV6tcPyvCgz_aE2attEfqL5mHGyOZ2dPv0XMZ3XLdMVQ

Above link – The Secret Program of US Mind Control Weapons

https://acrobat.adobe.com/link/review?uri=urn%3Aaaid%3Ascds%3AUS%3A17e2796b-83ea-3e9e-8212-0d5c7e178f09#pageNum=312

Above Link – The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave

https://phys.org/news/2008-02-pentagon-lasers-voices.html?fbclid=IwAR2IN2e-q7BS1I5lsRtjYaxJT-leYbmuaYqVp6PwmBaYnlLrF8m7zIzvX88

Above link – Pentagon Laser Voices

https://rumble.com/v18sxel-cathy-obrien-americas-mk-ultra-mind-control.html

Above link – Cathy O’Brien, America’s MK Ultra Mind Control

https://www.naturalnews.com/2022-06-10-civilians-being-assaulted-with-directed-energy-weapons.html

Above link – Civilians Being Assaulted with Directed Energy Weapons

https://www.bibliotecapleyades.net/ciencia/ciencia_psychotronicweapons15.htm?fbclid=IwAR1iHX9IE0kvY28cT_Z2vBis7VJ1y3k9JdfjcCWVyUkyPn6Hf_h71GXSZMc

Above Link – CIA Psychotronic Weapons

https://mysteriousuniverse.org/2018/03/mind-control-through-the-airwaves/?fbclid=IwAR09HwHL4RzQFja-OVDB702-ijmUk_496ZqVi-T7qf7OdXZSD8Q_Vs3Jl24

Above Link – Mind Control Through the Airwaves

Above Link – The Silent War Being Waged on Our Children

https://rumble.com/v159gtp-down-the-rabbit-hole-ep.6-the-dark-truth-of-transhumanism-ft.-dylan-louis-m.html?fbclid=IwAR2lE6QkURKPBDfIJpbqOj6ZQnZ35dn7gOwDJArF94w6nqkUHQWNt_khb8M

Above Link – The Dark Truth of Transhumanism

Above Link – Mind Control with Silent Sounds and Super Computers

https://jacobsm.com/projfree/the_military_use_of_mind_control.html?fbclid=IwAR1QONw63JZEW0u1JQySLC4ZilBwPEj03QU2IvgzhuYCjO_IdS3OcKocYxI

Above Link – The Military Use of Mind Control

https://www.europarl.europa.eu/press/sdp/backg/en/1998/b980209.htm?fbclid=IwAR3Wxd5yBRtGJ0R8Or8yzUB-YY6w6uM1fbJsH-R-1Hkw_Cz14LdJYp5LMoI

Above link – The HARP Project and Non Lethal Weapons

Can Someone Verify This? …

Can Someone Verify This? …

From the tales of electromagnetic destruction comes this beauty. If this list is true, and I have yet to determine that, then the military industrial complex is indeed guilty of the orgy of weaponry and research that many report. Hey, you could be paying for your own subjugation, and good luck finding the weapon or filing an abuse report….

Please, can someone verify this list? … I’d love if you could discredit it … I don’t want to believe that the human race is so vulnerable … yes, please discredit it … put my soul at ease ….

But really, feel free to leave a comment .. going up against the deep state and the military industrial complex is one hell of a retirement plan, but then again I’m already targeted so I have total freedom … to my deep state adversaries … what on earth are you doing with our planet?

“O, what a tangled web we weave when first we practise to deceive!”

Walter Scott

Love from an old apple orchard in Northern California …

Stay strong people!!!

As you read this list, keep in mind that thousands, if not millions of people are saying that they are experiencing these symptoms … the world calls them targeted individuals … many of them are ex-military or ex-intelligence whistle blowers … many are doctors or journalists … the list is growing daily …

Found on FaceBook – 5/4/2022

  1. Microwave Pulse Weapons: Head & Body Pulse Shots, Low-Intensity to High-Intensity, productive of instant migraines, running noses, stuffed noses, inability to breathe, extreme heat
  2. Sonic & Acoustic Radar Weapons–Ultrasonic (Bone Conductance), Infrasonic, ELF (Extremely Low Frequency): Projected Sound, Silent Sound, Tinnitus/High Tone, Remote Cavitation of Organs for Tracking—Stomach, Throat, Mouth, Intestine, Rectum.
  3. Vibration Weapons: Vibrations of couch, bed, seat, externally induced; Vibrations at spine of body (induced presumably by implants at spine); see Conducted Electrical Weapons & Microchip Weapons below; ELF vibrations from large engines, HAARP wind weapons acting like ELF vibrations to aid in tracking/honing/guiding Pencil Microwave Weapons at Rectum, Vibrations transmitted through Water Pipes underfoot in flooring
  4. BCI/EEG/TMS/Sonic/Other Neuroweapons:Neuro Injections – V2K (Voice to Skull), Synthetic Telepathy, Forced Speech, Synthetic Images & Film, Sounds, Sensations, Smells, Electronic Dreams;
    Neuro Communications/Modifications/Interventions – BCI (Brain Computer Interface) Tech inducive of Hive-Mind Communications, Brain to Brain communications, BCI-CBI Communications; Removal of Memories; Insertion of Memories; Removal of Words, Language Skills, Musical skills, Computer skills;
    Neuro Takeover – EEG Heterodyning and EEG Cloning, Bio-Robotizing inducing effect of Brain Clone invading brain and imposing external will/external force in thought, speech, bodily movements
  5. Bio-Resonance Frequency Weapons/DEW: Forced Sleep, Forced Emotions: Induced Rage, Fear, Fatigue, Depression, Paralysis, Confusion; Bodily Organ Attack via Organ-Specific Bio-Resonance Weapons, experienced as pulse shots, pain
  6. Scalar Radar/Touch Weapons: Pulse-flicker weapons, Skin-crawl/Skin-hammer weapons, Highly Intrusive Private-Part-Invasions, Haptic touch weapons
  7. Conducted Electrical Weapons: Remote electro-shock/vibration/spasm weapons, producing violent to mild shocks and spasms of different parts of body or whole body—perhaps to mimic clinical seizures; violent to mild vibrations at spine; Remote sexual stimulation/orgasm-inducing weapons, perhaps to create involuntary sexual stimulation, now classified a “disorder”; Remote electromagnetic rape weapons (Precision tracking radar)
  8. Tracking Radar Weapons: Nerve-flicker weapons, Breath-and-heartbeat-tracking weapons (Through-wall-surveillance radar, Earthquake radar), Muscle-flicker weapons—all used as Biometric Surveillance devices, to establish occupancy or presence, to establish bodily position, azimuth.
  9. Brain Entrainment Frequency Weapons: Radio Hypnosis/Brain Programming Weapons, often at night, inducive of externally-imposed urgency-of-action-without-personal-will (Manchurian-action), causing people to engage in compulsive, unexplainable behavior and speech
  10. EEG Weapons: Painful EEG scans at scalp, done remotely
  11. EMF Wave Weapons: Painful pressurizing constrictions, wave-like, intense, unshieldable by simple metal, at brain and body: the forced movement of high EMF fields through the body & brain
  12. Laser/Maser Weapons: Sharp precision hits at skull, eyes; evidence of cigarette-mark-style burns on body
  13. Bio-Resonance Nerve-Activation Weapons: Painful activation of vagus, other nerves, remotely; fibromyalgia-style-inducing spot-hits on subdural nerves on face and body
  14. Microchip Weapons: RFIDs, Bio-MEMs, BCI (brain) chips, WBANs (Wireless Body Area Networks), Pattern of Clandestinely-placed Implants at Spine, Implants Surgically Inserted inside Organs, activated from outside for Torture and Organ Damage.
  15. Nanoweapons: Nanotech MEMS, Nanobots, Nanobiosensors in fingertips, tongue, Sprayed thin-film nanotech on back, used with microwave pulse weapons to induce extreme, subdural heating effects, basically Torture; sprayed/injected nanotech filler-synthetic-tissue to disfigure and mutilate faces and bodies; nanotech attacks to create burns, lesions, swellings, discoloration; nanotech clustering at feet, to permit remote electrical vibration
  16. Active Denial/5G/Millimeter Wave Weapons: Skin-burn weapons, producing burns, blisters, lesions
  17. Plasma Weapons: Pulsed Energy Projectiles, Localized Heat-bombs, inducing extreme heat on body and surroundings; Localized Heat-Sinks, ionizing/cooling-down of temperatures around body
  18. Chemical Weapons: Chemicals and gases, vented into homes/cars, targeted aerosols/chem trails, dropped from aerial vehicles,
  19. Biological Warfare Weapons–Virus-laden Aerosols/Chem Trails; Microchip/Nanotech weapons: Inducing high-itch/psoriasis, flus, colds, coughs, Morgellons
  20. HAARP Weather Warfare Weapons: Localized microburst wind, storms, hail, tornados; Wind vibrations used like ELF vibrations to aid in tracking/honing/guiding Pencil Microwave Weapons at Rectum
  21. Pencil or Precision Microwave High-Frequency Pulse Weapons at Rectum/Vagina/base of spine, sending high-frequency vibrations up spine, causing concussion-like headaches, electromagnetic rape/sexual stimulation.

Webinar on the Havana Syndrome Concludes that Civilians are Targeted with Invisible Weaponry

Webinar on the Havana Syndrome Concludes that Civilians are Targeted with Invisible Weaponry

On Thursday, February 10th, 2022 non consensual test subjects who have been painfully targeted with covert military weaponry finally got the recognition and compassion that they have been seeking. I was on this Webinar as an independent journalist and so this report is a first hand account of the proceedings. As a participant I was allowed to submit a preliminary question. I asked if the panel knew that hundreds of civilians had reported symptoms of Havana Syndrome to the State Department and that two of these civilians had actually been tested for the after effects of such an attack with positive results. I asked them to confirm that civilians were indeed being targeted with invisible weaponry and, to my astonishment, they did.

Here is some information about the Webinar …

This was a very long and scientifically detailed presentation. I waited patiently for James Giordano to speak because I knew that if anyone on the panel knew about the civilian victims then it would be him. He did not disappoint me. Here is the video of his presentation.

But the real knowledge of the situation came out in a panel discussion after each speaker had spoken individually … Here are the quotes from that discussion which revealed the truth of the terrible situation that non consensual test subjects find themselves in. I am one of these test subjects and my life has been completely destroyed and I spend every day and every night in pain and/or discomfort and I am not alone … thousands around the world endure the same predicament. Thank you Dr. James Giordano for your courage, intelligence and honesty …

“The overall intention of utilizing these most sophisticated devices I think harkens back to a very very literal definition of a weapon … in other words it’s a means of contending against others in ways which are disruptive .. it doesn’t seem to be destructive but disruptive … disruption can occur on a variety of levels … physical disruption, social disruption, psychological disruption, economic disruption … and essentially what that does is to create a rippling effect so it becomes important to think what are valuable targets? … there’s the need for increased vigilance, preparedness and understanding that a variety of tools, techniques, technologies and science could be rendered more generally against the public inclusive of those we hold near and dear, children inclusive, to have disruptive effects … we need to be aware of what’s quote “out there” … of what the science and technology can do … how it can be misused in ways which are nefarious” – Dr. James Giordano

and thank you to Dr. Munro Cullum for asking this question …

“Has anyone tried to study civilians who feel that they may be suffering from similar symptoms or exposed to such conditions”? – Dr. Munro Cullum

“Yeah, there’s evidence coming from some of the international literature for individuals that have been exposed to various forms of rangeable and unrangeable acoustic stimuli both those in the auditory range and ultrasonic range … Certainly we know that’s there’s been a lot of work done on the Frei effect and there is a body of literature both international and some of it domestic with regards to the effects of scalable pulsable microwaves which exist below the thermal artifacts” – Dr James Giordano

Joint Economic Committee Hearing – Radio Frequency Weapons and Proliferation

Joint Economic Committee Hearing – Radio Frequency Weapons and Proliferation

28 February 1998
Source: http://www.house.gov/jec/hearings/02-25-8h.htm


Joint Economic Committee Hearing

Radio Frequency Weapons and Proliferation:

Potential Impact on the Economy

Wednesday, February 25, 1998

Witnesses:

James O’Bryon
Department of Defense


David Schriner
Electronic Warfare Association


Dr. Ira Merritt
Missile Defense Space Tech Center


Dr. Alan Kehs
U.S. Army Research Laboratories

Chairman Jim Saxton’s Prepared Statement

Mr. James O’Bryon’s Prepared Statement

Mr. David Schriner’s Prepared Statement

Dr. Ira Merritt’s Prepared Statement

Dr. Alan Kehs’ Prepared Statement


Statement of Chairman Jim Saxton
Joint Economic Committee

Wednesday, February 25, 1998

Radio Frequency Weapons and Proliferation: Potential Impact on the Economy

      Good morning. Thank you very much, everyone, for being here.

      On June 17, 1997, the Joint Economic Committee (JEC) held a hearing called, “Economic Espionage, Technology Transfers and National Security,” in which it heard testimony from Lt. Gen. Robert Schweitzer [below] about a new class of weapons, radio frequency weapons (RF), and the impact of these new weapons on the civilian and military electronic infrastructure of the United States.

      Since the General talked about a terrorist threat and a proliferation threat, the JEC has continued to investigate these potential threats. I am pleased to welcome to the Committee an extremely knowledgeable group of panelists. Let me introduce them.

      Dr. Alan Kehs is with U.S. Army Laboratories and will discuss the overall RF threat. Dr. Kehs has a BS and a MS in Electrical Engineering, and a MS and a PhD in Physics from the University of Maryland. He is a recognized expert on the generation and use of intense relativistic electron beams for the production of high-power microwave radiation. Recent assignments include Chief of the Source Physics Branch and Chief of the Nuclear and High Power Microwave Technology Office. Dr. Kehs chaired the 8th national conference on HPM in April 1997 and currently chairs the tri-service HPM technology coordinating committee.

      Mr. James O’Bryon is the Deputy Director of Operational Testing and the Director of Live Fire Testing with the Office of the Secretary of Defense at the Pentagon. He has received a BS in Mathematics, and he also has graduate degrees from George Washington University in Operations Research/Management Science and from MIT through the Electrical Engineering Department. The Director will discuss the role of Live Fire Testing and how it may play a role in testing our military equipment with RF weapons.

      Mr. David Schriner is the Principal Engineer directed energy studies with Electronic Warfare Associates and a recently retired engineer with the naval weapons testing facility at China Lake. He has numerous patents, has received superior service awards, and given technical presentations over 42 years of civil and military service. He will discuss the difficulty in building a RF weapon and the terrorist threat.

      Dr. Ira Merritt is with the Missile Defense Space Technology Center in Huntsville, Alabama. He has more than 25 years of experience in developing advanced technologies, systems requirements, system designs, and test capabilities for ballistic missile defense systems. He has a Bachelor of Science in Chemical Engineering and advanced degrees in Nuclear Engineering. Dr. Merritt will discuss the proliferation of RF weapons primarily from the former Soviet Union.

      I look forward to the enlightening testimony from our panelists.


Statement of Mr. James F. O’Bryon Deputy Director, Operational Test and
Evaluation Live Fire Testing Office of the Secretary of Defense before the Joint Economic Committee United States Congress Wednesday, February 25, 1998

      Mr. Chairman and other distinguished members of the Committee, it’s an honor for me to appear before the Joint Economic Committee today to discuss the role and mission of Live Fire Testing, and specifically as it relates to the ballistic threat, the threats posed by radio frequency and electro-magnetic pulse and other threats. As your letter of invitation states, these issues “are of great importance to our nation as well as the world.”

      Let me begin by acknowledging the fact that the Congress recognized, starting about a decade ago, that there was a significant and growing need to realistically test our major weapons and weapons platforms to assure that they would withstand the rigors of combat and to inflict the maximum effect on the enemy when used. The Live Fire Test legislation, first authored in Fiscal Year 1986 and strengthened several times since then, including most recently, the Federal Acquisition Streamlining Act (FASA), signed into law by the President in October 1994, requires that this realistic testing be conducted against realistic threats and that an independent report on the test results be prepared and delivered from the Secretary of Defense to the defense committees of both houses of the Congress prior to making any decision to enter full-rate production on each designated system. These systems have included armor systems, missiles, projectiles, aircraft and others. To date, literally thousands of Live Fire Tests have been conducted and evaluated and more than two dozen Live Fire Test and Evaluation reports on both weapons and platforms have been forwarded to the House and Senate in compliance with statute, prior to the decisions to enter full-rate production.

      Live Fire Testing has revealed design flaws which, had they not been found in testing and corrected, would most likely have resulted in the loss of valuable equipment, and more importantly, loss of life of our combat forces. The kind of realistic testing that we require provides the opportunity to learn what otherwise would only be discovered in the first days of actual combat, and that is certainly not the time for surprises.

      Since this is the Joint Economic Committee, I’m confident that your focus would be on how much this testing has cost the American taxpayer and in turn how much has been returned on these investments. I’m happy to report to you that, over the past decade since the inception of this program, although significant improvements have been made to our weapons systems as the result of this testing, not one test program has exceeded 1/3 of one percent of the program’s cost. This small investment has paid significant dividends in not only military equipment saved but also savings in lives from improved combat survivability.

      From its beginning, the LFT&E program has required that not only design threats be tested against our systems but that also emerging threats be tested as well since we need to anticipate what we’ll face at the end of the acquisition cycle and beyond. The System Threat Assessment Reports, or STARs, as they’re known, are prepared by the Service proponents and approved by the Defense Intelligence Agency (DIA). These documents, by DoD regulation, are the primary source document used to establish what these emerging threats will be.

      The threats tend to fall into three categories: classical conventional, emerging conventional threats and unconventional threats. The legislation forming the basis for LFT&E calls for testing against expected conventional threats. The Pentagon’s JCS Publication 1-02 defines a conventional weapon as one which is neither nuclear, biological or chemical. Hence, testing of our chemical, biological and nuclear weapons is not under the aegis of Live Fire Testing. However, LFT&E does include other threats including directed energy threats. The focus of the STARs over the years has been on, what I term, “classical conventional threats.” They have formed the basis of the DIA threat documents outlining projected threats over the years. These traditional threats are certainly the most familiar and they include such things as rockets, bullets, missiles, mines, torpedoes, grenades, shaped charges, kinetic energy penetrators, high explosives and other similar weapons which damage by depositing either kinetic energy, explosive energy or both. We have done significant testing of these threats and these threats will, most likely continue to face us well into the next century.

