This post is about:

  • My first gang-stalking experiences this year
  • Perpetraitor foreign gang-stalking training courses
  • How perpetraitors trap people in a life of crime


Gang-stalking, also sometimes described as a form of street-theatre, is defined by Wikipedia as:

“surveillance and harassment of a designated target, by stalkers which are members of groups, which are networked.

Gang-stalking has three essential elements: The harassment is done by a substantial number of people, not by an obsessed single stalker, nor by helpers who are recruited by an obsessed single stalker.

The group members are given the name of the target and/or have the target identified for them. They do not usually know the target beforehand. Organized stalking community groups are tightly networked with stalking groups in other communities.”



I have been a targeted individual for at least 18 months, and I am being targeted by two different groups based in the US. I was born in Britain, where I lived and worked for most of my life. Since my retirement, I went on holiday in the US, where I was targeted, and on return to the UK, I continued to be targeted by US operatives based in Britain, some of whom are in London, and others in my local town.

I first experienced gang-stalking in May 2013, when I became aware that some kind of perpetraitors international training course was being conducted in the sleepy street where I live.

It is hard to believe that a group of young foreign 20-30 somethings, could be based so close to my own apartment, studying gang-stalking and electronic targeting techniques, and using me as a nonconsensual human subject.

I think my perpetraitors have been getting additional income during the summer months, from making me available as a human subject.

As well as gang-stalking courses, I discovered that there were courses in synthetic telepathy for communicants – people whose job is to try to engage targeted individuals in conversation to establish their daily schedules, where they go, who they meet and how long they will be away from their home. Communicants a give feedback to electronic technicians on bio-data changes arising from targeting with electromagnetic radio waves and laser hits.

As the weeks progressed, there were advanced classes for technicians learning how to hit victims with painful laser beams.  Again,  I was a nonconsensual human target, and the entire class got to have a go at me, but their weapons were set at a low strength during the initial training. 


In the middle of all this, I had to attend an eye clinic to have a black floater removed from my eye using ultrasound. The floater was in fact a nano-camcorder. I had learned from experience that perpetraitors used photographs of people recorded on the video to identify their personal radio wave frequencies, in order to track them remotely and target them. So having the floater disabled was an important step in preventing more people where I live from being targeted.

I traveled to the clinic by train. On the outward journey, when I got on the train from my town, the compartment was empty. Then three people in their twenties joined me –  a young fair-haired man and woman, who might have been twins, and supervising them, a slightly older woman with brown hair.

She directed the ‘twins’ to sit in two seats next to me. They were giggling nervously. She sat opposite them, holding a note-book with index cards, prompts etc. Their conversation suggested that they were trainee actors sitting some kind of exam.

They seemed basically nice kids, but very nervous, and when they burst into nervous laughter I saw fear in their eyes that suggested to me they had good reason to be afraid of failure. The three of them left the train after fifteen minutes.

On the return journey I found myself in a packed compartment with only a few seats free, and about twelve perpetraitors sitting behind me, some of whom I recognised from  earlier interaction on the perpetraitors synthetic telepathy system – known as Syntel.


Syntel can provide not only a two-way audio system but also a two-way video link, although this is not normally enabled now, to protect the anonymity of perpetraitors.  At first they did not realise I could see them, but when they realised, they put a block on the viewer. In fact I can still see perpetraitors  occasionally on the internal viewing screen attached to my retinal implant, if they forget to activate the block.

There were two men who appeared to be in their fifties, one in his forties, and a man and woman in their late thirties. These were clearly supervisors of their younger charges.   Some of the younger male perpetraitors were making abusive comments about me, with an air of bravado, relating to my being a female, and to my appearance – big deal considering I am nearly 65 years old. How ludicrous can you get?

Most of the trainees were too shy to say much. But when a younger female passenger took the seat next to me, they were emboldened to make a few catcalls, and personal comments about her as well.

Flock_of_sheepSitting right behind me were an Asian woman and an English man in his fifties, who talked to each other about their work as mental health care workers. They were part of the group, and interacted with them, but did not participate in the verbal abuse.  When we got to London I watched them all carefully as they disembarked, memorizing their features. I got another chance to review them all when I joined a taxi queue to cross London. They were all lined up behind me, looking rather sheepish.

Some of them joined the train that took me to my home town, and they were joined by one or two others that I recognised, one of whom lived and worked as a computer technician in my road.

The next day I had to go to London unexpectedly. the perpetraitors knew of this as soon as I did, through listening to my thoughts on synthetic telepathy. As I walked through a station to board an underground train, I took a staircase down, and became aware of people pressing behind me, as if in a hurry. I stood aside to let them overtake me, and recognised the two fair-haired ‘twins’ who had been in the train with me the previous morning. They giggled as they ran past and rushed away through the crowds, holding hands. I noticed that the female had a long pony tail that day, whereas she’ d had a short hair style the previous day, which was presumably a wig.


A month later  I had to go for a second treatment at the laser eye clinic, for the process to be completed.   On the return journey,  the train stopped at a station about an hour from London, and two large men, possibly from North America, rushed in and sat down on separate airline seats, one behind the other, looking at me. They became engrossed in their smartphones, which were pointed at me, and they had small earphones connected to their smartphones.

My impression was that they were competing with each other, and both had stern expressions, exhibiting intense concentration.  I suspected that they were trying to dial-up some transmission device in my eye, and see whether my eye treatment had disabled the connection. After about twenty minutes, they relaxed and took no more interest.


I decided to update my website diary. These days it is not possible for me to use my computer on-line at home, owing to perpetrator hacking, so I take my laptop to a municipal WIFI room, in our local village. As I sat at my computer, a young boy about 12 years old came and sat right next to me, using a device like an iPod, plugged into the socket next to mine. he had small white ear phones. It became obvious that he was using the device to access my computer and take a copy of what I was writing, and that he was receiving instructions via the earphones.  When perpetrators take copies of my work, it is usually so that they can alter the contents, and then substitute their version on my blog.

I was shocked that a child should be set to work in this way, because in Britain, if children undertake activities with adults, such as participation in a public theatre performance like the musical Oliver, the law requires them to be accompanied by a licensed chaperone,to prevent exploitation. See end of this article for details.+

Since I was on syntel, I pointed this out mentally to the perpetrators. five minutes later two women showed up, and one of them came over and asked the boy if he was OK. She then sat down and watched him till I left.


598px-Heliconius_mimicryOne of the strangest things about my gang-stalking experiences was the look-alikes. I saw four young men and one young woman who could have been brothers and sisters, and a woman in her thirties, who also looked very similar, slim build with fair hair and blue eyes, similar to the colouring of many people in Norway. Were they all from the same family, I wondered. I saw a couple of the young men get into a taxi at my train station.



I commented via syntel to the perpetraitors, that the foreign students stood out like a sore thumb in a quiet British town, and that if their objective was to be covert, they would do better to ride bicycles than hang around sports cars. Since then, I have seen some of the gang-stalkers using bicycles.Some times, I would see groups of young people, some of whom looked Mediterranean, strolling round my town, the women wearing glitzy designer shades. Some of them hung around flashy foreign sports cars parked in the street. I suspect some of them were actually actors.

SuricataOne day, when I went to the hairdresser, one of the young men was already in there, accompanied by a woman, having his fringe bleached with highlights. I heard a perpetrator explaining to another perpetrator via syntel that the young man was worried because targeted individuals tended to remember his features more than other gang-stalkers, because he was dark. So he was having his hair lightened to blend in more with the rest.

I noticed that he and the woman both had smart phones, full of tiny text, which they studied intensely. There seemed to be a correlation between the text and the timing of my thoughts.  I suspected that perpetraitors must get an almost instant print out of whatever is said or thought via the syntel system.  My suspicions were reinforced when at one point, while I was thinking aloud to my self, I broke off in mid sentence. Looking over the shoulder of the woman in the hairdressers, I saw this reflected in her smart phone by a paragraph break.

THE DARKER SIDE OF THE PERPETRAITOR TRAINING COURSE                                                                                        

0At the end of every weekly training course, some of the young men were selected to stay on at the weekend.  Evenings and  weekends are when perpetraitors typically carry out acts of violence, using electronic weaponry.  The reason for this may be that the British network system used by the perpetraitors seemed to do its housekeeping from about 01.00 BST, while the US equivalent did not start till about 03.00 BST, so there was a gap of two hours when perpetraitors thought they could operate unobserved.  They also appeared to think that there were fewer British law enforcement staff on duty to monitor their activities at the weekend.

The young men were introduced to use of stronger powered electronic weaponry which could inflict serious pain on targeted individuals. I was usually one of the targets on these occasions, and I often used shielding devices to block their activities.

Some of the young men went on to the next stage a week later, when they were told their big day had arrived.  They would be allowed to drive unsupervised in the midnight hours.  Unbeknownst to them, their tutors had spiked their brain fluids  with chemical intoxicants and steroid stimulants, in order ro hype them up, using remote neural programming and sonar vortex ring technology*, which can deliver the chemical cocktail remotely. [See end of this article for a reference to the  technical details of vortex rings]

It sometimes happened that tutors, using a different gravatar from the one used to identify them on the syntel system, stage-managed frenzied attacks on a selected victims, in which the young turks participated to some extent. Next day the tutors take the young men aside and tell them that because of what they have done, they could be arrested any time, but that the tutors will not give them away, provided they fully commit to being perpetraitors from now on.

It is possible to kill people with these electronic and sonic weapons, and I was seriously targeted with chemicals that brought on breathing difficulties in the early days.  I had to call the police on one occasion.  Another member of my family was later attacked with sonar and lasers, and was lucky to survive.  Neighbours called the police in the middle of the night. The police have been really good, checking up on her regularly, since then.



It is hard to believe that even a criminal mafia type organisation could spend so much resources, and turn up mob handed on so many occasions, just to give a little old lady some bad vibes. Perhaps it was because it was one of a series of training courses typically for 12-20 people.

I commented via syntel to the perpetraitors, that the foreign students stood out like a sore thumb in a quiet British town, and that if their objective was to be covert, they would do better to ride bicycles than hang around sports cars. Since then, I have seen some of the gang-stalkers using bicycles.

So what was the point of it all? I suspect that gang-stalking is just another job creation programme for criminals, funded by the criminally insane. There is no incentive for gang-stalkers ever to stop their activities, as it will put them out of a job.

To me it was just annoying, but in some countries, where law and order are understood differently, it could be sinister and threatening, particularly when gang-stalking was taken a stage further into targeting, and people were not just making objectionable or salacious comments, but breaking into people’s houses and sabotaging their property.  Several targeted individuals have recorded their gang-stalking and targeting experiences, including:

Gloria Naylor in her book ‘1996‘, published in 2006, and Elizabeth Sullivan, in her book ‘My Life Changed Forever: The Years I Have Lost as a Target of Organized Stalking‘.


My experience is mild by comparison with these.  In my view this is because the British police would arrest people who did the things described in these books, so the perpetrators did not dare do anything too extreme.  I would describe gang-stalking as a form of anti-social behaviour, which, according to Wikipedia, is now classified as a form of mental illness – see Antisocial_personality_disorder.

Those who authorise such activities live in an insane fantasy world of their own, and  a secure mental institution for the criminally insane is where they should be. But some of the kids and their mentors may have been taken from young offenders institutions and press-ganged into criminality, and if so, they need to be rescued as much as the targeted individuals.


+ pagereq=2#.Ud87mGt5mK0

* For technical details of vortex rings see chapter 7.3.4 of ‘Non-Lethal Weapons’, by Neil Davison, 2009. At the time of publication, Neil Davison was a senior policy adviser in the Science Policy Centre at the Royal Society.  For four years he was lead researcher at the Department of Peace Studies, University of Bradford.

Picture sources:


This post was first issued on 5 November 2012.

This post is about:320px-Backscatter_large

  • Part I: Psychotronics – what it is and how it works.
  • Part II: Psychotronics used for anonymous torture.
  • Part III: Advanced technologies associated with psychotronics.

Picture above:  How perpetrators may see Targeted Individuals via psychotronics.  Source:                                                                             

PART I: Psychotronics is a complicated subject, and not everyone agrees what it is about.  I would describe it as ‘manipulating brain activity to achieve physiological outcomes’.

The main point about psychotronics is that it can be used remotely, and anonymously on innocent civilians for torture, mind control and sinister political purposes.  Criminal perpetrators can commit crimes against humanity without detection, as if they were invisible. They can in fact be detected, but only through use of similar technologies.

Just because these criminals are using invisible directed energy weapons  and not  guns, and because they redefined information warfare as  propaganda, we are supposed to think it is less than war and murder of the  citizens. These are invisible weapons being used far more destructively than a simple bullet to the’

Cochlear_implantHowever psychotronics is widely used in health treatments, enabling people suffering from paralysis to speak and move, and enhancing sight for people with partial blindness or hearing problems.  When it comes to new technologies, psychotronics is just the tip of the iceberg.  This post looks at some of the implications of psychotronics, and what is now in the public domain about a range of formerly secret technologies.  Picture opposite: Cochlear implant.


Some people interpret psychotronics as meaning ‘synthetic telepathy’, or referring exclusively to weapons purposes. Here are three different interpretations of ‘psychotronics’:

–  Psychotronics as synthetic telepathy

162px-Capricho_43,_El_sueño_de_la_razón_produce_monstruos‘Synthetic telepathy also known as techlepathy or psychotronics – is a term used to describe the process in brain-computer interfaces by which human thought (as electromagnetic radiation) is intercepted, processed by computer and a return signal generated that is perceptible by the human brain. (ref 1,2,3,4)’

1. – Army developing ‘synthetic telepathy.

2. – Army Sinks Millions Into “Synthetic Telepathy” Research

3. – Tips and Tricks for Mind Control from the US Military

4. articleshow/3596708.cms – US army developing synthetic telepathy

Source: at

Effects_of_sleep_deprivation.svg–  Psychotronics as weapons development programmes

‘Development programs for microwave and radio frequency radiation weapons designed to influence the central nervous system’.

