This post is about:

  • covert airplanes used for illegal medical procedures
  • how perpetraitor terrorists prepare targeted individuals for uplift to covert airplanes
  • some of the science behind these illicit operations


800px-PatiententransporteinheitNovember is the month when perpetraitor terrorists sort through all the images of potential research targets for the coming year, and produce a list of those to be implanted with tracking devices and other specialist prostheses such as retinal cameras,  ear implants and / or inner ear microphones for synthetic telepathy candidates that perpetrators intend to force into their service as spies.

Many targeted individuals report receiving implants and prostheses, but how is it done? I hope to be able to throw some light on this, based on my own experience, observation and the experiences of other targeted individuals.


What I think happens is that a cargo plane, equipped with stealth technologies, surgical instruments and gravity manipulation devices, is deployed to an area where perpetraitors are active.  Perpetraitors produce a schedule of all the victims and the times for their transportation to the cargo plane. Local perpetraitors sedate the victims throughout the day with inhaled hypnotics, and finally administer a stronger anaesthetic dose.

Smaller stealth aircraft with gravity manipulation devices and classified quantum technologies, hover over the houses of targeted individuals at the appointed time, and locking onto pre-set co-ordinates, alter the gravity of the victims, and using quantum transportation, deliver them to beds in loading bays on the cargo plane.


Colors indicate increases or decreases in infrared radiation emitted from the body surface

Specialists in clinical telemetry then scan the bodies of the victims, mapping their physiology and brain frequencies, using MRI, fMRI and other diagnostic devices. Ultimately, a CD of biodata is produced for each targeted individual.  Copies of these CDs are subsequently  supplied to selected perpetrator groups to undertake non consensual human subject research for terrorist fund-raising.

Criminally compromised clinicians on the cargo plane then insert tracking devices, ultrasound ear microphones and retinal nerve cameras etc, before returning the victims, still anesthetized, to the smaller craft, who then drop them back in bed.

On Friday 15 November at about 12.45 a.m. I was lying in bed, when I became aware of an external intervention creating breathing difficulties. I decided to open the window.  As I went to raise the blinds, I was attacked on the left upper leg by a muscle-paralysing beam, with acute pain like a Taser device.


Picture above:  A handheld stun gun which discharges high-voltages to penetrate clothing, followed by low-voltages to cause Neuro Muscular Incapacitation.


Luckily I had two MEDICURE ultrasound pain management devices on the dressing table, so I clicked on one of them and it released the beam attack.*  The attack, which seemed to be directed from the flat above, then switched to the other upper leg.  I clicked on the other ultrasound device and again it went away.  After opening the window I wrapped a warm waterproof coat round me, which provides good EMF shielding, and went back to bed.

* The MEDICURE is not much use for reducing pain, but it is an ultrasound device, and it appears to reduce the effectiveness of some perpetrator devices that use ultrasound beams to track and target me.

Perpetraitors told me that when I was attacked on the legs with a taser-like device last week, it was because i was booked in a slot for upload to a secret surgery plane, and that by getting out of bed at that time, I missed my scheduled upload.  How true that is I do not know, but I have heard of similar events occurring elsewhere.

 I have reason to suspect that a perpetraitor craft has been in the local area, with stealth technology and gravity manipulation enhancements. The craft would have the capability to upload and download targeted individuals for the purpose of mapping their physiological, neurological and frequency arrangements using telemetry, and for implantation of tracking devices, ultrasound ear microphones and retinal procedures such as implantation of retinal nerve cameras.  If true, this is not such good news for the people of Haslemere.

715px-FracturedtoothA friend of mine who lives in County Durham, and who is a long-standing targeted individual, told me a couple of weeks ago that she woke up one November morning with a horizontal break in the middle of one of her front teeth.  The same thing happened to me in November 2011.  I suspect that this is the result of anaesthetic equipment being applied hurriedly, for the purpose of updating tracking devices and telemetry chips for the coming year of nonconsensual research. The timing is consistent with the activities of the stealth aircraft used for illicit surgical procedures.

Picture above:

When i went to my dentist with a broken tooth, he said to his assistant, “Now I want you to look carefully at this X-Ray, because you are unlikely to see such a horizontal break again.  They are normally only presented by boxers who have been punched in the face”.  My dentist cross-questioned me about how I got the horizontal break, and I was not able to give him a satisfactory answer, since I did no know, although I had strong suspicions that it was a stealth surgical procedure.  My friend’s recent experience tends to support this hypothesis.