      There is a second category of threats which, in my opinion, are of increasing importance, the directed energy threats. This category of threats includes low, medium, and high-energy lasers and high powered microwave radio frequency threats. I would like to focus the remainder of my opening statement on them.

      These directed energy threats are included within the official definition of conventional threats, and hence, within the LFT&E mandate for oversight, are receiving increasing attention from the Services.

      Recent defense guidance has made clear that other nations may very well choose to fight the U.S. asymmetrically, thereby avoiding a frontal assault on our forces in the more traditional war of engagement and attrition. Rather, they very well might choose to select a specific area of our potential vulnerability, for example communications, or information warfare, or other selective threat to attack us more effectively and efficiently. Recognizing that our nation, both militarily and commercially, is heavily dependent upon electronically produced, processed and transmitted information, it makes good sense to assume that rogue nations could easily try to exploit this potential niche warfare area to not only disrupt military command, control and communications but also to attempt to defeat our highly sophisticated military systems which rely increasingly on computers and their related software.

      Drawing much of their technology from the commercial world, our military systems, whether they be tanks, ships or aircraft are heavily dependent upon computers or computer components. They use computers to navigate, to communicate and to acquire and home on targets. In fact, some of our new fighter aircraft literally cannot fly without their computer controls. Destroying, disrupting, corrupting or interrupting computer components could be very serious. As our computers become more and more miniaturized, faster and more proliferated, it may become feasible to attack these platforms through their potentially soft electronic components. As Mark Twain once said, “If you put all of your eggs in one basket, you’d better watch that basket.”

      Other technologies, such as the introduction of nonmetallic composite skins for our aircraft and armor, may, while minimizing weight, inadvertently increase vulnerabilities by eliminating the “Faraday cage” which has traditionally provided a degree of protection from external electronic disruption.

      We recently initiated a series of Joint Live Fire Tests (JLF) with the three Military Departments to assess the effects of potential radio frequency weapons against our platforms. While there has been some testing of RF weapons over the years, these JLF tests were particularly interesting for several reasons: First, we were examining the survivability of our systems to such weapons. In contrast to this, most tests done previously had been to asses our lethality against potential adversaries. Second, the source was a transient electro-magnetic broadband threat, making potentially susceptible a much wider range of equipment than the more traditionally tested narrow band systems. Third, the tests were conducted outside, rather than the vast majority of other testing which has been done at short range inside enclosures. Just as one’s voice sounds differently in the shower than it does outside, so does the performance of an RF weapon in the open. Fourth, the tests were done against a fully operational target, not simply a component or series of components as is often done. Just as the human body behaves as a total system, weapons platforms perform differently when tested as a complete operating system. We selected the Army’s Huey Cobra Gunship as the candidate platform to gain insights into not only what the first order effects might be but also to gain insights into how to even test such systems to these threats. Our intent in testing such an older and less sophisticated platform than we are currently developing was that it would not only be less costly and more available for destructive testing but also might indicate that if such an unsophisticated platform were to be vulnerable to such threats, then our newer, more computer dependent platforms could also be. We also were able to place other devices of interest in the path of the threat with significant results.

      Just three weeks ago, I and some 200 others attended a meeting in the Russell Building sponsored by the National Defense Industrial Association, at which time the issues of information security and warfare were discussed. The act that some of our military communications are conducted over commercial lines was noted. Hence, what might first appear to be a civilian problem could also be a military problem.

      Because of the rate of change of technology, in communications, computers and sensors as well as in lasers and radio frequency technology, the complexities of the issues are fast-moving.

      I’m not here to imply that the sky is falling, or that our weapons don’t work. What I am trying to say is that the world is changing, the potential threat is changing, and our approach to designing and testing in this emerging world must change to meet it. We must realistically Live Fire Test to these emerging threats to our military platforms and weapons. It will be a savings not only in real dollars and equipment, but in lives as well.

      Thank you for your invitation to appear here this morning. I’ll be happy to answer any questions you may have at this time.


Statement of Mr. David Schriner before the Joint Economic Committee United States Congress Wednesday, February 25, 1998

“The Design and Fabrication of a Damage
Inflicting RF Weapon by ‘Back Yard’ Methods”

      Note, this paper reflects the personal views and opinion of the author. The material in this paper has been deemed unclassified by those who hold his security clearances but it does not specifically represent their views. This paper is a very brief statement on the subject and it is written from a non-technical point of view to provide an easy look at the subject manner by non-professional people or groups. Further elaboration on any point can be requested in either a technical format or at a classified level with the proper security restrictions in place.

      For many years research activities in different countries have focused on the use of radio frequency (RF) waves as a weapon. Most of this work has been titled or described under the title of High Powered Microwave (HPM). Worldwide, large amounts of money have been invested in this technology to support both the military interests but also the industrial heating needs. Like most technologies, with maturity the applications increase and the costs to use it become lower. One primary point of this paper is that as these technologies mature they also become affordable and usable by criminals and terrorists. Most military programs are classified and the general public knows little concerning their nature but as the technology becomes available to criminals and terrorists, it may be directly applied to the infrastructure elements of our society. This paper addresses the question concerning the possibility of certain types of this technology being used against the society.

      The primary focus of this paper will be on a different and new form of HPM called Transient Electromagnetic Devices (TED) that could, in the hands of enemies, criminals, pranksters, or terrorists pose a significant threat to much of the United States infrastructure components that are based on micro-circuits and computer or micro-processor control. This includes financial institutions, aircraft, security, medical, automotive, and other critical equipment used everyday in our society. The systems necessary for the production of this form of energy are much easier to construct and use than the earlier and more well known conventional HPM narrow-band systems that are currently in development for military use. Millions of dollars have been spent on the conventional HPM, systems and it is the type that DOD managers and their funding offices are well acquainted with. This paper will briefly speak to these but the main focus of it will be on the very different type, the TED systems, which is less well known and may be the RF weapon of choice to the modern cyber or infrastructure RF warrior.

      Conventional HPM systems generate RF wavessimilar to those used for many different purposes including communications, heating, and radio location purposes. We are all very familiar with the term frequency as expressed in mega-hertz (MHz) when we tune our FM radios over the FM band from 88 to 108 MHz. Likewise with the AM radio band from .55 to 1.5 MHz. These expressions of frequency describe how many complete RF cycles occur each second from the radio transmitters that generate them. Radar systems also generate RF signals but these are in thousands of MHz each second (the term Giga-Hertz or GHz applies). This is the type of signal that conventional HPM systems generate or radiate, a sine wave. TED systems do not generate a sine wave and operate entirely differently than narrow-band systems.

      Narrow band HPM systems are similar to microwave ovens in that they use high powered sine waves to cause material placed in their field to generate heat. This is exactly what narrow band HPM systems do, they attempt to use extremely high powered RF sine waves to cause a target system to burn out. Other types of HPM use high powered, but conventional wave-like signals to enter a target system and cause some of the conventional effects that a jammer or countermeasure system might. All of these narrow band HPM systems employ sine waves that are very different than the signals generated and radiated and employed by the TED systems.

      RF power is expressed in Watts and one million Watts is expressed as “megaWatts” or MW. A kitchen microwave oven, for example, uses a magnetron tube to produce a continuous wave (CW) .5 to 1 MW RF signal to provide energy to heat the material placed in its presence. In a simple way of describing the heating, the powerful microwave signals cause the molecules of the material to rub together at the frequency generated by the magnetron and heat results in the material exposed to the field. Materials such as meat, many materials containing carbon molecules, and even water heat well when placed in such a field. Many industrial heating applications require considerably larger power levels than the home microwave oven but the basic principles are the same.

      It is with this view of microwave heating that we have the first notion of the use of microwaves as a weapon. One assumes that if a microwave signal of extremely high power level is aimed at a distant target of some type, then heating and perhaps burnout of some part of the target would occur. If the signal was tuned to the operating frequency of a targeted radio receiver, for example, one would assume that if enough power was provided in the radiated beam directed at the target’s radio antenna, that the radio’s “front-end”, that part directly connected to the antenna, could be heated sufficiently to burn it out. The key here is whether there is an entry point for the high powered signal to enter the targeted system and whether there is enough power to cause burnout.

      The community involved with HPM systems generally describes a “front-door” and a “back-door” entry point. A front-door point might be, as in the above example, an antenna normally used by the target platform, such as an aircraft or a tank, for some RF function such as communication or radar. Here the RF weapon designer would attempt to radiate an RF signal into the target platform’s antenna and cause either a burnout or a disruption effect. A back-door entry point might be an unshielded wire at some point on the targeted platform that would allow the RF weapon signal to enter some part of the platform’s electronic systems and, as before, cause a burnout or disruption of some sort. The weapon designer would like to have a priori knowledge of the target so as to select the right frequency and use the right modulations to accomplish the desired result.

      Since this extremely high-powered RF generation technology also fills the needs of industrial heating applications, essentially very high powered microwave ovens, there is a universal worldwide need for the technology and export controls are confused when it comes to the possible use of this technology as a weapon.

      The New Kid on the block, the Transient Electromagnetic Device (TED):

      There is a new type of source technology currently under development in our country and, very likely, other countries as well. This type of directed RF energy is quite different than the narrow-band systems previously described. This type of directed energy is called transient electromagnetic radiation. Instead of generating a train of smooth sine-waves, as the conventional narrow-band systems do, it generates a single spike-like form of energy. This spike-like burst of potential does not have “cycles” or waves and it may be only one or two hundred pico-seconds (psec) in length. 100 psec is the time that it takes light to travel 1.2 inches and often these short time duration puoses are described in “light-inches”.

      It is very similar to the type of signal that occurs when you rub your feet on the carpet on a dry day and then touch your computer keyboard. An electrostatic discharge (ESD) occurs when you do this. The electrostatic charge on your body discharges onto and into the computer and a very brief amount of very high current flows quickly from your finger into the computer circuits causing a momentary break in the normal flow of signals and bits of information. Because of this momentary break in the “bit-flow” the ESD may cause the computer to crash and in some cases it may cause sensitive electronic circuits to be actually damaged to the point where they are non-functional and must be replaced. This vulnerable item may be just a single semiconductor diode in a single integrated chip in a circuit on the motherboard, and there are hundreds or thousands of these in a desk-top computer. It is often economical to simply replace a whole circuit board of components rather than trying to find the one specific circuit and replacing just it. This type of new weapon source, a transient electromagnetic device (TED), is actually a system that radiates an ESD-like signal that is intended to cause a similar responses, as just described, to the targeted system.

      Let us look at the differences between narrow-band (NB) and TED HPM systems. The NB systems generate sine waves, the TEDs don’t. The NB systems are very costly and go to great lengths to generate very high average powers, the TEDs don’t, the NB systems are very complex systems, the TEDs are not, the NB systems generate very high average powers (microwave heating), the TEDs generate very high peak powers (and are poor RF heaters). They both use an antenna and the larger it is, the more power they can radiate, in a narrow focused beam, at the target.

      In a narrow-band HPM device, high technology vacuum tubes are used that are, in some ways, very similar to those used in our highest-powered TV or FM stations and radar systems. They are very delicate devices, are complex, and very expensive. They require large amounts of primary power and generally require some type of cooling system, either air blowers or liquid types. All of this complexity requires complex engineering and development, and the manufacturing time is great and costly. Not for the amateur or a low-cost, start-up operation. Generally a highly skilled team of various technical experts of numerous engineering specialties is required to manage the development and operation of such devices.

      TEDs, on the other hand, are relatively simple devices that generally use simple spark-gap switches, either in oil or in pressurized gas pulse storage lines. The power supplies are relatively small in size and much lower in average power and cost than for the NB systems. The engineering and mechanical issues are small in comparison to the narrow-band devices. The technology is well described in the various professional Pulse Power references found in good technical libraries. The significant development, engineering, and manufacturing costs are small in comparison to narrow band. Most of the technology required is available and is an outcrop of the various nuclear and flash x-ray work done in the past.

      NB systems operate at some given frequency with a small bandwidth, and you will find them at one spot on the radio dial. The TEDs do not even have a definable frequency but instead, because of their short time duration, they occupy a very large spectrum space, and you will find it everywhere on every radio dial. When a TED pulse is generated it will have the ability to excite responses in systems designed to receive at any frequency from as low as 100 MHz up to several GHz, from the FM band up to the lower microwave bands. A NB system would excite only those systems that were operating at its frequency, say 2.345 GHz, so a narrow band system must be “tuned” to a given target’s known soft spot but a TED system would go after any soft spot of the target platform, back-door or front door.

      So what is the bottom line of this discussion?

      Because of the simplicity of TED systems and the suspicion that they may cause disruptive effects to electronic systems that they are aimed at, they make an attractive approach for RF terrorists to use for various purposes. We see hints of this vulnerability in the many warnings that we get each month about locations where we should not use radios and electronic devices for fear that we will do some damage to something. They make passengers on aircraft, during take off and landing, turn off radios, games, and other electronic devices. Hospitals regularly place signs that electronic devices are not allowed. Many people do not want you using your cellular telephones near their computer. Many repair shops require that wrist-bands attached to ground be used when opening electronic equipment for repair. We have a lot of things out there in the world that either have known or suspected vulnerabilities to RF fields or electrostatic discharge. A TED system provides both of these conditions, an RF electrostatic discharge nature and its output (the number of pulses per second) can be adjusted for maximum disruptive effect. Its peak power output can be made much higher than those fields ordinarily found in everyday systems like cellular radios, radar systems, TV and FM stations, and simple ESD effects.

      It clearly appears, based on testing that has been done as well the information presented at unclassified technical papers and conferences, that the TED would make a good terrorist RF weapon and that, with the proliferation of high technology infrastructure systems that are integral to everyday life in our country, we would be very vulnerable to such systems. It is also clear, because of the extreme cost of repairing all of the vulnerable systems, that until this vulnerability was shown, no one would have much concern or interest in it.

      Considerable discussion and innuendo has recently been made concerning the possibility of building a TED source using “back-yard” methods, a Radio Shack Terrorist RF weapon. Such a system would have to have sufficient power to, with some degree of probability, cause detrimental effects to common infrastructure items such as those found in; financial institutions (banks, ATMs, and stores), medical facilities, airport facilities, general transportation items (auto engine controls, ABS, air-bags, etc.), utility facilities (telephone exchanges, power grid controllers), and other infrastructure entities. This type of source is imagined to be what a criminal, terrorist, or prankster could develop or build in a reasonable time, with reasonable tools and materials and with open literature or reference material.

      The accomplishment of such an effort would require that either some sort of estimate of what power level would be necessary to accomplish a given objective or to simply make all of the power that could be made, and then go out and test the weapon against various target items under either controlled conditions or actual attempts against a family of established targets. Since it is an extremely complex process to even come close to some predicted level of vulnerability, using even the most advanced modeling and analysis techniques, the obvious approach would be to “go for the maximum power and then test” approach. Normal testing would be done under strict safety and security conditions but a terrorist would not have such limitations. Normal tests would be conducted at a test location but a terrorist would simply drive around the block or building until something happened.

      An important criteria for an RF terrorist would be that any of the parts and materials used would have to be those that could be easily found in any city and were not traceable by conventional counter-terrorist agencies such as the local police, insurance investigators, and FBI.

      It is clear that there are four basic configurations that could be used, one the size of a briefcase that could be placed very close to a target system (like a computer at a desk or counter), one that could be mounted into a small van and disguised to appear as ordinary, one that was dedicated to be set up at a remote target location and used for some purpose where appearance was not of any concern, and finally, a system that could be located in one’s back yard such that it could be aimed at over flying aircraft.

      The systems would likely have much in common and the builder would employ a learning curve to go to the next more advanced system. The results or vulnerabilities found with any system could be factored into the use of the next system. This learn-as-you-go process would be a natural approach for such an amateur effort.

      The means of manufacturing the system includes parts and tools that one could purchase at a hardware store or those found in an average garage shop. Tools such as a small lathe with an integral milling machine (available via mail-order at a cost about $2,000), drill press, and general garage tools should be all that were needed, nothing exotic.

      The effort would likely be started with the small briefcase-sized unit. It could use automobile ignition parts and a camcorder ni-cad battery for the power supply. It might use a small dish antenna bought mail-order and some parts picked up at a surplus store. The total cost of such a unit would be about $300 and it could be built in about one week. The development behind its design could be accomplished by doing some basic experiments with stun-guns or other high voltage components found in surplus stores, automotive shops, and parts from a “well equipped electronics junk box”. The unit could easily be tested at close range to the type of computers and hardware found in any home office and if it caused some ill effect, then the terrorist would have proven the effectiveness of the system. Success with step 1.

      The next step would be to refine the technology and increase the voltage and the repetition frequency. An advanced design might use a 6-foot TV dish antenna that could be bought mail-order (for $200) and it might use a more advanced spark-gap unit than was used in the earlier model. Such learn-as-you-go is a natural process in the design of spark-gaps.

      Such a unit using a larger antenna (a mail-order 12-foot TV dish), when finished would look like a simple TV dish system and it (or many like it) could be mounted such that it could easily be pointed at over-flying aircraft.

      In support of the information presented in this testimony and taking advantage of the winter’s need to work indoors, a unit that uses oil spark-gaps was designed, built, and tested. The materials for it were mail-ordered at a cost of about $500 and about one week was needed to fabricate the mechanical hardware. It use two ignition coils and a battery for power, an automobile fuel pump and filter for the oil circulation, and commonly available transformer oil. An additional week was required to work out all of the electrical wiring, the oil lines, and the general finishing details. This unit was ready for testing in two weeks after starting the effort.

      The signal radiated from the unit was measured and found to be a very significant power level that can be compared against available vulnerability and susceptibility levels of military equipment. When the weather permits, this unit will be tested against a set of infrastructure targets at an official test range. From the measurements and known signal levels, this unit is expected to be consistently deadly to many types of infrastructure items at ranges suitable for terrorist usage.

      This quickly-developed low-cost system could easily be placed in a small van and used in a parking lot or directed at buildings that the van was driven past. It is highly likely that this type of device would be a very effective terrorist system and the findings of its design could be factored into another either a larger, higher powered device, or a more advanced design each with significantly greater effectiveness.

