The age-old adage First Do No Harm should be the tempering goal of not only medicine, but government and industry, especially when they team up to deploy new technologies, set policies and serve the people.

This blog exists to reveal and analyze areas in which these powerful groups are failing to "first do no harm."

Saturday, February 6, 2016

The science & technology of mind reading


Research is likely decades ahead of what is now publically available. The research is ongoing.

Here are 3 examples of the science showing how minds can be tapped into via technology.


1. Technology could read unspoken thoughts via larynx nerve signals (since 2007). (Think what this can do today, possibly without an attached implant or sensor, like the fMRI in #2 below).

Although some people claim their mouths operate independently of their brains that's not usually the case. The brain sends neurological signals to the larynx, which converts them into sound. Now, what if we could use those larynx nerve signals to control things?

That's exactly what a company called Ambient is doing. Its Audeo technology basically converts "unspoken speech" (neurological signals flowing through larynx nerves when a person thinks about speaking) into control commands that can be used to guide a motorized wheelchair (video above) or synthesize speech. Pretty amazing!

To use the system, a person wears a lightweight sensor band around the neck. The band picks up the larynx nerve signals and transmits them wirelessly to a remote computer (don't worry about "mind wiretapping" -- the transmission is encrypted.) The remote computer uses NI LabVIEW and signal processing algorithms to interpret the nerve-impulse patterns and translate them into the right commands.


2. The fMRI can suck that picture straight out of your brain. You don't need any sort of implant or anything. (This was touted back in 2012. Again, where is it today? one might wonder).

Functional magnetic resonance imaging (fMRI) is a remarkable technology: it can be used to do everything from recording your dreams on video to teaching you new skills while you sleep. It's also good for controlling robots, and Israeli researchers have managed to get a robot to move around a room just by thinking about it.

An fMRI machine detects changes in blood flow to measure brain activity in real time with a very fine degree of spatial resolution. It can detect changes so subtle that it's possible to differentiate between the activity patterns created when you think about turning left versus when you think about turning right, which is the basis for the experiment shown in the video below. In Israel, a researcher inside an fMRI machine thinks "walk forward" or "move right" or "move left," and a thousand kilometers away in France, a robot performs the movement based on the researcher's thoughts alone while sending back first-person video for an avatar-like experience:

There are a few different reasons why this method of brain control is different from (and arguably better than) other methods of brain control that we've seen in the past. Other tools, like Emotiv's EPOC headset, can detect specific patterns of brainwaves that can then be used to send commands to a robot, but to get that to work, you have to train your brain to reliably create those brainwaves. fMRI, on the other hand, can (sort of) read your thoughts directly, with a vaguely alarming degree of accuracy, meaning that very little training is necessary: just picture a robot doing something, the fMRI will suck that picture straight out of your brain, and then get the robot to do the same thing. The other big advantage is that you don't need any sort of implant or anything, just a ridiculously expensive machine.

3. The fMRI is commonly combined with other biometric tracking techniques to provide a clear picture of the subject.

It is common to combine fMRI signal acquisition with tracking of participants' responses and reaction times. Physiological measures such heart rate, breathing, skin conductance (rate of sweating), and eye movements are sometimes captured simultaneously with fMRI.[citation needed] The method can also be combined with other brain-imaging techniques such as transcranial stimulation, direct cortical stimulation and, especially, EEG.[55] The fMRI procedure can also be combined with near-infrared spectroscopy (NIRS) to have supplementary information about both oxyhemoglobin and deoxyhemoglobin.


The fMRI technique can complement or supplement other techniques because of its unique strengths and gaps. It can noninvasively record brain signals without risks of ionising radiation inherent in other scanning methods, such as
CT or PET scans.[56] It can also record signal from all regions of the brain, unlike EEG/MEG, which are biased toward the cortical surface... R


U Try searching biometrics or mind at the IEEE for more interesting developments.

Why surveillance? "The money will come in buckets" says WSJ article



Red-light cameras show us the flaw in the theory that government will ‘nudge’ us into doing the right thing.

By
Holman W. Jenkins, Jr.

Feb. 5, 2016 6:46 p.m. ET

The WSJ article begins: “Any terrorist who doesn’t watch this for tips is, frankly, a mug.”  So went a headline in the Times of London about a popular new British reality show for the surveillance age, called “Hunted.”

The article explains how Britain had asserted its camera network would “deny criminals the use of the roads.” But this has not panned out. Jenkins says that the financial motive is easier to observe as the reason for surveillance. “The money will come in buckets,” said a camera promoter quoted in the article.

The author also talks about Chicago’s similar system and the impact of the government’s “nudging” in ObamaCare. The theory of “Nudge” is actually in a book by Chicago economist Richard Thaler and Harvard Law School Professor Cass Sunstein “on how government can use gentle rewards and punishments to improve us,” explains Jenkins.