Source: Marshall Thomas – Monarch II  -Victims.pdf

– Psychotronics as a method of inflicting torture and mind control

There are two options for inflicting torture via electronic weapons, gang-stalking or remote delivery of Directed Energy Weapons  – DEW.  Unless the TI lives nearby, gang-stalking isn’t an option, which is why Remote Neural Monitoring used to be a requirement – If you aim a precision electronic weapon at someone from a distance, you want to know where you hit them, and what effect that had on them.

If perpetrators wanted to carry out assassination, they would use lethal equipment.  The purpose of targeting individuals seems to be to force them into virtual slavery using electronic weapons and to brainwash them into obedience using mind control.  This would never be achieved over night, which is why an episode of psychosis followed by temporary incarceration in a mental institution were regular tools that perpetrators used in an attempt to create new mind controlled slaves or hostages.

But TIs have proved much more resilient than expected by perpetrators.  The only way to bludgeon human beings into permanent submission is by mafia tactics of gang-stalking – hit them on the head with a blunt instrument.  The close proximity of MKULTRA perpetraitors to their victims was what ensured the relative success of that era of abduction and torture of innocent citizens. The total condemnation of that era by the elected representatives of the USA should leave no one in any doubt of the illegality of such activities.

In his first book ‘The Matrix Deciphered’ – now freely available on his website at, this is what Robert Duncan has to say about his work experience and psychotronics:

My research interests have been neural networks, virtual reality, and EEG controlled robotics. Before graduate school I worked for the Department of Defense, Navy, NATO, and various intelligence agencies computer science projects… and worked on the highest level of military projects for the U.S., NATO, and U.K…
I apologize to the human race for any contribution to these 4th generation weapons that I may have worked on that are more horrific than the nuclear bomb and whose cover-up is more pervasive than the Manhattan Project. And because of the horrific acts of violence being committed on as many as two thousand Americans as far as my research has uncovered and many others in other countries, I understand the extreme risk to my own welfare that publishing this material will have.

In this post I quote a fair bit from ‘The Matrix Deciphered’, because it covers psychotronics in a lot of detail, and few authors do that.  Here’s what Robert Duncan says about psychotronics:

130px-Francisco_de_Goya,_Saturno_devorando_a_su_hijo_(1819-1823)Coal miners used as slaves were hobbled by breaking of their ankles to keep them from running away and demonstrated in the movie,”Misery”. Brain hobbling through psychotronics is done today in an analogous fashion.

By using psychotronic generators to inject minute random currents into the targeted brain, a threat will exhibit schizophrenic thinking and can be thrown into a mental hospital where further silencing can occur without their consent. Neural scientists are closely watched and any who get to close to rediscovering the government’s mind control technology can be mentally hobbled to prevent further discovery.

Without visible political prisons and torture scars, the public will remain discredulous that it is being done.’

‘The tools of psychophysicists are called psychotronics…Mind control weapons are the holy grail of the ultimate weapon and has given birth to the world’s most notorious, sociopathic scientists which in turn have spawned a generation of the most intense human suffering for weapons testing efficacy the people of this planet have ever endured.’

Picture above: Saturn Devouring His Son, painting by Spanish artist Francisco Goya.

‘The Matrix Deciphered. This is a book written by Robert Duncan (The Saint). It is non-fiction and original research. Also see his vital new book PROJECT:SOUL CATCHER Vol 2 at’


My view is that RNM was once a discrete system, but as secret technologies advanced, parts of the system became obsolete, and by now the original system has been virtually superceded.

Originally RNM was the way perpetrators dealt with distance from TIs.  It was a technology that would work with satellite delivery.  Now perpetraitors can achieve the same results without RNM or satellites. But with the global take-up of wireless for TV, cell-phones and lap-tops, satellite is no longer normally required

So RNM is really a legacy concept.  But not all perpetrators have the latest technology, and someTIs may still be linked to older criminal track-and-target systems.  Upgraded versions of the technologies that underpinned RNM are still key to tracking and targeting TIs, but they rely  on wireless instead.

RNM was once a proprietary product, but by now, criminals all over the matrix appear to have access to variations on, or upgrades of the basic system.  See section on Brain-Computer Interface below for more recent developments.

561px-Connectome_extraction_procedurePicture above:

Remote Neural Monitoring – RNM – uses a set of brain-wave reading technologies to find out what is going on in an indiividual’s mind and body.  RNM can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor…Operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves…Operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.


fMRI – Functional Magnetic Resonance Imaging:  

fMRI is the method used to map the brain. It can ‘identify regions linked to critical functions such as speaking, moving, sensing, or planning…It is common to combine fMRI signal acquisition with tracking of participants’ responses and reaction times. Physiological measures such heart rate, breathing, skin conductance (rate of sweating), and eye movements are sometimes captured simultaneously with fMRI. The method can also be combined with other brain-imaging techniques such as transcranial stimulation, direct cortical stimulation and, especially, EEG. Functional_magnetic_resonance_imaging.

Translating thought into language is linked to changes in blood flow in the brain. fMRI ‘uses the blood-oxygen-level-dependent (BOLD) contrast… This is a type of specialized brain and body scan used to map neural activity in the brain or spinal cord…by imaging the change in blood flow…related to energy use by brain cells…BOLD contrast depends on blood flow.  The point of monitoring blood flow is that it is used to decode thought word-patterns.

Structural_MRI_animation.ogvMRI – Magnetic resonance imaging: also known as nuclear magnetic resonance imaging (NMRI), or magnetic resonance tomography (MRT), is a medical imaging technique used in radiology to visualize internal structures of the body in detail. MRI makes use of the property of nuclear magnetic resonance (NMR) to image nuclei of atoms inside the body.

EEG – Electroencephalograph: records electrical activity along the scalp, and measures voltage fluctuations within the neurons of the brain.   It records different states of awareness – sleep, dreaming, dozing, awake, and alert. EEG techniques include monitoring evoked potentials , which show ‘spikes’ in response to a stimulus – visual, sound or touch. So perpetrators can tell if a TI is afraid, happy attracted to or repelled by something.

  • MEG – Magnetoencephalography: is another technique for mapping brain activity by recording magnetic fields produced by electrical currents occurring naturally in the brain, using very sensitive magnetometers.

MEG- Brain wave monitors have graduated from EEGs to magnetoencephalographs (MEGs) that correlate brain wave patterns via a remote crystalline computer whose software reads and translates spoken words and silent thought. “EEG cloning” can monitor the target’s electromagnetic field, decode it through computer software, then feed emotional patterns back to the target’s brain or to another brain. A 5- micromillimeter microchip placed in the optical nerve can draw neuroimpulses from the brain so as to “eavesdrop” on the implanted person and transfer his or her thoughts to a computer where they will be stored until they’re projected back into the brain to be re-experienced as hallucinations, voices from past conversations, etc. Perpetraitors can monitor brain waves via satellite, decode evoked 5-milliwatt potentials of the brain at 3.50Hz, and transmits them to a VHSIC (very high speed integrated circuit) computer monitor to set up forced “conversations.” modification-technology/

EPR_spectometer– ESR – Electron Spin Resonance: This facilitates detailed biochemical analysis of a subject, such as is required in research, using imaging techniques which can show corresponding frequencies via a spectrometer.  It also facilitates analysis of DNA and changes in DNA following external interventions. Apparently it can get a wireless analysis from the body’s brain waves.  This analysis would identify cancers, altered blood sugar levels, leaching of calcium etc.  A scientific explanation is at

‘This is the secret sauce that the conspiracy kills to keep secret. Notice that there are no ESR machines in hospitals. Why? Because it would become immediately obvious how easy it is to read body electricity from RADAR, i.e. brain waves at a distance. The basic concept is simple and very analogous to the way Magnetic Resonance Imaging works. It works on manipulating spin and gyro frequency of electrons.’  Picture above: ESR spectrometer.

MRI-PhilipsECoG – Electrocorticography: measures the electrical activity of the brain taken from beneath the skull in a similar way to non-invasive electroencephalography,… but the electrodes are embedded in a thin plastic pad that is placed above the cortex.

ECoG is a very promising intermediate BCI modality because it has higher spatial  resolution, better signal-to-noise ratio, wider frequency range, and less training requirements than scalp-recorded EEG…It is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech.–computer_interface

Picture above: MRI equipment.

‘Based on EEG/MEG responses, words are readily distinguished from non-words, pictures, and as to length.’


MRI (Magnetic Resonance Imaging) for brain imaging, in general, is used for view the structure of the brain.  It is especially useful for detecting small anatomical changes as a result of disease processes or trauma that cannot be resolved in a CT scanner.  It has  great research utility for correlating structural changes/differences with behavior.

 fMRI (functional MRI) is a recent development in MR technology that allows you to obtain a ‘functional’ image of the brain by measuring blood flow (blood oxygenation actually in certain cases).  This is a hot area because the hope is that you would eventually be able to take advantage of the high spatial resolution of MRI and the far superior temporal  resolution of fMRI…So the major difference is the MRI images structure and fMRI images function.

Brain Wave Monitoring: Why one size doesn’t fit all

Researcher-testPicture above: fMRI – functional magnetic resonance imaging.

When an individual is identified as suitable for targeting it takes quite a long time for preparatory work to be done mapping the individual’s brain and body. Robert Duncan notes that there is a unique body resonance signature, heart beat signature, and brain wave print for every individual:

‘The key to influencing a neuron and the entire informational structure of the mind is in the timing of the pulses of electromagnetic signals. Using just EEG probes is generally not enough to determine the timing…It is only the informational coherence of the signal specific to each individual that matters.’


vision_street_news-2MRI mind reading scans ‘reveal secrets of human vision’

’In 2011 psychologists and computer scientists at Stanford, Ohio State University and the University of Illinois at Urbana–Champaign demonstrated that pictures shown to volunteers in MRI scanners – were sufficiently reflected via the scanners, to enable the researchers to tell what they were looking at, if they were using sophisticated software that interprets the signals coming from the scan.’

Source: Stanford Report, May 18, 2011 ‘Mind reading’ brain scans reveal secrets of human vision’ ...“Mind reading” scans show that, to our brains, a sparse line drawing of a street scene is almost as recognizable as a detailed color photograph.  Images courtesy of Fei-Fei Li.

In October 2011 the Economist reported on three recently published papers, the first on the process of dreaming, the second on reconstruction of a moving image of what an observer is looking at, and the third on how to tell what someone is thinking about.  All three papers are based on determining, by scanning the brain, what someone is actually thinking about.

Synthetic telepathy uses wireless         

For a detailed review of synthetic telepathy see my previous post ‘Targeted Individuals: thinking Allowed’. Synthetic telepathy is about sound waves. The term sonar is a generic term for equipment used to generate and receive sound. The acoustic frequencies used in sonar systems vary from very low (infrasonic) to extremely high (ultrasonic).  This means that potentially the whole range of sound waves, infrasound, microwave and ultrasound, are capable of being used for silent sound and synthetic telepathy, although ultrasound may be the preferred method.  As all sound waves work on wireless, synthetic telepathy can work by connecting with your terrestrial  TV transmitter, cell-phone or computer, so satellite is not needed unless there is no wireless outlet at the TI’s home.

Spectrogram_of_I_owe_youPicture opposite: spectrogram of I-owe-you.

ECoGs discriminate vowels and consonants embedded in imagined words

‘In a $6.3 million Army initiative to invent devices for telepathic communication, Gerwin Schalk, underwritten in a $2.2 million grant, found that it is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech.’*–computer_interface

* Kennedy, Pagan (September 18, 2011). “The Cyborg in Us All”. New York Times. Retrieved January 28, 2012.

_45706740_brain_512_288‘Research is ongoing into military use of Brain-Computer interfaces and since the 1970s DARPA has been funding research on this topic. The current focus of research is user-to-user communication through analysis of neural signals. The project “Silent Talk” aims to detect and analyze the word-specific neural signals, using EEG, which occur before speech is vocalized, and to see if the patterns are generalizable.

In 2009, the world’s first personal EEG-based spelling system came to the market: intendiX. The system can work with passive, active, or new dry EEG electrodes. The first version used P300 activity to type on a keyboard-like matrix. Besides writing text, the patient can also use the system to trigger an alarm, let the computer speak the written text, print out or copy the text into an e-mail or to send commands to external devices.’–computer_interface.

One thing to be aware of: If you do not verbalise your thoughts they cannot hear what you are thinking.


‘A brain–computer interface (BCI), often called a mind-machine interface (MMI), or…a brain–machine interface (BMI), is a direct communication pathway between the brain and an external device.’–computer_interface.

Mind-machine communication no longer needs a wired connection between the TI’s brain and the perpetrators’ computers, because wireless can use a TI’s terrestrial TV, cell-phone or computer to link up to TIs, wherever they are.  This is referred to as ‘direct wireless neural interfaciing’. So images of people with electric probes stuck to their skulls via EEG caps probably don’t reflect the current technology.

Wireless Ionosphere Signal Bouncing: The Earth’s Ionosphere is spherical. This allows a phased array beam to be bounced off the ionosphere and focused on a point on the Earth. The total internal reflection only occurs at a certain angle from the source…’So these over the horizon Radar systems, which are mostly used for viewing and tracking people, have their radar signals bounced off of the Earth’s atmosphere in a donut like circle for the strongest energy areas due to the phenomena known as total internal reflection.’

Haxby2001According to Robert Duncan, writing in 2010: 

Not only are they conducting internal voice recognition using the neural feature set of premotor muscle movements and word meaning recall brain waves, they are…working on computer vision image recognition techniques from the decoded visual cortex…

This has incredible potential for mind/machine interfacing. By just visualizing characters being typed, a computer could recognize the characters, send them to a virtual keyboard to an internet browser and then project the resultant information page in their minds eye.’