      The net result of all of this design, experimentation, fabrication and measurement proves that such a weapon system could be made by anyone with an engineering degree or even a bright technician with good hardware experience. The technical information required can be found in open sources, if not just from good common engineering sense. The materials needed are nothing special and if the effort is made, advanced concepts can be made using everyday hardware such as automotive ignition systems. The testing to date has been very limited but the results of this testing have provided considerable insight to just what is vulnerable in infrastructure systems. This insight and work leads to a firm opinion that a terrorist would have little trouble developing such technology and that he would have a high probability of success in the use as an RF weapon against our infrastructure elements found in any city or near facilities around the country.

      This work has been done within the proper security guidelines since:

  1. The models made in my home laboratory/workshop used off-the-shelf materials and open-source references.
  2. The laboratory tests of this hardware were made in a controlled environment with the proper security in place.
  3. The results of these tests, the data capabilities, and the target set identities are kept in a facility cleared for classified storage.
  4. The development of any of this hardware is reported on a regular basis to those with whom I relate at a classified level to assure that they are informed of the work and are able to apply this to their interests and efforts if necessary. Any of this hardware can be used by them for any determination of utility to military interests.

      Work in this area will be continued and an aggressive test and evaluation of these “back yard” techniques and methods will be accomplished. This process will be done in cooperation, and if requested, under the direction of agencies with an interest in this non-military weapon related process. The author of this report will, if requested, provide to the Committee further details at a classified level in the proper security environment.


Statement of Dr. Ira W. Merritt
Chief, Concepts Identification and Applications Analysis Division
Advanced Technology
Directorate, Missile Defense and Space Technology Center
U. S. Army Space and Missile Defense Command before the Joint Economic Committee United States Congress Wednesday, February 25, 1998

“Proliferation and Significance of Radio Frequency Weapons Technology”

Introduction

      Thank you for your invitation and for this opportunity to offer testimony to the Joint Economic Committee regarding the proliferation of radio frequency (RF) weapons technology and its significance to the operability of our high value assets. I am employed by the U.S. Army Space and Missile Defense Command, but some of the opinions and conclusions expressed are based upon my own past experiences and observations and are not necessarily those of the Army.

      I am from the Advanced Technology Directorate (ATD) of the Missile Defense and Space Technology Center, U.S. Army Space and Missile Defense Command. One of our principal responsibilities is to develop innovative and advanced technologies for application to Army projects, joint missile defense projects and other programs of national importance. In particular, ATD evaluates the capabilities of technologies, including radio frequency weapon technologies, to establish their significance to the operability of our sophisticated electronics. Our interest in RF weapon technologies has increased in the last several years as a result of:

  • Rapid advances in RF sources and antennas
  • Increased interest by other countries, and groups, in RF weapons and RF mitigation
  • Increased susceptibility to microwaves of miniature solid state electronics
  • Insights from our travel to Russia and from ongoing technical exchanges with Former Soviet Union scientists and co-workers in United Kingdom, Sweden, and Australia.

      Our work with Russian scientists has been particularly useful in confirming that their approaches to technical problems are often very different from ours. Over the past several years we have visited laboratories developing directed energy weapon technologies, pulsed power systems, high power microwave technologies, high power lasers, and space-based neutral particle beams. In 1992, we visited the Moscow Radio Technical Institute, which was developing high-power microwave (HPM) sources and which had a large test facility for performing susceptibility and effects measurements. In 1994, we visited the Kharkov Physico-Technical Institute in Ukraine, where they were developing: high power microwave sources, such as the magnetically insulated linear oscillator (MILO); neutral particle beam sources; prime power systems; and where they were also performing susceptibility and effects tests. The MILO was invented in the U.S., but we discontinued work on it in the late 1980s. The Soviet Union (SU) picked up the technology and successfully continued its development. Russia also exploited the magnetocumulative generator (MCG) as an explosively driven power supply. The MCG was developed by Dr. Andrei Sakharov in the SU and the Russians have used MCG power supplies extensively to drive ultra wideband (UWB) and HPM sources, lasers, and railguns. In 1995 we visited: the Kurchatov Institute to discuss laser and high current problems, the All-Russian Electrotechnical Institute to discuss high voltage technology, Ioffe Physico-Technical Institute in St. Petersburg to discuss ultra fast switches, and the Institute of Problems of Electrophysics, also in St. Petersburg, to discuss pulse power and plasma technologies. My comments in the rest of this testimony are based upon the results of visits to Russian laboratories, visits to other countries, continued scientific contacts, research reports from contracts, some test results and open source literature.

Background

History: It has long been a concern in the scientific community that Soviet scientists led the world in development of RF weapon technologies. This concern was heightened in 1994 when Gen. Loborev, Director of the Central Institute of Physics and Technology in Moscow, distributed a landmark paper at the EUROEM Conference in Bordeaux, France. In this paper Dr. A. B. Prishchepenko, the Russian inventor of a family of compact explosive driven RF munitions, described how RF munitions might be used against a variety of targets including land mines, sea skimming missiles, and communications systems1, 2, 3. He further popularized these munitions with articles in Russian naval journals and in other professional journals and magazines4.

      The Soviet Union had a large and diverse RF weapons program and remnants of this work continue today within FSU countries. The scope and results of the Soviet program are poorly understood, but ATD personnel have been at the forefront of efforts to gather information and to understand it5 and its accomplishments through Windows on Science and contracts for R&D effort. Our principal objective is to understand requirements and to identify technologies applicable for RF mitigation. Nevertheless, large uncertainties still exist concerning the status of RF weapon development and associated efforts to mitigate their effects on electronics. In spite of these uncertainties, it is clear that many nations continue to aggressively pursue the development of RF weapons and techniques to mitigate their effects6.

Proliferation: Worldwide interest in RF weapons has increased dramatically in the last several years. The collapse of the Soviet Union is probably the most significant factor contributing to this increase in attention and concern about proliferation. A recent study of open source literature dealing with RF weapons6 clearly documented the worldwide interest in RF weapon technologies and my testimony is offered in the context of these conclusions. A few of the report’s key judgments were that:

  1. “…construction of effective explosively-driven Flux Compression Generator devices is entirely feasible for established military powers such as Russia, China, France, Germany, et cetera,…”
  2. “There is no confirmed evidence of employment of such a device to date … available in open sources”.
  3. “Modern Metal Oxide Semiconductor technology, on which most of our critical national infrastructures depend, unless deliberately protected or “hardened”, is extremely vulnerable to even low–power electromagnetic pulses…”
  4. “…it is well understood that the US is disproportionately more vulnerable to RF attack than are less developed nations.”

      Specific examples of interest in RF weapons and the proliferation of this technology follow. The French Gramat Research Center has dedicated significant assets to study the effects of electromagnetic energy on electronics and in 1989 Thompson CSF published brochures in which they stated that they were developing RF weapons7. A 21 January, 1998 newspaper article in the Swedish newspaper SVESNSKA DAGBLADET8 reported that the Swedish National Defense Research Institute purchased a Russian “suitcase bomb” that uses high power microwaves to “knock out” computers and destroy all electronics within the radius of its “detonation”. The article also reported that this device is being sold commercially and that it has been sold to the Australian military. The price was reported to be several hundred thousand Kroner, or about $100,000. Mr. Carlo Kopp, an Australian professor, who claims to have had a relationship with their military, has his own web site (http://www.cs.monash.edu.au/~carlo) and has provided detailed papers on the alleged effects of RF weapons and sketches of design concepts9. A simple search on the Internet recently identified 95 websites that referenced Mr. Kopp’s work. These included 16 sites in the U.S. and 18 sites in other countries, not including Australia. The Internet is becoming a significant factor in enhancing the interest in RF weapons.

Waveforms and Susceptibility: State of the art semiconductors are becoming more vulnerable to the effects of radio frequency energy as semiconductor features become smaller and smaller10, 11, 12. Commercial microelectronics make heavy use of metal oxide semiconductor devices which fail when subjected to voltages that exceed the dielectric strength of the component or when the device melts as a result of heating from currents induced by the RF pulse.

      High-power microwave and ultra wideband signals differ in their pulse length and frequency content (Figure 1). HPM sources produce short, very high power, narrowband pulses, often billions of watts (gigawatts) in billionths of a second (nanoseconds). If HPM waveforms are in-band, they can efficiently couple energy into the target and energy is available to disrupt or to cause damage to sensitive “front door” components that are connected to antennas. However if the HPM frequency is not in-band, the energy must enter through a “back door” and coupling to the target is generally poor. In this case, much less energy enters the target to disrupt or to cause damage. UWB sources generate a much wider band of frequencies than do HPM sources, and thus ensure that some energy is at a frequency to efficiently couple to the target. However, since the energy is spread across a wider band, the power spectral density is lower and the amount of energy available in a waveband is also much lower. As a result, an UWB device is more likely to disrupt than to destroy a target, except at very close range. Many UWB sources can be repetitively pulsed and therefore can continue to disrupt the target as long as the source is functioning and within effective range. Many systems tend to be susceptible to disruption or damage at specific, sometimes unpredictable, frequencies. As a result, UWB weapons are well suited to exploit these susceptibilities, since they produce significant energy over a wide range of frequencies. This area has been aggressively researched by the Soviet Union, Russia, and others.

      Extensive work has been conducted to understand the effects of high-altitude nuclear EMP (HEMP) on systems and components, but these data are mostly for frequencies less than 1 GHz and for pulse widths in the range from 50 nsec to 1usec. The shorter pulses characteristic of HPM and UWB waveforms are significant because current methods for protecting electronics from HEMP, and other anticipated sources of disruption, will not be effective against pulses from RF weapons. High-altitude nuclear EMP does not have significant energy above a few tens of megahertz, whereas HPM spectra are typically in the few gigahertz to tens of gigahertz range and UWB spectra may contain energy in the frequency range from hundreds of megahertz to a few gigahertz. There is extensive information on the effects of lightning and nuclear EMP on electronic devices, but these pulses are significantly longer than the pulses from HPM and UWB sources. Since HPM and UWB pulses tend to be shorter than the response times of most limiters, their RF energy can pass largely unattenuated into the target and cause upset or damage before the limiter can turn on. Tests over the last 10 years have produced data on component responses to pulse widths in the range from 1 to 50 nsec. However little information is available that describes electronic responses for incident pulses having sub-nanosecond pulsewidths. Testing is needed to establish effects of the following general waveforms: very short (nanosecond and sub-nanosecond) single pulses, multiple closely-spaced very-short pulses, and long (millisecond) pulses.

      Much of the existing effects data is from direct drive tests. Such tests produce the most repeatable indication of whether or not the pulse in question will upset or damage the device being tested. However these tests do not help clarify the issue of whether or not the RF waveform in question will actually couple through the walls, openings, filters, cables, and wires that separate components at risk from the external environment. This uncertainty creates a situation in which even the best analysis must be based upon significant assumptions. As a result, our commercial and military systems may be much more, or much less, susceptible to upset or damage than we now assume. As a result, characterization of representative components and circuits and the effects of physical configurations are badly needed for very short pulses.

      A 1996 paper by Bludov, et al12 from the Kharkov Physico-Technical Institute, Ukraine described HPM and UWB testing on electronic components and biological systems. The paper identified three levels of damage: temporary upset, permanent upset, and burnout. It appears that Ukraine has a systematic program to characterize the effects of HPM and UWB waveforms on electronic components.

Example Weapon Related Technologies

      RF weapon-related sources can be classified in several ways, including: HPM or UWB, pulsed or continuous, single shot or repetitively pulsed, and very short pulse (nanosecond) or long pulse (microsecond to millisecond). In addition, the electrical or explosive power source has a significant effect on the output characteristics of the device. For example, the explosive driven munitions described by Mr. Carlo Kopp and the RF munitions described by Dr. Prishchepenko are single shot devices that convert the chemical energy of high explosives first into magnetic energy, then into electrical energy and finally into microwave energy. This multi-step conversion of energy is inherently inefficient, but explosives are very compact sources of energy, modern electronics are not very robust to external sources of energy, and the intent is to place the source/weapon as close to the target as possible. Electrically driven devices have fewer energy conversion steps, but typically they are larger and produce less power per pulse.

Electrically Driven Devices: The electrically driven (non-explosive) devices require an external power supply and energy storage system, which often leads to larger and less self-contained systems than can be produced by explosive-driven approaches. However, two recent technologies that minimize this limitation are the solid state pulsers developed at Ioffe Physico-Technical Institute in St. Petersburg and the RADAN system. These devices are quite compact and can be powered by small hand-carried energy sources.

      Pulsers developed at Ioffe Physico-Technical Institute are based upon very fast (nanosecond and picosecond) solid state “on” and “off” switches developed by Prof. Igor Grekhov and Dr. Alexi Kardo-Syssoev. These switches have recently been used to generate 10 nanosecond, 10 KHz pulses for a prototype ground penetrating sensor that is now being used commercially in St. Petersburg (Figure 2). This 10 kg portable sensor is said to be used routinely to image to depths of 200 meters with an accuracy of 1% of the depth and it is claimed to be able to image down to 1000 meters with slightly lower resolution13. Jammers based upon these switches can be made small enough to fit into a briefcase. A recent version is said to weigh 6.5 kg and to deliver fields of 30 kV per meter at 5 meters. This is comparable to high-altitude EMP (HEMP) field strength. An optimized version is said to deliver 100 kV per meter at 5 meters14, 15 and the pulse width and repetition rate can be tuned to have the maximum effect on the intended target.

      RADAN16 (Figure 3) is a compact high-current electron accelerator that is a little smaller than an attaché case and weighs about 8 kg with its rechargeable 12 volt battery power supply, but not including its antenna. RADAN can be used to stimulate several outputs including lasers, x-rays, wide band RF and high power microwaves that allow RADAN to be used as a jammer. RADAN output parameters are: total output power > 5 MW; repetition rate up to 1 kilohertz; pulse width about 2 nanoseconds; and output pulse bandwidth from 1 MHz to 5 GHz. A directional antenna has been developed and the developer has proposed that RADAN could be used to stop car engines and to destroy the electronic arming and firing circuits of bombs. Limited testing of RADAN has been conducted in the U.S. and it was found to affect calculators and electronic watches.

      The Russian built NAGIRA radar produces short powerful pulses with the following characteristics17: 10 GHz fixed frequency, 5 nanosecond pulse length, 300 MW peak power, 2 Joules per pulse, 150 Hz pulse repetition rate. NAGIRA was purchased by the UK Ministry of Defence and was delivered to Defence Research and Evaluation Agency (DERA) Frazer, near Portsmouth, in November 1995. Indications are that the UK will use NAGIRA to investigate detection of fast moving targets in sea clutter, to study electromagnetic–pulse penetration into equipment and to measure the effectiveness of front-end protection devices. During initial field trials near Nizhny Novgorod, Russia (Figure 4), NAGIRA was able to track a helicopter at more than 150 km range and at altitudes as low as 50 meters. We understand that because of electromagnetic interference (EMI) concerns, Russian helicopters were not allowed to operate within several miles of the radar when it was operating at full power.

Explosively Driven Devices: Compact explosive-driven radio frequency munitions (Figure 5) being developed by Russia have recently received a great deal of attention. These munitions are claimed to range in size from a hand grenade to a 155-mm artillery shell18 and the output may be either a HPM or an UWB pulse. Since these warheads are part of a projectile, they are intended to detonate very near their target, so fratricide is not a problem as it would be with HEMP.

      In June 1997, a U.S. measurements team led by the Advanced Technology Directorate participated in a joint series of measurements on radio frequency munitions (RFM) at a site near Nalchik, Russia5. The purpose of these tests was to verify Russian claims about the output of Dr. Prishchepenko’s compact explosively-driven RFM. The test results left Russian claims unconfirmed, since most U.S. measurement equipment was not allowed by Russian authorities to reach the test site and since Dr. Prishchepenko’s team claimed that the RFM that were tested radiated in a band that could not be measured with equipment at the site.

      ATD engineers continue to evaluate RF weapon technologies, to work closely with other countries, and to identify technologies that can be adopted for military applications and commercialization. We maintain relationships with other scientists through direct personal contact at conferences and site visits, through small research contracts, in collaboration with the U.S. Department of State on International Science and Technology Center (ISTC) and Science and Technology Center of the Ukraine (STCU) projects, and through the U.S. Air Force’s Windows on Science Program. ATD has been extremely effective in identifying and executing joint projects, such as the joint radio frequency munitions test in Russia and briefings on the solid state pulsers developed at the Ioffe Institute in St. Petersburg. We are now working to bring the underground imaging sensor and its developers to the U.S. to test its ability to detect land mines. Solid state switches developed by the Ioffe Institute are now imported by a U.S. company that produces water purification equipment using Russian pulse power hardware. ATD has cooperated in hosting many scientists under the Windows on Science Program, including a scientist from Loughborough University in England, the only university that designs, tests, produces and markets inexpensive MCGs.

      Many source and antenna technologies can be used to produce devices with very different output characteristics. For example, Russia reports that its cylindrical shock wave source generates a single gigawatt pulse about a nanosecond long. However, susceptibility tests in the FSU and U.S. suggest that irradiating a target with a train of nanosecond pulses is more damaging than a single pulse, since multiple pulses lower the damage threshold of the target12. As a result, Russian emphasis has been on devices that produce a train of pulses. Some designs are said to generate 50 to 100 pulses, each about a nanosecond long, in a burst of pulses about 10 microseconds long18.

      The implications of this summary are that there is an increasing variety of equipment capable of generating very short RF pulses that are capable of disrupting sophisticated electronics. These pulses are not addressed by current design standards and will challenge existing front-end RF protection and other forms of EMI protection. New capabilities are needed to reject high-power, very-fast RF pulses and to minimize their effects on systems.

      We believe that common EMI and EMP mitigation techniques will not provide adequate protection against nanosecond and sub-nanosecond pulses from future radio frequency weapons, since active mitigation device response times are typically several nanoseconds to microseconds. Faster solid-state devices do not now have the high power capability needed to protect systems from RFW pulses.

RF RISK MANAGEMENT

      Several fundamental questions must be answered before we can adequately understand the potential risk that radio frequency weapons pose to our military forces and civilian infrastructure. These questions are:

“What are the current and expected capabilities of RF weapon technologies?” “What are the effects of these weapons on potential targets?” and “What is the likelihood that our systems will be exposed to RF weapons as a result of terrorism, conventional conflict, etc.?”