THE SCIENCE – Gravity Manipulation and Micro Gravity


Picture above: Astronauts on the International Space Station experience only microgravity and thus display an example of weightlessness.

Antigravity and microgravity devices have been around long before the first space walk. ‘Airplanes have been used since 1959 to provide a nearly weightless environment in which to train astronauts, conduct research, and film motion pictures. Such aircraft are commonly referred by the nickname “Vomit Comet“…A typical flight lasts around two hours. Source:



Picture Source:

‘A reduced gravity aircraft is a type of fixed-wing aircraft that provides brief near-weightless environments for training astronauts, conducting research and making gravity-free movie shots.

Versions of such airplanes, officially nicknamed Weightless Wonders, have been operated by the NASA Reduced Gravity Research Program. The unofficial nickname “vomit comet” became popular among those who experienced their operation.

800px-Mercury_Astronauts_in_Weightless_Flight_on_C-131_Aircraft_-_GPN-2002-000039NASA has flown zero gravity flights on various aircraft for many years. In 1959,Project Mercury astronauts trained in a C-131 Samaritan aircraft, which was dubbed the “vomit comet”...


Peter Diamandis of Zero Gravity Corporation

NASA currently has a microgravity services contract with Zero Gravity Corporation (ZERO-G) and uses its aircraft, G-FORCE ONE, a modified Boeing 727-200.[10]

In late 2004, the Zero Gravity Corporation became the first company in the United States to offer zero-g flights to the general public, using Boeing 727 jets.’

These flights can go at over 25 times the speed of sound in order to combat gravity. See

THE SCIENCE – Levitation



Levitation (from Latin levitas “lightness”)[1] is the process by which an object is suspended by a physical force against gravity, in a stable position without solid physical contact. A number of different techniques have been developed to levitate matter, including the aerodynamicmagneticacousticelectromagneticelectrostatic,gas film, and optical levitation methods…Levitation techniques are useful tools in physics research…

Frog_diamagnetic_levitation-1Scientists have levitated frogs, grasshoppers, and mice by means of powerful electromagnets utilizing superconductors, producing diamagnetic repulsion of body water. The mice acted confused at first, but adapted to the levitation after approximately four hours, suffering no immediate ill effects…

Magnetic levitation is used to suspend trains without touching the track. This permits very high speeds, and greatly reduces the maintenance requirements for tracks and vehicles, as little wear then occurs. This also means there is no friction, so the only force acting against it is air resistance.’


THE SCIENCE – Implants as tracking devices

It is now compulsory in some countries for dogs to be implanted with tracking devices so that they can be identified.  Vets implant tiny devices under the skin – see  Pets can be tracked using GPS.

519px-Rfid-scanner‘A microchip implant is an identifying integrated circuit placed under the skin of a dogcathorseparrot or other animal. The chip, about the size of a large grain of rice, uses passive RFID (Radio Frequency Identification) technology… Microchips can be read with a scanner…The vet or technician injects the chip with a syringe and records the chip’s unique ID. No anesthetic is required. A test scan ensures correct operation…In dogs and cats, chips are usually inserted below the skin at the back of the neck between the shoulder blades on the dorsal midline.’


‘A human microchip implant is an identifying integrated circuit device or RFIDtransponder encased in silicate glass and implanted in the body of a human being. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information…Since nearly all implantable microchips are unencrypted, they are extremely vulnerable to being read by third-party scanners.

By scanning secretly, someone could steal the information on a chip and clone the signal, enabling that person to impersonate a chipped individual. This could create security problems for building or computer access or potentially enable criminal misuse of a medical account held by an unrelated person.

The Council on Ethical and Judicial Affairs (CEJA) of the American Medical Association published a report in 2007 alleging that RFID implanted chips may compromise privacy because there is no assurance that the information contained in the chip can be properly protected.’ Source:

Update Wednesday 20 November 2013

Perpetraitor terrorists were not happy that information about their illicit use of medical planes was publshed.

To express their displeasure about this, perpetraitor trainees on a terrorist training course being held every week in the Haslemere area, hacked into my laptop while I was on the Surrey local government library server, and left the following ‘messages’ relating to various types of perpetraitor attacks on me below:
Screen Shot 2013-11-20 at 15.26.50
The hacking took place between 15.30 and 16.30 British Daylight Saving Time.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s