emerging weapons technologies: my every location is known

CIA black budget money secret testing /Dennis Kucinich Bill Text 107th Congress (2001-2002) H.R.2977.IH Space Preservation Act

from below: “information war” means extracting information from the human brain, computers and other data storage, remotely from the weapons technologies indicated in the in the Dennis Kucinich (107th Congress) Bill (H.R. 2977 Space Preservation Act 2001) below. This can create the means to make life on earth for one individual, a living hell, coupled with other applications.

emerging weapons technologies CIA black budget money secret testing: psychological stress, manipulation, etc.

  • my password protected internet accounts, free or paid for, are all accessible to those working this secret testing and crime
  • my every location is known
  • the amount of money in my pocket, wallet, including coins is known. The amount of money in bank accounts is known
  • They used this technology to set up theft using people they hired or asked to do such. they used family and so called friends (fellow expats) in China to further rid me of things: $10,000 (between may 2005 to june 2006) lap top; digital camera, swiss watches, tea pot collectables, clothing.
  • They know my location and plan, so they used keys to enter my home in China (Guangzhou) and 11 Arthur Street Binghamton.
  • Coolidge West Side Properties was hired or worked for CIA Black Budget Secret Testing Emerging Technologies: Coolidge and unknown workers for this stole: 400 compact disc (consv. est. $5000) box loads of books many unused mint (conservative est. $1000). Clothing: $1000

Dennis Kucinich Bill Text 107th Congress (2001-2002) H.R.2977.IH Space Preservation Act

QUOTE: (ii) Inflicting death or injury on, or damaging or destroying, a person (or the biological life, bodily health, mental health, or physical and economic well-being of a person)– (I) through the use of any of the means described in clause (i) or subparagraph (B); (II) through the use of land-based, sea-based, or space-based systems using radiation, electromagnetic, psychotronic, sonic, laser, or other energies directed at individual persons or targeted populations for the purpose of information war, mood management, or mind control of such persons or populations; end quote- Dennis Kucinich Bill Text 107th Congress (2001-2002) H.R.2977.IH Space Preservation Act http://www.gpo.gov/fdsys/pkg/BILLS-107hr2977ih/pdf/BILLS-107hr2977ih.pdf

Lieutenant Colonel John B. Alexander, US Army: The New Mental Battlefield – ‘Beam Me Up, Spock’ (Military Review VOLUME LX DECEMBER 1980 NO 12)

1980 article:

  • quote:

The complexity of the battlefield is constantly increasing. Introduction of new and sophisticated technology requires commanders to be fully aware of the nature of a potential threat as well as countermeasures and counter- countermeasures. In addition to more widely known tech- nological advances, a new battlefield dimension that may defy our generally perceived concepts of time and space looms on the horizon. This field is sometimes called psychotronics or bioenergetics.

Two subdivisions of this field have also been investigated. Mind~altering techniques designed to impact on an opponent are well-advanced. The procedures employed include manipulation of human behavior through use of psychological weapons effecting sight, sound, smell, temperature, electromagnetic energy or sensory deprivation.

end quote

Using Emerging Weapons Technology to Alter Sense of Smell (serves to discredit victim’s mental health):

“The US military have undertaken research on these receptor sites for many years.  Of the few that have been identified, some can cause temporary blindness; can make you think  you are smelling something that is not there; can cause submissiveness or extreme anxiety .329”  (page 66: sec. 6.3.1 Calmatives: CROWD CONTROL TECHNOLOGIES (An appraisal of
technologies for political control) Final Study Working document for the STOA Panel.  Luxembourg, June 2000 PE
168.394/FinSt

  • This was an inventive way to make me look crazy or mentally ill.
  • Thus stated, all, from Guangzhou, China to Aspen, Colorado,  knew that that was not true, and they knew that I was confronted with the actions and interference by the people doing this. They all were used to isolate me.
  • I kept my beliefs of this, to myself in 2006.
  • Though did write about it using pseudonyms on internet forums related to so called gang stalking and blogs. By March 2007, I knew that this was a hoax. Jim knew this. Anda in Guangzhou, from Turkey, a so called friend, knew about this and did some things related to convincing me of the lie.
  • During these situations, through my senses and feelings I unnatural smells seem to have been presented or present in the environment. I had concluded it was some chemicals that act in varying ways on the mind, being sprayed, released in secret or what. By July 2006 i discovered the hoax of gang stalking on the internet, and things were placed on the internet, now gone, that were designed to confirm my false concludion about gas and fumes to affect victims. by 2007, February or March, I had concluded that this was a trick by highly classified technologies.

 

The deception being done to me in regards to weapons technology, was to get me to voice complaints that people were secretly using sprays or gas in affect my mind. Jim knew of this, as did Jenny, for some evenings at night, I would think I was being attacked in my sleep with severe chemical fumes, and would freak out, in their home.