      As I have stated, Advanced Technology Directorate has initiated high payoff research and development efforts to understand RF weapons technologies and we have also begun to develop broadly applicable RF mitigation techniques that can ensure the operability of our high-value assets in the presence of stressing electronic warfare environments. Our emphasis is on development of near-term, low-cost capabilities that are applicable to a broad range of military and commercial-off-the-shelf (COTS) electronics and that are relatively insensitive to the details of RF weapon output. We are achieving success in this effort and believe that superior results can be obtained by selectively involving a relatively small number of highly innovative and skilled researchers and that this can be done without a great commitment of funds. For example, one of our recent $100,000 research efforts provided test results that demonstrated the ability of a low-temperature sinterable liquid to reduce external RF fields by many orders of magnitude over a frequency range from a few megahertz to a few gigahertz. This low-cost material has broad military and commercial applications. It will greatly enhance our ability to use COTS electronics on the digital battlefield and to protect key elements of the national infrastructure.

      In my opinion, a more comprehensive risk mitigation effort should include the following tasks:

  • Characterize expected electromagnetic environments by analyzing and understanding rapidly advancing RF source and antenna technologies. A variety of RF sources have been identified that could be used in RF weapons and that produce environments that can challenge the operability of our systems. We should evaluate these technologies, assess their potential for weaponization, and provide information to guide hardening measures required to mitigate their effects. The results of this task should be:
    1. credible information on the output of electrically-driven and explosively-driven RF sources;
    2. much better understanding of the capability of the rest of the world to threaten the performance of our sophisticated electronic systems,
    3. much stronger technical basis on which to develop broadly effective and low-cost RF countermeasures.
  • Conduct tests to determine the effects of short pulse RF waveforms on representative electronic components, subsystems and systems. This task should establish the effects of anticipated radio frequency weapon waveforms on representative circuits to provide a basis for development of mitigation techniques for COTS and military electronics. It should test representative electronic circuits to RF weapon-like waveforms in a laboratory environment to better predict the coupling of RF energy into targets and to measure the effects on targets. The targets characterized should consist of representative classes of COTS and military electronics, i.e. commercial Global Positioning System (GPS) receivers, radios, computers, satellite communication systems, components from tactical operations centers (TOCs), etc. This effort should leverage ongoing Defense Special Weapons Agency (DSWA) EMP and HPM mitigation activities, which address a part of this problem, and should jointly select synergistic items for testing. This will permit unique insights into the robustness of representative electronics to all types of RF disturbances. The target electronics should be tested in anechoic chambers available at several service facilities and should use appropriate RF sources to ensure repeatable waveforms at the appropriate power levels and with appropriate frequency content. The target electronics should be instrumented so that both the effects of the radiation and the method of coupling can be determined. These results will permit quantification of the specific performance/capability needed for each mitigation technique.
  • Use the results of effects tests to develop front-end limiters and electromagnetic interference (EMI) shields. This task should develop and quantify mitigation capabilities and implementation guidelines for low-cost, low insertion loss, miniature plasma limiters and low-cost, very light-weight films, filters, and software algorithms to reduce internal and external electromagnetic interference produced by either local/friendly emissions or high power hostile emissions. Since RF warfare and EMI spectra cover such a broad range of frequencies and power levels, several mitigation techniques will be required.
    • Traditional methods of EMI isolation often use metal enclosures to prevent unwanted radiation from entering the circuit. These shields provides effective protection, but they add weight and are not applicable to some newer systems that may use COTS with lightweight, nonmetallic enclosures that provide little or no EMI protection. Low-cost, light-weight RF isolation techniques are needed that can be cheaply applied to COTS and military equipment to significantly increase their ability to continuously operate on the electronic battlefield.
    • Analyses are now being performed on miniature plasma limiter front-end protection devices that are compatible with solid state manufacturing processes. Analysis will confirm the feasibility of a low-loss miniature plasma limiter and its essential parameters such as threshold electric fields, gas breakdown and recombination times. This device is intended to be installed in front of sensitive antenna and receiver elements to protect them from damage or disruption by incident high power RF signals.

Conclusions

      We cannot now precisely quantify the risk presented by radio frequency weapons, but we know that the risk is growing. I believe that we can respond to this risk by developing near-term, low-cost, broadly-applicable mitigation techniques. These techniques can greatly reduce our susceptibility to radio frequency weapon environments and thereby reduce the risk to our technological superiority that is essential to our military and economic preeminence.

      I again thank the Committee for the opportunity to appear and to comment on the proliferation of radio frequency weapons and their significance to our critical infrastructures.

ACRONYMS

ATDAdvanced Technology Directorate
CSWSCylindrical Shock Wave Source
COTSCommercial Off-The-Shelf
DSWADefense Special Weapons Agency
EMIElectromagnetic Interference
EMPElectromagnetic Pulse
FCCFederal Communication Commission
FSUFormer Soviet Union
GHzGigahertz
GPSGlobal Positioning System
GWGigawatt
HEMPHigh Altitude EMP
HPMHigh Power Microwave
ISTCInternational Science and Technology Center
kVKilovolt
MCGMagnetocumulative Generator
MHzMegahertz
MILOMagnetically Insulated Linear Oscillator
MWMegawatt
NNEMPNon-Nuclear EMP
RFRadio Frequency
RFMRadio Frequency Munition
STCUScience and Technology Center Ukraine
SUSoviet Union
TOCTactical Operations Center
UWBUltra Wide Band

References

1 Prishchepenko, A.B., V.K. Kiseljov, and I.S. Kudimov. “Radio Frequency Weapon at the Future Battlefield”, Proceedings of the EUROEM Conference, Bordeaux, France, June 1994.

2 Prishchepenko, A.B. and V.P. Zhitnikov. “EM Weapon (EMW) in Air Defense or Some Aspects of Application of EM Radiation in the High-Frequency Band as a Striking Force”,

3 Prishchepenko, A.B. and M.G. Akhmetov. “Radioelectronic Strikes in General Forces Operations (Combat)”, Voyennaya Mysl’, No. 2, March-April 1995, pp. 42-48.

4 Prishchepenko, A.B. “Electromagnetic Munitions”, 96UM0427, Soldat Udachi, Moscow, No. 3, 1996, pp. 45-46.

5 Altgilbers, L.L., I. Merritt, M. Brown, J. Henderson, D. Holder, and Merriwhether. OCONUS Radio Frequency Munitions Test Report, ATD-98-001, 4 December 1998.

6 Linder, J.C., W.R. Graham, M.S. Hewitt, and T.J. Skucas. Radio Frequency, Electromagnetic Pulse, and High-Power Microwave Weapons, National Security Research, Contract No. N39986-97-M-7241, 18 August 1997.

7 Lucien, Vayssie, Communications and Public Relations Supervisor, Centre d’Etudes de Gramat, Gramat, France.

8 Stockholm Daily SVESNSKA DAGBLADET, 21 Jan 1998

9 Kopp, C. “The E-Bomb: A Weapon of Electrical Mass Destruction”, http://www.infowar.com/mil_c4i/mil_c4i8.html-ssi.

10 Taylor, C.D. and D.V. Giri. High Power Microwave Systems and Effects, Taylor and Francis Pub., 1994.

11 Benford, J. and J. Swegle. High Power Microwaves, Artech House, 1992.

12 Bludov, S.B., N.P. Gadetskii, K.A. Kravtsov, Yu. F. Lonin, I.I. Magda, S.I. Naisteter, E.A. Prasol, Yu.V. Prokopenko, S.S. Pushkarev, Yu.V. Tkach, I.F. Kharchenko, and V.I. Chemakov. “Generation of High-Power Ultrashort Microwave Pulses and Their Effect on Electronic Devices”, Plasma Physic Reports, Vol. 20, No. 8, 1994, pp. 643-647.

13 Personal Communication with Moose Hill Enterprises, 22 January 1998.

14 Grekhov, “Semiconductor Switches and Generators of Gigawatt-Range Micro- and Nanosecond Pulses”, 14th IEEE International Pulse Power Conference, Baltimore, MD, June-July, 1997.

15 Kardo-Sysoev, A.F., S.V.Zazulin, V.M. Efanov, Y.S. Lilkov, and A.F. Kriklenko. “High Repetition Frequency Power Nanosecond Pulse Generation”, 14th IEEE International Pulse Power Conference, Baltimore, MD, June-July, 1997.

16 Yalandin, M.I., G.T. Smirnov, V.G. Shpak, and S.A. Shunailov. “High-Power Repetitive Millimeter Range Back-Wave Oscillators with Nanosecond Relativistic Electron Beam”, Proceedings of the 11th International Conference on High Power Particle Beams, Vol. 2, Prague, 1996, pp.388-391.

17 Bunkin, B.V., A.V. Gaponov-Grekhov, A.S. Eltchaninov, F.Ya. Zagulov, S.D. Korovin, G.A. Mesyats, M.L. Osipov, E.A. Otlivantchik, M.I. Petelin, A.M. Prokhorov, V.V. Rostov, A.P. Saraev, I.P. Sisakyan, A.V. Smorgonsky, and V.A. Suvorov. “Nanosecond Radar System Based on Repetitive Pulsed Relativistic BWO”, Proceedings of the 9th International Conference on High-Power Particle Beams, Washington, DC, May 1992, pp. 195-202.

18 Prishchepenko, A.B. and V.P. Zhitnikov. “Microwave Ammunitions: SUMM CRIQUE”, Proceedings of the AMREM Conference, Albuquerque, NM, May 1996, in publication.


Statement of Dr. R. Alan Kehs Army Research Lab before the Joint Economic Committee United States Congress Wednesday, February 25, 1998

“The Radio Frequency Weapons Threat and Proliferation of Radio Frequency Weapons”

      Mr. Chairman and Members of the Committee, I thank you for the opportunity to help shed some light on the widely ignored topics that you have chosen for these hearings. I have spent most of the last twenty years working on various radio frequency weapons technologies and I am currently serving as chair of the tri-service High Power Microwave (HPM) technology coordination panel.

      In general, our security classification guide prevents us from discussing anything but the most generic concepts and severely limits the depth of discussion if we remain at the unclassified, full public release level. It is not deemed to be in our best interests to provide details on our programs or roadmaps to weapons development that might assist rogue states, terrorists and others who would eventually wish to use these weapons against us.

      However, one does not need to rely on classified reports in order to appreciate the potential impact of radio frequency weapons (RFW) or as they are frequently called, HPM weapons. Everyone in this room has undoubtedly experienced Electromagnetic Interference (EMI) to some piece of household electronics. Some common examples are the effects of lightning strikes or automotive ignition noise on radio transmission, placing two computers too close to one another on a bench, driving under power lines while trying to listen to the radio, and so forth.

      A step up from these minor inconveniences is the warning that we hear each time we take off or land in an airplane. We all wonder “can a Gameboy or calculator really cause serious problems to the airplane electronics?” The answer, of course, is that a Gameboy, calculator or cellular telephone is not usually sufficient to disrupt airplane electronics, but it can happen. As a result, we adopt a policy of “better safe than sorry” and shut down electronics during the more critical take off and landing segments of commercial air flights. We have now asked the question “How much power does it take to create problems?” Realistically, these questions cannot be answered at the unclassified, full public release level. More subtly, the question becomes “At what point do common civilian electronic devices become weapons?”

      Let us shift now from the low power levels (microwatts and milliwatts) of gameboys and cellular telephones to the very high power levels (megawatts) of commercially available radar systems, TV transmitters, and particle accelerator tubes. This is the platform from which HPM weapons programs would be based.

      Conceptually, an HPM weapon looks like a radio transmitter. There is a power source, a tube to generate RF energy, and an antenna to radiate the energy appropriately. The key technologies and final products have been under development for the greater part of this century and are readily available on a broad range of markets. In the Army, we make extensive use of surplus radar and radio equipment.

      Military electronics generally contain some electromagnetic shielding and protection devices — even if they are not specifically designed to withstand an HPM attack. Commercial designers are generally concerned only with FCC limits on EMI and no one knows how susceptible commercial electronic systems might be to a concerted electronic attack. These commercial systems include our banking and telecommunications systems as well as oil and gas distribution and transportation systems, among others. Although these systems are designed to withstand the loss of a critical node, a concerted attack would cause unknown effects.

      HPM technologies appear on the critical technologies list. However, the required special approvals have not slowed the transfer of increasingly powerful and sophisticated HPM technologies to overseas buyers.

      The intelligence community will have to address the threat issues but I believe that they will find existing technology is more than sufficient to support several potential applications and threat scenarios.

      The growing US dependence on sophisticated electronics for warfighting and domestic infrastructure makes us potentially vulnerable to electronic attack. By its nature, the Defense Department is compelled to confront such threats, however, the full range of our technological society is also at risk and much less aware of potential threats. I pray that congress will help all of its agencies and departments to appreciate the increasing seriousness of the questions raised here today and take appropriate actions to evaluate threats and construct appropriate defensive measures.


Source: http://www.house.gov/jec/hearings/espionag/schweitz.htm

Statement by Lieutenant General Robert L. Schweitzer U.S. Army (Retired) before the
Joint Economic Committee United States Congress June 17, 1997

Radio Frequency Weapons and the Infrastructure

      I have been asked to talk to the overall subject of your hearing from a somewhat different perspective. Initially, it was to be from the one of what technology transfer means to a soldier. That part would have been fairly simple to address. Field soldiers are too busy to think much, if at all, about such transfers. That is, until they run across them on a battlefield where U.S. technology or materiel is being used against them. That happened in World War II when the residue of simpler technologies in the form of scrap metal was employed against us in the Pacific. It happened in Vietnam when some of our weaponry was obtained by our adversary. It happened again in Desert Storm when we ran across containers of U.S. materiel in the hands of Saddam Hussein’s soldiers, materiel which had been channeled through Jordan. Then the fleeting reaction is one of anger and “why?” But soldiers–placed as they are since the time of the Roman legions in the sand, mud, rain and snow to fight decisive battles–are really too busy to brood much about such things. They are, however, grateful when Congress acts ahead of time to bar technology transfers, not only the simple ones of which I speak but the more serious, albeit subtle ones, which can affect the outcome of battles and wars.

      Today there is a new class of radically new and important radio frequency weapons (RFW) which merits your attention as it emerges. And in this case, the horse is out of the barn. Transfers have occurred and are occurring. Equally true, however, is the fact that there are things that can be done to protect our nation, which is the underlying objective of today’s hearing. Certainly one of these things is to recognize that export control documents, particularly the Militarily Critical Technologies List, needs to be reviewed to determine if radio frequency technologies should be considered in the same careful way we do nuclear technologies. I respectfully suggest that this is the case; stronger controls are needed. One example is Reltron tubes which went to a friendly nation, one who sells products widely–sometimes to nations who do not like us. These tubes, which can be small or large, generate intense radio frequency pulses and can be used as RF weapons.

      Before we go further I wish to state clearly for you and for the public record that I do not speak for the Department of Defense, for any military service or any government agency. I come before you only as one who has researched this area for the past year and is writing a White Paper on the subject, one which will be offered to DoD for their use and disposition.

      Some of you may know about radio frequency weapons, where they came from, what they can do and what the implications are.

      Although there are a number of groups and individuals concerned with this subject, I have found that somewhat paradoxically the word has not really gotten out in Washington itself. Despite the existence of a Presidential commission, an Infrastructure Protection Task Force, a Critical Infrastructure Working Group, an Information Warfare School at the National Defense University, and other working groups, to include divisions on the Joint Staff in the Pentagon, as well as a few very dedicated and brilliant mid-level people in DoD, a general understanding is lacking. This is true not only of RFW, but of their immediate threat to our DoD and national infrastructure. Indeed the term “infrastructure” is so amorphous that it lacks impact if not meaning. One of our first tasks will be to define what is the military and economic infrastructure and what in it is susceptible and vulnerable to RF weapons.

      Some 90 to 100 references in 26 pages of the 70-page Quadrennial Defense Review speak to this new threat, but only to a discerning reader; the name for the class is not used. On the other hand, a recent search of the Internet found 2,400 to 2,800 references, while yet another, more thorough search found many tens of thousands of documents where the key words “radio frequency weapons” appear. Some very good people have written books and articles on the subject, the first revealing article known to me appeared in 1987 in the Atlantic Monthly, but for many reasons the knowledge is diffused. In the public sector the subject has yet to draw any real attention or concerted action.

      To help set the stage, recognize with experts like a former NSA Director that we are the most vulnerable nation on earth to electronic warfare. This thought is echoed by a former CIA Deputy Director, and a former Deputy Attorney General who forecast that we will have an electronic Pearl Harbor if we do not accept a wake up call. Our vulnerability arises from the fact that we are the most advanced nation electronically and the greatest user of electricity in the world.

      On the military side, as in the civilian sector, our current superiority is based on microelectronics. To prevail against us, an adversary must cripple, destroy or deny access to those same microelectronics. Can an adversary do so? Very likely, as this hearing will bring out. All of our military doctrine assumes extensive use of sophisticated electronics and communication systems to ensure information dominance and overwhelming battlefield success. As is the case with our civilian infrastructure and economy, our current dependence is large and will continue to grow. Because our battlefield success and the well being of our civilian economy–with which this committee is especially charged–-are so dependent upon the effectiveness of our microelectronic-based systems, we should fully understand any technology that might be used to defeat our systems. This is particularly true of the newly emerging threat of radio frequency weapons. And even more importantly, we must develop countermeasures before such weapons are used against us.

      Before going further, let me explain what these weapons are, where the Russian work has gone since 1949 and the applications of these weapons. If you are interested–as I believe you will be–you may wish to bring before you successive panels of our own leading scientists and experts. I have talked to many of them, heard them make presentations at conferences, and read their articles and books. I will be pleased to provide your staff with names of those who could provide this or other committees with a better understanding. I am also willing to assist in any way that might be helpful.

      First of all, an RF weapon is one that uses intense pulses of RF energy to destroy (“burnout”) or degrade (“upset”) the electronics in a target. These weapons can be employed on a narrow beam over a long distance to a point target. They are also able to cover broad targets. They are categorized as high power microwave (HPM) weapons and ultra wide band (UWB) weapons.

      The phrase non-nuclear electromagnetic pulse is sometimes used, because these weapons, which are indeed non-nuclear, project the same type of pulse we first learned of in conjunction with nuclear weapons. As a practical matter, a piece of electronic gear on the ground, in a vehicle, ship or plane does not really care whether it is hit by a nuclear magnetic pulse or a non-nuclear one. The effect is the same. It burns out the electronics. The same is true of the computers in this Senate office building, in industry, or on Wall Street.