If it were not for use of psychotronics for torture, there would be few Targeted Individuals.  Criminal perpetrators exploit ‘less-lethal ‘Directed Energy Weapons and psychotronic techniques to inflict pain and unpleasant sensations on victims however far away they may be, and they can do it anonymously.  TIs generally report receiving painful attacks from perpetraitors. See examples below:

TARGETED INDIVIDUALS REPORT EXPERIENCES OF…/Over-300-Satellite-and-Brain-Weapons-Assault-
 Iran/Neitherlands. Torture began 2001: I went to USA for 3 months, because my family lives there, I could not stay and had to go back to the Netherlands and that’s when I began to hear the harassers, they began talking and I could here them, making different parts of my body or even my internal organs ache, sometimes the pain was excruciating, and they would make me feel dizzy and make me here noises as if they were coming from the neighbors and as if the neighbors were complaining about me.After a few awful years of excruciation and torture in the Netherlands where I was completely alone, left with no friends at all and no job and no money, in 2005 I went back to my country of birth Iran, but the effect of the mind control devices seem to have no limitation and it does not matter where in the world you are, they continue to torture me…The main symptoms are:-Pain in different parts of my body and sometimes internal organs, headache, tooth ache, not being able to communicate with people and want to be alone for ever, sleeplessness, electric shocks (specially when sleeping), hearing things that are not there, making people get angry at me for no reason at all.  Page 24-25
Spain. Torture began 1995: Although I have been living these agonies for fifteen years, only five years ago did I discover what all this was about. I am a victim of extreme torture and abuse using directed energy and neurological weapons. I am only thirty-five years old but my whole life has gone to rack and ruin since the fated day I took part  in a demonstration for women’s rights. After leaving the demo premises I was electronically attacked on the very evening I went back home, but at the time I did not have a clue of what it could be. To hear my story would be terrifying and bewildering to a public unaware of this type of weapons and crimes but these are all true facts.More often than not, my physical pains are so intense that I cannot even walk. On a couple of occasions I had to crawl to move from one room to another in my own flat.To alleviate my pains I often have to adopt a foetal position for hours and hours, even at night, which means I am regularly deprived of a normal sleep. Page 26
Germany. Torture began 2005: One day I noticed I felt unusual. I was sweating, I was boiling hot, nauseous, dizzy, my heart racing. It only lasted a short time, then I felt normal again. Yet soon the symptoms grew worse, new ones appeared, and the rest periods’ became rapidly shorter. I had stinging pains on my body and headaches pressured my skull…An engineer whom I ask for advice tells me of electronic weapons and of instruments, that were developed for psychiatry, which are used to “treat” (cure) people to free them from their addiction. He shows me letters of “targeted people”. The heading says: “torture and murder with energy weapons in the Federal German Republic”. The brutally tortured writer speaks about the worst violation of human rights in Europe since the Holocaust…Someone is aiming at me, why ? I find red and also reddish-purple circles on my body, they are the targeted red burned points. To avoid directed radiation I move my bed, sleep on the floor in every conceivable corner of the house, on the balcony, in the woodshed, in the farmyard, on the haystack, even in the chicken coop…The radiation’s hit all around the walls of the house, gently at first increasing in force to the sound of a fire cracker. What are those devices ? They cause different body reactions : I become hot and almost instantly completely sweaty, I feel terribly sick, dizzy almost to fainting, I have the worst headaches ever, my intestines begin to rumble violently, I immediately get diarrhoea, the heated current attacks my body, giving me very bad muscle cramps and stabbing pains in my intestines, heart, head, arms, legs, genitals. A bestial torture ! And no one wants to believe it ? Pages 31-32

What TIs are talking about are Directed Energy Weapons – DEWs.


Electromagnetic radiation weapons are a type of directed energy weapons which use electromagnetic radiation to deliver heat, mechanical, or electrical energy to a target to cause various, sometimes very subtle, effects. They can be used against humans, electronic equipment, and military targets generally, depending on the technology.

‘Now, there are electron “amnesia” beams and magnetophosphene guns that make you “see stars”; hand-held VLF (20-35KHz) infrasound generators that trigger nausea, diarrhea, and abdominal pain. Brilliant Eyes surveillance satellites are equipped with multispectral scanners, interferometers, visible infrared spin scan radiometers, cryocoolers, hydride sorption beds, brain maps, and neurophones to alter behavior subliminally. An electronic imaging satellite beam can lock onto a human target in real time and assault him or her with a laser.’ From an article by Elana Freeland, modification-technology/

‘The energy can come in various forms:

– High-energy radio frequency weapons – HERF – or high-power radio frequency weapons – HPRF – use high intensity radio waves to disrupt electronics.

– High and low power, Pulsed Microwave devices use low-frequency microwave radiation which can be made to closely mimic and interact with normal human brain waves having similar amplitudes and frequencies. The heart, lungs, and other vital organs are controlled by very low voltage electric signals from the human brain. It should be possible to disrupt, catastrophically, such signals— from a distance— using this technology. Taser-like motor effects are also possible. The purpose of the PEP (Pulsed Energy Projectile), the LIP (Laser Induced Plasma) weapon and the Active Denial System (ADS) is to induce pain, although the PEP has lethal capabilities.

Some bio-effects of electromagnetic radiation weapons include effects to the human central nervous system resulting in drowsiness, localized physical pain – e.g. headaches or joint pain, difficulty breathing, vertigo, incontinence, nausea, disorientation, or other systemic discomfort. Electromagnetic radiation weapons may cause cumulative damage to the human body. Electromagnetic weapons can affect the human nervous system and might lead to diseases of the nervous system such as Primary Lateral Sclerosis.

Millimeter-wave pulses can affect the epidermis (skin) and dermis, the thick sensitive layer of skin and connective tissue beneath the epidermis that contains blood, lymph vessels, sweat glands, and nerve endings, generating a burning sensation or actual burn from as far as 700 meters.  Interference with breathing poses the most significant, potentially lethal results.  Light and repetitive visual signals can induce epileptic seizures. Vection and motion sickness can also occur.

– Lasers: Lasers are often used for sighting, ranging and targeting for guns; but the laser beam is not the source of the weapon’s firepower. Laser weapons usually generate brief high-energy pulses. A one megajoule laser pulse delivers roughly the same energy as 200 grams of high explosive, and has the same basic effect on a target.

– Masers: – Meaning focused microwaves: Microwave guns powerful enough to injure humans are possible:

Active Denial System is a millimeter wave source that heats the water in the target’s skin and thus causes incapacitating pain. It is being used by the U.S. Air Force Research Laboratory and Raytheon for riot-control duty. Though intended to cause severe pain while leaving no lasting damage, some concern has been voiced as to whether the system could cause irreversible damage to the eyes. There has yet to be testing for long-term side effects of exposure to the microwave beam. It can also destroy unshielded electronics:

– Pulsed Energy Projectile: Pulsed Energy Projectile or PEP systems emit an infrared laser pulse which creates rapidly expanding plasma at the target. The resulting sound, shock and electromagnetic waves stun the target and cause pain and temporary paralysis. The weapon is under development and is intended as a non-lethal weapon in crowd control.

– Sound in Sonic Weapons: Cavitation, which affects gas nuclei in human tissue, and heating can result from exposure to ultrasound and can damage tissue and organs. Studies have found that exposure to high intensity ultrasound at frequencies from 700 kHz to 3.6 MHz can cause lung and intestinal damage in mice. Heart rate patterns following vibroacoustic stimulation have resulted in serious arterial flutter and bradycardia. Researchers have concluded that generating pain through the auditory system using high intensity sound risked permanent hearing damage.’

A multi-organization research program** involved high intensity audible sound experiments on human subjects. Extra-aural (unrelated to hearing) bioeffects on various internal organs and the central nervous system included auditory shifts, vibrotactile sensitivity change, muscle contraction, cardiovascular function change, central nervous system effects, vestibular (inner ear) effects, and chest wall/lung tissue effects. Researchers found that low frequency sonar exposure could result in significant cavitations, hypothermia, and tissue shearing. Follow-on experiments were not recommended.

** Naval Submarine Medical Research Laboratory (Groton, Connecticut), Navy Experimental Diving Unit (Panama City, Florida), SCC San Diego, Navy Medical Research and Development Command (Bethesda, Maryland), Underwater Sound Reference Detachment of Naval Undersea Warfare Center (Orlando, Florida), Applied Research Laboratories: University of Texas at Austin, Applied Physics Laboratory: University of Washington, Institute for Sensory Research: Syracuse University, Georgia Institute of Technology, Emory University, Boston University, The University of Vermont, Applied Physics Laboratory, Johns Hopkins University, Jet Propulsion Laboratory, University of Rochester, University of Minnesota, University of Illinois system, Loyola University, State University of New York at Buffalo, New York

‘The TECOM Technology Symposium in 1997 concluded on non-lethal weapons, “Determining the target effects on personnel is the greatest challenge to the testing community,” primarily because “the potential of injury and death severely limits human tests.”

Also, “directed energy weapons that target the central nervous system and cause neurophysiological disorders may violate the Certain Conventional Weapons Convention of 1980. Weapons that go beyond non-lethal intentions and cause “superfluous injury or unnecessary suffering” may also violate the Protocol I to the Geneva Conventions of 1977.”

See Annex to this post for recognition of psychotronics in national and international forums.


220px-Human_motor_mapAccording to Wikipedia, the human brain contains a map of the body within the Motor cortex, ‘with different body parts, represented by partially overlapping areas, lined up along a fold called the central sulcus’.  ‘The motor cortex is a term that describes regions of the cerebral cortex involved in the planning, control, and execution of voluntary movements’.

If someone electronically stimulates a tiny part of the brain that relates to the foot, something happens to the foot.  It may create an involuntary movement, or it may register a feeling like touch, or it may translate into pain.

Picture below: developed along the lines of similar screens that can be found at and Robert Duncan’s book Project Soulcatcher’, Higher Orders Thinkers Publishing, 2010.Tscreens4.001

In his book ‘Project Soulcatcher’, Robert Duncan describes how operatives could point to different parts of the body on a screen monitor showing a stylized human being and inflict pain.  Pain is not targeted directly at parts of the body.  Instead pain sequences are played into a part of the brainthe cerebrum, and then the TI experiences this as an electronic torture attack in specified areas of the body, carried out by an IT technician. That is how the Remote Neural Monitoring method works.

Where RNM is not used, accuracy of body mapping rather than brain mapping becomes the focus.

‘By modeling a human body and head, one could calculate the resonant pattern in the human body, i.e. the standing wave formations and where the high and low energy absorption nodes would be. So a directed energy weapon could be made more effective by precision targeting of energy to specific organs for example.

If you wanted to give a target diabetes, you could destroy some of the pancreas or alter the sugar metabolism in the cells. If you wanted to increase the chance of lung or brain cancer, the weapon merely needs to add energy to those locations and overtime the probability will increase dramatically.’


How do perpetrators locate the TI without RNM?  They still have to do the full brain and body mapping exercise when they first ‘kidnap’ a TI, after that they can then locate TIs anywhere in the world by wireless EEG or body resonances signatures – see


Mra1If perpetrators want to target body functions rather than body parts, they may still use RNM.  Using RNM, breathing systems can be targeted through lung function, blood oxygen take-up, congestion of airways or brain-oxygen take up.

But most of this can be achieved by either microwaves or sonic weaponry techniques such as cavitation. A TI can be made to feel a heart rate change by projecting a rhythmic microwave pulse that mimics heart beat onto the back of the chest, around the heart. If perpetrators wish to alter the actual heart rate, sonic weaponry may be required.

If a TI has a pacemaker or insulin disburser, perpetrators might choose to manipulate its effectiveness.  But recent developments indicate that shielding is being developed to protect clinical prostheses from manipulation.  See BBC report: ‘Antimagnet’ joins list of invisibility approaches’.  26 September 2011.    Picture above: Magnetic resonance angiography showing heart and arteries.


At the end of his first book, Robert Duncan acknowledges his debt to Targeted Individuals, and reveals the appalling truth about the criminal acts inflicted on innocent civilians. TIs are being used for research not just for weapons testing, but for TORTURE testing:

‘I want to thank all the weapons testing and torture testing victims around this country and other countries for their time and information. Ironically I need to thank the weapons testers and their guilty conscious for filling in many of the details on the political solutions, limitations of the software algorithms and the science behind these fascinating weapons. I especially applaud the patriotic and noble x-CIA and x-FBI agents that have come forward with their confirmation of the continuation of the MKULTRA mind control programs. We have a chance to win back America’s freedom, dignity, and sanity by exposing and eliminating the military uses of these weapons.’



For a long time, psychotronics was like the tip of the iceberg, hinting at a range of secret technologies. There have been delays in releasing classified technologies to the public, but that is beginning to happen now. This section looks at advances in one or two of those technologies:

  • One where ultrasound is being used to heal and regenerate bodies.
  • The other an illegal application of laser eye surgery combined with eye implants, now being applied by perpetrators to some TIs without their consent, and in breach of state and national laws. An issue requiring clarification is how they are introduced into a TI’s body without TIs being aware if it.


Introduction. Ultrasound plays a key role in synthetic telepathy and some torture methods. But the other side of the coin on ultrasound is almost unbelievable, and much more sensitive. I have quoted a number of media reports about the benefits of ultrasound healing, which show that both military and health clinicians are already exploiting the incredible opportunities offered by low-level pulsed ultrasound.

Targeted Individuals with nonconsensual implants or surgery may have wondered why incisions leaves no wounds or scars. Check out the website below on incision-less surgery using ultrasound.

 Ultrasound for incision-less surgery. Yoav Medan: Ultrasound surgery —  healing without cuts – December 2011.

Imagine having a surgery with no knives involved. At TEDMED, Yoav Medan shares  a technique that uses MRI to find trouble spots and focused ultrasound to treat such  issues as brain lesions, uterine fibroids and several kinds of cancerous growths.


First the downside: High levels of ultrasound can be harmful to health

It is often the case that the same technologies can be used for help and harm, and this is so with RNM stimulation of nano-sized brain particles. Ultrasound is used widely in clinical applications, and yet occupational exposure to ultrasound in excess of 120 dB may lead to hearing loss.

Ultrasound treatments and/or exposure can create cavitation that can potentially “result in a syndrome involving manifestations of nausea, headache, tinnitus, pain, dizziness, and fatigue.”

