Understanding Mass, Mind Invasive “REMOTE NEURAL MONITORING” (RNM): A Special Tribute to Targeted USAF SMSgt Ken Peartree Veteran, Military, R.I.P.

HOW ANY AND EVERYONE’S BIOMETRIC SIGNATURE CAN BE USED FOR “REMOTE NEURAL MONITORING” STORED IN AND MANIPULATED FROM

A SUPERCOMPUTER SYSTEM

Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.[1][2]

Based on the concept of predictive policing, TIA was meant to correlate detailed information about people in order to anticipate and prevent terrorist incidents before execution.[3] The program modeled specific information sets in the hunt for terrorists around the globe.[4] Admiral John Poindexter called it a “Manhattan Project for counter-terrorism“.[5] According to Senator Ron Wyden, TIA was the “biggest surveillance program in the history of the United States”.[6]

Congress defunded the Information Awareness Office in late 2003 after media reports criticized the government for attempting to establish “Total Information Awareness” over all citizens.[7][8][9]

Although the program was formally suspended, other government agencies later adopted some of its software with only superficial changes. TIA’s core architecture continued development under the code name “Basketball.” According to a 2012 New York Times article, TIA’s legacy was “quietly thriving” at the National Security Agency (NSA).[10]

***

HOW IT WORKS

It Employs A Set Of Programs Functioning at Different Levels detailed below:

1. The signals intelligence system which applies electromagnetic frequencies (EMF), to excite the brain for the system and the electronic brain link (EBL).

2. The Brain Stimulation system that has been planned as particle emission intelligence, which means receiving information from unintentionally created electromagnetic waves in the environment. However, it is not related to radioactivity or nuclear detonation.

3. The recording machines that have electronic equipment to examine electrical action in human beings from afar. This computer-generated brain charting can always record all electrical events in the cerebrum.

4. The recording aid system deciphers individual brain maps for security purposes.

The underlining technology of this system takes under consideration that the electrical activity in the speech center of the brain, can be translated into the subject’s verbal thoughts. R.N.M. can send encrypted signals to the audio cortex of the brain directly circumventing the ear.

This encoding assists in detecting audio communication. It can also perform electrical mapping of the cerebrum’s activity from the visual center, which is achieved by avoiding the eyes and optic nerves, consequently projecting imageries from the subject’s mind onto a video display. With this visual and audio memory, both can be visualized and analyzed.

The machinery involved can, remotely and non-invasively, detect information by digitally decoding the evoked potentials in 30-50Hz, 5 mW electromagnetic emissions from the cerebrum.

Evoked potentials are called the spikes and patterns created by the nerves, as they produce a shifting electrical pattern with an ever-changing magnetic instability, which then puts on a constant amount of electromagnetic waves. The interesting part about this is that the entire exercise is carried out without any physical contact with the subject.

The EMF emissions can be decoded into current thoughts and audiovisual perception, in the subject’s gumption. It sends complicated cyphers and electromagnetic pulse signals to activate evoked potentials inside the mind, consequently generating sound and visual input in the neural circuits.

With its speech, auditory and visual communication arrays, R.N.M. allows for a comprehensive audio-visual mind-to-mind connection or a mind-to-computer association.

The mechanism needs to decrypt the resonance frequency of each specific site to modulate the input of information in that specific location of the cerebrum.

Furthermore, R.N.M. can detect audio via microwaves, and features the broadcast of precise directives into the subconscious, producing visual disorders, illusions and instillation of words and numbers into the brain through radiation waves.

With all the given paybacks for tracing the unlawful and traitorous activities, there are many alarms and dangers being pointed out by human rights advocates and scientists. The agencies of human rights, worldwide, have criticized the system as an affront to the basic human rights because it violates privacy and the dignity of considerations and events of life.

Several countries have opposed it and refer to it as an offence on their human and civil rights. Along with other biological concerns voiced by scientists, R.N.M. remains a controversial technology, which is being used in many countries for security maintenance and surveillance.

Remote Neural Monitoring or RNM works remotely via satellite and cell phone towers to control the brain of the targeted victim to record thought to text and said to be a surveillance and an intelligence tool although it violates just about every valued civil right and liberty we hold dear without warrant or you would’ve been served as per legal process.

Research studies have shown that the human brain thinks at a rate of about 5000 bits per second and does not have the capacity to compete with A I supercomputers which signals are distributed via satellites, implants, biotelemetry and dna sequencing tuned to resonate frequencies targeting individuals or mass populations.

The human brain has distinctive datasets or called a bioelectric resonance system from transcribing dna into ions then datasets to tune a unique frequency to that individual or from voice monitoring a population to identify a specific individual’s brain output or neural signature then it this unique brain signature is transcoded from signature to ions to specific dna resonance frequency for that targeted victim. RNM consists of a complicated systems of software infused with a multitude of emotional and behaviors modification tools and communication abilities utilizing V2k, VM, PM, BCI, HMI, RI, RV, PM, Location and MK technologies directed at the targeted victim’s nervous system in order to influence their emotional state, thoughts and actions in a desired way. RNM technologies have been developed over the past 60 years and is abused today to influence individuals and populations. Secret neuro-electromagnetic involuntary human experimentation is well known to be used by the CIA and DARPA acknowledging declassified projects like operation paper clip, MK-Ultra, operation Guinea Pig, Project Blue Beam, CO Intel pro and modern day operations ventriloquist.

According to many scientists, within a few years it is expected that DNA sequencing and nano microchips will become commonly implanted into the human brain which would make it inherently controllable by the RNM and RNN Operators, ROD’s & ISA.