The profit and "nudge" motives for surveillance could be applied to all areas that it is expanding in.

Want to see more about the sensor systems being created? Do searches at the IEEE site to understand this obsession with automating everything.

Sunday, January 17, 2016

Federal Government Wants a Smart Meter “on EVERY home and business in the country.”


On January 14, U.S. Department of Energy (DOE)stated it (ultimately) wants a smart  meter on every home and business in the country. The blog I am linking to explains some of the issues with this.
Interestingly, this blogger has a case at the Department of Energy complaining about smart meter health impacts and requesting an opt out, which state utilities and utility regulators refused to provide. The question is will exceptions be made for individuals who have Radiofrequency Sickness or other problems with smart meters. The complaint was sent to the Department of Justice in August 2014. It was routed to the Department of Energy in fall 2015. The outcome of this complaint/case should be interesting in light of blanket statements made about the smart meter program. But like any disability, accommodations should have to be made. For example, a person who cannot hear would get an appropriate machine that allowed them to access services of whatever kind.
Stay tuned.

Sunday, December 27, 2015

SCIENCE SAYS: Man-made EMR dangerous, unlike Natural EMR

MAN-MADE MICROWAVES have grown to levels up to  1018 power higher than natural levels from the beginning of life on Earth, according to Dr. Leif Salford, neurosurgeon and researcher, who has studied the biological impacts of this radiation on our brains.

Furthermore, we can no longer say man-made wireless/EMR is harmless because we believe it is no different than Natural EMR. SCIENCE says this is simply not true. Therefore, those stating this untruth are not referring to science, but their own wishful thinking.
 

Polarization: A Key Difference between Man-made and Natural Electromagnetic Fields, in regard to Biological Activity.

http://www.ncbi.nlm.nih.gov/pubmed/26456585

Sci Rep. 2015 Oct 12;5:14914. doi: 10.1038/srep14914.
Polarization: A Key Difference between Man-made and Natural Electromagnetic Fields, in regard to Biological Activity.   Panagopoulos DJ1,2,3, Johansson O4, Carlo GL5.

Author information  1National Center for Scientific Research "Demokritos", Athens, Greece.
2Department of Biology, University of Athens, Greece.
3Radiation and Environmental Biophysics Research Centre, Greece.
4Experimental Dermatology Unit, Department of Neuroscience, Karolinska Institute, Stockholm, Sweden.
5The Science and Public Policy Institute, Institute for Healthful Adaptation, Washington, DC, USA.

Abstract
In the present study we analyze the role of polarization in the biological activity of Electromagnetic Fields (EMFs)/Electromagnetic Radiation (EMR). All types of man-made EMFs/EMR - in contrast to natural EMFs/EMR - are polarized. Polarized EMFs/EMR can have increased biological activity, due to: 1) Ability to produce constructive interference effects and amplify their intensities at many locations. 2) Ability to force all charged/polar molecules and especially free ions within and around all living cells to oscillate on parallel planes and in phase with the applied polarized field. Such ionic forced-oscillations exert additive electrostatic forces on the sensors of cell membrane electro-sensitive ion channels, resulting in their irregular gating and consequent disruption of the cell's electrochemical balance. These features render man-made EMFs/EMR more bioactive than natural non-ionizing EMFs/EMR. This explains the increasing number of biological effects discovered during the past few decades to be induced by man-made EMFs, in contrast to natural EMFs in the terrestrial environment which have always been present throughout evolution, although human exposure to the latter ones is normally of significantly higher intensities/energy and longer durations. Thus, polarization seems to be a trigger that significantly increases the probability for the initiation of biological/health effects.

PMID:

26456585

[PubMed - in process]

PMCID:

PMC4601073

Free PMC Article
 

Wednesday, September 16, 2015

Emergency Room Physician Discusses (her own) Electro-hypersensitivity - Dr. Erica Mallery-Blythe, UK

Emergency Room Physician Discusses (her own) Electro-hypersensitivity (Dr. Erica Mallery-Blythe, UK)





Here is another video with the assessment of the science behind wireless radiation's biological impact, by Dr. Erica Mallery-Blythe: Electromagnetic Radiation Health for Children 2014 (70 minutes) by Dr. Erica Mallery-Blythe, a UK physician This video is a wide ranging overview of the impact of electromagnetic radiation on human health, particularly at microwave frequencies, with a special emphasis on children and the school environment.  (This video was posted here earlier, as well).

Saturday, September 12, 2015

What is this "targeted individual" business, anyhow?

Targeted Individuals, a department of defense term, are people who locals deem unfit for society, in one way or another. Some are whistle-blowers; some are dissidents, like anti-war demonstrators; some have a beef with one corporation or another; some just have different political or religious ideologies then the norm; some are targeted for reasons of lust and greed, and some are targets of convenience. They are targeted by means of gang-stalking, b & e’s, harassment, poisonings (biological and/or chemical), remote electronic harassment (messing with radios and tv’s, etc., remotely), vandalism, character assassinations, staged accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted Individuals).