Exposure in excess of 155 dB may produce heating effects that are harmful to the human body, and it has been calculated that exposures above 180 dB may lead to death. Part II, industrial and commercial applications (1991). Guidelines for the Safe Use of Ultrasound Part II – Industrial & Commercial Applications – Safety Code 24. Health Canada. ISBN 0-660-13741-0.,



See evidence in the public domain:-

Ultrasound to treat war wounds, By Paul Rancor, Science reporter, BBC:

The US military plans a portable device that uses focused sound waves to treat troops bleeding internally from wounds sustained on the battlefield. Ultrasound can seal ruptured blood vessels deep within the body without the need for risky surgery.The lightweight device has to be designed so that soldiers can operate it with minimal training.The technology could potentially save lives on the battlefield.The US military plans a portable device that uses focused sound waves to  that uses focused sound waves to

_41823972_troops_afpgetty_203Ultrasound for trauma & first aid

Ultrasound is also increasingly being used in trauma and first aid cases, with emergency ultrasound becoming a staple of most EMT response teams. Furthermore, ultrasound is used in remote diagnosis cases where teleconsultation is required such as scientific experiments in space or mobile sports team diagnosis:-

DistanceDoc and MedRecorder: New Approach to Remote Ultrasound Imaging | Solutions | Epiphan Systems. Retrieved on 2011-11-13.

Ultrasound for bone and tooth regeneration

320px-Molarsindevelopment11-24-05Ultrasound is sometimes used to increase bone formation, for instance post-surgical applications.

Low intensity pulsed ultrasound is used for therapeutic tooth and bone regeneration. Researchers have successfully used ultrasound to regenerate dental material:-

^ Toothsome research may hold key to repairing dental disasters – ExpressNews – University of Alberta. Retrieved on 2011-11-13.–study-deadly-puffer-fish.html#ixzz2Agn4kUwm

_55974966_ultrasound_legShockwaves that can heal broken bones: New treatment avoids need for surgery on fractures that won’t join up.By Annie Boyde, 28 June 2011

New ultrasound treatment avoids need for surgery on fractures that won’t join up.

Ultrasound speeds up healing of broken bones, study shows

By DAILY MAIL REPORTER UPDATED: 09:47, 8 October 2010

Picture above: Glasgow surgeon using ultrasound to treat fractures

Please heal me quicker! Wilshere hooked up to machine in race to be fit for Euros

By Sportsmail Reporter,  7 February 2012

The machine is an ultrasound bone healing system and is the only bone healing device proved to accelerate the healing of fractures.

New hope for millions tormented by tinnitus: Sound-wave machine relieves ringing in ears that drives victims to despair By Isla Whitcroft,  24 April 2012

The new treatment is a hand-held ultrasound device that is placed behind the ear for one minute. It’s designed to give temporary relief, and is currently being used in trials on 500 people. The gadget is held against the skull behind the ear, and then emits a high frequency signal.

HIFU ultrasound hope for prostate cancer

Sound wave treatment that zaps prostate tumours could double men’s chance of avoiding debilitating side effects. Daily Mail, April 16 2012

Soundwaves could help 95% of prostate cancer patients… without affecting sex life. Daily Mirror, April 16 2012

Ultrasound scanner could spell the end of the arm-squeezing cuff to take your blood pressure, By Daily Mail reporter, 16 June 2011

The male Pill? Ultrasound hailed as new contraceptive for men.  By DAILY MAIL REPORTER, 12 May 2010

_58145672_c0079228-spermBreakthrough: Scientists claim sperm production could be halted by a blast of ultrasound waves. Ultrasound is being hailed as a cheap, reversible contraceptive for men, offering a potential new birth control option for couples throughout the world.

The fat zapper: Ultrasound waves to be used to help dieters shift that flab

By SOPHIE BORLAND UPDATED: 07:49, 7 March 2011

Ultrasound waves that destroy fat cells could be used to help dieters shift those final stubborn pounds.  British scientists have developed a new technique that uses the powerful blasts of energy to get rid of flab without harming the healthy tissue nearby.



This section is based on reports that can be accessed at:

246px-DNA_Structure+Key+Labelled.pn_NoBBIn Russia ‘there is evidence for a whole new type of medicine in which DNA can be influenced and reprogrammed by words and frequencies — WITHOUT cutting out and replacing single genes…

According to their findings, our DNA is not only responsible for the construction of our body, but also serves as a means of data storage and communication…Russian linguists found that the genetic code — especially in the apparent “useless” 90% — follows the same rules as our human languages.They compared the rules of syntax (the way in which words are put together to form phrases and sentences), semantics (the study of meaning in language forms) and the basic rules of grammar.

Russian linguists ‘found that the alkalines of our DNA follow a regular ‘grammar’, and do have set rules just like our languages. Therefore, human languages did not appear by coincidence, but appear to be a reflection of the inherent patterns in our DNA…

The Russian biophysicist and molecular biologist Pjotr Garjajev and his colleagues also explored the vibrational behavior of DNA. In brief, the bottom line was: “Living chromosomes function just like a holographic computer, using endogenous DNA laser radiation.”  This means that they managed, for example, to modulate certain frequency patterns – sound – onto a laser-like ray, which then influenced the DNA frequency — and thus altered the genetic information itself.

Since the basic structures of DNA-alkaline pairs and language – as explained earlier – are similar, no DNA decoding is necessary. One can simply use words and sentences of the human language!

This, too, was experimentally proven. Living DNA substance in living tissue, not in vitro, will always react to laser beams that have been modulated by language, and even to radio waves, if the proper frequencies – sound – are being used.This scientifically explains why affirmations, hypnosis and the like can have such strong effects on humans and their bodies. It is entirely normal and natural for our DNA to react to language…

Esoteric and spiritual teachers have known for ages that our body is programmable by language, words and thought. This has now been scientifically proven and explained.

Of course, the frequency has to be correct. And this is why not everyone is equally successful, or can perform feats of consciousness with the same degree of strength.

The Russian researchers work on a method that is not dependent on these factors but will ALWAYS work, provided one uses the correct frequency.’

So the big question is:-  What frequencies are we talking about?  The Russians are not saying, but the answer may very well be ULTRASOUND. 

See also


A low profile Russian group claims to have discovered a method of healing many diseases through the application of number sequences, using concentration alone.  Some patients in Moscow receiving treatment for diseases not only recovered but found that organs removed by surgery and missing teeth were regenerated.  Arcady Petrov “Light of eternity” part 1 (Vid 8’.34”) Regeneration, rejuvenation, immortality. and

The group’s exact method for replicating these results is not clear, and western proponents of the concentration method do not seem to achieve such dramatic results.  Could it be that there was a missing step in the method, that was not shared with western researchers – application of Low intensity pulsed ultrasound for example?

Picture opposite: A starfish regrowing two of its legs.291px-Sea_star_regenerating_legs


Based on my observation, some Tis targeted in tranches from about autumn 2011 onwards may have been given embedded eye cameras etc before they were aware they were being targeted.  And they may still not be aware they are being targeted.

My previous post on ‘TIs: Seeing through the perpetrators’ covered military use of implanted cameras either on an embedded lens or behind the retina.   Recently, I had my eyes checked, because perpetrators had been carrying out unauthorized interventions in my eyes.

Fundus photographs – like the one below – clearly showed a dark line attached to the retina of one eye.  In the last month, further nonconsensual surgery appears to have been carried out in both my eyes.


Fundus photographs of the right eye (left image) and left eye (right image), seen from front so that left in each image is to the person’s right. Each fundus has no sign of disease or pathology. The gaze is into the camera, so in each picture the macula is in the centre of the image, and the optic disk is located towards the nose. 


Both optic disks have some pigmentation at the perimeter of the lateral side, which is considered non-pathological.
The left image (right eye) shows lighter areas close to larger vessels, which has been regarded as a normal finding in younger people.










I now think  perpetraitors supplemented a retinal camera with computer functions and an internal monitor which could display mental images.  This meant that perpetrators were able to see my internal mind pictures in clear definition in full colour, possibly in 3D. See

Perpetrators  commented on the ‘improvement’, which enabled them to get a better view of what I was thinking in mind pictures.  But the eye implants require maintenance. As detailed in my post on ‘Targeted Individuals: Seeing throught perpetraitors’, I woke up when perpetraitors were apparently trying to change a battery in what they referred to as the flaps in one of my eyes.  They dropped the battery, and I heard something fall with a ‘clink’ sound.

159px-thumbnailPicture opposite: LASIK surgery using the Star S4 IR™ excimer at US National Naval Medical Center Bethesda.

I looked up eye surgery on the internet, and was astonished to find that there is a type of laser eye surgery – LASIK – that involves putting flaps in a person’s eye:

‘LASIK or Laser-Assisted in Situ Keratomileusis, commonly referred to simply as laser eye surgery, is a type of refractive surgery for the correction of myopiahyperopia, and astigmatism. LASIK is performed by an ophthalmologist using a laser.The laser is used to reshape the cornea in order to improve the clearness and sharpness of the image that is seen’.

Laser remodeling 

I suspect that perpetrators are implanting nano-cameras and other equipment into the eyes of TIs, and then making adjustments to the cornea, in order to correct any vision problems arising.

Picture below: The procedure involves creating a thin flap on the eye, folding it to enable remodeling of the tissue beneath with a laser and repositioning the flap.Lasik_UOC.ogg

One possible reason for TI eye surgery 

There may be many reasons, relating to military applications, but to focus on one for now, espionage seems likely.  Perpetrators could be taking photos of people that TIs meet, through the camera implanted in a TI’s eye, and then run face recognition checks to the TI’s memory database, using internal imaging screens, before checking their own databases.  See Robert Duncan’s comments on uses for military display glasses:

Robert Duncan, writing in 2010 said: ‘In business school I borrowed a pair of heads-up display glasses from DARPA for a wearable computer entrepreneurship project. The idea was to overlay a computer screen in each eye that would enhance reality with information that only you could see. For example, with a small camera embedded in the glasses face recognition could be done. A bio of the recognized face comes up. Or if you are giving a presentation, you could read off a teleprompter only you could see…At the time, I did not think that direct wireless neural interfacing techniques were so developed.’


Now in my country all this nonconsensual surgery would be classed as a criminal assault – or perhaps assault and battery.   But how could it happen in the first place without my knowing.   How could anyone carry out a surgical procedure on my eyes involving insertion of a prosthesis without my knowing, and without disrupting my normal life.  

In my last post I mentioned how an elderly relative over 95 years old recently became aware that she was being targeted, with distressing synthetic telepathy and induced visual images.  I told her what had happened to me, and she reminded me of a strange experience she had in December 2011.  

She had gone out shopping, with her shopping trolley, and suddenly found herself wandering in a strange part of town that she did not recognize.  She was lost, and could not find her way home.  A gentleman saw her and came to her aid.  He asked where she lived, and took her to her house.  But she was bewildered for some time afterwards, and she later fell ill with a chronic condition that has remained ever since. 

In the light of my experience, my elderly relative now thinks that perpetrators may have been responsible in some way for what happened to her.  But how could it happen?  Perhaps readers could hazard a guess as to what has been going on.  

Annex: Recognition of psychotronics in national and international forums
The term “psychotronic”, short for psycho-electronic ( ref 38) was used in the proposed Bill H.R. 2977 Space Preservation Act of 2001, which listed “psychotronic” as a list of possible spaceborne weapons which would be banned by the Act (ref 39)In 2001, President Vladimir V. Putin signed into law a bill making it illegal to employ “electromagnetic, infrasound … radiators” and other weapons of “psychotronic influence” with intent to cause harm…The European Parliament adopted a resolution on January 28, 1999[38], 28.1.99 Environment, security and foreign affairs A4-0005/99:23. Calls on the European Union to seek to have the new ‘non-lethal’ weapons technology and the development of new arms strategies also covered and regulated by international conventions …27. Calls for an international convention introducing a global ban on all developments and deployments of weapons which might enable any form of manipulation of human beings38. , -Journal of Psycho-Social Studies – Vol 2 (2) 2003 – On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology by Dr. Carole Smith – Space Preservation Act of 2001 at


320px-Freedom_of_Thought_Ben_Franklin This post is about:

–  Implications of synthetic telepathy.

–  What is meant by ‘synthetic telepathy’.

– What Targeted Individuals say they    experience. 

–  Technical basis of synthetic telepathy.

‘Without freedom of thought there can be no such thing as wisdom & no such thing as publick liberty without freedom of speech, Benjamin Franklin, 1722.’



How would you feel if someone far away could listen not only to what you were saying, but also to what you were THINKING!!  And what if that person commented on what you wereTorch.svg thinking, in a way that no one else could hear.

That is what synthetic telepathy is about.  It is an invasion of privacy, and a breach of human rights. It offers the opportunity for espionage, impersonation and theft of intellectual property. Most people, including those inside military and state organisations, may not know or really believe it is happening, but corporate criminals within security industries are involved in weaponising thought.  Many Targeted Individuals know all too well what weaponisation of thought is about, because it is with them every waking and sleeping moment of their lives.

Freedom of thought (also called the freedom of conscience or ideas) is the freedom of an individual to hold or consider a fact, viewpoint, or thought, independent of others’ viewpoints. It is different from and not to be confused with the concept of freedom of speech or expression.

In the Universal Declaration of Human Rights (UDHR), which is legally binding on member states of the International Covenant on Civil and Political Rights, freedom of thought is listed under Article 18:

Everyone has the right to freedom of thought, conscience and religion; this right includes freedom to change his religion or belief, and freedom, either alone or in community with others and in public or private, to manifest his religion or belief in teaching, practice, worship and


Synthetic telepathy refers to a technology that can make you hear real people’s voices broadcast in your head, as if you were hearing a cell-phone conversation.  Perpetraitors can listen to your thoughts too, and you may not be aware they are doing so.  The implications of that are huge, and though the technology has been understood for some time, there is silence about it.  But now synthetic telepathy is becoming openly acknowledged as part of new weapons strategies in the US. Credibility gap?? Check these links:

  • Youtube video demonstrates synthetic telepathy 

All you need to do is point the energy device accurately at the electromagnetic field of the targeted individual, and they will hear the speech transmitted from the microphone.  The Youtube video at the link below demonstrates synthetic telepathy in action.!

  • Pentagon report investigated lasers that put voices in your head:

‘A recently unclassified report from the Pentagon from 1998 has revealed an investigation into using laser beams for a few intriguing potential methods of non-lethal torture. Some of the applications the report investigated include putting voices in people’s heads, using lasers to trigger uncontrolled neuron firing, and slowly heating the human body to a point of feverish confusion – all from hundreds of meters away’., 2008.