      There is another way these weapons can be delivered to a target, military or civilian. Here the term RF munitions, or RFM is used. Yet these too are properly called RF weapons. These small munitions contain high explosives that produce radio frequency energy as their primary kill mechanism. In the hands of the skilled Russian scientists, these munitions come as hand grenades, mortar rounds, or large artillery shells or missiles. Generally, they produce a short but very intense pulse. While not yet fully understood and with some uncertainties argued as to their capabilities, many scientists are convinced the weapons actually exist. Without making any claims as to what they can do, I offer the following list from open source FSU literature of some nine smaller RF munitions or weapons:

  • Magnetohydrodynamic Generator Frequency (MHDGF)
  • Explosive Magnetic Generator of Frequency (EMGF)
  • Implosive Magnetic Generator of Frequency (IMGF)
  • Cylindrical Shock Wave Source (CSWS)
  • Spherical Shock Wave Source (SSWS)
  • Ferromagnetic Generator of Frequency (FMGF)
  • Superconductive Former of Magnetic Field Shock Wave (SFMFSW)
  • Piezoelectric Generator of Frequency (PEGF)
  • Superconducting Ring Burst Generator (SCRBG)

      Some of these weapons are said by the Russians to be now available as a hand grenade, a briefcase-like object, a mortar or artillery round.

      Applications or potential targets (like those of the larger High Power Microwave weapons) would include all military computers, circuit boards, or chips, of any description, and include the following key components of our military and national infrastructure. They would have equal impact on civilian targets with the advantage less power would be required. Recall that the term “infrastructure” lacks clear meaning, but would include things like:

  • The national telecommunications systems
  • The national power grid
  • The national transportation system, to include especially the FAA but also such simple things as our traffic lights (with consequent gridlock)
  • The mass media
  • Oil and gas control and refining
  • Manufacturing processing, inventory control, shipment and tracking
  • Public works
  • Civil emergency service
  • Finance and banking systems (to include bank’s ability to dispense cash)

      This list of potentially vulnerable targets could and should be extended to include airplanes, ships, vehicles and the like. Of interest is the fact that we are doubly vulnerable because we are, and will remain, in an era of dual use of military and civilian systems. For example, 90% of our military communications now passes over public networks. If an electromagnetic pulse takes out the telephone systems, we are in deep double trouble because our military and non-military nets are virtually inseparable. It is almost equally impossible to distinguish between the U.S. national telecommunications network and the global one. What this means is that it is finally becoming possible to do what Sun Tzu wrote about 2000 years ago: to conquer an enemy without fighting. The paradigm of war may well be changing. If you can take out the civilian economic infrastructure of a nation, then that nation in addition to not being able to function internally cannot deploy its military by air or sea, or supply them with any real effectiveness–if at all.

      Since 1949, the intense interest of the former Soviet Union in developing these weapons appears to have resulted from their recognition that they could not match the capability of Western electronics, and their belief that RFW have the potential to be effective against our sophisticated electronics. It is far less clear to me and to others why they are willing to transfer and proliferate the RF technologies they have developed so carefully and so well, but that they are clearly doing so. Should you wish, a future hearing by this or another committee could go into more detail.

      President Yeltsin proposed to President Clinton a joint program for a “plasmoid defense” against ICBM’s. While it is unclear to many scientists what President Yeltsin meant, such a defense, if attainable, might presumably set up a shield which would ionize the atmosphere and cause missiles to fail. Official Russian journals and publications show keen interest and provide many details about these weapons. A great amount of information is flowing continuously from three former Soviet Republics on their past and current programs.

      We do know that the reduction in military spending by the FSU and many Western nations is prompting the defense industries of many countries to offer advanced weaponry to foreign customers to further their own research, development and industrial capabilities. This trend is almost certain to grow over the next 10 years.

      From unclassified sources, we know that Russia, Ukraine, the United Kingdom, China, Australia and France are well ahead in this field, while Germany, Sweden, South Korea, Taiwan and Israel are emerging and have ample details of the Russian work and of the proceedings of more than 20 years of international conferences. Without going into any classified matters one may reasonably infer that the pariah nations have similar interests and some certainly have the financial resources to develop or procure RF weapons.

      Russian and FSU information on RFW has been moving across borders for many years. International conferences beginning in 1949 have been a principal source of technology transfer. Scientists here and abroad have long exchanged papers, letters and, with increasing frequency, telephone calls.

  • The first Megagaussing Conference on the generation of high power electromagnetic pulses took place in 1949 in Frascati, Italy. Russian scientists were key players in what has become a long series of presentations on the generation of electromagnetic power. Present at this and many subsequent conferences was the U.S. inventor of RF weapons, Dr. Max Fowler. His picture was placed over the center of the Moscow desk of one of his Russian counterparts who is a leader in the Russian development of the smaller version of these weapons. The latter is a key figure in the offer to sell RFW and RFM or their technologies to others.
  • EUROEM Conferences have been meeting (with name changes) for perhaps some 20 years at about two-year intervals. At the 1994 conference which was held in Bordeaux, France, the Russians made public many details of their long work in these weapons. Some of their papers deal with the strategy, tactics and techniques for the use of offensive RF weapons. Among nations participating were Iran and Iraq. At this conference the Russians talked about selling their technology and weapons to prospective buyers. I am told that subsequently a large number of nations have engaged them in some form of negotiations. Some of these “buyers” raise legitimate concerns.
  • The BEAMS conference (with name changes) has been meeting about every two years since 1975.
  • The EUROEM Conference met in Albuquerque in 1996; the BEAMS Conference met that same year, I believe in Prague. Attendance was open to all nations.
  • The next EUROEM and BEAMS conferences will meet in 1998 in the Middle East, two weeks apart in Tel Aviv and Haifa, respectively.
  • An International Pulse Power Conference held their tenth conference under that name in 1995, but has existed under other names for a longer period of time.
  • The International Particle Accelerator Conference has also met for more than 20 years.
  • The American Physical Society has a Plasma Physics Division which hosted (for more than 20 years) many conferences. Usually each one has several sessions on microwave generation.
  • And there are more. . .

      Understanding the number, frequency and long standing nature of these conferences, you can perhaps better appreciate why I earlier said that the horse is out of the barn. Of interest, too, is the role of the United States in these conferences. Indisputably, the U.S. is the scientific powerhouse of the world. We have initiated and hosted a number of these conferences, funded many of them to a significant degree, and played a prominent role at all. While we gain some information, our scientists will readily acknowledge the net advantage is always to other attendees.

      Put another way, from a narrow technology transfer standpoint we have thus far lost more than we gained. However, even prior to the Internet no one could control the flow of ideas, especially among scientists. They like to talk especially about what they have achieved, and how they solve theoretical and practical problems. For decades our scientists have found their Russian counterparts to be brilliant, dedicated and creative. Personal relations are important and some have developed, but they are exceptional. For the most part the Russians have been ambiguous about their great work and often are mistrustful of Americans. We should move to change that by closer and warmer contacts as well as by efforts to enter into joint ventures–with all the travails that accompany such efforts. The Russians are intensely interested in our comments and some professional appreciation by their scientific peers of their decades of work on the offensive use of RF weapons. In my humble opinion they would prefer to work with our own distinguished scientists rather than others, but will sell their technology and products to others. I believe there is a real potential for joint ventures which could serve to constrain to some degree the proliferation of these weapons, especially to those who would do us harm.

      To return to the earlier point about the need for better controls of technology transfer, consider these two counterpoints which illustrate the problem:

  • First: Although RF weapon components are on the Critical Technologies List, there are no up to date DoD guidelines or directives on this subject. An attempt to do so was made two years ago when little was known about the subject. As a consequence, decisions within the U.S. scientific community are becoming harder and dicier to make. There is a lack of clear policy guidance and direction.
  • Second: The first point is illustrated by the transfer of the Reltron microwave tubes. These tubes, which generate radio frequency power, cost a great deal of money to produce and test. The U.S. is the leader in high-power tubes and their associated power systems, but the market is really thin. Our tube industry has no current buyers here in the U.S. Without major contracts from foreign countries (France, the United Kingdom, Germany and Israel, among others), our tube industry will die. We will lose contact with real customers and become dependent on foreign hardware for our systems. Ultimately we will increase the difficulties that must be overcome to develop HPM applications for any future DoD use. Almost certainly we would know less–almost nothing–about what was going on in this area. For their part the Europeans and others would not cease to procure; they would simply undertake their own development. So our high power microwave scientific community told the State Department on balance to approve the transfer, which State did. Inevitably one consequence will be to advance the work of others and ultimately the production of RF devices to be used wherever and however by whomever. Note well, however: there is no guarantee that friendly countries will not sell the devices they produce to unfriendly, even hateful people.

      It would also appear that there are other proliferation and transfer concerns of interest to this committee, simply because there is so much accurate how-to-do information in the open literature and on the Internet. Several countries have RFW programs and Russia says it has sold some technologies to these countries. At least one of these countries has acknowledged such a transfer. The crux of the difficulty in controlling these transfers is best illustrated by the fact that High Power Microwave weapons look like ordinary radars. With a dish or horn antenna, and a van with a power source, an RFW would look like a new, used or renovated radar. Used ones are offered for sale today in military surplus and commercial catalogs. Other catalogs offer for sale the components to put together lower power, but also very low cost items, that once assembled could be used effectively against the infrastructure.

      Users of the new weapons can be criminals, individuals or organized gangs of narco or domestic terrorists–or a determined, organized, well-funded foreign adversary, either a group or nation who hates us.

      The Russians, as noted, led with this work starting in 1949 with theory. By 1961, they were doing research, as documented in their numerous unclassified scientific articles. Experiments began in the seventies and proceeded to testing as described in their publications. Many of these weapons appeared in written descriptions, some photographs and diagrams in the nineties. Strategy, doctrine, tactics and techniques are all laid out in rather clear form. Please note all of this is unclassified information.

      There is a legitimate question about the intelligence aspect of all of this. Our intelligence community largely proceeds on the operating principle followed in the Cold War: A threat is not validated until it is fielded. Well and good; hard evidence is essential.

      But the question may fairly be asked: does that principle serve us well in the present day? Suppose we were to take a Russian or FSU-designed weapon, fabricate it in the U.S. and test it here. If the results were to meet the standards of performance and capabilities now claimed by the Russians, would we then have a validated threat? The answer to the capabilities may be forthcoming this month because at an unclassified level one of our national labs is doing just that. Another lab has purchased cheap, off the shelf components and will test its lower power device this month. Their engineers and I believe it will indeed work against infrastructure and light military targets.

      There is a great deal of other corroborating evidence which at least argues for the existence–which is still disputed in some quarters–of these weapons: one minor one is an International Institute for the Prevention of Offensive RF Weapons, located in Philadelphia. Why such an institute if there are no such things? Evidence as to the capabilities of the weapons may be found in such recent statements as China’s declared intention to purchase three RF weapons derived from the Russian technology. Another is the series of reliably reported discussions within the IRA of their intention to seek RF weapons for use against the London financial system in lieu of bombs and explosives. Consider, too, the recent statement by Sweden they have used these devices in experiments to stop cars at 100 yards, as well as their reported claim that RF weapons have been used against their financial institutions. A similar but much disputed statement has been reported by the London Times concerning British financial and banking institutions. The Los Angeles Police Department had done some successful work with vehicles in the interests of public safety and to halt fleeing suspects. Advantages of the larger high power microwave RF weapons include:

  • Low cost per engagement
  • All weather
  • Instantaneous engagement times
  • Simplified pointing and tracking
  • Possible to engage multiple targets
  • Deep magazines–simplified logistics (can “fire” or pulse as long as there is power in the generator)
  • Non-lethal to humans when properly adjusted
  • Well suited to covert operations because of lack of signature; deniability
  • Not able to detect attacks; silent when used without explosive devices

The RFM offer many of the same advantages, offset only by the sound of the explosion that detonates them and produces the rise in pulse energy.

Unless we choose to be, we are not without courses of action. Some of these could be explored at a future hearing. Some preliminary thoughts are offered today:

  • We either fully understand nor control this technology.
  • We have not begun to work on defenses , especially for our vulnerable infrastructure.
  • We need to first scope the problem, determine susceptibilities and vulnerabilities, then test.
  • All of this, to include any appropriate hardening of existing components, will take many years.
  • There are other courses of corrective action, but all will take time to acquire and apply.
  • The first step might well be to bring forward our real RF experts in DoD and the scientific community who know what needs to be done.

We need to go at this problem with a step-by-step sensible approach. No budget buster is proposed. Even if Congress had ready funds, a grandiose national solution is not the way to go.

We can start by scoping the problem and then by applying some of the same low-cost components that are now used in the ever expanding information technologies. Examples are surge-like protectors, plasma limiters, diodes, and metal covers. Parallel or redundant systems are another technique.

We are good at managing risks. We should no longer hesitate to reduce the impact of the threat, or to give our intelligence community the guidance to open up (some would say revise) their approach to this problem. Clearly the United States Congress will play a key role in whatever we do, or choose not to do, and our top leadership should focus on the longer term. But we should begin now in a sensible, modest way.

Three things we want to keep foremost in mind:

  • Do not throw a lot of money at this problem. Funds don’t exist; the best solutions will have to be devised.
  • Do not tell DoD or the Services to take this out of their budgets. They are over stretched now and it would be wrong to tell them to pay for protection of the civilian infrastructure.
  • Do not continue to do what we have been doing and ignore the problem.

Symptoms of Electromagnetic Targeting

Symptoms of Electromagnetic Targeting

I have been asked to provide details of the non consensual experimentation that I have experienced. This is from my latest book … https://www.amazon.com/Notes-Engineered-Life-Controlled-America-ebook/dp/B08LDSVGDJ/ref=sr_1_2?keywords=rosanne+marie+schneider&qid=1636069331&qsid=145-7993626-8350851&s=digital-text&sr=1-2&sres=B014B4YUDS%2CB08LDSVGDJ

Torture

When I describe the following I want you to think of not only nonconsensual experimentation but also of training exercises, because frankly nothing else makes sense. Who was I? A nobody. Why would anyone want to do this to me? Perhaps there was the angle of silencing an old MKUltra victim, perhaps the lords of England didn’t like me involved with their architectural heritage, perhaps I had witnessed too many strange deaths, perhaps I had business dealings with organized crime and didn’t even know it, perhaps someone didn’t like my nationality, or my religion, or my politics, perhaps someone wanted to sleep with me and I refused, perhaps my devotion to animal rescue made me suspicious, perhaps it was just simple depopulation and enforced communism .. I will never know the answer to this question …

When everybody in the town thought that I was crazy, a criminal or both the real fun began. I was hit by something that felt electrical, as if I was being shocked. It was very painful and caused me to overheat. My whole body felt burnt but especially my face and feet. It was during one of these events that I went to an emergency room. My face was beet red and it had been raining for weeks so it was not a sunburn. I thought that some kind of chemical was being thrown at me and I said so. They refused to give me a simple blood test to determine that. Instead they took my blood pressure and it was through the roof, in fact they wouldn’t let me leave until they brought it down. Now, I was not only on thyroid medication for life, a symptom that many targeted individuals share, but I would be taking blood pressure medication for life as well. Was someone like Big Pharma making money from engineered misery?

 Another time I felt suddenly dizzy while driving my car. I pulled off into a parking lot and passed out cold. Two hours later I woke up and went to an emergency room. My blood pressure was so low that I was setting off alarms. It was gradually normalized without explanation. Someone explain this to me. I could have been killed. Another time, the whole inside of my mouth was burnt. This is on record at my doctor’s office. She was so concerned that she sent me to a specialist but there was never a real diagnosis made, as I remember. Another mystery. I have photos of me waking up with a black eye, I have photos of holes burnt into my skin and bruises that I sustained in the middle of the night. I woke up one day feeling that I had been drugged and I found a scar on my right hand between the forefinger and thumb. That’s where authorities put tracking chips.

I had an MRI brain scan at one point in hopes of explaining the loud tinnitus in one ear. I was also getting headaches in the left temple area which seemed to precipitate an attack. I was also experiencing left eye drop and I actually saw a Facebook posting about it. There was a photo circulating of politicians and celebrities and they all had left eye drop like me. Oh my God. The MRI showed abnormalities when compared with normal MRIs online but no one said anything. I also got a report saying that I had unspecified metal fragments in my brain.

I was in between roommates waiting for the next person to move in and I was alone. I was viciously attacked with directed energy of some kind, and there was a pattern to it. Attacks to my heart would occur every night when I went to bed, attacks to my hearing would occur every day when I woke up … I was burnt on the chest every morning to awaken me … It was like clockwork and very precise. This would later be called Satanic Ritual Abuse, and according to my research, it’s a component of trauma based mind control.  Also, my teeth were being removed one by one. I would feel energy and pain on the side of my face and in the morning the tooth would be loose. This would happen until it fell out. Almost all of my top teeth were removed in this way. Many other victims have reported the same thing. Then I started noticing that the activists around me all had missing teeth. Oh my God. At this time I was waking up to the problem. It wasn’t just me going through this, it was hundreds and hundreds of people all across the country going through this. What on earth was going on?

I was doing a computer search one night using the term “chemical assault” and I tripped across the targeted individual community. There were thousands of videos and websites online from people who were being attacked just like me. It’s as if there was a script. Precision destruction. It just had to be military. There were conference calls with these people every night of the week and so I got on them. After a few false starts (this world is highly infiltrated) I met some truly great people. My own theories centered on Agenda 21 and the push for a global government.

I became a researcher at this time because I couldn’t believe what was happening to me and so I read about all of the conspiracy possibilities. The conspiracy theories that I focused in on were the documented ones and I began to investigate how targeting could tie in with global agendas. Taking down America is paramount for any global government and I was surely being taken down. Not only did the whole community think that I was either crazy or a criminal of some kind, but my close personal friends started to drop off one by one.

My life had been infiltrated by a new “best friend” who played a role in this. She continued the “crazy” narrative to most of my friends. She did really really bad things but looking back I could see that she was targeted also and trying to save her family. At home things were awful. I had one pet stolen and the others were being affected by something that was making them pull out their hair and fight. I finally gave them away to save them and never saw them again. All pets gone.