With RNM, it is possible to read and control a person’s emotions, vitals, thought processes and physical movements along with the subconscious messaging and dream injections. At present, around the world, supercomputers are monitoring millions of people simultaneously with the speed of 20 billion bits per second especially in countries like the USA, Japan, Israel and many European countries with impunity thus far as the general public is clueless as to the nefarious and invasive nature for which this technologies are used without accountability, compliance and enforcement.

This is exactly why we must all spend the word and hold the U.S. Government accountable for depriving U.S. Citizens our constitutional rights, forcing many citizens into mental health facilities and creating false flag events by coercing and manipulating them to act against their better nature. This is a national security issue and health crisis that has been ignored for to long. RNM has a set of certain programs functioning at different levels, like the signals intelligence system which uses electromagnetic frequencies or EMF, to stimulate the brain for RNM and the electronic brain link or EBL or neural signature. Both cause tissue and brain damage unbeknownst to the targeted victim as electronic magnetic fields can be extremely detrimental to the human body as a whole.

The EMF Brain Stimulation system has been designed as microwave radiation intelligence which means it receives information inadvertently originated from electromagnetic waves. However, it is not related to radioactivity or nuclear detonations. The recording methods within the signals intelligence system investigate electrical activity in humans from a significant distance such as satellites and cell phone towers. This computer-generated brain mapping can constantly monitor all electrical activities in the brain of the targeted individual causing great mental, physical and emotional distress. The recording aid system decodes individual brain maps for analysis, study and monitoring purposes without consent of the targeted subject and affecting millions of Americans in varying degrees across the United States.

This would be deemed cruel and unusual punishment if U.S. investigative agencies like the F.B.I and intelligence agencies like the DIA, CIA, DNI and DARPA were honest with politicians and the judiciary branch about the invasive nature and extreme consequences rendered to the targeted victim including but not limited synthetic telepathy and clairvoyance leading to misdiagnosed schizophrenia, delusions, brain damage and physical torture not mention the injection of inhuman injections of ISA, ROD and operator auditory and visual torture 24 hours a day and 365 days a year which could easily be deemed a weapon of mass destruction.

For purposes of electronic evaluation, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts also known as synthetic telepathy or acoustic paradigm. RNM can send encoded signals to the auditory cortex of the brain directly bypassing the ear. This encoding detects audio communication and is recorded by the fusion center, U.S. Airforce base comm centers and inevitably the nsa.

It can also perform electrical mapping of the brain’s activity from the visual center of the brain, which it does by bypassing the eyes and optic nerves, thus projecting images from the subject’s brain onto a neural viewing monitor and display at these communication centers. With this visual and audio memory, both can be visualized, analyzed and recorded which again violates just about every constitutional right we hold dear. This system is remote and said to be non-invasive although in truth it is highly invasive and has yet to produce actionable intel to prevent terrorism instead U.S. Citizens are used like human cattle without a thought for their health or well being.

They are utilized as nonconsensual investigative proxies, community stalkers or molded into false flag domestic terrorists. This is believed to achieve the the D O J’s philosophy and self fulfilling prophecy of classifying domestic terrorism as being the number 1 threat to American citizens which is far from true statistically. Its used to detect information by digitally decoding the evoked potentials in the range of 30-50Hz and 5 milliwatts of electromagnetic emissions from the brain. The nerves produce a shifting electrical pattern with a shifting magnetic flux which then puts out a constant amount of electromagnetic waves which is again highly disruptive to any human beings normal life as they knew it before.

There are spikes and patterns which are called evoked potentials in the electromagnetic emission from the brain and can also be used to hive mind the targeted victim with innumerable others they do not know. This is all carried out without any physical contact with the subject or the necessity of nano technology or an implant as the human brain is a natural transceiver.
The EMF emissions from the brain can be decoded into current thoughts, images and sounds in the subject’s brain and in reverse as well meaning injected or manipulation of the targeted victims overall actions even against their will through conditioning.

It sends complicated codes and electromagnetic pulse signals to activate evoked potentials inside the brain, thus generating sounds and visual images in the neural circuits and vice versa to and from the viewing station or the others you are connected to without your consent or will. With its speech, auditory and visual communication systems, RNM allows for a complete audio-visual brain to brain link or Recurrent Neural Network with many other people or a brain-to-computer link which is automated or a combination of different RNN architectures which are generally modular in design. Of course, the mechanism needs to decode the resonance frequency of each specific targeted victim to modulate the insertion of information in that specific location of the brain to evoke the desired response or action.

RNM can also detect hearing via electromagnetic microwaves or synthetic telepathy which the targeted victim hears voices and sounds imperceivable to anyone else around them, and it also features the transmission of specific commands into the subconscious or subliminally to the targeted victim specifically or mass populations, this can produce visual disturbances, visual hallucinations and the injection of words, numbers, sounds and complete messages in to the brain through electromagnetic radiation waves. Also, it manipulates emotions and thoughts and reads the targeted victims thoughts remotely, causes pain to any nerve of the body as desired by the ISA or ROD’s, allows for remote manipulation of behavior, controls sleep patterns, dreams and complete control over communication is made easy while the subject is unaware.

This is said to be used for criminal investigations and security management yet the broad constitutional violations bring the legal term of fruit from a poisonous tree to mind as the targeted individual is controlled, manipulated and under the influence of technologies very few in the world understand in full and trained operators without oversight, accountability or true enforcement can convince, coerce and effect the behavior and thus the actions of the targeted victim. ISA’s, ROD’s and operators are known to use shady and highly illegal tactics or manipulation, coercion, mental conditioning and highly illegal interrogation tactics.