This Youtube comment explains what the TI experience on a daily basis. However, it must be noted that the people/groups behind a particular case vary, government, industry, agenda-driven groups, people with resources and power.

One of the most in-depth descriptions I’ve seen: What TI's are experiencing is the cyber-aspect of rogue factions of the federal government's post-2000 COINTELPRO Domestic Intelligence (DOMINT) Operation, which is based on strategic and tactical techniques comprised of the following Counter Intelligence tenets: Destroy, Deny, Degrade, Disrupt, Deceive. Federal, state and local law enforcement - combined with EMS, first responders, neighborhood watch programs and private citizens (often paid with federal tax dollars through private security companies) have organized into groups - with international contacts (through classified branches of federal law enforcement and intel agencies), which target individuals who have been deemed a "domestic threat." This includes but is not limited to activists, minorities, whistle-blowers, alpha-male or -female leader-types, scholars or anyone who speaks out about wrongdoing - or thinks/acts "outside of the box."

The techniques being utilized are a melange of tactical/strategic procedures culled from the playbooks of the Stasi, the KGB, and Mao Tse Tung's Red Squads. A program is in place which frames, isolates and destroys a target financially, socially and professionally via slander, framing for non-existent criminal activities and on-line harassment which extends into the physical realm when the "target" goes to shop, church or any public location. This is what "Gang Stalking" is.

"Gang Stalking" is actually a misnomer. "TI's" or "Targeted Individuals" are whistle-blowers, good Samaritans, minorities, artists, activists and any others from different groups of people who have been labeled as a "domestic threat." They aren't being mobbed and harassed by random groups of citizens or 'gangs' (although it may seem like that to them). They are being followed and harassed by civilian groups who have been hired by Private Security Companies, the owner(s) of which did or still do have classified security clearance and may have been in the employ of Federal Law Enforcement/Intelligence and/or ex-military intel, in addition to shadow federal agencies with fat budgets and unknown agendas.

Local citizens (often with criminal backgrounds, unemployed and/or with little education) are "tasked" to follow people around in public. You aren't alone. Several million US citizens are on the threat list and certain rogue factions of the US government have tasked neighbors and fellow citizens to track and harass individuals on the list. This is coordinated with local and state law enforcement agencies (often through Data Fusion Centers) and in many cases the "target's" vehicles (and/or cellphones) have geo-locational systems attached/activated in order to keep tabs on the location of the "threat." (you).

Mao Tse Tung was an expert at playing groups against each other - little energy expenditure, minimum manpower loss and widespread damage to the targets. That is why many of the street-level perpetrators are individuals with low self-esteem and often little or no education. Their lack of goals and a future makes it easier for those higher up in the command chain to control them as well. Indeed, in some ways the "perps" are also being victimized in this operation - which does unfortunately span continents and nation-states.

The harassment is fine-tuned to each individual by the information which is remotely and illegally harvested from their computers, e-mails, phone conversations, medical records, and purchase histories (supermarkets, Amazon, E-Bay, etc.) - so there is evidence of great complicity at many governmental levels (state, local, federal and international).. The cyber-breaches require a substantial degree of technological know-how (at the minimum local Law Enforcement - but more prevalently state and federal), but be aware that your meta-data, purchases and internet habits (pornography viewing, YouTube views, news articles of interest) are relayed to your "minders" on a local level.

The information is illegally harvested without your consent and without any reason/due process and then distributed to the people (perps) you come into contact with on a daily basis. The offhand/casual remarks you hear are not coincidental. Your recent purchase of a book or estimate of an on-line search for a property to purchase were mentioned in front of you to (1) attempt to destabilize you and (2) to give you a sense (regardless of legality) to how pervasively your privacy has been invaded, and (3) question your own sanity. Don't question your sanity.

The sad fact is that today's technology used by the government (two to three decades in advance of what we are aware of) has been used against some of the most moral and humanitarian citizens in the United States. Without the dissent of moral and god-fearing people, this program will arch its claws further into the lives of common Americans - and this is what one of the goals is.

These rogue government factions are not "sweeping up" surface meta data for future reference in the case of an emergency (or court order). American citizens are being subject to a systemic and systematic rape of their most personal information and files (psychological and behavioral systems of records) are being/have been created on anyone who has ever owned a firearm or called the local government to complain about air or water quality, equal employment opportunity or corruption of local, state or federal government officials.