  • The Army’s Bold Plan to Turn Soldiers Into Telepaths:

‘The U.S. Army wants to allow soldiers to communicate just by thinking.

The new science of synthetic telepathy could soon make that happen’.,2011 and–field-years, 2012.

  • Army developing ‘synthetic telepathy’:

‘Similar technology marketed as a way to control video games by thought’…

Read This Thought: The U.S. Army is developing a technology known as synthetic telepathy that would allow someone to create email or voice mail and send it by thought alone. The concept is based on reading electrical activity in the brain using an electroencephalograph, or EEG.’, 2008.

  • Army budgeted $4 million to give soldiers telepathy

The United States Army Research Office budgeted $4 million in 2009 to researchers at the University of California, Irvine to develop EEG processing techniques to identify correlates of imagined speech and intended direction to enable soldiers on the battlefield to communicate via computer-mediated telepathy. Source:


360px-Ultrasound_range_diagram-1.svgFrom what I have read, it is possible to direct waves at a person’s electromagnetic field and, using a microphone, to speak directly to their inner hearing function, bypassing the ears.  It may be that several types of radio waves could be used for this including infrasound – considered by some to have higher health risks – microwaves, and ultrasound, which has its origins in sonar.  The sound waves may resonate via the bones in the skull, or it could be that the waves are converted to audible speech by the earth, acting as a transducer.  The picture below was removed by perpetrators and had to be replaced. Perhaps this was because it reflects their synthetic telepathy systems too closely.

320px-Signal_processing_system[A transducer is a device that converts one form of energy to another. Energy types include (but are not limited to) electrical, mechanical, electromagnetic (including light), chemical, acoustic or thermal energy.]

Theoretically, synthetic telepathy could be transmitted via satellite in the same way that satellite TV, long distance cellphones and Global Positioning Satellite data are communicated.  I live in the UK and regularly receive invasive transmissions from different parts of the US, often via a virtual chat room.


Many TIs report hearing voices of perpetrators abusing them, impersonating others and trying to manipulate them:

Ti Experience & Source
I had very violent depreciating vile voices or thoughts that came from people in hollywood. Leonardo De Caprio was one of them. Ben Kingsly was another. I have also had Arnold Shwarzenneger.’ Germany, 09/08/2012.
On January 13, 2009 I started to hear a voice that was nearly as loud as normal spoken words. I think that it was about 3 PM. This continued for exactly 10 weeks. As soon as I woke up, within 1 second I heared a message spoken by an angry male voice with aggressive intonation. This was repeated every few seconds the whole day long, until I fell asleep…In the summer of 2011 I heard a voice say regularly “I have cancer.” Then the voice disappeared.
I hear now voices in my head, which threaten me personally: We will kill you, you are already a zombie! We will erase your memory; We will kill your relatives!; On the 22nd of September you do not go to the demonstration ! Think about your relatives ! We will remove your legs and hands and all other body organs! We will turn you into a zombie! These voices torment me at night and inhibit any sleep. They ask me questions and demand that these are answered.. They affect my free will and control me. Without any doubt my human dignity is permanently violated and as the Human Rights are guaranteed by the German Constitution not only national but international rules of law are violated. 128.

Suushi_Yurei‘Attempted murder by arrhythmia brutal forced effort at maximum power.

Inductions to suicide through “Synthetic telepathy” Sound + + Stimulation (to nudge Stimoceiver) + generation of mental state (5 or 6 days of torture started 24 hr ON apparatus open (10-15 January 2005) + Possible psychoactive (17/70 hz)’



When I got targeted, I could hear people talking, quietly, in a different medium from normal hearing, more like what you would hear if you wore headphones.  If friends or family were talking to me, I didn’t notice the voices, but when I was alone, or on waking, I could hear them.  Generally they were talking to each other about me, consciously for me to hear, but sometimes they forgot and started talking to each other.  Very rarely did they address me directly.  That was nearly a year ago, and it continues.

Screen Shot 2013-02-27 at 17.36.52If you go out to a show, do sport, sing in a choir or watch something interesting on television, it is less likely that you will notice the voices. That may be why TIs report losing their job and becoming more isolated.  Perpetrators want your undivided attention, but they cannot get it unless you are alone or asleep. So if you want to avoid them, go outside, take part in things, and if possible, be around family and friends.

It may seem easy for perpetrators to talk via synthetic telepathy, but I found out they have to learn and practise before they reach a recognised standard, and they have to take an examination. I remember the first time that the perpetrator referred to by his peers as Phillip – the son of the perpetrator referred to as David, was learning how to use the psychotronic head set.  He wanted to talk to his colleagues, but he couldn’t.  They were shouting ‘Take the head-set off!”.  He was talking to me, not them, but didn’t realise it.


_58194695_58194686Communicating sounds from one person to another is possible over distances in the same way as with a cell phone, using microwave and lasers/masers.  Just as each person has a cell phone number, each person has their own unique electromagnetic field frequency, which can be identified by sound wave devices of many types, in a similar way to television, you have a transmitter and a receiver, and for long distances, satellite is necessary.

Electrical activity can best be demonstrated by looking at the way an EEG machine works.  It shows brain wave activity and responses to sounds and other interventions.

But how are microwaves turned into words?  Apparently it is based on measuring blood flow to the brain for different sounds, reflected in electrical activity. A technique called functional magnetic resonance imaging to track blood flow in the brain has shown promise for identifying which words or ideas someone may be thinking about.

So first you dial a person’s frequency number, using a satellite tracking device like GPS.  Then you speak into a headset that translates your brain blood flow patterns into electronic impulses.

_55910139_katiaandheadset1There is now a variety of brainwave-reading headsets on the market, mostly used for video gaming’

Headset picture and quote from: and

The electrical impulses are pointed by a focused laser/maser beam towards someone’s electromagnetic field and they pick up the resonance via the bones in their skull and ear. The impulses are translated into words by the brain in the same way as for normal speech.  Satellite is used except where both people are located nearby. Satellite tracking implies that the person receiving the call has an implant that transmits a frequency signal, but this is not always required. 

How synthetic telepathy works: Measuring Blood flow to the brain  

A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts.

fMRI is usually used to track brain activity by measuring blood flow.’ 

In June 2012 the BBC reported that  ’A new brain scanner has been developed to help people who are completely paralysed speak by enabling them to spell words using their thoughts._61257358_brain

It uses functional magnetic resonance imaging (fMRI) to help patients choose between 27 characters – the alphabet and a blank space… fMRI is normally used to track brain activity by measuring blood flow… Each character produces a different pattern of blood flow in the brain, and the device interprets these patterns…The study appears in Current Biology journal of Cell Press.

Bettina Sorger of Maastricht University in The Netherlands, one of the researchers working on the current study, told the BBC.

“The work of Adrian Owen and colleagues led me to wonder whether it might even become possible to use fMRI, mental tasks, and appropriate experimental designs to freely encode thoughts, letter-by-letter, and therewith enable back-and-forth communication in the absence of motor behavior.”

The team writes in the paper that because the noninvasive device requires “only little effort and pre-training, it is immediately operational and possesses high potential for clinical applications.

Science decodes ‘internal voices’ 

On 1 February 2012 the BBC reported that ‘By studying patterns of blood flow related to particular images, Jack Gallant’s group at the University of California Berkeley showed in September that patterns can be used to guess images being thought of – recreating “movies in the mind”.

The team focused on an area of the brain called the superior temporal gyrus, or STG. This broad region is not just part of the hearing apparatus but one of the “higher-order” brain regions that help us make linguistic sense of the sounds we hear.

According to the BBC, researchers at University of California Berkeley: ‘have demonstrated a striking method to reconstruct words, based on the brain waves of patients thinking of those words.

The technique reported in PLoS Biology relies on gathering electrical signals directly from patients’ brains. Based on signals from listening patients, a computer model was used to reconstruct the sounds of words that patients were thinking of. The method may in future help comatose and locked-in patients communicate.

Several approaches have in recent years suggested that scientists are closing in on methods to tap into our very thoughts; the current study achieved its result by implanting electrodes directly into a part of participants’ brains: The discovery of language – electrical brain wave patterns:

_58205067_58205065Science decodes ‘internal voices’, BBC News

The technique hinges on plotting brain activity across a number of frequencies

In a 2011 study, participants with electrodes in direct brain contact were able to move a cursor on a screen by simply thinking of vowel sounds..The team employed a computer model that helped map out which parts of the brain were firing at what rate, when different frequencies of sound were played.

With the help of that model, when patients were presented with words to think about, the team was able to guess which word the participants had chosen.

They were even able to reconstruct some of the words, turning the brain waves they saw back into sound on the basis of what the computer model suggested those waves,meant.

Real-life Jedi: Pushing the limits of mind control

On 10 October 2011 the BBC reported on a headset, developed by Australian company Emotiv for the games industry, which used software connected to various electronic devices. The headset has been around for some time, but it is only now that companies such as IBM are beginning to harness the wealth of data that it can provide.

Using software developed in-house, researchers have linked the Emotiv to devices such as a model car, a light switch and a television.

_55865761_464_joinControl signals come from two main sources; electroencephalography (EEG) measurements of brain activity, and readings of nerve impulses as they travel outwards to the muscles…At Brown Institute for Brain Science in the US, scientists are busy inserting chips right into the human brain.

The technology, dubbed BrainGate, sends mental commands directly to a PC.

Subjects still have to be physically “plugged” into a computer via cables coming out of their heads, in a setup reminiscent of the film The Matrix. However, the team is now working on miniaturising the chips and making them wireless.


There are various modes of operation for synthetic telepathy including:

  • Screen Shot 2013-02-27 at 17.47.29One person listening to another’s thoughts or speech;
  • Listening in a group to another’s thoughts and speech;
  • Talking and listening to one person;
  • Talking to one person and being listened to by many people;
  • A virtual chat room in which anyone could talk or listen, if they followed set procedures.

_55867826_t4980011-brainwave-reading_headset-spl‘Synthetic telepathy requires techniques for scanning the specific brain emissions given off when the targeted victim subvocalises. The techniques must be able to detect the 15-Hz, 5-milliwatt auditory cortex brain emissions that are linked with sound that bypasses the ear; the ELF frequencies that are linked with the excitation potentials in the brain that are associated with subvocalised thought; and EEG signals, such as the P300 signals mentioned previously’*

Picture above: –

* at

‘Contrary to popular belief, synthetic telepathy does not provide the ability to read a person’s mind or memories. What it does provide is the ability to read the internal monologue (or anything that causes electrical change/radiation) and the trick is to get the subject to “voice” their memories and cross-reference that with their emotional state. In other words, basic psychological manipulation is a key factor and makes the technology not much more reliable than a standard lie-detector test. In practice, passive monitoring of the internal monologue over a long time period (months-years) is probably the most effective method of intelligence gathering. at

Using Electroencephalography (EEG)

230px-EEG_capThe device that makes the leap from  electronic brain impulses into words. is said to be an electroencephalograph or EEG. In clinical contexts, EEG refers to the recording of the brain’s spontaneous electrical activity over a short period of time, usually 20–40 minutes, as recorded from multiple electrodes placed on the scalp. EEG used to be a first-line method for the diagnosis of tumours, stroke and other focal brain disorders, but this use has decreased with the advent of anatomical imaging techniques with high spatial resolution such as MRI and CT.

Picture below: The first human EEG recording obtained by Hans Berger in 1924. The upper tracing is EEG, and the lower is a 10 Hz timing signal.

According to Wikipedia:  ‘Derivatives of the EEG technique include ‘evoked potentials’, which involves averaging the EEG activity time-locked to the presentation of a stimulus of some sort (visual, somatosensory, or auditory)’‘Event-related potentials (ERPs) refer to averaged EEG responses that are time-locked to more complex processing of stimuli; this technique is used in cognitive science, cognitive psychology, and psychophysiological research‘.

What that means is that when perpetraitors inflict something on a TI,  they can see that event reflected in TI brain waves recorded on a machine. ‘Event-related potentials’ refers to the machine read-out of the TI’s reaction to being tortured, abused or harassed by perpetraitors.

Text-To-Speech Systems

700px-TTS_System.svgIn her acclaimed book ‘1996’*, author Gloria Naylor describes in her fictionalized memoir how she was exposed to synthetic telepathy. Perpetraitor technology at that time involved a small satellite dish with a lap-top computer connected to it.  Perpetrators typed in the words they wanted Gloria to hear, and that translated into ‘heard thought’ in her perception.  The method described is similar to a Text-to-Speech system. Perpetraitors removed the picture above several times in an attempt to prevent it being published.  

*Third World Press, Chicago, 2005.

Technology has advanced since 1996, and from what I have observed, there is now no need for typing text onto a computer in order to create synthetic telepathy. Perpetraitors speak directly into microphones, and speech recognition equipment is used with computer-brain interface instead.–computer_interface.


According to John J. McMurtry, in his article ‘*Remote Behavioral Influence Technology Evidence’:

‘A Defense Intelligence Agency review of Communist literature affirmed microwave sound and indicated voice transmission. The report states, “Sounds and possibly even words which appear to be originating intracranially (within the head) can be induced by signal modulation at very low average power densities.” Among microwave weapon implications are “great potential for development into a system for disorienting or disrupting the behavior patterns of military or diplomatic personnel.”+

Application of pulsed microwaves 

‘An Army Mobility Equipment Research and Development Command report affirms microwave speech transmission… “One decoy and deception concept presently being considered is to remotely create noise in the heads of personnel by exposing them to low power, pulsed microwaves . . . By proper choice of pulse characteristics, intelligible speech may be created” quotes the report.’…

Microwave Auditory Effect

“Communicating Via the Microwave Auditory Effect.” is the title of a small business contract for the Department of Defense. Communication initial results are: “The feasibility of the concept has been established” using both low and high power systems…

Such a contract’s purpose is elaborated by the Air Force’s “New World Vistas” report: “It would also appear possible to create high fidelity speech in the human body, raising the possibility of covert suggestion and psychological direction . . . . If a pulse stream is used, it should be possible to create an internal acoustic field in the 5-15 kilohertz range, which is audible.