Some of these tactics include convincing the victim their friends, family and neighbors are at fault, that they are the one or competing in the hyper theory game, that they have special powers, that they are part of a Dr. Frankenstein medical study, that they are under investigation and facing charges, that they are participating in terrorism investigations, that they are competing in FBI, CIA or Special Forces tryouts or in contact will government officials without physical contact and many other scenarios. This yields false, coerced and forced confessions under the threat of fear and distress without adhering constitutionally to the victims right to remain silent it denies the presence of counsel and the right to mount a fair and equitable defense if they were in fact truly facing charges. There are profound legal issues associated with RNM, moral concerns and extreme humanitarian risks pointed out by human rights activists and other scientists.

Many criticize the illegal use of RNM as a violation of basic human and constitutional rights as it amounts to illegal search and seizure without presenting the victim with a warrant or presenting Miranda rights and it’s non consensual as most victims are completely unaware of the source of their torment mentally, physically and emotionally. It violates privacy, basic dignity of thoughts and infringes upon every voluntarily activity of the targeted victims life. Several countries have protested against the involuntarily use of RNM and refer to it as an attack on every human decency.

The scientists protesting against the use of RNM believe that people who have been afflicted involuntarily become biological robots, guinea pigs, Manchurian candidates and electronic slaves for the RNM’s ISA’s, ROD’s and operators in the guise of national security for the United States government. Please note this is not the American people as they have been predatorized by these technologies for 50 plus years with impunity, it is in fact the intelligence and investigative agencies operating under the false pretense of the patriot act and does the latter. Instead of preventing terrorism and crime it initiates, perpetuates and incentivizes more terror and crime. Binding innocent civilians into electronic bondage, false imprisonment in their bodies, minds and souls and creates great instability throughout our nation as a whole.

This is an important biological concern related to government sponsored abduction of innocent minds and is the equivalent of U.S. Govt sponsored terrorism on its own citizen through and by dereliction of duties, willful neglect in the face of obvious evidence and ultimately complicity in the greatest conspiracy in American history to use, abuse and kill off innocent civilians by choice not necessity. There is absolutely no doubt a majority of the population is ignorant to these hidden technologies that yield exactly one end goal to take control of the human mind. RNM threats to civil rights such as free will, free thought, freedom of speech, free choice are near unfathomable yet a clear and present danger to democracy as a whole as it deprives each and every victim everything the former greatest country in the world offered its citizens.

This is happening to hundreds of thousands of U.S. citizens today and our government ideally sits back and watches victims die from slow kill voice of god neurological weapons, be tortured, tormented, suppressed, threatened and utterly destroyed without interdiction. They U.S. Government and every official elected, unelected or appointed in every agency and branch must be held accountable for their actions and inactions as they have failed to protect and serve its people. RNM is not only a controversial technology its is an non consensual weapon of mass destruction that should never be used on civilian populations.

This is a war crime and inevitably the world will see the U.S. Government has defiled not only its own people but hundreds of millions of innocents around the world and sent them all to an unjustified death before their natural time.

This is an active genocide in progress by the U.S. government as the technology leads back to only one source regardless of your personal experience and the purposeful deception RNM ISA’s, ROD’s and operators try to portray to individual victims. Please get the truth out and assist us in bringing this insanity to an end. This information was produced and provided by Cognitive Investigative Services found at C I S Tech.info or reach us at 602-769-0036. God blessed America, please help us keep it that way.

Details courtesy of TARGETED Activist Michael Von Werthern, Germany

***

***

A USAF (ret) veteran R.I.P. who served for 25 years, confirms that thousands nationwide, growing into millions globally, reports of patented Remote Neural Monitoring technology.

He details his experiences, and plight in today’s massive, official, ongoing nonconsensual human experimentation program.  This is a program using civilians as little more than human guinea pigs below.

Modern-day Mind Control is not a process for controlling the mind. It is a group of programs and systems designed to remotely intercept and monitor human thought, compile those thoughts into an individually personalized data set including tendencies, and inclinations; then build a behavioral pattern recognition algorithm designed to predict that individual’s future actions. Imagine the absolute power in the ability to know what any human being on the planet is thinking, and then be able to predict what the person will do next. That type of information is an insurmountable advantage for whoever possesses it. The UNITED STATES Government has that technology and it is operational and fully deployed today.

I am a lifetime human test subject, most recently in this Remote Neural Monitoring and Behavior Modification Testing Program. There are likely thousands of us.  The Propaganda term for these human test subjects is Targeted Individuals. I avoid that term because it is clear to me that it was likely started by the same people who use us as their test subjects. The words “Targeted Individual” naturally lends itself to someone that needed to be watched, without saying it.  It fits naturally into operators’ and normal citizens’ most obvious questions, “Why do you think that they picked you?”  The answer to that question can skillfully paint the victim into a self-assessment box of exploring what they may have done wrong.  The fact is, what they did wrong has little to do with it until one of their normal human flaws are exploited to create a narrative that fits the program’s goals of discrediting them. If the victim has a weakness, they will stop at nothing to exploit it; to turn our own accepted flaw into the program’s most potent weapon against us.  Please watch the video to better understand this complicated maze of deceit.

We are not targets, we are victims of body hacking. That is why I coined the term, Victims of Involuntary Technology Interface. That is a mouth-full, so the simple acronym VITI, pronounced Vie-tie accurately describes what we victims face every day.  I am a VITI.