 Mr.C tried to save me by having me move in with him but it was disastrous. I didn’t realize it at the time but he might have been affected by frequencies as well. He could not understand his own behavior at one point, because most of the time he was angry and did not want me there. He was quick to argue and demanding. Not like my friend at all.  While I was on his roof deck in the middle of San Francisco, a big black helicopter sat stationary over my head for at least twenty minutes. Thirty or Forty feet above me. I was amazed. If I went out of his apartment I was followed. I was beginning to realize that I was in huge trouble. These were not irate neighbors doing this, as many think, … this was massive and well funded. This felt like our military but why were they attacking their own people? Were they using me for training exercises? Possibly because of remote influencing technologies, Mr. C and I just could not tolerate being together and I left his apartment within a week. He later sent me a text message to say that he could no longer stand the sound of my voice. All friends gone.

Isolation is a well-known component of torture. The torture at this time was continuous. I had a strong taste of salt in my mouth, my skin was drying up, my muscles were misbehaving and it was difficult to get things done, but I persisted. There were sexual attacks, muscular attacks, sneezing attacks, coughing attacks, pain and burning to my feet, breasts, vagina, face, head, hands, legs … my body was swollen and burnt. My pubic hair had been burnt off, my toenails had been disfigured, lots of wrinkles added to my face, I had put on weight, my top teeth had fallen out, I had developed brown spots all over my body, and I was now ugly. Good job boys! I had to wonder if this was done for perverse reasons or to keep me from finding a mate … Either way it was cruel, and obviously these were tailored attacks against women, … not much had changed since my mother had faced the same thing.

I tried to construct a shelter out of old card tables and shielding material but the perpetrators got right through it. I finally ripped off some sheet metal from the washing machine and that seemed to shield me from direct attacks to my organs. I slept with my grandfather’s old stew pot over my head stuffed with Mylar and cotton and I bought a 400 lb. neodymium magnet. Everything helped a bit but there was no stopping the torture.

I once heard scientists talking about me for about 15 seconds and then that feed went dead. I also heard a large “Meow” as I was trying to sleep. My cats were with me then and they jumped to the ceiling. This was projected sound.

Driving had suddenly become a disaster. After forty years of a perfect driving record I had two minor accidents and I was stopped by the Highway Patrol three times. At the same time my nice car was being destroyed. Every day there was more vandalism to it. One day the back window flew out as I was going down the freeway. Another time the brake lines had been cut. Another time all of the oil had been drained from the car. Another time a tire had been shot out prompting my tire guys to send me to the police. Some kind of chemical had been thrown at the car which disintegrated the clear coat. The side mirror had been knocked off. The trunk lock had been broken. It went on and on until the car just stopped working one day. My mechanic said that it looked like a lightning bolt had hit the distributor. I gave up and I was without a car.

 Agenda 21. Seriously, that’s my guess…. and I’m furious. Without a vehicle I lost the ability to work, to exercise, to shop, to visit friends and I became completely dependent on everyone around me. No independence. None. But it worked out well for the control freaks who were doing this because they didn’t want me living in a location where I would need a car.  Agenda 21. Research Rosa Koire and listen carefully to every word that she says. I am but a lab rat for this Agenda and I can tell you that it is pure fascism disguised as concern for the environment.

At this time I also lost computers. They were all hacked and destroyed. Four of them. Windows was useless against this so I went to Linux, very stable, and then the screen blew out and the keys started malfunctioning. I finally gave up and bought a smart phone.

This is from a current notebook that I keep. It’s an abuse log. It was written on 4/16/2020.

 “Abuse Log – Current Hostile takeover of my home 

Destruction of smart phone by destroying battery 

Rash all over body upon awakening… Black eye, or bruised eye upon awakening 

Wound on ankle upon awakening

Repeated jamming of phone signal 

Burning of inside of mouth 

Massive tinnitus in one ear 

Infiltration 

Difficulty walking, pain in legs, difficulty maintaining balance 

Shooting pains throughout body 

Difficulty breathing at times 

Abuse Log – Past 

•             Destruction of four computers

•             Destruction of two cars

•             Destruction of multiple phones

•             Repeated tickets by highway patrol

•             Staged accidents

•             Attempts to run me off the road

•             Multi perpetrators practicing on foot surveillance – suspect C.O.P.S.

•             Police surveillance

•             Destruction of most personal property

•             In home infiltration and use of property for nonconsensual experimentation on victims of remote influencing technologies

•             Torture and theft of pets to induce trauma

•             Sabotage and destruction of businesses to increase dependency on government funding

•             Slander and lies to husband and community for discrediting purposes

•             Theft of two pieces of private property

 Remote Influencing Technologies ( Neuroscience ) Applied to Produce the Following Symptoms:

 •            Immediate and unexpected sleep

•             Immediate and unexpected anger

•             Immediate and unexpected sorrow

•             Immediate and unexpected anxiety

•             Vivid nightmares

•             Pain in all parts of the body

•             Heart attack symptoms

•             Stomach aches, nausea and indigestion, inability to digest, lack of appetite

•             Extreme tinnitus in one ear

•             Sudden and unexpected coughing

•             Difficulty breathing

•             Sudden back ache, knee ache, shoulder ache, ankle ache

•             Attacks on Achilles Tendon

•             Sudden constant sneezing

•             Destruction of thyroid functioning

•             High blood pressure

•             Visual disturbances

•             Fabricated smells

•             Fabricated sounds, including words ( military term – V2k, Voice to Skull )

•             Fabricated sights

•             Gassing – chemical experimentation

•             Sudden dizziness

•             Sudden memory loss, searching for words, confusion

•             Sudden edema in legs and feet

•             Burning of feet and toes

•             Burning of face, creation of wrinkles

•             Burning of chest, breast and vagina

•             Sudden nasal congestion

•             Knee malfunction

•             Internal bleeding

•             Sudden infections

•             Dentistry problems, tooth loss

•             Sudden weight loss or gain

•             Sudden heating up of body

•             Sudden chills

•             Strange courage in the face of danger 

•             Sudden incontinence, loss of urination or defecation control

•             Sudden severe migraines

•             Headache

•             Sinus pain

•             Sudden pain pricks in eyes and other parts of the body

•             Loss of balance

•             Sudden severe muscle cramps

•             Sudden severe heart pain

•             Arthritis

•             Skin abnormalities, rashes, bites, etc.

•             Sudden vertigo

•             Itching eyes

•             Blurry vision

•             Mind control, performing actions that you have no control over like looking at your watch at the exact same time every day. 

 Other affects surrounding the target:

 •            Changes in animal behavior, increased aggression in all species, barking and attacking dogs, migration of unwanted pests into the home, wildlife that seems confused, pets that are acting abnormally, pets in pain, pets in distress, pets developing diseases, pets dying, pets disappearing without a trace.

 •            Landscaping changes, plant death, tree death, proliferation of unwanted species ( weeds ), holes punched in soil, water rerouted through soils leading to flooding, increase of silt in soil leading to inability to sustain life, increase of molds in soil, reduction of insect life, all done remotely. 

 Damage to home, damage to roof, damage to fencing, damage to appliances, damage to woodwork, damage to electrical system, damage to fireplace, damage to plumbing, damage to water system … all done remotely.

 •            Biological Teleportation … yes, I’m serious… look it up …   

That’s quite a long list, isn’t it? And I’m sure that I’m leaving many things out. Can you see how this technology might affect big Pharma profits? Or privately owned psychological institutions? Or privately owned jails? Or economics? Or relationships? Or housing?

Those calling themselves targeted individuals are tortured 24/7 for years. All that I have claimed here is now being verified by some very important people. The tide appears to be turning just a bit. Brave people are starting to help ….

Online Press Conference on DEW/Neurotech/Stasi COINTELPRO Targeting Fri, Oct 15, 2021

Online Press Conference                                                            on DEW/Neurotech/Stasi                                    COINTELPRO Targeting                                                       Fri, Oct 15, 2021

I was honored to be a participant at the above conference. Below you will find a transcript of the speech that I gave along with references to the information that I provided. Following each individual presentation there was an open discussion which was very valuable. I will be posting the video of the entire conference as soon as it is released.

As promised here is the video of the entire conference …

My name is Rosanne Schneider and I am the author of two books “Surveillance, Torture and Control in the Modern World”1 and “Notes from an Engineered Life”2. Both of these books document my painful journey from a free and loving human being to the horror and pain of a military industrial complex non-consensual test subject.

In 2011 my life was stolen. I went from a business woman, a Home Hospice volunteer, an animal rescuer and an artist to a crime victim. My businesses were sabotaged, my animal rescue activities turned ugly, my computer was hacked, my relationships were destroyed, my home was broken into, my vehicle was vandalized, all of my electronics started to fail, my possessions were destroyed or stolen, and I was followed around town by police and on foot surveillance like a criminal. This unwanted attention included the infiltration of aggressive and uncooperative people into my home life and social circles. I do not have and have never had a criminal record.

At the time, when I thought that things could not be worse, I began experiencing what some might know as Havana Syndrome symptoms. I began to experience dizziness, loss of balance, vertigo, difficulty sleeping, difficulty concentrating and a constant burning sensation throughout my body. But it was about to get much worse … Symptoms gradually progressed until every bodily function was involved. I couldn’t see properly, or breathe properly, or digest properly, or walk properly and there was unexplained pain that would come and go in every part of my body. At the same time my cognitive abilities began to decline and my behavior began to change. I was no longer a free person and I was being manipulated politically. It felt as if some evil entity had control of my body and my mind, and actually that’s exactly what was happening.

This was a time of terror for me as I watched my natural abilities disintegrate and all of my assets disappear. I now spent my days in the emergency rooms of local hospitals or unconscious or in extreme despair.

I contacted the police, the FBI, and my county supervisors and in the end I was called delusional, which was a lie, and told to keep my mouth shut about all of this or risk a forced hold in a psychiatric hospital.

Eventually, as I did research using my symptoms and experiences, I came across thousands of people experiencing the same things. They called themselves “targeted individuals”. My activism began.

I began to do research about microwave weaponry because I could think of no other reason for the burning of my body and I soon realized that this technology had been around for a long time. The Moscow Signal was a reported microwave transmission varying between 2.5 and 4 gigahertz directed at the Embassy of the United States in Moscow from 1953 to 1976 resulting in an international incident.3 It is said that America allowed these attacks to continue so that they could discover the effects of such weaponry. The development of this invisible stealth technology never ended.

From the article “How Far in the Future is the Ban of Psychotronic Weapons” by Mojmir Babacek4

“In March 2012 Russia’s defense minister Anatoli Serdjukov said, at a meeting with Prime Minister Vladmir Putin “The development of weaponry based on new physics principles, directed energy weapons, geophysical weapons, wave energy weapons, genetic weapons, psychotronic weapons, is part of the state arms procurement program for 2011 – 2020.”

The UK based newspaper, Daily Mail, wrote that research in electro-magnetic weapons had been secretly carried out in the United States and Russia since the 1950s and that low-frequency waves or beams can affect brain cells, alter psychological states and make it possible to transmit suggestions and commands directly into someone’s thought processes. High doses of microwaves can damage the functioning of internal organs, control behavior or even drive victims to suicide.”

That article was written in 2013 – Let’s fast forward to an article that was published on October 8th, 2021 entitled “Behind NATO’s cognitive warfare; Battle for Your Brain waged by Western Militaries” by Ben Norton.5

“Western governments in the NATO military alliance are developing tactics of “cognitive warfare”, using the supposed threats of China and Russia to justify waging a battle for your brain in the human domain to make everyone a weapon.

The US – led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries, including economic warfare, cyber warfare, information warfare, and psychological warfare.

Now, NATO is spinning out an entirely new kind of combat … it has branded cognitive warfare. Described as the weaponization of brain sciences, the new method involves hacking the individual by exploiting the vulnerabilities of the human brain in order to implement more sophisticated social engineering.

A 2020 NATO sponsored study of this new form of warfare clearly explained “Cognitive warfare’s objective is to make everyone a weapon”.  “The brain will be the battlefield of the 21st Century” the report stressed.

In a chilling disclosure, the report said explicitly that “the objective of Cognitive Warfare is to harm societies and not only the military”. The study described this phenomenon as “the militarization of brain science”. But it appears clear that NATO’s development of cognitive warfare will lead to a militarization of all aspects of human society and psychology, from the most intimate of social relationships to the mind itself.

The study makes it clear that those competitors purportedly exploiting the consciousness of Western dissidents are China and Russia.

The Pentagon is among the primary institutions advancing this novel research, as the report highlighted … “Although a number of nations have pursued, and are currently pursuing neuroscientific research and development for military purposes, perhaps the most proactive efforts in this regard have been conducted by the US Department of Defense, with most notable and rapidly maturing research and development by the Defense Advanced Research Projects Agency ( DARPA ) and Intelligence Advanced Research Projects Activity ( IARPA ).

The study indicated that the direct weaponisation of neuroscience and neurotechnology can and will be fatal. The research can “be utilized  to mitigate aggression and foster cognitions and emotions of affiliation of passivity; induce morbidity, disability or suffering; and neutralize potential opponents or incur mortality” … in other words, to maim and kill people.

The report nears it’s conclusion with an eerie quote; “Today’s progresses in nanotechnology, biotechnology, information technology and cognitive science boosted by the seemingly unstoppable march of Artificial Intelligence, have created a much more ominous prospect where everyone, unbeknownst to him or her, is behaving according to plans”

So now we have the suspected criminals that stole my precious life from me … How did they pull this off legally I wonder? And is any one safe? I got a clue from an ex – police chief that I know who used his security clearance to help one of the victims. He found her listed on the Terrorist Watch List as “Dangerous”. She is a housewife without a criminal record. I hear that once one is listed as a terrorist, one loses all of one’s human rights … Well that would work now, wouldn’t it?  Haven’t many of our dissidents who oppose our fascist regime been thrown on the terrorist watch list by Fushion Centers?

But why were all of my assets stolen I wonder? Oh wait a minute, hasn’t Klaus Schwab, the founder and executive chairman of the World Economic Forum stated publicly “You’ll own nothing and be happy about it?”6

Who’s really behind all of this?

1. https://www.amazon.com/Surveillance-Torture-Control-Modern-World-ebook/dp/B014B4YUDS/ref=sr_1_1?dchild=1&keywords=rosanne+marie+schneider&qid=1634348297&s=digital-text&sr=1-1

2. https://www.amazon.com/Notes-Engineered-Life-Controlled-America-ebook/dp/B08LDSVGDJ/ref=sr_1_1?crid=1KGEEQ36X0M4B&dchild=1&keywords=notes+from+an+engineered+life&qid=1603386994&s=books&sprefix=notes+from+an+engi%2Cstripbooks%2C205&sr=1-1

3. https://en.wikipedia.org/wiki/Moscow_Signal

4. https://www.opednews.com/articles/How-Far-in-the-Future-is-t-by-mojmir-Babacek-130117-720.html

5. https://thegrayzone.com/2021/10/08/nato-cognitive-warfare-brain/?fbclid=IwAR3nqged6OoA6opELFrXrirzAmRaMrI6lVI0zvSc3nb8FutHGOrxzuoO5iU

6. https://www.americaoutloud.com/you-will-own-nothing-and-be-happy-klaus-schwab/

Is Illegally Classified Experimentation Being Used to Asset Strip and Re-Educate Americans?

Is Illegally Classified Experimentation Being Used to Asset Strip and Re-Educate Americans?

The war of words rages on about Havana Syndrome, or the deliberate attack on human beings by unseen and undetected frequencies … it’s Russia, it’s China, it’s a mystery they say, what could it be they say … really? Our government is stumped by these attacks?, then how do we explain the patents displayed at the bottom of this page? How do we explain the fact that our own defense manufacturers describe flashy new electronic weaponry on their websites as countermeasures to the existing threat of electromagnetic warfare? Perhaps the Havana Syndrome reporting has been a little “funny” … eh?

https://www.lockheedmartin.com/en-us/capabilities/directed-energy.html

https://www.baesystems.com/en-us/productfamily/electronic-warfare

Imagine, if you would, these systems falling into the wrong hands … they could destroy automobiles, electrical systems, consumer technologies, computerized machinery, and the list goes on … Oh, and they can also destroy people … I forgot to mention that …

I am greatly alarmed by this and you should be too … These are technologies of war … I understand the fascination … these are stealth weapons and they’re very difficult to trace … if you can remotely destroy property, electronics, and vehicles without a trace, how might that impact We the People if this technology should fall into the wrong hands? …. Is this the kind of future we can expect?, … being covertly zapped into oblivion? … being covertly “modified”?…. Might these weapons support fascism? … well yeah, of course …

I can hear the arguments now … but if you can remotely subdue the enemy’s mind then you don’t need to kill them, right?  … true, their bodies are intact but are their souls? If you can modulate behavior with frequencies, and all the experts who actually worked on this technology for governments say that you can, … and our modern world is absolutely bathed in frequencies, …. then what hope is there that this network will not be abused? … Does anyone know of a government anywhere that would not like control of their population? …. Anyone?