Thus it may be possible to ‘talk’ to selected adversaries in a fashion that would be most disturbing to them.” Robert Becker, whose eminence was enough to have been twice nominated for the Nobel Prize in biological electromagnetic fields research, is more explicit: “Such a device has obvious applications in covert operations designed to drive a target crazy with “voices” or deliver undetectable instructions to a programmed assassin.”++

Not all commentators are impressed with synthetic telepathy’s application on a battle field: 

Synthetic telepathy has limited uses as a communication system unless direct-contact headset systems are used and supported by encrypted channels. As such, standard radios are more effective in combat situations. Synthetic telepathy also requires the thought stream to be processed,+ which results in a minor lapse of attention, rather like a daydream, that could have deadly consequences on the battlefield.’ + My emphasis. at

1975 – A.W. Guy describes pulsed microwave effect

pot_obj3According to Richard Alan Miller, a researcher called A. W. Guy observed the effects of pulsed microwaves on humans. He noted that low levels of microwave energy could penetrate the skull and heat up the brain cells, causing expansion of brain tissue at cellular level. This caused a sound wave to pass from the skull to the ear, creating the microwave auditory effect.+++

*John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Phone- 410-539-5140.

+ “Surveillance Technology, 1976: policy and implications, an analysis and compendium of materials: a staff report of the Subcommittee on Constitutional Rights of the Committee of the Judiciary. United States Senate, Ninety-fourth Congress, second session, p 1280, US GOV DOC Y 4.J 882:SU 7/6/976.

++ Becker RO and Selden G. The Body Electric: Electromagnetism and the Foundation of Life Quill William Morrow, New York, p 319 & 320, 1985.

+++SYNTHETIC TELEPATHY AND THE EARLY MIND WARS By Richard Alan Miller, copyright 2001

[Presented at the Consciousness Technologies Conference-July 19-21, 2001,on Saturday, July 20th, 2001, in Sisters, OR], updated 03/04/2003,


John J. McMurtry also cites patents for ultrasound as the basis for synthetic telepathy:

‘Internal voice capability, without discernment by others nearby. is also evident in ultrasound-based technology. Lowrey Patent # 6052336 “Apparatus and method of broadcasting audible sound using ultrasonic sound as a carrier” clearly focuses on non- lethal weapon application against crowds or directed at an individual…’

Hearing_mechanics_cropped‘Norris Patent # 5889870 “Acoustic heterodyne device and method”, directionally produces sound on interference (or heterodyning) of two ultrasound beams. The cancellation leaves the carried audible sound perceivable. The effect becomes apparent particularly within cavities such as the ear canal. An individual readily understands communication across a noisy crowed room without nearby discernment. Sound can also be produced from mid-air or as reflecting from any surface’.

Source: ‘*Remote Behavioral Influence Technology Evidence’:John J. McMurtrey, M. S.Copyright 2003, 23 Dec. 2003. Address: 903 N. Calvert St., Baltimore MD 21202. Email- Phone- 410-539-5140.


If you have a head implant, such as an ear device or retinal camera, the only thing you can do is have it removed, as implants operate on wireless as transmitters/receivers, and wherever the TI is located, they send tracking signals to perpetrators, and pick up transmissions from them.

If you do not have a skull implant, shielding is an option. At the moment, Targeted Individuals do not have a lot of choice, because of the costs of shielding. There is no point in covering just our ears or head, because our whole body is enclosed in an electromagnetic field that operates like a TV satellite dish.  We need to be in a shielded environment.  Solutions do exist, and clearly where  government and state operations are involved, specialist security equipment must provide appropriate shielding.

320px-Electromagnetic_shielding_inside_mobile_phonePicture opposite: Electromagnetic shielding cages inside a disassembled mobile phone.

Here are some examples of shielding materials:

  • Acoustic or silent glass, available as UPVC windows or double glazing
  • Leaded glass
  • Silicon / plastic-based materials in walls, roofs and windows
  • Metal sheeting and wire such as used in microwave ovens.

These may not be easily affordable or practical for every-day life, but it is worth knowing they exist.  Jamming devices are another option, and they are more affordable, but they may have health risks, just as microwaves may do. Tall office blocks encased in green glass are likely to be sound-proof against synthetic eavesdropping, as are airports and modern deluxe airport hotels.

But what happens when the state representatives go home after their meetings?  What about all those intelligence, security and military personnel around the world who don’t discuss classified material, but know about it?  What if someone tries to listen to what they are thinking by pointing a microwave auditory device at them?  My theory is that they must have some kind of implanted devices, that operate radio wave jamming frequencies.  If so, that may work in the short-term, but it is not doing the health of such people any good.

This post was altered by perpetrators while I was preparing to publish it, and after it had been published. Only IT technicians have access permissions to do that, but family influence can be brought to bear. The main perpetrator involved was referred to by others as Philip, a trainee IT technician, the son of the perpetrator referred to by others as David. Based in England, on an overseas military base near where I live, Philip has been part of a group of new entrant perpetraitors participating in training in the US, with his father acting as mentor. As a trainee, he is still on probation, wherever his current location may be.



This entry was originally posted on August 18 2012.  

_60222459_p8900576-vision This post is about information in the public domain, recently highlighted in the UK and  US media, about miniature lenses that can sit on an eyeball and communicate with other devices used for military purposes.  Based on reports of targeted individuals, similar  technology may already be in use to enable perpetrators to see through the eyes of some if not all Targeted Individuals.

In my post on ‘Perpetraitor Profiles’ I mentioned that several Targeted Individuals recorded that perpetraitors were looking through one or both of their eyes, and that a technology called Remote Neural Monitoring could be used to do that.  But it wasn’t clear how that worked in practice.  

Since then I have done some more research and, based on the information and evidence quoted below, I have come up with a theory about how perpetrators could look through the eyes of Targeted Individuals, using non-consenual retinal implants which might possibly be inserted via nasal passages..  So here is my argument for what technology is being used, and how it works.


_41444182_cyborg_bugs_203In 1999 scientists proved that they could look through the eyes of a cat. BBC News Online Science Editor Dr David Whitehouse reported: ‘ A team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing… To their amazement they say they saw natural scenes with recognisable objects such as people’s faces. They had literally seen the world through cat’s eyes.’


In March 2008 Fox News reported that ‘U.S. military engineers are trying to design flying robots disguised as insects that could one day spy on enemies and conduct dangerous missions without risking lives… In essence, the research seeks to miniaturize the Unmanned Aerial Vehicle drones used in Iraq and Afghanistan for surveillance and reconnaissance.’,2933,456384,00.

_46537050_cyborg_x220In November 2008 Fox News also reported that ‘The next generation of drones, called Micro Aerial Vehicles, or MAVs, could be as tiny as bumblebees and capable of flying undetected into buildings, where they could photograph, record, and even attack insurgents and terrorists.’,2933,456384,00.html#ixzz22s2VQHy3

 In July 2009 the journalist Chares Q. Choi reported that: ‘Scientists can already control the flight of real moths using implanted devices.  The military and spy world no doubt would love tiny, live camera-wielding versions of Predator drones that could fly undetected into places where no human could ever go to snoop on the enemy.’


On 3 February 2012 the UK newspaper the Daily Mail reported:

_59631552_lennnnn‘DARPA – the Defense Advanced Research Projects Agency, thought of as the American military’s ‘mad scientist’ wing – has been funding research on ‘soldier mounted displays’ for some time, but previous versions have been bulky.

The lenses, made with nano-scale engineering processes,work as a hi-tech focusing device, which allows Innovega’s glasses to be considerably less bulky than previous devices.   The lenses themselves require no power, and thus can sit safely on the eyeball.’*  *My emphasis 

DARPA Says, ‘Innovega’s  iOptiks are contact lenses that enhance normal vision by allowing a wearer to view virtual and augmented reality images without the need for bulky apparatus. ‘

‘Instead of oversized virtual reality helmets, digital images are projected onto tiny full-color displays that are very near the eye.’

These novel contact lenses allow users to focus simultaneously on objects that are close up and far away.

On 14 April 2012, the Daily Mail ran an article under the headlines:



  • Lenses can let troops see through ‘eyes’ of drones flying above.
  • Can ‘layer’ target information over view of world.
  • Contact lenses don’t impede fighter’s vision.
  • Equivalent to a 240-inch 3D television from 10 feet’.

The Daily Mail reporter, Rob Waugh, stated that:

‘The Pentagon has placed an order with Innovega for lenses which focus 3D battlefield information from drones and satellites directly into people’s eyeballs*. The tiny ‘screens’ sit directly on users’ eyeballs and work with a pair of lightweight glasses with a built-in translucent screen. *My emphasis

On Sunday 29 July 2012, the Daily Mail also reported that:

‘The system is designed to improve the awareness of a military team as a whole, allowing soldiers to see through the eyes of their team mates in real-time’.* *My emphasis


According to John St Clair Akwei, a former surveillance specialist, Remote Neural Monitoring plays a key role in the targeting of individuals:

‘Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.’ 

From an article in Nexus Magazine April/May 96 from MindControlForums Website.

John St Clair Akwei does not say how Remote Neural Monitoring is achieved.  Dr John Hall, medical anesthesiologist, author of ‘A New Breed: Satellite Terrorism in America’ and a targeted individual, states that satellite technology was used at an early stage to connect electronically with computers. Drawing on his experience in the medical profession he _59631554_glashhnotes that Electroencephalograms – EEGs – are routinely used in hospitals to monitor brain wave frequency activity, and that when connected with satellite technology, a similar type of equipment will enable a perpetraitor to hear what you hear and see what you are seeing in real-time.


For Remote Neural Monitoring to work, satellite and / or wireless technology must have some way to connect with the targeted individual. Perpetraitors can see Targeted Individuals all the time using lasers and satellite technology. But they can also look through the eyes of a Targeted Individual. So far I have not been able to find anything that describes how this is achieved, but I think that nano-scale cameras must play a part in enabling perpetraitors to see through the eyes of targeted individuals.

The reason I think this is that:

  • The Daily Mail reported how US military battlefield methods are being upgraded with drones or satellites connected to cameras that can ‘safely sit on the eyeball’ of soldiers, allowing them to ‘see through the eyes of their team mates’.
  • If  the US military weapons described in the Daily Mail articles could connect with drones and satellites without using nano-scale eye cameras they would have done so, as it can hardly be convenient  for soldiers to be fitted with a type of contact lense attached to a camera, however small.  If the US Military didn’t need nano-scale cameras I doubt if the US army would be doing what they are doing.
  • The US military weapons system has some similarities with the Remote Neural Monitoring, and it is quite possible that RMN would need nano-scale cameras in the same way.
  • TIs report that perpetraitors only look through one of their eyes.  This is consistent with having a camera installed in one eye.

My theory is that perpetraitors can see through both our eyes, using satellite / wireless technology to track into our brains and connect with a nano-scale camera attached to or implanted on the outside of the eye.


My impression was that perpetraitors could look through one of my eyes, although I now think they can see through both eyes, even if our eyes are closed.  Something else I noticed was that in the dark I could see the nano-scale camera implant equipment shining white inside both my eyes, although it appears that only one eye has a camera.

324px-SharinganAnd in daylight I saw something in one of my eyes that looked like a black comma.  At first I thought it was a floater. Then I saw a clothing advert on a bill board, and noticed that the model had a comma drawn above her cheekbone. It looked like the one in my eye.   I searched the words ‘comma symbol’  on the Internet and found that there is a computer game called Naruto which has a huge following, and that the comma symbol is known as a Sharingan.

I also found out that you can buy contact lenses that give you a whole range of Sharingans. Could it be that some perpetraitor technician is into Naruto games and is making nano-scale eye camera implants that have a Sharingan on them?  Picture opposite: Sharingans.


After reading the articles referred to above in the Daily Mail, and adding to them the information I had from my own experience, I began to realise that a TI with a camera embedded in one eye could be part of a weapons system, providing additional close up vision that could be transmitted to a drone/satellite and also to a third party, possibly but not necessarily a human with weapons capability.

But the set up could work just as well if the Targeted Individual was the third party with weapons capability, if the camera in the TI’s eye could be used as a weapon to be fired at someone or somthing. Could some Targeted Individuals be used as human handgrenades? And could the system work just as well if the Targeted Individual had a separate camera in each eye? Or could the second camera be embedded centrally somewhere else in the TIs head?

ImplantSawanI put a patch over my eye – the one with the Sharingan in it. I could see as well with the other eye as if I had two eyes. But for the first time, I noticed a blurred patch in the middle of the other eye. Could that blurred patch be an invisible camera sight? I had already seen the placement socket shining in the dark as if reflecting ultraviolet light. Did it make any difference whether my eyes were open or closed?

At this stage, I hope I am wrong in my conclusions. Last week, I was sitting next to a friend who was driving, when something the colour of a stone seemed to come from slightly above eye level opposite us and hit the windscreen, leaving a mark in the glass. The mark in the glass was where my eyes were focused when the windscreen got hit.


Are nearby people and living things at risk when individuals are targeted electronically?

When perpetraitors target me with microwaves, birds and squirrels do not visit the food table outside. When perpetraitors stop targeting me with microwaves, birds crowd the table, as if making up for lost time.

This made me wonder how wide a space is covered when perpetraitors target individuals.  Could it affect people nearby, for example sleeping in the next room.  Could it affect neighbours sleeping in a semi-detached house.  And what effect could it have on partners of targeted individuals.


Anti-histamine cream and tablets appear to be helpful, based on my experience.  Maintaining an alkaline ph balance may also assist – for example, drinking lemon juice or cider vinegar.  Perpetraitors  get agitated by this, so it may nullify the results of some laser or microwave research testing.  Microwaves leach calcium out of bones, with results similar to osteoporosis. Taking a sufficiently strong dose of calcium citrate with vitamin D3 on a regular basis can counter the effects of this. 1000 mg of calcium with D3 a day would be the lowest suggested level.  Seeking the advice of a pharmacist is advisable.