We are living in a McCarthyesque or Kafkaesque system in which we are raped for all of our personal data in a sadistic fashion. The perpetrators have no limits and no oversight. You, I and many others have been tried and adjudicated guilty without probable cause, without due process and without a day in court. In a way the operational procedures parallel what the Chinese Government has done to their "Falun Gong" dissidents, yet in the US - and via its proxies should an American travel abroad - it is done in a much more discreet and vicious fashion which can cost the target his life and/or liberty.

What many TI's have experienced with their computer is the tip of the iceberg. What Snowden did not reference was how all of the illegally accessed information was used against American citizens. There is no due process prior to the information access and the activities/goals of these extra-judicial operations are illegal and would certainly qualify to be prosecuted under RICO statutes were they ever to come to light.

Secondly, your being a "good" citizen, or patriotic, or harboring no ill-intent for others and our country (USA) does not make a bit of difference. Unfortunately the goal is destruction of an individual - not simply "behavior modification." If you travel to a foreign country, these rogue factions in the US will notify foreign governments that you are a "potential threat" and you will be monitored or harassed in the country you are visiting/living in by the internal security apparatus of that foreign country. AND BTW, your constitutional rights will be violated and all of your personal information (and misinformation) will be released to foreign governments in order to motivate them to be extra-vigilant with you and possibly trigger a "proxy detention."

These people play with your life like you are an inconsequential toy, and there is no oversight to their activities, and the individuals involved in this program are unhinged and totally out of control. Once again, this is not simply a behavioral modification program - the end result is to silently destroy the individual on all levels - professionally, financially, socially, mentally, spiritually and physically. One thing T.I.’s can do is wear a small body cam and post footage of the perps on YouTube - along with their Zip Code(s) of operation.


Surveillance occurs 24/7:

Edward Snowden on the most shocking way the NSA spies on people 2014

 




Existing TECHNOLOGY is used to ID and monitor individuals (and their thoughts) remotely:
Detecting EMF Fields in Humans for Surveillance - Apparatus and method for remotely monitoring and altering brain waves (27/12/02) Detecting EMF Fields in Humans for Surveillance. A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance.


In-person harassment (gang-stalking) is a part of targeted people's daily lives:

Gang Stalking ~ From a Christian's perspective




Eleanor White Discusses Organized Stalking and Technological Harassment With Victim Sueann Campbell




Friday, May 30, 2014

New book worthy of title: An Electronic Silent Spring, Facing the Dangers and Creating Safe Limits







 

 








 

 

Frank Clegg, former president of Microsoft Canada says everyone who uses technology should read An Electronic Silent Spring by Katie Singer.

ABOUT THE BOOK:

In order to operate, mobile phones, iPads, cellular antennas, Wi-Fi and “smart” utility meters emit electromagnetic radiation (EMR) at frequencies and amplitudes that are not found in nature. An Electronic Silent Spring tells how people and wildlife are affected.

  1. The book reports on peer-reviewed studies that show that EMR-exposed tadpoles die, aspen tree seedlings wither, bee colonies collapse, birds crash into antennas and white stork mates fight.
  2. EMR from “smart” utility meters, metal detectors, hybrid cars and other common electronics can shut off a medical implant. NIH estimates that 10% of Americans have a medical implant. The FDA regulates microwave ovens, which can interfere with cardiac pacemakers. No agency regulates cell phones, which operate closer to the body, with more power and at the same frequency as a microwave oven. In An Electronic Silent Spring, geophysicist, electrical engineer and implant patient Dr. Gary Olhoeft speaks on the issues.
  3. How does long-term, chronic exposure to EMR affect infants and children? In An Electronic Silent Spring, Dr. Martha Herbert, Harvard pediatric neurologist, and Cindy Sage, MA, co-editor of the BioInitiative Report, explain why exposing children to EMR may lead to autism. The American Academy of Pediatrics advises pregnant women and children not to use mobile devices.
  4. An Electronic Silent Spring looks at worker safety: the International Brotherhood of Electrical Workers are routinely exposed to dangerous EMR from rooftop antennas without warning or protection.
  5. Federal regulations protect the engineering needs of electronic devices–and telecom companies. A federal law prohibits local officials from refusing installation of cellular antennas based on health or environmental concerns...

A comment at Amazon justly praises the ground-breaking book:

  
Rachel Carson's book "Silent Spring" written in 1962 inspired a generation of environmental movement and transformation. As awareness of toxins has become more mainstream, our biggest threat is now from electronic overload of wireless and electrical noise (dirty electricity) and the sad popular assumption that it's all completely safe. This book takes that belief and introduces readers to the real life experiences of countless individuals who have seem the darker side of the electronic revolution. Singer is able to take a very complex topic and simplify and clarify the issues. She wisely choose to include voices of many other experts in this movement to show that this is not the view of one person, but a growing network of concerned citizens from around the globe working together against this monumental threat to life. I am also thrilled to see her include the emerging link between EMF and autism and information about light flicker.