Speaking of technological abuse, … there’s a very large and very potent movement towards truth and exposure going on by innocent people who claim that they are indeed being abused by these technologies. Before you make yourself feel better by assuming that these people are internet tin-foil-hat conspiracy nuts, please realize that these people have very impressive credentials. Many of them are from our military, many of them are highly educated scientists, many of them are government whistleblowers, many of them went up against corruption and paid the price, and there’s proof of all of this  … are these the kind of people who would come together in great numbers to weave a fictional account of covert attacks? … I don’t think so … Here’s an example of the people in our country who claim that they are being targeted with this technology … before you read the article read the signatures …

https://everydayconcerned.net/2017/01/26/memorandum-to-president-donald-j-trump-on-domestic-us-torture-programs-running-under-cover-of-surveillance/

Here’s a sampling of the global population who claim that they are being abused by this technology … make sure that you watch it from the beginning … do you really think that they would organize in great numbers and put their faces on camera for the world to see to spread lies or delusions ? You can believe that if it makes you feel better, but I’m one of these people and that’s NOT what’s happening …

So what is happening to these people? They hold conference calls every day of the week aimed at identifying the perpetrators and bringing their slavery to an end … By the way, it IS slavery … if someone aims a neuroweapon at your brain and incapacitates you in any way then you are being controlled by an outside force and that is slavery …

So what is happening to these people? What is the purpose of all of this? This is what I have observed in my life and the lives of others …

  1. They are being asset stripped and impoverished .. to date I have lost 2 pieces of real estate, 2 automobiles, 3 businesses, 4 computers, and thousands of dollars worth of personal property … Most notably all electronics and electrical systems were destroyed by interference of some kind … sound systems, computers, digital cameras, cell phones, security cameras, security alarms, electric fans, the programmable thermostat for my home heating system, and let’s not forget electrical outlets throughout my home …. and let’s not forget the electrical components that control ignition under the hood of my automobiles … according to my mechanic my distributor looked like lightening hit it … his exact words …
  • They are being slandered, thrown into legal battles which they did not initiate and do not wish to participate in, they are losing their friends and family …
  • They are being coerced into adopting a “collective” mentality to protect themselves and others. Don’t get me wrong, I’ve always been a person who has willingly shared my resources with others who were less fortunate, but I did this out of the goodness of my heart and because I was taught to behave this way by a family with very high moral standards. I don’t want to be forced into this behavior for my very survival and if I am then there is something tragically wrong with our country, a known refuge for self determination …

Are you having trouble believing all of this? ( I know that I did at one time ) … do a search for “TI” or “Targeted Individual” in FaceBook groups …

Here I did it for you because I want to illustrate a point … so what’s going on here? …

  • I Support TI AwarenessPublic group  · 140 members This page is dedicated to The efforts of raising awareness about citizens being used as targets in a Military Directed Energy Weaponry non consensual human experimentation program. We are all aware of the changes that have been unfolding before our eyes. We have all looked for the answers to the questions at hand.  
  • TI’S READY TO DO SOMETHING ABOUT THEIR TARGETINGPrivate group  · 6.7K members
  • West Coast States/California TI’s/victims Private group  · 202 membersA Coalition of COINTELPRO victims often called TI’s (Targeted Individuals). Inclusive of the West Coast States .. Anyone is welcomed accept for Anti-TI’s and Infiltrators set to disrupt or destroy group activity and Civil Liberty Processes.
  • European TI-group Public group  · 797 members This is a group for only European TIs. The intention with the group is to gather all TIs in Europe in order to discuss and to eventually plan some huge meeting, huge demonstration and collaboration between TIs. Invite all TIs from Europe. http://www.targeted-individuals-europe.com
  • TI THINK TANK Public group  · 415 members VÄLKOMMEN TILL DETTA GRUPP, HÄR SKA VI FÖRSÖKA KOMMA PÅ NYA OCH DJUPA IDÉER FÖR ATT HJÄLPA ALLA TI (targeted individual) att överleva alla trakaserier, gangstalking, strålning attack, och också att försvara sig på ett lagligt sätt genom att studera lagarna, vår bibel ska bli den stora boken om lagar.  
  • Targeted Individuals SoCal (TI) Private group  · 346 members
  • Georgia TI’s Activist Network Private group  · 15 members Facebook group for TI’s in the state of Georgia for support, activist efforts, and networking. Anyone in the Georgia area is encouraged to join.  
  • Devoted to TI Health Public group  · 379 members
  • Glenn Greenwald Support Group for TI of NSA Inquisition WorldwidePublic group  · 326 members
  • IN THE MEDIA: IS THIS PERSON A TI?Public group  · 213 membersPlease add any stories from the media where you suspect the person is being targeted. Whether or not the person knows they are being targeted, we may be their only voice as they are certainly being isolated by everyone around them. If the suspected target committed an act of violence we are not condoning it, just posing theories as to why they did it. Story can be old or new. Goals are to build public awareness and dialogue about targeting. God bless and thanks for supporting my new group page.
  • Patty’s thoughts and experiences about being a TI Private group  · 134 members
    • I started this group because I haven’t been well and I want to have some documentation of what has been happening to me. I wanted to document the severe torture and other attacks on my life. My health has been on a decline and I want to be sure that it is well documented that I was torture severely.
  • Civil case for targeted individuals …or the ‘LAST STAND OF THE TI COMMUNITY Public group  · 1.1K members steve ahmann, here. I created this group back in 2010 in an effort to get a class action lawsuit going. At that time, there was not much interest, and complaints about me and my credibility. There appears to be renewed interest. I have written a new revision of the suit that you can read under ‘files’. Look for Revision 15 (or later).  
  • TIs Legal Taskforce – Public group  · 694 membersThis Group’s Mission is to Find Legal Remedies & Redress for the Targeted Individuals.
  • TIs Action Network Public group  · 1K members This Group is a “Working Group” for Digital Grassroots Activism & a Hub for Targeted Individuals Action Plans. Our Current Projects are: Petition Drives, Document Database (see the Files), & Social Media Networking. Of course, new projects are welcomed & encouraged by any member. Thank you.
  • Targeted Individuals International Private group  · 10K members This is an international group for Targeted Individuals all over the world.  
  • TARGETED INDIVIDUALS – OFFICIAL SUPPORT GROUP ™️ Public group  · 2.4K members This is a Facebook Page devoted to the Targeted Individuals Cause; where TIs can offer support, advice and post relevant and non-fiction information. We Will Be Free..
  • Targeted Individuals PUBLIC Public group  · 8K membersThis public group addresses the worldwide reality of voice to skull technology and other forms currently in use by governments and corporations to control human beings and slowly over time the entire population. We present facts through evidence gathering and statistically impossible abnormalities through victim population recognition.  
  • Solutions for Targeted Individuals: A Group Effort!!! Private group  · 2.6K membersThis is a group to work together to find a solution. Let’s put our heads together because two heads are better than one. It is up to us to help each other and get off this slow kill black list.  
  • Targeted Individuals – Presented by the DadBod SocietyPublic group  · 2.4K membersThis is a group to protect our most vulnerable members of society from opportunistic libtards and scamers.  
  • List of targeted IndividualsPrivate group  · 1.1K membersCreating a TI data base
  • Targeted Individual – Evidence CollectionPrivate group  · 933 membersLET’S PUT IT ALL IN ONE PLACE! Share any medical or other evidence, testimony, support from a politician or other goverment authority, activism, photos, books about remote political control technology and methods, interviews of the targeted,… etc.- whatever your heart desires. At this point, we are trying to build to hard evidence       
  • US Targeted Individuals / victimsPublic group  · 458 members This is an effort to organize by country here on fb for our viral activism. We will focus on US matters here.  
  • Targeted Individuals AssociationPrivate group  · 5.5K membersThe TIA is a Pressure Group Against Covert Harassment, Ring Fencing, Gang Stalking, Voice to Skull, V2K, Direct Energy Weapons, DEW & RFID Implants. We are lobbying and suing every government in the world to ban this suppression
  • Smart Targeted IndividualsPrivate group  · 790 membersThis group is for those who are determined to find the truth and solutions and realize how targeters are playing us all.  
  • Targeted Individual Tips, Advice, and HelpPublic group  · 1.4K members
  • Targeted Individuals SoCal (TI)Private group  · 346 membersThis is a group devoted to the Targeted Individual… Their struggles, triumphs, and general thoughts in regards to everything from group stalking to electronic harassment. This group is specifically designed for those in Southern California, but is open to any and all! Let us share our experiences, our hopes, the evidence we collect and hopefully we will one day be able to file a court case against these criminals!
  • Targeted Individuals SacramentoPrivate group  · 424 members This group is for individuals in or near Sacramento, California or those concerned about the government’s use of workplace mobbing/gang stalking (Cointelpro-like operations), electronic harassment, mind control, and implanting of mind-control devices into human subjects without their knowledge. We are not anti-government. We love our country but we think we can do better! Human rights, civil rights, and dignity belong to everyone and no one has the right to take them away.
  • TARGETED INDIVIDUALS!!!Private group  · 374 membersTO MAKE THIS THE LARGEST TARGETED INDIVIDUAL GROUP ON THE INTERNET!!! TO SHED LIGHT!!!
  • Targeted Individual … to give Strength, love & hopePublic group  · 381 members = a place to share what gets you through the day
  • Targeted-USPublic group  · 466 membersThis is a group for Targeted Individuals (TI). Any member can add and approve new members. Any member may post what they want. The information on the site will be helpful to TI’s.
  • TARGETED INDIVIDUAL RESISTANCE GROUPPublic group  · 597 members
  • Targeted Connecticut & NortheastPrivate group  · 154 membersFor people who are targeted individuals in the Connecticut or anywhere else looking to share their stories and connect with others dealing with this atrocity to mankind.
  • TARGETED INDIVIDUALS – NATION OF TURKEYPublic group  · 9 membersSupport platform of Turkish victims and friends under microwave weaponry torture.
  • Targeted Individuals MuseumPublic group  · 165 membersThe Targeted Individuals Museum is dedicated to the conservation of videos and information of political, cultural, historical, and scientific importance regarding the systematic manipulation and abuse of the public. The Museum archives are available for public viewing to educate and inform. Visit the ‘Files’ section which contains the archives of the Targeted Individuals Museum.  
  • Targeted Individuals In AfricaPrivate group  · 365 membersThe Group For Targeted Individuals In The African Continent.
  • Targeted Individuals in South AfricaPrivate group  · 119 membersA group for TIs in South-Africa and the African continent. A place to post your stories and comments.  
  • TARGETED INDIVIDUALS FROM POLANDPrivate group  · 501 membershttps://tomekbieniek.wordpress.com/ http://stopzet.org/ Jestem Targetem od urodzenia tylko dlatego że moja Mama była Targetem. Stosują wobec mnie gang stalking i electronic harassment. Będę poszukiwał innych Targetów z Polski chociaż wiem że większość Targetów z Polski nie jest świadoma co się wokół nich dzieje.
  • The Gang Stalking and The Targeted Individual GroupPublic group  · 3.1K membersThis is a miss use of vital emergency services. NYPD, FDNY, EMS I already reported it. CCRB #IAB 201904539 on May 2019
  • Targeted Individuals, Danmark – Public group  · 181 membersElektromagnetisk tortur, en gruppe for danske T.I.s her kan man snakke med andre T.I.s, aftale møder, lave workshops og lign.
  • Targeted individuals SurvivalPublic Group – 219 Members
  • The Pattern of Choosing Targeted Individuals is in the FundingPublic group  · 286 membersTargeted individuals are people who’s biological attributes could be exploited to receive government funding while using them as live human test subjects, which gives them the upper hand in advancing science and technology, in the race for profits. Neurotechnology is the main stage in this era of scientific research and brain has become the final battleground in a war that has our communities involved in a public slow motion harvest and humiliation ritual that rewards their behaviour financially.
  • targeted individuals unite against the threatPrivate group  · 5.9K members This group is for targeted individuals, to help explain the enemy’s motive and discuss ways to fight back You are not alone! All TIs (Targeted Individuals) are welcome to join: https://www.facebook.com/groups/survivorsofmindcontrolsupportgroup/  
  • Targeted Individuals CommunityPublic group  · 325 members
  • Targeted Individuals Global CommunityPublic group  · 195 members
  • Targeted Individuals and Gangstalking Victims International Support GroupPublic group  · 7.3K members http://facebook.com/stopgangstalking A group for targeted individuals, victims and researchers to organize and discuss gangstalking along with its related techniques.  
  • Targeted IndividualPublic group  · 150 membersif you have been targeted by the Govt, then you are a targeted individual. only the truth can set us free.  
  • Targeted Individuals Video BasementPublic group  · 258 membersThis group is dedicated to the TI’s out there also know as “Targeted Individuals. I made this group for TI”s to post video evidence to raise awareness of what is taking place to alot of law abiding citizens.  
  • Targeted individuals balkans!!!Public group  · 745 membersOvde cemo sve fino okititi kako nase balkanske pojedine drzave ljudima peru mozak u 21. Stoljecu
  • Targeted individuals Belgium and HollandPublic group  · 398 membersDeze Groep is opgericht voor Targeted individuals uit België en Nederland..Ik S.V.d.V die deze groep oprichtte ben niet aansprakelijk voor de zaken die anderen plaatsen noch voor de commentaren van anderen/ This is a group for Targeted individuals from Belgium and Holland..Feel Free to post and share..
  • Targeted Individuals ChilePublic group  · 93 members
  • Targeted Individuals ColombiaPublic group  · 169 members
  • Creative Targeted IndividualsPublic group  · 780 members “Creative Targeted Individuals” is a group where one can see and share creative ideas, artworks, photos, poetry, stories or music made by and for Targeted Individuals.  
  • ENEMIES OF THE STATE = TARGETED INDIVIDUALS!!Public group  · 58 members
  • Targeted Individuals USAPublic group  · 58 members
  • Testimonies and Videos of Targeted Individuals and Whistleblowers.Public group  · 530 membersI Created This Group So Testimonies and Videos of Targeted Individuals and whistleblowers can be posted here..
  • Hour of Mercy/targeted prayersPublic group  · 1.5K members

Most of these victims report many of the symptoms reported by US diplomats in Cuba, China, Washington D.C. and Florida … and now Vienna and Berlin? … the locations are multiplying … hmmm, seems global …

https://www.nbcnews.com/politics/national-security/many-200-americans-have-now-reported-possible-symptoms-havana-syndrome-n1274385

So, what are the symptoms of Havana Syndrome that our groups of targeted individuals on FaceBook are also experiencing? …

“Those affected report a range of conditions including dizziness, headache, fatigue, nausea, anxiety, cognitive difficulties and memory loss of varying severity. In some cases, diplomats and intelligence officers have left active service due to complications from the condition.”

https://www.wsj.com/articles/havana-syndrome-symptoms-11626882951

and yes, the targeted individuals on FaceBook are experiencing those same symptoms as their years of digital testimony will reveal … they are experiencing those symptoms but they are also experiencing other symptoms which are much, much, worse … symptoms to do with injury and disease, symptoms to do with synthetic telepathy ( look it up ) and cognitive manipulation, … Symptoms which very much mirror these fine patents … … Let’s have a look at what the CIA and NSA have been developing shall we? … Wow, they’ve been busy, haven’t they? … Where are they going to find all of the people needed to test this stuff? … oh wait, isn’t it possible to use people branded as “terrorists” for this research? I hear that they have no rights at all …

CIA and NSA ELECTROMAGNETIC MIND CONTROL PATENTS

=====================================

This is a PARTIAL listing of various technologies available which can be combined for use in direct or subliminal mind-control systems.

  • USP # 6,488,617 (December 3, 2002), Method and Device for Producing a Desired Brain State Abstract:

A method and device for the production of a desired brain state in an individual contain means for monitoring and analyzing the brain state while a set of one or more magnets produce fields that alter this state. A computational system alters various parameters of the magnetic fields in order to close the gap between the actual and desired brain state. This feedback process operates continuously until he gap is minimized and/or removed.

  • USP # 6,239,705 (May 29, 2001), Intra-Oral Electronic Tracking Device

Abstract: An improved stealthy, non-surgical, biocompatible electronic tracking device is provided in which a housing is placed intraorally. The housing contains microcircuitry. The microcircuitry comprises a receiver, a passive mode to active mode activator, a signal decoder for determining positional fix, a transmitter, an antenna, and a power supply. Upon receiving a coded activating signal, the positional fix signal decoder is energized, determining a positional fix. The transmitter subsequently transmits through the antenna a homing signal to be received by a remote locator.

  • USP # 6,091,994 (July 18, 2000), Pulsative Manipulation of Nervous Systems

Abstract: Method and apparatus for manipulating the nervous system by imparting subliminal pulsative cooling to the subject’s skin at a frequency that is suitable for the excitation of a sensory resonance. At present, two major sensory resonances are known, with frequencies near 1/2 Hz and 2.4 Hz. The 1/2 Hz sensory resonance causes relaxation, sleepiness, ptosis of the eyelids, a tonic smile, a knot in the stomach, or sexual excitement, depending on the precise frequency used. The 2.4 Hz resonance causes the slowing of certain cortical activities.

  • USP # 6,052,336 (April 18, 2000), Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound as a Carrier

Abstract: An ultrasonic sound source broadcasts an ultrasonic signal which is amplitude and/or frequency modulated with an information input signal originating from an information input source. The modulated signal, which may be amplified, is then broadcast via a projector unit, whereupon an individual or group of individuals located in the broadcast region detect the audible sound.

  • USP # 5,539,705 (July 23, 1996), Ultrasonic Speech Translator and Communications System

Abstract: A wireless communication system, undetectable by radio-frequency methods, for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transmitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840R2l400, awarded by the US Department of Energy to Martin Marietta Energy Systems, Inc.

  • USP # 5,507,291 (April 16, 1996), Method and an Associated Apparatus for Remotely Determining Information as to Persons Emotional State

Abstract: In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated andwirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state.

  • USP # 5,159,703 (October 27, 1992), Silent Subliminal Presentation System

Abstract: A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain.

  • USP # 5,017,143 (May 21, 1991), Method and Apparatus for Producing Subliminal Images

Abstract: A method and apparatus to produce more effective visual subliminal communications. Graphic and/or text images, presented for durations of less than a video frame, at organized rhythmic intervals, the rhythmic intervals intended to affect user receptivity, moods or behavior.

  • USP # 4,877,027 (October 31, 1989), Hearing System

Abstract: Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to 10,000 megahertz that are modulated with a particular waveform. The waveform consists of frequency modulated bursts. Each burst is made up of 10 to 20 uniformly spaced pulses grouped tightly together. The burst width is between 500 nanoseconds and 100 microseconds. The bursts are frequency modulated by the audio input to create the sensation of hearing in the person whose head is irradiated.

  • USP # 3,951,134 (April 20, 1976), Apparatus & Method for Remotely Monitoring & Altering Brain Waves

Abstract: Apparatus for and method of sensing brain waves at a position remote from a subject whereby electromagnetic signals of different frequencies are simultaneously transmitted to the brain of the subject in which the signals interfere with one another to yield a waveform which is modulated by the subject’s brain waves. The interference waveform is re-transmitted by the brain to a receiver where it is demodulated and amplified. The demodulated waveform also can be used to produce a compensating signal which is transmitted back to the brain to effect a desired change in electrical activity therein.

The following is written by former White House insider Fred Burks (except for the patent obviously), The below patent describes technology used for behavior modification through TV, computer monitors, video, and DVD programming. If you have a science background, I invite you to read the full 16-page patent to see the high level of sophistication involved. The manipulation is not done through the insertion of single-frame anomalies, as has been done in the past, but rather by modulation of the feed or signal.

It is unfortunate that very few people are aware of these behavior modification capabilities. I doubt there are any laws to protect us from such manipulation. Like any tool, these technologies can be used for either the benefit or detriment of society. Let us spread this information so that we might assure that these technologies are not used for harm, but rather only for the benefit of humankind.

Note: For the U.S. Patent & Trademark Office patent search page, see this link. Or click here to go straight to patent #6,506,148. As the full patent is 16 pages long, only key excerpts are included below.