As a VITI, I have come to the shocking realization that all my previous relationships, marriage, my entire life have been carefully managed to hide the atrocities committed against me.  Each VITI must come to the realization that they have created entirely new narratives, complete sets of lies about us.  They seem to have different lies for different persons or groups, each part of a continuing effort to control the narrative and prevent the truth from becoming public about the nonconsensual human experimentation that our country has conducted on VITIs for decades.

MK-ULTRA: CIA Document – Declassified in Part

Sanitized Copy Approved for Release 2012/08/29

“MK-ULTRA’s purpose was “research and development of chemical, biological and radiological materials’ [for use] in clandestine operations to control human behavior.” The CIA hoped the “psychoactive chemicals” would work on the victim’s mind and emotion to “release him from the restraint of self-control. The program was also intended to develop an anti-interrogation drug to counter Soviet truth serum, or possible to scramble a CIA agent’s brain to that any confession to his captor would be useless.”

The government told the American people that they shut down MK-Ultra, but they did not.  They likely simply gave it a different name and buried it deep into secret programs under the veil of national security; the perfect cover when anyone asks questions.  When the victim becomes too knowledgeable, especially in the case of African Americans and minorities, they stage elaborate entrapment events and accuse the victim of harming someone, being dangerous, or mentally ill.  Some have resulted in deaths, followed by the violent neutralization of the victim, most notable Myron May, Aaron Alexis, and Esteban Santiago.  Each of these victims turned to our Government for assistance with what they knew were other government agencies attacking and harassing them; no one would help because they are forbidden from assisting.  In other cases, they use covert electronic weapons, remote neural monitoring, and covert tactics such as gang stalking to push the victim to suicide, or they murder them through chemical toxins and say they died of some natural sudden death such as heart attack.  The bottom line is, once the victim recognizes what is happening to them, they simply eliminate the victim because we are considered a threat.

The horrors of being a VITI is the dark world that most people have no idea even exists; and still, others will refuse to believe, even when faced with overwhelming and indisputable evidence.

I challenge you to do your homework.  Research the writing of Dr. Robert Duncan, Dr. Collin Ross, and Paul Batcho, Ph.D., to name a few.  Research into the term “Targeted Individual” will turn up an entire web of disinformation agents. Sure, there are some real victims that could be found in that search, but the top of the search will be Federal Operatives spreading a tail of lies and disinformation so wide that it is impossible to get around unless you understand the program. Internet search engines keep operative’s videos and writing on top while suppressing real and knowledgeable victims’ words and videos under mountains of disinformation.  These operatives have the task of keeping victims in the dark, to keep us chasing our tails in programs they call Gang Stalking when Gang Stalking is in fact the primary tactic used to have victims committed for mental illness. Gang Stalking is a tactic in the Remote Neural Monitoring and Behavior Modification Programs that we call Mind Control, but if you visit these sites, you will not find Gang Stalking and Mind Control associated in many places if any. They keep victims’ focus on the tactic that will get them committed under a false diagnosis of mental illness so that they never even consider the question of why they are being stalked in the first place.

I am Kenneth Peartree, born free in America, now an isolated victim of Remote Neural Monitoring. My body is evidence. This is my thanks for 25 Years of service.

Ken Peartree, USAF (Retired) after 25+ years of military service retired honorably in 2004. He earned a range of Outstanding Performance Medals and Awards and served as a Noncommissioned Officer in Charge of a Base Air Force Honor Guard unit. 

***

R.I.P.

24/7 TARGETED:  UNITED STATES AIR FORCE RETIRED

KENNETH WENDELL PEARTREE

February 1, 1960 ~ August 31, 2024 (age 64)

https://www.heavenlyarmsfamilymortuary.com/obituary/SMSgt-Peartree

A TRIBUTE  TO COURAGE AND QUEST FOR 

REMOTE NEURAL MONITORING JUSTICE FOR THOUSANDS

“Peartree’s videos laid bare the perpetrators’ tactics: bizarre, nonsensical behaviors such as burglary, petty thefts, and the use of advanced “over-the-wall” technologies—all carefully orchestrated to make victims appear delusional or unstable. This, as I now understand, is their primary strategy: to discredit victims, isolate them, and ensure their voices are silenced..”

DETAILED LINK

https://enlemma.substack.com/p/bearing-witness-reflections-on-smsgt?utm_campaign=post&utm_medium=web

***

FOX NEWS: DEPARTMENT OF HOMELAND SECURITY

REMOTE NEURAL MONITORING DEMONSTRATION

DETAILED LINK

https://www.foxnews.com/story/homeland-security-detects-terrorist-threats-by-reading-your-mind

***

DETAILED LINK

https://www.targetedevidence.com/remote-neural-monitoring.html?fbclid=IwY2xjawMHZ2ZleHRuA2FlbQIxMABicmlkETFIeVJPb1ZQSWxjS1drMTR3AR5IWFpWgjxnXqxohnqaIPjshMHtsEqHWRdz4xirihGEIY_7IB8Oan9VZD5x9g_aem_ljhiq0Kb4KQZ8aXEV90D8A

***

RNM is the ultimate method of surveillance…

Remote Neural Monitoring (RNM) can map out electrical activity from the visual cortex of a target’s brain and show images from the target’s brain on a video monitor. ‘operatives’ see what the target’s eyes are seeing. in addition, visual memory can be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. ‘operatives’ can also put images into a target’s brain while they are in REM sleep for brain-programming purposes. speech, 3D sound, and subliminal audio can be sent to the auditory cortex of the target’s brain (bypassing the ears) RNM can alter a target’s perceptions, moods, and motor control. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