This book is an excellent introduction to EMF and has a great deal of depth and detail that even experts in the field will learn from. I believe this book can deliver another worldwide movement to protect our generation.

Great work!

Saturday, February 6, 2016

The science & technology of mind reading


Research is likely decades ahead of what is now publically available. The research is ongoing.

Here are 3 examples of the science showing how minds can be tapped into via technology.


1. Technology could read unspoken thoughts via larynx nerve signals (since 2007). (Think what this can do today, possibly without an attached implant or sensor, like the fMRI in #2 below).

Although some people claim their mouths operate independently of their brains that's not usually the case. The brain sends neurological signals to the larynx, which converts them into sound. Now, what if we could use those larynx nerve signals to control things?

That's exactly what a company called Ambient is doing. Its Audeo technology basically converts "unspoken speech" (neurological signals flowing through larynx nerves when a person thinks about speaking) into control commands that can be used to guide a motorized wheelchair (video above) or synthesize speech. Pretty amazing!

To use the system, a person wears a lightweight sensor band around the neck. The band picks up the larynx nerve signals and transmits them wirelessly to a remote computer (don't worry about "mind wiretapping" -- the transmission is encrypted.) The remote computer uses NI LabVIEW and signal processing algorithms to interpret the nerve-impulse patterns and translate them into the right commands.


2. The fMRI can suck that picture straight out of your brain. You don't need any sort of implant or anything. (This was touted back in 2012. Again, where is it today? one might wonder).

Functional magnetic resonance imaging (fMRI) is a remarkable technology: it can be used to do everything from recording your dreams on video to teaching you new skills while you sleep. It's also good for controlling robots, and Israeli researchers have managed to get a robot to move around a room just by thinking about it.

An fMRI machine detects changes in blood flow to measure brain activity in real time with a very fine degree of spatial resolution. It can detect changes so subtle that it's possible to differentiate between the activity patterns created when you think about turning left versus when you think about turning right, which is the basis for the experiment shown in the video below. In Israel, a researcher inside an fMRI machine thinks "walk forward" or "move right" or "move left," and a thousand kilometers away in France, a robot performs the movement based on the researcher's thoughts alone while sending back first-person video for an avatar-like experience:

There are a few different reasons why this method of brain control is different from (and arguably better than) other methods of brain control that we've seen in the past. Other tools, like Emotiv's EPOC headset, can detect specific patterns of brainwaves that can then be used to send commands to a robot, but to get that to work, you have to train your brain to reliably create those brainwaves. fMRI, on the other hand, can (sort of) read your thoughts directly, with a vaguely alarming degree of accuracy, meaning that very little training is necessary: just picture a robot doing something, the fMRI will suck that picture straight out of your brain, and then get the robot to do the same thing. The other big advantage is that you don't need any sort of implant or anything, just a ridiculously expensive machine.

3. The fMRI is commonly combined with other biometric tracking techniques to provide a clear picture of the subject.

It is common to combine fMRI signal acquisition with tracking of participants' responses and reaction times. Physiological measures such heart rate, breathing, skin conductance (rate of sweating), and eye movements are sometimes captured simultaneously with fMRI.[citation needed] The method can also be combined with other brain-imaging techniques such as transcranial stimulation, direct cortical stimulation and, especially, EEG.[55] The fMRI procedure can also be combined with near-infrared spectroscopy (NIRS) to have supplementary information about both oxyhemoglobin and deoxyhemoglobin.


The fMRI technique can complement or supplement other techniques because of its unique strengths and gaps. It can noninvasively record brain signals without risks of ionising radiation inherent in other scanning methods, such as
CT or PET scans.[56] It can also record signal from all regions of the brain, unlike EEG/MEG, which are biased toward the cortical surface... R


U Try searching biometrics or mind at the IEEE for more interesting developments.

Why surveillance? "The money will come in buckets" says WSJ article



Red-light cameras show us the flaw in the theory that government will ‘nudge’ us into doing the right thing.

By
Holman W. Jenkins, Jr.

Feb. 5, 2016 6:46 p.m. ET

The WSJ article begins: “Any terrorist who doesn’t watch this for tips is, frankly, a mug.”  So went a headline in the Times of London about a popular new British reality show for the surveillance age, called “Hunted.”

The article explains how Britain had asserted its camera network would “deny criminals the use of the roads.” But this has not panned out. Jenkins says that the financial motive is easier to observe as the reason for surveillance. “The money will come in buckets,” said a camera promoter quoted in the article.

The author also talks about Chicago’s similar system and the impact of the government’s “nudging” in ObamaCare. The theory of “Nudge” is actually in a book by Chicago economist Richard Thaler and Harvard Law School Professor Cass Sunstein “on how government can use gentle rewards and punishments to improve us,” explains Jenkins.

The profit and "nudge" motives for surveillance could be applied to all areas that it is expanding in.