  • United States Patent 6,506,148  Loos, January 14, 2003 Nervous system manipulation by electromagnetic fields from monitors

Abstract  Physiological effects have been observed in a human subject in response to stimulation of the skin with weak electromagnetic fields that are pulsed with certain frequencies near 1/2 Hz or 2.4 Hz, such as to excite a sensory resonance. Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity.

Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA92651)  Appl. No.: 872528 Filed: June 1, 2001

SUMMARYComputer monitor and TV monitors can be made to emit weak low-frequency electromagnetic fields merely by pulsing the intensity of displayed images. Experiments have shown that the 1/2 Hz sensory resonance can be excited in this manner in a subject near the monitor. The 2.4 Hz sensory resonance can also be excited in this fashion. Hence, a TV monitor or computer monitor can be used to manipulate the nervous system of nearby people. The implementations of the invention are adapted to the source of video stream that drives the monitor, be it a computer program, a TV broadcast, a video tape or a digital video disc (DVD). For a computer monitor, the image pulses can be produced by a suitable computer program. The pulse frequency may be controlled through keyboard input, so that the subject can tune to an individual sensory resonance frequency. The pulse amplitude can be controlled as well in this manner. A program written in Visual Basic(R) is particularly suitable for use on computers that run the Windows 95(R) or Windows 98(R) operating system. The structure of such a program is described. Production of periodic pulses requires an accurate timing procedure. Such a procedure is constructed from the GetTimeCount function available in the Application Program Interface (API) of the Windows operating system, together with an extrapolation procedure that improves the timing accuracy. Pulse variability can be introduced through software, for the purpose of thwarting habituation of the nervous system to the field stimulation, or when the precise resonance frequency is not known. The variability may be a pseudo-random variation within a narrow interval, or it can take the form of a frequency or amplitude sweep in time. The pulse variability may be under control of the subject.

The program that causes a monitor to display a pulsing image may be run on a remote computer that is connected to the user computer by a link; the latter may partly belong to a network, which may be the Internet.

For a TV monitor, the image pulsing may be inherent in the video stream as it flows from the video source, or else the stream may be modulated such as to overlay the pulsing. In the first case, a live TV broadcast can be arranged to have the feature imbedded simply by slightly pulsing the illumination of the scene that is being broadcast. This method can of course also be used in making movies and recording video tapes and DVDs.

Video tapes can be edited such as to overlay the pulsing by means of modulating hardware. A simple modulator is discussed wherein the luminance signal of composite video is pulsed without affecting the chroma signal. The same effect may be introduced at the consumer end, by modulating the video stream that is produced by the video source. A DVD can be edited through software, by introducing pulse-like variations in the digital RGB signals. Image intensity pulses can be overlaid onto the analog component video output of a DVD player by modulating the luminance signal component. Before entering the TV set, a television signal can be modulated such as to cause pulsing of the image intensity by means of a variable delay line that is connected to a pulse generator.

Certain monitors can emit electromagnetic field pulses that excite a sensory resonance in a nearby subject, through image pulses that are so weak as to be subliminal. This is unfortunate since it opens a way for mischievous application of the invention, whereby people are exposed unknowingly to manipulation of their nervous systems for someone else’s purposes. Such application would be unethical and is of course not advocated. It is mentioned here in order to alert the public to the possibility of covert abuse that may occur while being online, or while watching TV, a video, or a DVD.

Source:

http://endthelie.com/books-and-reading-material/behavior-modification-and-mind-control-patents/#axzz2QabIv4c3

MORE MIND CONTROL PATENTS

===================

� 3646940 Implantable electronic stimulator electrode and method

� 3727616 Electronic system for the stimulation of biological systems

� 3835833 Method for obtaining neurophysiological effects

� 3837331 System and method for controlling the nervous system of a

living organism

� 3837331x Patents Referencing This One

� 3951134 Apparatus and method for remotely monitoring and altering

brain waves

� 3951134x Further Details

� 3967616 Multichannel system for and a multifactorial method of

controlling the nervous system of a living organism

� 4834701 Apparatus for inducing frequency reduction in brain wave

� 4335710 Device for the induction of specific brain wave patterns

� 4858612 A method and apparatus for simulation of hearing in mammals

by introduction of a plurality of microwaves

� 4883067 Method and apparatus for translating the EEG into music to

induce and control various psychological and physiological states and

to control a musical instrument

� 5036858 Method and apparatus for changing brain wave frequency

� 5213562 Method of inducing mental, emotional and physical states of

consciousness, including specific mental activity, in human beings

� 5330414 Brain wave inducing apparatus

� 5356368 Method of and apparatus for inducing desired states of

consciousness

Interference with Sleep and or Healing

� 3576185 Sleep-inducing method and arrangement using modulated

sound and light

� 3712292 Method and apparatus for producing swept

frequency-modulated audio signal patterns for inducing sleep

� 3773049 Apparatus for the treatment of neuropsychic and somatic

diseases with heat, light, sound and vhf electromagnetic radiation

� 3884218 Method of inducing and maintaining various stages of sleep

in the human being

� 4573449 Method for stimulating the falling asleep and/or relaxing

behavior of a person and an arrangement therefor

Measurement / Calibration

� 3789834 Processes and apparatus for the investigation of internal

physiological phenomena based on measurements of the impedance

variation of the surface of the body

� 3893450 Method and apparatus for brain waveform examination

� 3980076 Method for measuring externally of the human body magnetic

susceptibility changes

� 4354505 Method of and apparatus for testing and indicating

relaxation state of a human subject

� 4591787 Multi-channel device with SQUIDS and superconducting

gradiometers for the measurement of weak magnetic fields produced by

various field sources

� 4771239 Multichannel device with superconductor gradiometers for

measuring weak magnetic fields

� 4864238 Device for measuring weak magnetic fluxes utilizing planar

technology

� 4951674 Biomagnetic analytical system using fiber-optic magnetic

sensors

� 5256960 Portable dual band electromagnetic field radiation

measurement apparatus

� 5458142 Device for monitoring a magnetic field emanating from an

organism

� 5507291 Method and an associated apparatus for remotely determining

information as to person’s emotional state

� 5522386 Apparatus particularly for use in the determination of the

condition of the vegetative part of the nervous system

� 5557199 Magnetic resonance monitor

� 5579241 Real-time acquisition and archiving system for multiple

time-sampled signals

Using Drugs

� 4202323 Drug activation by radiation

� 4479932 Brain-specific drug delivery

� 5124146 Differential delivery of therapeutic agents across the

blood brain barrier

� 5453361 Method for producing biologically active human brain

derived neurotrophic factor

Other

� 3662758 Stimulator apparatus for muscular organs with external

transmitter and implantable receiver

� 4048986

Individual identification and diagnosis using wave polarization

Source:

http://www.catalase.com/patent.htm

  • US Patent #4,395,600, Rene Lundy and David Tyler, July 26, 1983.Auditory Subliminal Message System and Method,

An amplitude-controlled subliminal message may be mixed with background music.

  • US Patent #4,335,710, John Williamson, June 22, 1982. Device for the Induction of Specific Brain Wave Pattern

 Brainwave patterns associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.

  • US Patent #5,159,703, Olive Lowery, October 27, 1992.

Silent-Subliminal Presentation System, A silent communications system in which non-aural carriers in the very low or very high audio frequency renage, or in the adjacent ultrasonic frequency spectrum, are amplitude modulated with the desired intelligence and propagated acoustically or vibrationally for inducement into the brain.

  • US Patent #4877027, Wayne Brunkan, October 31, 1989. Hearing System,

 A method for directly inducing sound into the head of a person, using microwaves in the range of 100 Mhz to 10,000 Mhz, modulated with a waveform of frequency modulated bursts.

  • Psycho-Acoustic Projector, US Patent# 3,568,347, Andrew Flanders, Feb 23, 1971.

A system for producing aural psychological disturbances and partial deafness in the enemy during combat situations.

  • US Patent #4,034,741, Guy Adams and Jess Carden, Jr, July 12, 1977.

Noise Generator and Transmitter, An analgesic noise-generator.

  • US Patent #5,123,899, James Gall, JUne 23, 1992. Method and System for Altering Consciousness,

A system for altering the states of human consciousness involving the use of simulataneous application of multiple stimuli, preferable sounds, having differing frequencies.

  • US Patent # 5,270,800, Robert Sweet, December 14, 1993. Subliminal Message Generator,

A combined subliminal and supraliminal message generator for use with a television receiver, permits complete control of subliminal message and their presentation. Also applicable to Cable television and Computers.

  • US Patent #4,777,529, Richard Schultz and Raymond Dolejs, October 11,1988. Auditory Subliminal Programming System.
  • US Patent #4,834,701, Kazumi Masaki, May 30, 1989. Apparatus for Inducing Frequency Reduction in Brain Wave.
  • US Patent #4,335,710, John Willaimson, June 22, 1982. Device for the Induction of Specific Brain Wave Patterns,

Brainwave Pattern associated with relaxed and meditative states in a subject are gradually induced without deleterious chemical or neurologic side effects.

  • Apparatus for the treatment of Neuropsychic and Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation, US Patent #3,773,049, L.Y. Rabichev, VV.F. Vasiliev, A.S.Putilin, T.G.Ilina, P.V. Raku and L.P.Kemitsky, November 20. 1973.

Don’t let the nice title fool you. This is the patent for LIDA, the infamous Soviet brainwashing machine.

  • US Patent #5,539,705, M.A.Akerman, Curtis Ayers, Howard Haynes, July 23, 1996. Ultrasonic Speech Translator and Communication System,

A wireless communication system, undetectable by radio-frequency methods for converting audio signals, including human voice, to electronic signals in the ultrasonic frequency range, transitting the ultrasonic signal by way of acoustic pressure waves across a carrier medium, including gases, liquids and solids, and reconverting the ultrasonic acoustic pressure waves back to the original audio signal. This invention was made with government support under Contract DE-ACO5-840-R21400, awarded by the US Department of Energy to Martin Marietta Energy Systems Inc.

  • US Patent #4,821,326, Norman Macleod, April 11, 1989.Non-Audible Speech Generation Method and Apparatus.
  • US Patent #4,227,516, Bruce Meland and Bernard Gindes, October 14,1980. Apparatus for Electrophysiological Stimulation.
  • US Patent #5,352,181, Mark Davis, October 4, 1994. Method and Recording for Producing Sounds and messages to achieve Alpha and Theta Brianwaves States and Positive Emotional States in Humans,
  • US Patent #4,883,067, Knispel et. al., November 28. 1989.Method and Apparatus for Translating the EEG into Music to Induce and Control Various Psychological and Physiological States and to Control a Musical Instrument.
  • Method of and Apparatus for INducing Desired States of Consciousness, US Patent #5,356,368, Robert Monroe, October 18, 1994.

Improved methods and apparatus for entraining human brain patterns, employing frequncy-following-response (FFR) techniques and facilitating attainment of desired states of consciousness.

  • US Patent #4,889,526, Elizabeth Rauscher and William Van Bise, December 26, 1989. Non-Invasive Method and Apparatus for Modulating Brain Signals through an External Magnetic or Electric Field to Reduce Pain.
  • US Patent# 3,393,279, July 16, 1968 Nervous System Excitation Device, Gillis Patrick Flanagan.

A method of transmitting audio information via a radio frequency signal modulated with the audio info through electrodes placed on the subject’s skin, causing the sensation of hearing the audio information in the brain.

  • US Patent #3,647,970, G. Patric Flanagan, March 7, 1972. Method and Simplifying Speech Waveforms,

A complex speech waveform is simplified so that it can be transmitted directly through earth or water as a waveform and understood directly or after amplification.

  • US Patent #2,995,633, Henry Puharich and Joseph Lawrence, August 8, 1961. Means for Aiding Hearing.

                 Means for converting audible signals to electrical signals and conveying them to viable nerves of the facial system.

  • US Patent #3,170,993, February 23, 1965. Henry Puharich, Means for Aiding and Hearing by Electrical Stimulation of the Facial Nerve System
  • US Patent# 4,858,612, Philip Stocklin, August 22, 1989. Hearing Device.

                  A method and apparatus for stimulation of hearing in mammals by introduction of a plurality of microwaves into the regions of the auditory cortex.

  • US Patent# 5,134,484, Joseph Wilson, July 28, 1992. Superimposing Method and Appartus Useful for Subliminal Messages, Method of Changing Person’s Behavior.
  • US Patent # 5,213,562, Robert Monroe, May 25, 1993, Method of Inducing Mental, Emotional and Physical States of Consciousness, including Specific Mental Activity, in Human Beings.
  • US Patent 4,717,343, ALan Densky, January 5, 1988.

A method of conditioning a person’s unconscious mind in order to effect desired change in the person’s behaviour, and which does not require the services of a trained therapist.

  • US Patent US3014477, Carlin, 1961, Hypnotic Inducer (Mind ControlMachine)
  • US Patent US3060795, Corrigan Et al, 1962, Apparatus for Producing Visual Stimulation (Subconscious Transmission via Movie Film)
  • Patent US3278676, Becker, 1966, Appratus for Prdoucing Visual and Auditory Stimulation (Subconscious Transmission via TV)
  • Patent# US3563246, Flanagan, 1968, Nervous System Excitation Device
  • Patent# US3712292, Zentmayer Jr, 1973, Method of and Apparatus for Producing Swept Frequency Modulated Audio Signal Patterns for Inducing Sleep (Brain Frequencies Broadcast)
  • Patent# US3951134, Malech, 1976, Apparatus and Method for Remotely Monitoring and ALtering Brain Waves (RF/Electromagnetic Waves)
  • Patent# US4395600, Lundy, 1983, Auditory Subliminal Message System and Method (Subliminal Brainwash via Music or Other SOund)
  • Patent# US4717343, Densky, 1988, Method of Changing A Person’s Behavior, (Subconscious Brainwash via Video)
  • Patent# US4777529, Schultz/Dolejs, 1988, Audiotory Subliminal Progamming System (Silent Brainwash via Music or Other Sound)
  • Patent# US5889870, Norris, 1999, Acoustic Heterodyne Device and Method (Ultrasound Ventriloquist Effect)
  • Patent# US6011991, Mardirossian, 2000, Communication System and Method Including Brain Wave Analysis and/or Use of Brain Activity (Remote Viewing)
  • Patent# US6470214, O’Loughlin/Loree, 2002, Method and Device for Implementing The Radio Frequency Hearing Effect (Microwave Hearing)
  • Patent# US6587729, O’Loughlin/Loree, 2003, Apparatus for Audibly Communicating Speech Using The Radio Frequency Hearing Effect (Microwave Hearing)
  • Patent# US6052336, Lowery, 2000, Apparatus and Method of Broadcasting Audible Sound Using Ultrasonic Sound As a Carrier (Ultrasound)

How do we explain this?

Police Using Electromagnetic Weaponry in Washington state?

https://blog.tenthamendmentcenter.com/2021/07/now-in-effect-washington-law-prohibits-no-knock-warrants-and-limits-federal-militarization-of-police/?__cf_chl_captcha_tk__=_4ab893f305215176eab3faf5b157eea24d054d6c-1627256522-0-gqNtZGzNA3ijcnBszQfi&fbclid=-Y

or this …

Defense Primer – Military Use of Electromagnetic Spectrum

or this …

The New Era of High Powered Microwave Weapons by Military Aerospace Electronics

https://www.militaryaerospace.com/power/article/14072339/emp-high-power-electromagnetic-weapons-railguns-microwaves

So can we get real here and actually discuss what’s going on? … or are we going to continue to pretend that we’re totally innocent about these weapons and absolutely shocked that our government workers have been hit with them? ….

One more thing, … It’s illegal to conceal crime with government classification ….

As always, Shine a Light People !!!!

( and if you can help me to survive while I shine a light you’ll find a donation link on my about page )

The Financial Elite and the Robotic Age – Does This Include Humans?

The Financial Elite and the Robotic Age – Does This Include Humans?

World Economic Forum founder and executive chairman Klaus Schwab states openly that we will “Have Nothing and Be Happy” … their motives are in clear view …

Would he also like us to “be nothing”?  I base my question on the following evidence of an extreme trend towards human roboticism, an agenda that I am acutely and intimately aware of, as are thousands, if not millions of global citizens who are being used for testing of these systems … wake the hell up Houston, we definitely have a problem …

Let me be clear about this … what is being studied is nothing less than the complete and utter takeover of the human being by connecting the brain to electronics … are you ok with that? Don’t believe me? Think that this is just a “conspiracy theory” ?  Take a look at this website …

http://gf2045.com/

Science fiction? … Do some research about the conference ….

Did you know that others are planning your evolution? Isn’t that in the realm of nature and God?

Look carefully … “Project Avatar; Android robotics, Anthropomorphic telepresence, Neuroscience, Mind theory, Neuroengineering, Brain-Computer Interfaces, Neuroprosthetics, Neurotransplantation, Long-range forecasting, Future evolution strategy, Evolutionary transhumanism, Ethics, Bionic prosthesis, Cybernetic life-extension, Mid-century Singularity, Neo-humanity, Meta-Intelligence, Cybernetic Immortality, Consciousness, Spiritual development, Science and Spirituality.

Are you getting all of this? Are you alarmed? “Neuroengineering, Future evolution strategy, Neo-Humanity, Cybernetic Immortality, Science and Spirituality”? … The last time that I looked science didn’t have anything to do with spirituality … Not a thing!!! … Unless, of course, you can manipulate the brain to achieve desired states of spirituality or non spirituality … now, that would be something … wouldn’t it? Talk to the CIA about this and read my previous works.

Manipulating the brain is nothing new. I’ve written books about it. But never before have the richest and most powerful people on earth stated publicly that this is the way of humanity in the future … Are they joking? … Watch this …

So this is all off in the future, right? … there are so many pressing problems right now that need immediate attention … talk to these people and then review the funding for Obama’s Brain Initiative … perhaps all of the pressing problems right now are fitting in just perfectly as a distraction for the implementation of this plan …

A video made by the global victims of remote influencing technologies. A must watch.

https://thelegalcoop.wordpress.com/2021/04/04/free-litigation-library-plaintiffs-motion-to-admit-legal-counsel-into-texas-non-consensual-implant-biochip-microchip-case/

By the way, I am not a conspiracy theorist but a conspiracy realist meaning that I do not write about things that I can not prove. Because of this, I have been financially attacked for the last ten years. I will be adding a donation option on the about page just as soon as I can figure it out. Thank you for reading this. Thank you for your support.