***

Microwave Weapons – System X

 

***

Remote Neural Monitoring: A Technology

Used For Controlling Human Brain

DETAILED LINK

https://discover.hubpages.com/politics/Remote-Neural-Monitoring–A-Technology-Used-For-Controlling-Human-Brain?fbclid=IwY2xjawMHaSBleHRuA2FlbQIxMABicmlkETFIeVJPb1ZQSWxjS1drMTR3AR7za543NmBjiRZkv6a8JGx5dYmWA5X-1eIuPq3VJPVHdElYcA4mVfj-SQKMkw_aem_suFIV-D3jDdMbfhR7XupEw

***

remote-neural-monitoring

 
 
 
 
FUNCTIONAL NEUROIMAGING
 

Remote Neural Monitoring is a form of functional neuroimaging, claimed to have been developed by the National Security Agency “NSA”, that is capable of extracting EEG data from the human brain at a distance with no contacts or electrodes required, see Brain Mapping and Mind Uploading.
 
 
***
 
 

NOTE:  The advanced technology documented here is today available, and in full use, not only at the Intel, Federal/military levels of higher echelon but also state and local law enforcement for the social and mass population control experimentation.

***

REMOTE NEURAL MONITORING FOR A COVERT CONTROL OF SOCIETY

http://www.mindpowerworld.com/remote-neural-monitoring-for-covert-control-of-society

***

ONE OF THE FIRST LAWSUITS CHALLENGING

PSYCHO-PHYSICAL TECHNOLOGY

John St. Clair Akwei vs. NSA, Ft. Meade, MD, USA

1. Table of Contents

Cover Page

NSA Mission & Operations
Communications Intelligence
Signals Intelligence
Domestic Intelligence
Independently Operating Personnel Target Citizens

NSA’s Domestic Electronic Surveillance Network Signals Intelligence Remote Computer Tampering Detecting EMF Fields in Humans for Surveillance

NSA Signals Intelligence Use of EMF Brain Stimulation Capabilities of NSA operatives using RNM NSA Signals Intelligence Electronic Brain Link Technology

Table: An example of EMF Brain Stimulation NSA Techniques and Resources

Remote RNM Devices
Spotters and Walk-Bys in Metropolitan Areas Chemicals and Drugs Intelligence/Anti-Terrorist Equipment

Resources

Further Resources

Cover Page

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.
(Civil Action 92-0449)

John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency’s structure, national security activities, proprietary technology, and covert operations to monitor individual citizens.

2. Table of Contents

The NSA’s mission and
the NSA’s domestic Intelligence operation.

Communications Intelligence (COMINT)

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment that can remotely analyze all objects whether man-made or organic that have electrical activity.

 

Domestic Intelligence (DOMINT)

The NSA has records of all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.

NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers, and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can some- times go beyond the bounds of the law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

3. Table of Contents

NSA’s domestic electronic surveillance network

As of the early 1960s, the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time, the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for keywords that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

With this technology, NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio, and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF Fields in Humans for Surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment, NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

4. Table of Contents 

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.
Table of Contents

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.

The speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

***

Table of Contents

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, .5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images, and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation:

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

5. Table of Contents

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country.

A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.

b) [Information missing from original]

c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.

b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.

c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public who is in contact with surveillance subjects.

Brain Area

Bioelectric Resonance Frequency

Information Induced Through Modulation

Motor Control Cortex

10 HZ

Motor Impulse Co-ordination

Auditory Cortex

15 HZ

Sound which bypasses the ears

Visual Cortex

25 HZ

Images in the brain, bypassing the eyes

Somatosensory Cortex

09 HZ

Phantom Touch Sense

Thought Center

20 HZ

Imposed Subconscious Thoughts

 

Chemicals and Drugs into Residential Buildings with
hidden NSA-installed and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharma-psychology.

Brief Overview of Proprietary U.S. Intelligence/Anti-Terrorist Equipment Mentioned.

The fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.

All equipment was hidden, all technology was secret, all scientific research unreported (as in electronic warfare research).

Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.

6.  Table of Contents

Resources

These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was taken against the NSA employees I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications:

The Body Electric: Electromagnetism and the Foundation of Life, by Robert Becker, M.D.

p. 265/313/318. Monitoringeuroelectric information in the brain. E-M wave E.S.B.

Cross Currents, by Robert Becker, M.D.

p. 70, p. 78, p. 105/210/216/220/242/299/303 E-M ESB. Simulating auditory hallucinations. p. 274, “Remote computer tampering using the RF emissions from the logic board.”

Currents of Death by Paul Brodeur
p. 27/93. Driving brain electrical activity with external E-M, Magnetophosphenes, Delgado.

The Zapping of America by Paul Brodeur
DoD E-M ESB Research, simulating auditory hallucinations.

Of Mice, Men, and Molecules, by John H. Heller. 1963.
p. 110, Bioelectricity. probing the brain with E-M waves.

The 3-Pound Universe, by Judith Hooper
p. 29/132/137. CIA EEG research. EEG’s for surveillance.

In the Palaces or Memory, by George Johnson
E-M emissions from the brain, the brain as an open electromagnetic circuit.

The Puzzle Palace, by James Bamford
Signals intelligence, most advanced computers in the early Sixties

The U.S. Intelligence Community – Glossary terms at National Security Archives:
Radiation intelligence – information from unintentionally emanated electromagnetic energy, excluding radioactive sources.