Taxi driver in Guangzhou had to act, as I was in a store he waited, He must of got approached, told to open all the car doors and roll down every window. This was to make me think the people working for this, sprayed fumes into his car to affect my nervous system. Really. Things like this were daily. When I existed the 7/11, he was standing by the curb waiting for me, and all four doors were open, and all windows rolled down, in February. I got in as he closed the doors, and the windows he kept down.

This was in conjunction with other tricks to lead me to think gasses or fumes with artificial chemical smells, were being used to alter my brain states, cause nervousness. That can be done with the electromagnetic weapons systems, alter sense of smell, alter brain states.

The US military have undertaken research on these receptor sites for many years.  Of the few that have been identified, some can cause temporary blindness; can make you think  you are smelling something that is not there; can cause submissiveness or extreme anxiety .329”  (page 66: sec. 6.3.1 Calmatives: CROWD CONTROL TECHNOLOGIES (An appraisal of technologies for political control) Final Study Working document for the STOA Panel.  Luxembourg, June 2000 PE 168.394/FinSt. (see link below in footnote 2.)

Several individuals, in China, as well as things done here in the States, were directly guided  to behave in manners that would lead me to think some covert rigs were used to spill fumes around me, or in rooms I was in. That is a fact. This was all to create complaints that are often the complaints of paranoids, to discredit me.

By early 2007 I had come to the realization that both surveillance and mental and sensory affects (smells) were being done by classified technologies, the likes reported in the EU report, and cited in USAF documents (footnote 2.).

The crime sought successfully to consciously employ a strategy called, “gaslighting”  in which they present an alternate reality to their victims, police, therapists and judges.  Gaslighting involves denying what occurred, offering plausible but untrue accounts of what occurred, or suggesting the victim is imagining things, exaggerating or lying.” (Forward, 2003; Engel, 2002, Stern, 2007). “-Court Watch, EMOTIONAL/PSYCHOLOGICAL ABUSE   FACT SHEET

Footnotes

2 “The US military have undertaken research on these receptor sites for many years.  Of the few that have been identified, some can cause temporary blindness; can make you think  you are smelling something that is not there; can cause submissiveness or extreme anxiety .329”  (page 66: sec. 6.3.1 Calmatives: CROWD CONTROL TECHNOLOGIES (An appraisal of
technologies for political control) Final Study Working document for the STOA Panel.  Luxembourg, June 2000 PE
168.394/FinSt: . http://www.europarl.europa.eu/RegData/etudes/etudes/join/2000/168394/DG-4-JOIN_ET%282000%29168394%28PAR01%29_EN.pdf

REFERENCE:

Brooke Berlin, HAARP: Progress or Mind Control? Poptronics Magazine, October 2001:

“However, this would be achieved by producing mild to severe physiological disruption or perceptual distortion or disorientation. U.S. Air Force documents revealed that a system for interrupting and exploiting human mental processes through pulsed radio-frequency radiation over large geographical areas is feasible and desirable. By creating and directing balls of energy at lightning speeds, it could be possible to manipulate the minds of people by altering the electrical energy already present in their brains.” (Brooke Berlin, HAARP: Progress or Mind Control? Poptronics Magazine, October 2001)

SECTION 9 – INFORMATION WARFARE TECHNOLOGY:

quote: Deception and Psychological Operations. For related technologies see
subsection 5 – Electronics, 8 – Information Systems, 15 – Sensors and Lasers
16 – Signature Control and 17 – Space Systems.
Rationale The current concept of IW evolved after Desert Storm, where the
use of military and civil resources for communications, sensing and intelligence
led to an operational C4I that was unchallenged. This has now evolved into a
paradigm integrating civil and military elements and including command, control.
SUMMARY
Overview (See Figure 9.0-1) Information warfare (IW) is defined as actions
taken to achieve information superiority by affecting adversary information,
information based processes, information systems and computer based networks
while defending one’s own information, information based processes,
information systems, and computer based networks. IW is a combination of
both old roles and missions, evolving and adapting to a new environment, and
new revolutionary capabilities. IW includes both offensive and defensive
activities: electronic warfare (EW), physical destruction, deception, information
attack, psychological operations, operational security, IW protection and security
measures. IW depends upon and embodies related information systems and other
supporting technologies as illustrated in Figure 9.0-1. Computer hacking is a
form of IW just as is bombing an adversary’s C2 facility since both deny the
enemy information. Because of the dependency of military C4I2 systems on
both civil and military communications, the crossover between civil and military
communications is transparent. This section focuses on the technology areas
shown in the box above that contain militarily critical technologies. No
militarily critical technologies were identified in two other technology areas:
1
Also called Electronic Countermeasures (ECM).
2
Also called Electronic Counter-Countermeasures (ECCM) end quote