Want to see more about the sensor systems being created? Do searches at the IEEE site to understand this obsession with automating everything.

Sunday, January 17, 2016

Federal Government Wants a Smart Meter “on EVERY home and business in the country.”


On January 14, U.S. Department of Energy (DOE)stated it (ultimately) wants a smart  meter on every home and business in the country. The blog I am linking to explains some of the issues with this.
Interestingly, this blogger has a case at the Department of Energy complaining about smart meter health impacts and requesting an opt out, which state utilities and utility regulators refused to provide. The question is will exceptions be made for individuals who have Radiofrequency Sickness or other problems with smart meters. The complaint was sent to the Department of Justice in August 2014. It was routed to the Department of Energy in fall 2015. The outcome of this complaint/case should be interesting in light of blanket statements made about the smart meter program. But like any disability, accommodations should have to be made. For example, a person who cannot hear would get an appropriate machine that allowed them to access services of whatever kind.
Stay tuned.

Sunday, December 27, 2015

SCIENCE SAYS: Man-made EMR dangerous, unlike Natural EMR

MAN-MADE MICROWAVES have grown to levels up to  1018 power higher than natural levels from the beginning of life on Earth, according to Dr. Leif Salford, neurosurgeon and researcher, who has studied the biological impacts of this radiation on our brains.

Furthermore, we can no longer say man-made wireless/EMR is harmless because we believe it is no different than Natural EMR. SCIENCE says this is simply not true. Therefore, those stating this untruth are not referring to science, but their own wishful thinking.
 

Polarization: A Key Difference between Man-made and Natural Electromagnetic Fields, in regard to Biological Activity.

http://www.ncbi.nlm.nih.gov/pubmed/26456585

Sci Rep. 2015 Oct 12;5:14914. doi: 10.1038/srep14914.
Polarization: A Key Difference between Man-made and Natural Electromagnetic Fields, in regard to Biological Activity.   Panagopoulos DJ1,2,3, Johansson O4, Carlo GL5.

Author information  1National Center for Scientific Research "Demokritos", Athens, Greece.
2Department of Biology, University of Athens, Greece.
3Radiation and Environmental Biophysics Research Centre, Greece.
4Experimental Dermatology Unit, Department of Neuroscience, Karolinska Institute, Stockholm, Sweden.
5The Science and Public Policy Institute, Institute for Healthful Adaptation, Washington, DC, USA.

Abstract
In the present study we analyze the role of polarization in the biological activity of Electromagnetic Fields (EMFs)/Electromagnetic Radiation (EMR). All types of man-made EMFs/EMR - in contrast to natural EMFs/EMR - are polarized. Polarized EMFs/EMR can have increased biological activity, due to: 1) Ability to produce constructive interference effects and amplify their intensities at many locations. 2) Ability to force all charged/polar molecules and especially free ions within and around all living cells to oscillate on parallel planes and in phase with the applied polarized field. Such ionic forced-oscillations exert additive electrostatic forces on the sensors of cell membrane electro-sensitive ion channels, resulting in their irregular gating and consequent disruption of the cell's electrochemical balance. These features render man-made EMFs/EMR more bioactive than natural non-ionizing EMFs/EMR. This explains the increasing number of biological effects discovered during the past few decades to be induced by man-made EMFs, in contrast to natural EMFs in the terrestrial environment which have always been present throughout evolution, although human exposure to the latter ones is normally of significantly higher intensities/energy and longer durations. Thus, polarization seems to be a trigger that significantly increases the probability for the initiation of biological/health effects.

PMID:

26456585

[PubMed - in process]

PMCID:

PMC4601073

Free PMC Article
 

Wednesday, September 16, 2015

Emergency Room Physician Discusses (her own) Electro-hypersensitivity - Dr. Erica Mallery-Blythe, UK

Emergency Room Physician Discusses (her own) Electro-hypersensitivity (Dr. Erica Mallery-Blythe, UK)





Here is another video with the assessment of the science behind wireless radiation's biological impact, by Dr. Erica Mallery-Blythe: Electromagnetic Radiation Health for Children 2014 (70 minutes) by Dr. Erica Mallery-Blythe, a UK physician This video is a wide ranging overview of the impact of electromagnetic radiation on human health, particularly at microwave frequencies, with a special emphasis on children and the school environment.  (This video was posted here earlier, as well).

Saturday, September 12, 2015

What is this "targeted individual" business, anyhow?

Targeted Individuals, a department of defense term, are people who locals deem unfit for society, in one way or another. Some are whistle-blowers; some are dissidents, like anti-war demonstrators; some have a beef with one corporation or another; some just have different political or religious ideologies then the norm; some are targeted for reasons of lust and greed, and some are targets of convenience. They are targeted by means of gang-stalking, b & e’s, harassment, poisonings (biological and/or chemical), remote electronic harassment (messing with radios and tv’s, etc., remotely), vandalism, character assassinations, staged accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted Individuals).