The Search for the “Manchurian Candidate,” by John Marks
p. 327. Electrical or radio stimulation to the brain, CIA R&D in bioelectronics.

Secret Agenda, by Jim Hougan National Security cult groups.

Crimes of the Intelligence Community. by Morton Halperin
Surreptitious entries; intelligence agents running operations against government workers

War in the Age of Intelligent Machines NSA computer supremacy, complete control of information Alternate Computers, by Time-Life Books Molecule Computers

The Mind, by Richard Restak, M.D.

p. 258, EEG Systems Inc., decoding brain E-M emanations, tracking thoughts on a computer. MedTech, by Lawrence Gallon

Triggering events in the brain” direct to auditory cortex signals. Cyborg, by D.S. Halacy, Jr. (1965)

Brain-to-computer link research contracts given out by the U.S. Government Psychiatry and the C.I.A.: Victims of Mind Control by Harvey M. Weinstein. M.D.

Dr. Cameron, psychic driving. ultraconceptual communications.

Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas

p. 127/276/116, 168-69. Intelligence R & D. Delgado. Psychic driving with radio telemetry. Mind Manipulators, by Alan Scheflin and Edward M. Opton

MKULTRA brain research for information gathering The Brain Changers, by Maya Pines.

p. 19. Listening to brain E-M emissions. Table of Contents

Further Resources

These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was taken against the NSA employees I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications:

Modern Bioelectricity
Inducing audio in the brain with e-m waves, DoD cover-up, E-M wave ESB. Remote EEGs.

Magnetic Stimulation in Clinical Neurophysiology by Sudhansu Chokroverty Magneto-Phosphenes. Images direct to the visual cortex.

The Mind of Man by Nigel Calder U.S. Intelligence brain research

Neuroelectric Society Conference – 1971
Audio direct to the brain with e-m waves, two way remote EEG.

Brain Control by Elliot S. Valenstein ESB control of individuals

Towards Century 21 by C.S. Wallia
p. 21. Brain Stimulation for direct to brain communication.

Mind Wars by Ron McRae, an associate of Jack Anderson
p 62/106/136. Research into brain-to-brain electronic communications, remote neural e-m detection.

Mind Tools by Rudy Rucker
Brain tapping, communication with varying biomagnetic fields. p. 82

U.S. News and World Report 1/2/84
p. 88. e-m wave brain stimulation. Intelligence community high tech.

Ear Magazine article on extremely low-frequency radio emissions in the natural environment, radio emissions from the human body.

City Paper article on FCC and NSA “complete radio spectrum” listening posts. 1/17/92.
Frontiers in Science – 1958 – by Edward Hutchings, Jr.

p. 48 Beyond Biofeedback – 1977 – by Elmer and Alyce Green

p. 118 The Body Quantum by Fred Alan Wolf
Cloning – A Biologist Reports by Robert Gilmore McKinnell

Ethical review of cloning humans. Hoover’s FBI by former agent William Turner

p. 280. Routines of electronic surveillance work. July 20, 2019, by Arthur C. Clarke

Lida, Neurophonics, Brain/Computer Link MegaBrain by Michael Hutchison

p. 107/108/117/120/123. Brain stimulation with e-m waves. CIA research and information control. The Cult of Information by Theodore Rosnak – 1986

NSA Directive #145. Personal Files in Computers. Computer automated telephone tapping The Body Shop

1968 implantation of an electrode array on the visual cortex for video direct to the brain and other 1960s research into electronically triggering phosphenes in the brain, thus bypassing the eyes. Evoked Potentials by David Regan

Decoding neuroelectric information in the brain

 

***

Screen Shot 2020-07-16 at 9.33.06 AM

https://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm

***

NSA CAN TARGET THOUGHTS OF MILLIONS

DETAILED LINK

https://www.lawfareblog.com/exclusive-nsa-program-can-target-thoughts-millions-targets-thousands-americans

NOTE:  Post 9/11 Remote Neural Monitoring technologies were approved for use within nationwide, federal, state, and local police departments, and numerous counterterrorism/fusion centers unifying military technology and personnel in today’s “Militarized Police State.”

***

ARTIFICIAL TELEPATHY “REMOTE NEURAL MONITORING”

http://artificialtelepathy.blogspot.com/2009/06/focus-on-us-air-force-space-command.html

***

EVERYTHING YOU NEED TO KNOW ABOUT

REMOTE NEURAL MONITORING

http://www.greatdreams.com/RNM.htm

NOTE:  It must be noted that with advancements in brain wave fingerprint monitoring, also known as Heterodyning, the “Remote Neural Monitoring” capability, technology, and ongoing testing, have advanced beyond the sole use or necessity for microchips.

AAEAAQAAAAAAAAfTAAAAJDZjNGQyNWExLWZiMjEtNDAxYi04N2QzLTZlYjkxMDExOGIzZA 

Microchip implant of any type all leads to Remote Neural Monitoring!!  For all the RNM victims – it’s not the end of our life!!  We can fight back!!