After using aluminium protective eye shades at night for a while I could see that I had a ‘sunglass mark’.  My face was more red – except where the eye shades covered my face. One side of my face was less red than the other, probably because I sleep  on that side. I am not sure if this was caused by directed laser or microwave energy.  Sleeping in sunglasses or eye shades covered with aluminium foil may be beneficial. Attaching a cloth container such as a sunglass case to eye shades, and filling it with aluminium is another option.

NOTE: This post may not read as I would wish, owing to multiple interventions made on my Blogspot post by perpetraitors while I was trying to draft it. In recent weeks I have been subject to an onslaught of interventions and attacks by perpetrators while drafting, and I sometimes find that publishing the post as work in progress is best. Criminal encroachment in the internet operations of another country is a breach of international law.


This entry was first posted on July 31 2012.  


Screen Shot 2013-02-20 at 21.51.40The development of psychotronics represents an amazing technological advance, with beneficial therapeutic applications, such as  enhancements for those with impaired hearing and eyesight.  Tragically  the technology is being pursued for the potential harm it can cause. Those who seek to use the technology for criminal activities have deselected themselves from the human race. Since my post on Perpetraitor Profiles I have had further opportunities to note and record more about those who carry out electronic harassment and psychotronic torture of targeted individuals.


Bearing in mind that psychotronic interaction with Targeted Individuals is a two-wayScreen Shot 2013-02-20 at 21.55.27 communication process, that means that when they are studying me, I might get insights into what’s going on with them as well.  And they know that, because they tried to install a human firewall after my last post, but that arrangement hasn’t been working too well.

What does that mean?  Well when I first got targeted, the criminal bosses allowed less experienced staff to interact directly with my mind.  But later they realised that this could enable me to look over their shoulders.  Then they tried having one suitably-equipped person to interact with me and tell less experienced staff what I was thinking and doing.  That meant that the less experienced staff got it second hand. I noticed that this arrangement might not be too effective, because only the ‘equipped’ person could say anything, and it might not be accurate and no one would know. Possibly for this reason, the criminal bosses gave the supervisor separate simultaneous access.

221px-Desmodus_rotundus_feedingThe problem with giving the supervisor separate simultaneous access is that, in this particular business model, the supervisor is the one operating the torture equipment.  Having separate access means that no one knows exactly what he is doing. There are volumetric reports for the equipment, but I doubt if that that is enough to ensure an accurate record. Also, certain events led me to conclude that those with access to torture equipment had other equipment as well, which did not have an automatic activity record, and which could be exploited to abuse others.


Screen Shot 2013-02-20 at 21.52.38According to the author and technical specialist, Robert Duncan*, perpetraitors have screen monitors that show them where to point when directing harmful/painful energy towards victims. For about two weeks I noticed that perpetraitors seemed fixated on one point on my leg.Eventually I realised that it was probably not my leg they were aiming for. Could it be that their shiny new equipment needs calibration?


Human head louse

Perpetraitors are sitting in their brand new ivory tower, having interaction with their screens, but if their equipment isn’t correctly calibrated they may not be getting reliable feedback about what TIs are experiencing. It could mean that when perpetrators thought they were administering a medium shock, they might be administering a higher level, in situations that could be life-threatening to the targeted individual.  This is unlikely to be what perpetraitors want,  because without a continuing population of TIs, they would be out of a job. If there is any business rationale for what they are doing, a possible flaw in technical performance might have implications for things like research contracts and continued viability.

*Project: Soul Catcher, Volume Two, Secrets of Cyber and Cybernetic Warfare Revealed, Page 237 – Torture Database Screen’, Robert Duncan and   the Mind Hacking Strategy Group 2010,


DesmodusThe perps were chatting on to each other as usual, and what they were saying was echoing through my mind, because I was obliged to listen to them.  If I had been wearing the right headset or had electronic receptors stuck to my brain, the frequencies I was hearing could have been recorded.   Even if  perpetraitors have paid for the best security at their hideout, other parties that have the technology could be eavesdropping through me.  The perpetraitors seem to disagree with my view on this, but that doesn’t mean it isn’t happening.

According to Dr John Hall*, criminal perpetraitors are hacking into satellites. If that is happening, it could mean that other parties could also listen in and record what I was hearing, using advanced satellite frequency detection devices.  They could then translate the frequencies into speech for their own purposes.

To use an analogy, if the perpetraitors were a bank, they might have reasonable in-house security, but that wouldn’t stop other criminals from abusing their ‘ATMs’, because the weak link in the chain is the person who has a bank account and who may not be aware that their PIN number could be detected. And none of this sounds like good news for the targeted individual. I hope the perpetraitors take care not to think about their credit card details and passwords when interacting with their equipment.

*A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.




I do not claim to have any knowledge of technical things, so this is just how it comes across to me: TIs often report that the perps can see what TIs are seeing, as if looking through their victims’ eyes.  This involves satellite technology* and Remote Neural Monitoring**.

On 30 April 2012, in an article about enhancements to US Navy uniforms, the UK Newspaper the Daily Mail also revealed one of a range of new ‘cyborg’ technologies under test by the Pentagon. The article  stated:

‘Another groundbreaking high-tech military system will allow any soldier in a unit to ‘see’ through the eyes of any of his comrades’.*** 

On October 11 1999 the BBC News Online Science Editor Dr David Whitehouse reported that ‘a team of US scientists have wired a computer to a cat’s brain and created videos of what the animal was seeing’.****  

The article anticipated that ‘It is also conceivable that, given time, it will be possible to record what one person sees and “play it back” to someone else either as it is happening or at a later date’. 


Black fly

Perpetraitors also have the option of looking not only at what you see, but also directly at you from satellites, using laser particle beam technology that allows them to see through walls, roofs, cars etc.  This option is more likely  to be available to the supervisor. If perpetraitors only have ‘see-through-eyes’ vision, they may be left in the dark if the TI closes both eyes or is in an unlit room. Having both views  usually clarifies what is going on, but can create two interpretations of what is happening. Sometimes it can be like two people blindfolded trying to put the tail on the donkey.

*See ‘A New Breed. Satellite Terrorism in America, Dr John Hall, 2009.

** Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor.


**** BBC News Online Oct 11, 1999, Looking Through Cats’ Eyes Fuzzy, But Recognizable, Dr. David Whitehouse, A BBC News article reported on the first pictures from an experiment to see through the eyes of a cat. 471000/471786.stm.  Source: Cold War Nonconsensual Experiments: The Threat of Neuroweapons and the Danger it will happen again, Cheryl Welsh, J.D.,


  • 220px-Ixodus_ricinus_5xif perpetraitors are invading your thoughts and you can think in another language, try doing that for a bit. It puts the perpetraitors off, because their criminal bosses want them to understand what you are saying.  If you carry on they will have to bring in someone who can speak the same language, and that is not always easy, even when no expense is spared.
  • I tried this, using a few phrases of a foreign language that I had picked up, and some songs from a CD in that language. I regularly repeated the words in my mind.  This resulted in two language experts being brought in.  They both left almost immediately on ethical grounds, and one of them was traumatised by what he  found out about targeting of individuals.
  • If you are fed up with intruders trying to take you over, and want to meet up with your friends, pick a venue that has built-in protection against a range of frequency devices.  Many airport hotels now have this, and some can be reasonably priced.  Just make sure you are within the shielding – avoid the foyer and bars open to non-guests.
  • Most people are aware of the next point, but I wasn’t, so I will mention it.  Before you go to sleep, it is advisable to switch off all wireless/internet routers and unplug internet cable connections to phone filters before you go to sleep.  Take strategic electric plugs out of sockets. Ensure that cell phones, tablets etc are not only switched off but encased in metal or wrapped in aluminium, as they can be used as tracking devices even when switched off.

 In the course of preparing this post my laptop was crashed externally so many times that it no longer worked, and I had to buy another one.  I also had to get a new filter for my Broadband internet.  The day after publishing this post the photo library in my iPhoto application, containing nearly 5,000 photographs was wiped out.  I do have a back up, so I reloaded the photos, and half an hour later they were wiped again.



This entry was first posted on July 25 2012.  It was updated on 20 February 2013.  

Screen Shot 2013-02-20 at 18.14.47This post covers:

  • The secret weapon that gives perpetraitors control
  • How the criminal perpetraitors do it
  • What methods we can use to protect ourselves
  • My personal experience of trying out one of the methods

Many Targeted Individuals (TIs) have had the courage to write about their experiences, either on the internet, or in books.  Some experiences appear to be common to most TIs, including remote pain transmission, exposure to dangerous levels of microwaves and altered states of awareness. Some also describe ‘gang-stalking’ and others report impressions of synthetic telepathy, paranoia and psychosis.


There is one type of energy weapons approach that gives perpetrators control over their victims. In her article ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies 2003, the psychoanalyst Dr Carole Smith.PHD, states:

‘In 1969 Dr Jose Delgado, a Yale psychologist, published a book: “Physical Control of the Mind: Towards a Psychocivilized Society”. In essence, he displayed in practical demonstrations how, by means of electrical stimulation of the brain which had been mapped out in its relations between different points and activities, functions and sensations, – by means of electrical stimulation, how the rhythm of breathing and heartbeat could be changed, as well as the function of most of the viscera, and gall bladder secretion. Frowning, opening and closing of eyes and mouth, chewing, yawning, sleep, dizziness, epileptic seizures in healthy persons were induced. The intensity of feelings could be controlled by turning the knob, which controlled the intensity of the electric current.’ – my emphasis.

What we are talking about in everyday terms – I do not pretend to know much about the technical side – is that by directing  electromagnetic technology at a very specific part of the  brain, perpetrators can alter the victim’s state of awareness, including:

  • Sudden onset of sleep/sleep deprivation
  • Going unconscious
  • Forgetting what happened to them
  • Experiencing externally induced emotions
  • Synthetically induced paranoia and psychosis
  • Heart malfunction
  • Breathing difficulties – asphyxia can be induced by altering frequencies in the brain that control breathing
  • Synthetically induced frequencies that replicate inhalation of noxious gases/chemicals.

If it wasn’t for this one perpetraitor capability, targeted individuals could probably get up and walk away from much of what was targeted at them, most of the time.



Use of electrical apparatus. Interrupted galvanism used in regeneration of deltoid muscle. First half of the twentieth century

The application of electrical currents to either generate or suppress activity in the nervous system is known as functional electrical stimulation (FES). FES can produce and control the movement of otherwise paralyzed limbs for standing and hand grasp, activate visceral bodily functions such as bladder control or respiration, create perceptions such as skin sensibility, arrest undesired activity such as pain or spasm, and facilitate natural recovery and accelerate motor relearning.

HOW DO THE CRIMINAL PERPETRAITORS DO IT? – Pulsed Radio Frequency Radiation

In his book ‘A new breed: satellite terrorism in America’ –, Dr John Hall has drawn attention to the use of satellite technology by criminal perpetraitors for targeting individuals remotely.  Dr Carole Smith’s article supports this:

‘A more disturbing use is the system developed for manipulating and disturbing the human mental process using pulsed radio frequency radiation (RFR), and their use as a device for causing negative effects on human health and thinking. The victim, the innocent civilian target is locked on to, and unable to evade the menace by moving around. The beam is administered from space’…*

‘The technology that originated in the years of the arms race between the Soviet Union and the West, has resulted in using satellite technology* not only for surveillance and communication systems but also to lock on to human beings, manipulating brain frequencies* by directing laser beams, neural-particle beams, electro-magnetic radiation, sonar waves, radiofrequency radiation (RFR), soliton waves, torsion fields and by use of these or other energy fields which form the areas of study for astro-physics.’

*My emphasis

Description of the technology

The following extracts from a well-known US court case detail some key perpetraitor technologies.  The extracts have been quoted in such a way as to make the general application clear, excluding named persons or organisations.  The source of these extracts is at

‘Everything in the environment with an electric current in it has a magnetic field around it which gives off EMF waves…’ The intelligence community ‘has developed proprietary advanced digital equipment which can remotely analyze all’… objects that have electrical activity’.

This technology ‘uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMB Brain Stimulation has been in development since’… ‘the early 1950’s’.

‘For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communications direct to the brain (bypassing the ears)… Operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia’.

‘Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor…Operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves…  Operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes’.

‘RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send mental images through the nervous system to affect their performance’.

‘RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz. to 50 Hz’.

‘An example of EMF Brain Stimulation:

Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation
Motor Control Cortex 10 Hz Motor impulse coordination
Auditory Cortex 15 Hz Sound which bypasses the ears
Visual Cortex 25 Hz Images in the brain bypassing the eyes
Somatosensory Cortex 9 Hz Phantom touch sense
Thought Center 20 Hz Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible’.

FMRI‘Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived’.

Detecting EMF Fields in Humans for Surveillance

‘A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment’… intelligence cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance’.

Intelligence ‘personnel can dial up any individual’… on an EMF scanning network and intelligence ‘computers will then pinpoint and track that person 24 hours-a-day’.


Shielding materials are used routinely for protection of buildings from radio frequencies. Many shielding materials offer varying levels of protection.  Silver-based thread, black out curtains and aluminium products are often quoted. Silicon gell and some plastics are also said to be effective.  Neodymium magnets – 9000 gauss – worn on the body conceal organic frequencies to some extent, making RNM targeting less accurate, and they remove pain. See Therapy Magnets at

According to Mr Barry Trower, a well-known advocate of targeted individuals*, TIs can protect themselves  using several layers of aluminium foil as shielding.  In a talk recently uploaded to YouTube, he also provides a range of other advice  –


I have read some things on the internet that suggest that anyone who uses aluminium foil – such as for tin hats – is deluding themselves.  But according to Wikipedia:

‘The notion that a tin foil hat can significantly reduce the intensity of incident radio frequency radiation on the wearer’s brain has some scientific validity, as the effect of strong radio waves has been documented for quite some time. A well-constructed tin foil enclosure would approximate a Faraday cage, reducing the amount of … radiofrequency electromagnetic radiation passing through to the interior of the structure…’

“The efficiency of such an enclosure in blocking such radiation depends on the thickness of the tin foil, as dictated by the skin depth, the distance the radiation can propagate in a particular non-ideal conductor. For half-millimetre-thick tin foil, radiation above about 20 kHz (i.e., including both AM and FM bands) would be partially blocked, although tin foil is not sold in this thickness, so numerous layers of tin foil would be required to achieve this effect’…

‘The effectiveness of the tin foil hat as electromagnetic shielding for stopping radio waves is greatly reduced by it not being a complete enclosure.’