This Youtube comment explains what the TI experience on a daily basis. However, it must be noted that the people/groups behind a particular case vary, government, industry, agenda-driven groups, people with resources and power.

One of the most in-depth descriptions I’ve seen: What TI's are experiencing is the cyber-aspect of rogue factions of the federal government's post-2000 COINTELPRO Domestic Intelligence (DOMINT) Operation, which is based on strategic and tactical techniques comprised of the following Counter Intelligence tenets: Destroy, Deny, Degrade, Disrupt, Deceive. Federal, state and local law enforcement - combined with EMS, first responders, neighborhood watch programs and private citizens (often paid with federal tax dollars through private security companies) have organized into groups - with international contacts (through classified branches of federal law enforcement and intel agencies), which target individuals who have been deemed a "domestic threat." This includes but is not limited to activists, minorities, whistle-blowers, alpha-male or -female leader-types, scholars or anyone who speaks out about wrongdoing - or thinks/acts "outside of the box."

The techniques being utilized are a melange of tactical/strategic procedures culled from the playbooks of the Stasi, the KGB, and Mao Tse Tung's Red Squads. A program is in place which frames, isolates and destroys a target financially, socially and professionally via slander, framing for non-existent criminal activities and on-line harassment which extends into the physical realm when the "target" goes to shop, church or any public location. This is what "Gang Stalking" is.

"Gang Stalking" is actually a misnomer. "TI's" or "Targeted Individuals" are whistle-blowers, good Samaritans, minorities, artists, activists and any others from different groups of people who have been labeled as a "domestic threat." They aren't being mobbed and harassed by random groups of citizens or 'gangs' (although it may seem like that to them). They are being followed and harassed by civilian groups who have been hired by Private Security Companies, the owner(s) of which did or still do have classified security clearance and may have been in the employ of Federal Law Enforcement/Intelligence and/or ex-military intel, in addition to shadow federal agencies with fat budgets and unknown agendas.

Local citizens (often with criminal backgrounds, unemployed and/or with little education) are "tasked" to follow people around in public. You aren't alone. Several million US citizens are on the threat list and certain rogue factions of the US government have tasked neighbors and fellow citizens to track and harass individuals on the list. This is coordinated with local and state law enforcement agencies (often through Data Fusion Centers) and in many cases the "target's" vehicles (and/or cellphones) have geo-locational systems attached/activated in order to keep tabs on the location of the "threat." (you).

Mao Tse Tung was an expert at playing groups against each other - little energy expenditure, minimum manpower loss and widespread damage to the targets. That is why many of the street-level perpetrators are individuals with low self-esteem and often little or no education. Their lack of goals and a future makes it easier for those higher up in the command chain to control them as well. Indeed, in some ways the "perps" are also being victimized in this operation - which does unfortunately span continents and nation-states.

The harassment is fine-tuned to each individual by the information which is remotely and illegally harvested from their computers, e-mails, phone conversations, medical records, and purchase histories (supermarkets, Amazon, E-Bay, etc.) - so there is evidence of great complicity at many governmental levels (state, local, federal and international).. The cyber-breaches require a substantial degree of technological know-how (at the minimum local Law Enforcement - but more prevalently state and federal), but be aware that your meta-data, purchases and internet habits (pornography viewing, YouTube views, news articles of interest) are relayed to your "minders" on a local level.

The information is illegally harvested without your consent and without any reason/due process and then distributed to the people (perps) you come into contact with on a daily basis. The offhand/casual remarks you hear are not coincidental. Your recent purchase of a book or estimate of an on-line search for a property to purchase were mentioned in front of you to (1) attempt to destabilize you and (2) to give you a sense (regardless of legality) to how pervasively your privacy has been invaded, and (3) question your own sanity. Don't question your sanity.

The sad fact is that today's technology used by the government (two to three decades in advance of what we are aware of) has been used against some of the most moral and humanitarian citizens in the United States. Without the dissent of moral and god-fearing people, this program will arch its claws further into the lives of common Americans - and this is what one of the goals is.

These rogue government factions are not "sweeping up" surface meta data for future reference in the case of an emergency (or court order). American citizens are being subject to a systemic and systematic rape of their most personal information and files (psychological and behavioral systems of records) are being/have been created on anyone who has ever owned a firearm or called the local government to complain about air or water quality, equal employment opportunity or corruption of local, state or federal government officials.

We are living in a McCarthyesque or Kafkaesque system in which we are raped for all of our personal data in a sadistic fashion. The perpetrators have no limits and no oversight. You, I and many others have been tried and adjudicated guilty without probable cause, without due process and without a day in court. In a way the operational procedures parallel what the Chinese Government has done to their "Falun Gong" dissidents, yet in the US - and via its proxies should an American travel abroad - it is done in a much more discreet and vicious fashion which can cost the target his life and/or liberty.