DETAILED LINKS

https://www.linkedin.com/pulse/micro-chip-implant-whatever-implants-all-leads-remote-projjal-ghosh

***

REMOTE NEURAL MONITORING – A TECHNOLOGY USED

FOR CONTROLLING THE BRAIN

https://hubpages.com/politics/Remote-Neural-Monitoring–A-Technology-Used-For-Controlling-Human-Brain

***

REMOTE NEURAL MONITORING

http://www.greatdreams.com/RNM.htm

***

***

CAPABILITY OF BRAIN-COMPUTER INTERFACE

Click to access BCI-for-communication-and-control.pdf

***

ALL YOU NEED TO KNOW ABOUT SIGNAL INTELLIGENCE

HISTORY OF SIGNAL INTELLIGENCE

https://en.m.wikipedia.org/wiki/Signals_intelligence

***

MIND CONTROL AND ELECTROMAGNETIC FREQUENCIES

https://www.linkedin.com/pulse/mind-control-electromagnetic-frequency-soleilmavis-liu/

***

DRONES AND SIGNAL INTELLIGENCE COLLECTION

http://www.baesystems.com/en-us/product/signals-intelligence-sigint

***

DETAILED LINK

https://www.scribd.com/document/248253243/Protecting-Brainwaves-Considering-Signal-Intelligence-Technology-Law?fbclid=IwY2xjawMJf0BleHRuA2FlbQIxMABicmlkETFDWXRIMGY1Qkx0SG1vckF2AR6151mXLZw3lH9OlKkZftRrK7vPZ7ypL6ozyDe_vKcrel7oH8rSZtVK4J-uHA_aem_Ra-rt_NDbTQIxUG05fLBqg

 

***

Also Google: “Journal of London Brainwave Protection” for additional reading and reports globally.  Note it will be difficult to stop and pinpoint this happening due to a space-based system.

***

GOVERNMENT AGENCY UNIFIED MILITARY TARGETING PROGRAM

https://m.goarmy.com/careers-and-jobs/browse-career-and-job-categories/intelligence-and-combat-support/signals-intelligence-analyst.m.html

***

http://whatis.techtarget.com/definition/SIGINT-signals-intelligence

***

https://www.nsa.gov/what-we-do/signals-intelligence/

***

INFO ON DOD “VOICE OF GOD” BEAMED TELEPATHY TECHNOLOGY

http://www.dailykos.com/story/2007/12/23/425814/–Voice-of-God-weapon-being-used-in-Iraq

***

https://www.forbes.com/sites/markcancian/2020/09/18/will-dod-deploy-a–heat-ray-and-the-voice-of-god-against-demonstrators/?sh=105e09b87add

***

http://gizadeathstar.com/2013/12/tamerlan-tsarnayev-implications/

***

https://www.whatdotheyknow.com/request/use_of_voice_of_god_weapon_syste

***

 REMOTE NEURAL MONITORING LAWSUITS 

DETAILED LINK

https://www.govinfo.gov/app/search/%7B%22query%22%3A%22%5C%22remote%20neural%20monitoring%5C%22%22%2C%22offset%22%3A0%2C%22historical%22%3Afalse%2C%22facets%22%3A%7B%7D%2C%22filterOrder%22%3A%5B%5D%2C%22pageSize%22%3A10%2C%22sortBy%22%3A0%2C%22facetToExpand%22%3A%22non_existing_facet%22%2C%22browseByDate%22%3Anull%7D?fbclid=IwAR2ZE6PemNE4WGyiqe_sKp9NK7UYUWm4JtdYnr3y0X9kkNk6VPUN8yiP03g

***

BRAINWAVE SCANNERS, HOW IT WORKS:

SEE MIND CONTROL PATENT’S LINK: BRAINWAVE SCANNERS, ETC.

http://bigbrotherwatchingus.com

***

DEPARTMENT OF HOMELAND SECURITY DEMONSTRATION

FOX NEWS: Homeland Security Detects Terrorist Threats by Reading your Mind 

https://www.foxnews.com/story/homeland-security-detects-terrorist-threats-by-reading-your-mind

***

PATENT – SYSTEM FOR PRODUCING ARTIFICIAL TELEPATHY

https://patents.google.com/patent/WO2005055579A1/en

 

UPDATED AVD LG NEW

HOW IT WORKS… Deceived, Mind Control: Schizophrenic High-Tech Fraud

***

Screen Shot 2020-07-13 at 9.47.54 PM

“BIGGER THAN SNOWDEN” WHISTLEBLOWER’S ARCHIVED LINK

https://youarenotmybigbrother.blog/2019/06/08/bigger-than-snowden-whistleblower-website-taken-down-fb-page-has-over-18000-likes-18000-followers/

***

***

Screen Shot 2023-11-28 at 12.26.17 AM

Screen Shot 2023-11-28 at 12.26.38 AM

https://www.youtube.com/@humanrightsadvocatereneepi7422 

4 comments

  1. Remote Neural Monitoring, although such a futuristic technology that it seems too far-fetched to even be possible, is actually real and being perpetrated around the world, including in Australia, on innocent civilians and political activists.
    Developed by US military laboratories for use in Iraq, it is now being covertly used to electronically stalk, harass and mentally torture people and is a major breach of civil liberties and privacy.
    As stated in the article above, those using it can see your body in the shower through your eyes; they can anticipate, edit and and attempt to brainwash your thoughts, and have driven several people to suicide.
    I don’t yet fully understand how they can possibly do this but it seems, from my online research, that satellites transmit the electromagnetic ‘directed energy weaponry’ at ‘targeted individuals’, possibly via the telecommunications systems.
    Make your politicians and civil liberties champions like Ralph Nader aware of it and demand that this satellite program be permanently disabled.
    Electronic stalking and harassment via remote mind control V2K voice-to-skull technology is an Orwellian evil that must be switched off.