Man wearing a tin foil (aluminum) hat

Recently, perpetraitors were directing brain targeting to make me struggle for breath, or lose concentration, particularly when I write this blog.  So I decided to give the aluminium hat a try – and I found that IT WORKS.  The lack of oxygen and loss of focus stopped.

There are things that aluminium foil doesn’t do, including blocking synthetic telepathy, but if you want to stop perpetrators taking over your brain, based on my experience, several layers of aluminium foil, covering the head completely, will do it.  You can buy the foil quite cheaply in places like supermarkets and general purpose stores.

The risk is mainly when you are indoors at home, and staying still, or asleep. If you are outside in fresh air and moving about, the risk is much lower.


Dr Carole Smith.PHD – ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’ –

Dr John Hall – ‘A new breed: satellite terrorism in America’ –

Mr Barry Trower –[20]%20Amended%20Declaration%20of%20Barry%20Trower.pdf


This entry was first posted on June 30, 2012.

Picture1 2Targeted Individuals (TIs) have been, and continue to be, the victims of unspeakable atrocities, and some have lost their lives.   The technologies involved have been available for a long time now.  For example, as early as 1969 Dr Jose Delgado, a Yale psychologist, was showing how electrical stimulation of different parts of the brain resulted in changes in breathing rhythms and heartbeat rhythms:-

To judge by the number of TIs reporting what has happened to them, there must be many criminal perpetraitors.  The number of TIs can only be estimated, but some indication may be drawn from a petition started in 2007, calling for a ban on electronic warfare on civilians  –

To date the petition has received over 1500 signatures, mainly from those describing themselves as TIs.  While numbers of signatures can only be indicative, there have clearly been ongoing issues since 2007.  Even one TI is one too many, but the petition numbers are probably only the tip of the iceberg.  The significant increase in 2011 and emerging figures for 2012 raise serious questions. Greater publicity for the petition might be one explanation, but I only discovered the website by chance this month, and I never saw any publicity for it. The testimonies of some of the signatories are heart-rending.

Picture8Signatures supporting a ban on electronic warfare on citizens from   2007-2012. 


What kind of person would routinely torture targeted individuals on a daily basis using electronic harassment and synthetic telepathy?  From the time that I became a targeted individual, I was obliged to interact with some of these people.  They used synthetic telepathy to talk to me – for an explanation of this see, and they sounded like any normal human beings you might meet in any street or office, except that they were abusive, cruel and manipulative. People said the same thing about staff working in Nazi death camps.  They went home at the end of the day to be with their families, and neighbours had no indication of what they were involved in.

This blog looks primarily at aspects of perpetraitor psychology and technology.  But while going down that route, we must not forget that the perpetraitors’ role is to operate a range of targeting devices that deliver torture to the body of the victim, and can cause cancer, heart ailments and malfunction of physical organs.

Who are the PerpeTraitors?

Picture112For some months I was obliged to live as if in close quarters with perpetraitors 24/7.  During that time I observed their behaviour, and it seemed to me that they fell into four categories:

–  Experienced criminal operators

–  “Old lags” – disgraced law enforcement / security officers, who may have     criminal convictions

–  Younger criminals with state-of-the-art ITC skills

–  “Les Miserables” – young kids, mainly women, who may have been targeted, or exploited or who got into something they didn’t understand.

Perpetraitors can listen to your thoughts, and their equipment allows you to hear their voices – but not their thoughts. The range of technologies that may be used are described at:

One of the things they don’t tell you is that synthetic telepathy can become more of a two-way process.  Based on my experience, if they can hear your thoughts, over time you can begin to build up a picture of what is going on at the other end of the ‘phone’, both aurally and visually, using the same equipment that they use to spy on TIs.  During the initial phases of targeting, the picture I began to build up was of a large room, one wall of which was like a plasma screen.  Information about each TI was displayed in series on the screen.  There were technicians, using automated software to manage the daily caseload of criminal interventions used to target each individual. It felt like a secure data centre IT environment, with staff quietly going about their daily tasks. Perpetraitors were anonymous, hardly interacting with me, though sometimes I heard them talking to each other.  What were these people like, I wondered. I pictured several casually-dressed men in their middle to late thirties, sitting round a table, playing cards, while helping themselves to soft drinks and snacks.

Later on it seemed I was targeted by a smaller criminal outfit operating a mix of experienced and less experienced perpetraitors, usually working three shifts a day in pairs.  If the TI sleeps at night, one perpetraitor may operate alone, using programmed interventions in an attempt to manipulate TI dream states.

A number of TIs have described on the internet how they were harassed through ‘street theatre’ using standard scenarios.  In my case, the theatre was more economically produced using holographic visual software designed to work with brain communications technology, drawing on stock scenarios. The daily dramas required perpetraitors to interact directly with the TI and ad lib in line with TI responses, rather than follow electronic screen prompts. The different characters in the dramas were created using  equipment that can transmute voices into different personalities, a bit like a synthesiser, switching genders and age to suit whatever story they were telling. Perpetraitors displayed enthusiasm in preparing their daily shows.  No doubt there is a lot of boredom in their work.  I got the impression that some of them were wanabee Hollywood script writers and movie directors.  It is sad that people could fall so low, when human potential offers so much more.

Use of Satellite Technology

Picture3According to some researchers such as Dr John Hall –, satellite technology is an essential part of effective targeting of individuals. Even if TIs are a long way off – in a different country, for example, they can be located and tracked for targeting.  According to the website, ‘advanced satellite surveillance systems can be accessed by corrupt “businessmen”, including media and political figures. They can access audio-visual material as well as intercept telecommunications. The results can be used to rob, blackmail, harass or humiliate targets. Targets include competitors, researchers, writers, inventors, lobbyists, law enforcers etc’.

Another website reports that ‘Private criminals or corrupt government are tapping into and somehow gaining access to Government satellite technology using Remote Neural Monitoring and terrorizing individuals. It is claimed that this is being done illegally to individuals across the United States.

Commercial satellite technology is readily accessible around the world to those who can afford to pay for it.  ‘As to where demand is coming from, the United States is the dominant force in this sector, with a 30 percent share due to high-demand from NASA and the Department of Defence (DoD). Europe enjoys a 25 percent share, while Asia follows suit with 22 percent thanks to activity in China and Japan. Russia has a 13 percent share of the market, while the Middle East and Africa (MENA) tops 9 percent and the rest of the world follows with 5 percent’.

It occurred to me that criminals intent on satellite targeting of individuals might buy access to some of the many satellites offering commercial opportunities, if there was a high enough profit from what they were doing.   Some examples of the way that perpetraitors might profit targeting of individuals are listed in the section on ‘Money, malice and revenge as criminal motivating factors’ below.

Perpetraitor operations

Picture4Perpetraitors do not necessarily have that much real-time interaction with TIs, although the TI is meant to think that they are on the other end of the line all the time.  Often what is actually being transmitted is an interactive programme using Neurophone technology, which provides a running commentary on the TI’s thoughts and feelings.

‘The computer repeats (echoes) your  own thoughts and then the human monitors comment or respond verbally’ …’Whilst the live/human comments are individualistic and unrelated to the victim’s own thought processes, oftentimes the artificial intelligence involved will parrot standard phrases.  These are triggered by your thoughts while the human monitors remain silent or absent’.

The programme can call on automated prompts which provide negative feedback, based on the TI’s thought response. These comments may be accompanied by synthetic noises like mocking canned laughter, jeering, hissing, and conspiratorial whispering. The perpetraitors can switch to manual for real-time interventions.

It is possible for a TI to halt the operation of the running commentary in a number of ways. The programme relies on TI feedback to continue running, and if there is no TI feedback for about an hour the programme will switch off. Eliminating thought for an hour is hard to do, but there is a much easier way to throw a spanner in the works. The programme is interactive and responds to what the TI is thinking.  If you ask the system a question for which it does not have a programmed response, the system will stall.  What questions will stall the programme?  Well at the time of writing some of these might work:

  • Who are you?
  • What is your experience of…?
  • When was the last time you…?

If a targeted individual happens to have nothing better to do than provide open questions to the programme, the system will pack up eventually, owing to lack of TI thought input.

Perpetraitors like to make out that they are all-powerful and impervious to any risks.  Listening to them, I realised that they don’t necessarily know that much about the technology they use, or the potential risks to themselvesas well as to TIs whenever they tortured their victims.

Junior perpetraitors may be at risk of targeting by their criminal overseers, one of whom thought nothing of using torture weapons on one of his young female staff on one occasion.

Criminal bosses may have told perpetraitors that electronic equipment they use is perfectly safe.  But you cannot always rely on what people say about technology.  For example, some people said that TSA scanners posed no threat to the health of air passengers or equipment operators.  The EU took a different line and banned their use: and

Since then there have been reports in the US that some TSA operators are being diagnosed with fast acting cancers:

Perhaps perpetraitors are also at risk from the technology they use.

Some TIs are used as guinea pigs

Picture6Some TIs report that they were experimented on for research purposes.  I had the impression that this happened to me too.  I am fairly sure that perpetraitors also used me as a subject during training of criminal recruits.

Altered states of consciousness leading to paranoia and psychosis appear to be the main means of gaining control over TIs, so research might be expected in this area.

Perpetraitors were trying out different approaches, focusing on psychotronics to deliver altered states of consciousness.  It felt as if they were trying to make me inhale something like chloroform or carbon monoxide. Other criminals sometimes joined the perpetraitors in what seemed like a virtual chat room, to study the effects of new approaches on me.

According to Dr Carole Smith, PhD, in ‘On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’* asphyxia can be induced by altering frequencies in the brain that control breathing.  Perhaps other altered states of consciousness can be produced in a similar way.  I have found that going out into fresh air greatly reduces the impact of synthetically induced breathing problems.

On the Need for New Criteria of Diagnosis of Psychosis in the Light of Mind Invasive Technology’, Journal of Psycho-Social Studies, 2003.

Money, malice and revenge as criminal motivating factors

Picture5Perpetraitors try to conceal the reason why TIs are targeted.  It was a while before I realised that at certain times, those torturing me were worried about meeting some delivery deadlines linked to incentive payments.  Perpetraitors were strongly focused on:

  • meeting  set levels of activity using various types of equipment
  • delivering a different drama every day
  • demonstrating that I was deprived of sleep for a specific number of days
  • ensuring a steady flow of interactions with the TI throughout their particular shift.

If the end of the shift was approaching, and targets had not been met, perpetraitors became tense and morose.

Why are the criminals doing it?  The short answer is that they do it to earn a living.  The objectives may vary, but I have read of reported cases where a “client” requested the criminals to deliver specific outcomes in exchange for payment.  Dr John Hall explores this in his book ‘A new breed: satellite terrorism in America’, 2009. Outcomes might include:

  • Changing a will in favour of a client
  • Beak up of a marriage
  • Constructive dismissal of a TI
  • Getting a TI to sell property  to a client at an advantage price
  • Forcing a TI to leave a particular neighborhood.

Other cases recorded on the internet suggest that criminal perpetraitors or their clients, motivated by jealousy or revenge, tried to have targeted individuals assassinated remotely, for example by a fatal stroke or heart attack, or arranged to have a member of a TI’s family hurt in some way.

I know of one particularly distressing case in which a couple visiting North America were targeted during their stay, and one of them was hospitalised with a life-threatening illness.  At the same time, it transpired that the elderly mother of one of them, living in their home country, was suddenly diagnosed with paranoia and psychosis, and sectioned.  Clinicians carried out extensive checks, as she had recently had a routine operation, but could find no cause of the change in her mental health. The attack on the helpless elderly mother was a cowardly despicable act of criminal exploitation motivated by malice.

How would perpetraitors feel if their own mothers were being treated this way?Perhaps perpetraitors are not capable of experiencing human feelings.

Revenge played a part in my becoming a targeted individual. Listening to perpetraitors talking among themselves I identified one of them – falling into the ‘old lag’ category, as having a grudge against my employer. I later learned the initial justification was the amount of overseas travel I did.


In his book ‘A new breed: satellite terrorism in America’, Dr John Hall states that perpetraitors use satellite surveillance equipment hacked into by criminals, to see what TIs are doing in their homes.  Some TIs report that perpetraitors are with them wherever they go, and comment on what they are looking at – This has been my own experience.

A number of other TIs report having similar experiences:

What technology would enable perpetraitors to look through my eyes?  It occurred to me that it might work a bit like a television. Most kinds of television work from the same basic principle as the eyes and the brain. The tiny dots of light produced on the TV screen, called pixels, flash according to a specific pattern provided by the video signal. A person’s eyes transmit this pattern to the brain, where it is interpreted as a recognizable image.

Remote Neural Monitoring is said to be used by perpetraitors to send images direct to the visual cortex of a TI, bypassing the eyes and optic nerves, to create optical illusions –  So presumably it could receive images from the visual cortex in the same way.  This would mean that perpetrators could use Remote Neural Monitoring to see what the TI was seeing.

Are there tactics that TIs can use to provide appropriate feedback to perpetraitors? There are sound frequencies that perpetraitors do not like, because of the way psychotronics works, including:

  • Rustling and crunching of cellophane, supermarket plastic bags and tissue paper.  The noise should be made loud and close to the TI’s head.  Do not be surprised if the perpetraitors temporarily turn off their communication links. Yes, they can turn the links off, and they will turn them back on a bit later.
  • A similar effect can be achieved by scratching cutlery on ceramic plates.
  • High pitched frequencies such as those played on Solfegio tones – from are also effective.

Strange as it may seem, there are repellent images that perpetraitors do not like thrown their way.  If they express interest in something revolting, call their bluff.  Create a strong visual image of what they are focused on – or something equally revolting – and send it back down the psychotronic line, visualising it falling all over them.  From what I have read, their equipment can show mind pictures on a screen, so you can provide both mental and visual feedback.



Mask images taken from:

This blog was published despite repeated attempts to interfere with my computer display drive function, and alteration of the text.  Apparently, this can be achieved using satellite technology remotely – from another country for example.