What many TI's have experienced with their computer is the tip of the iceberg. What Snowden did not reference was how all of the illegally accessed information was used against American citizens. There is no due process prior to the information access and the activities/goals of these extra-judicial operations are illegal and would certainly qualify to be prosecuted under RICO statutes were they ever to come to light.

Secondly, your being a "good" citizen, or patriotic, or harboring no ill-intent for others and our country (USA) does not make a bit of difference. Unfortunately the goal is destruction of an individual - not simply "behavior modification." If you travel to a foreign country, these rogue factions in the US will notify foreign governments that you are a "potential threat" and you will be monitored or harassed in the country you are visiting/living in by the internal security apparatus of that foreign country. AND BTW, your constitutional rights will be violated and all of your personal information (and misinformation) will be released to foreign governments in order to motivate them to be extra-vigilant with you and possibly trigger a "proxy detention."

These people play with your life like you are an inconsequential toy, and there is no oversight to their activities, and the individuals involved in this program are unhinged and totally out of control. Once again, this is not simply a behavioral modification program - the end result is to silently destroy the individual on all levels - professionally, financially, socially, mentally, spiritually and physically. One thing T.I.’s can do is wear a small body cam and post footage of the perps on YouTube - along with their Zip Code(s) of operation.


Surveillance occurs 24/7:

Edward Snowden on the most shocking way the NSA spies on people 2014

 




Existing TECHNOLOGY is used to ID and monitor individuals (and their thoughts) remotely:
Detecting EMF Fields in Humans for Surveillance - Apparatus and method for remotely monitoring and altering brain waves (27/12/02) Detecting EMF Fields in Humans for Surveillance. A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance.


In-person harassment (gang-stalking) is a part of targeted people's daily lives:

Gang Stalking ~ From a Christian's perspective




Eleanor White Discusses Organized Stalking and Technological Harassment With Victim Sueann Campbell




Friday, May 30, 2014

New book worthy of title: An Electronic Silent Spring, Facing the Dangers and Creating Safe Limits







 

 








 

 

Frank Clegg, former president of Microsoft Canada says everyone who uses technology should read An Electronic Silent Spring by Katie Singer.

ABOUT THE BOOK:

In order to operate, mobile phones, iPads, cellular antennas, Wi-Fi and “smart” utility meters emit electromagnetic radiation (EMR) at frequencies and amplitudes that are not found in nature. An Electronic Silent Spring tells how people and wildlife are affected.

  1. The book reports on peer-reviewed studies that show that EMR-exposed tadpoles die, aspen tree seedlings wither, bee colonies collapse, birds crash into antennas and white stork mates fight.
  2. EMR from “smart” utility meters, metal detectors, hybrid cars and other common electronics can shut off a medical implant. NIH estimates that 10% of Americans have a medical implant. The FDA regulates microwave ovens, which can interfere with cardiac pacemakers. No agency regulates cell phones, which operate closer to the body, with more power and at the same frequency as a microwave oven. In An Electronic Silent Spring, geophysicist, electrical engineer and implant patient Dr. Gary Olhoeft speaks on the issues.
  3. How does long-term, chronic exposure to EMR affect infants and children? In An Electronic Silent Spring, Dr. Martha Herbert, Harvard pediatric neurologist, and Cindy Sage, MA, co-editor of the BioInitiative Report, explain why exposing children to EMR may lead to autism. The American Academy of Pediatrics advises pregnant women and children not to use mobile devices.
  4. An Electronic Silent Spring looks at worker safety: the International Brotherhood of Electrical Workers are routinely exposed to dangerous EMR from rooftop antennas without warning or protection.
  5. Federal regulations protect the engineering needs of electronic devices–and telecom companies. A federal law prohibits local officials from refusing installation of cellular antennas based on health or environmental concerns...

A comment at Amazon justly praises the ground-breaking book:

  
Rachel Carson's book "Silent Spring" written in 1962 inspired a generation of environmental movement and transformation. As awareness of toxins has become more mainstream, our biggest threat is now from electronic overload of wireless and electrical noise (dirty electricity) and the sad popular assumption that it's all completely safe. This book takes that belief and introduces readers to the real life experiences of countless individuals who have seem the darker side of the electronic revolution. Singer is able to take a very complex topic and simplify and clarify the issues. She wisely choose to include voices of many other experts in this movement to show that this is not the view of one person, but a growing network of concerned citizens from around the globe working together against this monumental threat to life. I am also thrilled to see her include the emerging link between EMF and autism and information about light flicker.

This book is an excellent introduction to EMF and has a great deal of depth and detail that even experts in the field will learn from. I believe this book can deliver another worldwide movement to protect our generation.

Great work!