  2. A Remote Neural Monitor causes Cancer, Breathing Difficulty, Loss of Balance and many other serious health problems. The people who are Gang Stalking me are aware of these facts, which would make them Attempted Murderers. A Remote Neural Monitor has the Gang Stalkers see everything I see at the same time and hear everything I hear at the same time. I cannot look in the mirror without them seeing me. They can also hear my thoughts. These Gang Stalkers know everyone I contact which means I am not safe anywhere. None of these facts have deterred any of them from Gang Stalking me.
    As of today June 3, 2024, I have been Gang Stalked Interstate by the people listed below. This has been happening to me for more than 8 years, 9 months. These people will not stop until they are actually arrested. The information these people have on me is my name, address, phone number, social security number, date of birth, weight, bank account number, medical insurance numbers, passwords, usernames, email address, lease information, doctor names and names of the medicine I take. Below is my story, I would like to have the remote neural monitor removed and be put in Witness Protection.
    Stolen Lawsuit Money Human Trafficking Gang Stalking Interstate
    Motive: $5,000,000. Lawsuit
    I, Rita Geiger, won a lawsuit in the amount of $5 million, years ago. I have been trying to receive my stolen lawsuit money for more than 8 years, 9 months. I have moved from PA to NV due to the fact that I had stalkers follow me everywhere I went in PA. I also had listening devices and cameras in my apartment. I have been threatened by PA Judge Ida Chen and PA Senator Christine Tartaglione with My Life and My Lawsuit Money which was stolen by Judge Ida Chens assistant. Judge Ida Chen had me in her courtroom for a divorce and tried to involve me in Human Trafficking with what she calls 4 of her guys. I did not cooperate. Since then, she has tried to destroy my life for her 4 guys. When I was in that judge’s courtroom for my divorce, she told me that I was going to marry a man named Tom Kenny who worked for the court system. After that she involved a man named Vincent S Talotta and then a man named Salvatore Accardo and then her assistant Jack Kelly aka Mr. Daymond. They all work for the Philadelphia Family Court. When she involved her assistant, she kept threatening me that I was going to marry him. She called my house, and came on my job with her 4 guys threatening me that I was going to marry Jack Kelly aka Mr. Daymond. Since then, her and her 4 guys have been stalking me, harassing me and stealing from me by using a Remote Neural Monitor. This is Gang Stalking and Interstate Stalking and has been going on for more than 24 years. As of today, I still have not received my stolen lawsuit money. Due to this fact I spent more than 4 months in the hospital. I also have had to sleep in my car. I have been surrounded by Drug Addicts, Alcoholics, Prisoners and Mental People. If I had my stolen lawsuit money none of this would have ever happened. I lived in the same apartment for approximately 15 years. I worked at the same place of employment for at least 15 years. There is no reason why the attorney could not bring my stolen lawsuit money to me or no reason why they could not contact me as I had the same phone number for 15 years as well.
    On February 5, 2018, I was evicted from my apartment and was out on the street for 11 months. My life is in danger. They have ruined my perfect credit and as of today no one has given me my stolen lawsuit money or has had anyone arrested.
    I have been Gang Stalked by Judge Ida Chen from Pennsylvania for the past 24 years. Her Gang Members who have been stalking me for the past 24 years are as follows, Senator Christine Tartaglione, Vincent S Talotta, who repeatedly names my doctors and should not know any of their names. Tom Kenny, Jack Kelly also known as Mr. Daymond, along with his girlfriend Judy, Salvatore Accardo and Anthony Rossi and relatives of his including Gina DeGrandis. An unknown person who claims he will blow my head off. This unknown person is also making lewd comments about girls. During the past 8 years, 9 months, with a motive to take my $5,000,000. from me are as follows. Thomas P. Geiger, my ex-husband, Divorced 2002. He brought in members of his family who are as follows, Paulina Geiger, Nicolette Geiger, who when I spoke to her claims, she did not know what I was talking about, nothing further was ever said, she continues to Gang Stalk me. She also has her boyfriend’s Gang Stalking me. Carolyn Geiger, who is knowingly and willingly committing the crime of Gang Stalking believing she can actually commit this crime with no consequences stating Judge Ida Chen is involved. Bill Geiger, who thinks he has a right to Gang Stalk me and is sitting there with his wife, making rude remarks to me. Also, there is Bob Geiger and James Geiger, I have not seen these people for 30 years. Also involved is Rita Chieffo, who when I told her numerous times I was being Gang Stalked and had Lawsuit Money in the amount of $5,000,000. she acted like I was Mental, yet she continues to Gang Stalk me. Eugene Chieffo, and numerous people from H & R Block who include Frank Russo, Barbara Willamen and Rosemarie Maribello. Neighbor Nikki Liberty. These people watch everything I do and make comments. They even watch me go to the bathroom, shower and get dressed. They also announce what medicines I take.
    Judge Ida Chen has stolen from me for the past 24 years. This would include any Child Support, Alimony, Attorney Fees and Divorce Settlement that should have been paid to me and never was. When I went to the Court System to see Tom Kenny, instead of him being there, there was an Imposter who introduced himself as Tom Kenny and was not, I will be able to identify that man.
    My Lawsuit Money is from me suing the City of Philadelphia and should have been paid to me in 2004. The person who should have given it to me is Salvatore Accardo. For some reason I was told that Jack Kelly also known as Mr. Daymond stole it and has never given it to me. He works for Judge Ida Chen as her assistant and has been Gang Stalking me for the past 24 years.
    If any further damage happens to me, above are the people to look at for any damage caused and my Lawsuit Money that does not belong to any of them. I am not safe anywhere.
    Rita Geiger
    900 Brush Street Apt 411
    Las Vegas NV 89107
    702-612-1914

Leave a Reply