He'd love to get his scanner right next to Rae Fernandez's head...and ask her why is she transmitting radio signals from her temple? Just kidding Rae, we all know that you and Lisa had a "secret agreement" and that you hear her...but you aren't the only one.
Jesse runs the IAACT and he and I are good friends...his work scanning and my investigation skills make a formidable team...only one difference...I KNOW WHO LISA IS AND SO DO THE POLICE!!! So wondering about whom is doing this is eliminated...all we need is law enforcement to grow a pair!!!
While we are waiting for that to happen, watch my buddy Jesse at work...he's a decorated paramedic and no dumbell when it comes to this technology!!!
In the meantime here are some tips from Edmund that I have told you about for years...pay particular attention to the very last line which shows Lisa's intentions for this technology!!!
Victims & Researchers,
I have recently updated the "Tips for Targets" post on my blog, edmundosreh.blogspot.com, and I strongly urge targets to review these tips as some of them involve cost-effective means for detection and cheap, effective shielding.
"If you have recently discovered that you are a target, please, initiate at least some of these actions:
Create an intial affidavit/case summary detailing your knowledge of the source and nature of victimization, and email it to John Finch (mcmailteam@gmail.com); complete the "Opt-out Form from Nonconsensual Experimentation" prepared by Letitia Peters (email her at USHumanRights@gmail.com, and see her webpage ontumblr.com for more information); and consider logging your harassment at stopcovertwar.com.
Consider joining the mass lawsuit filed by victims and enlisting for the Skynet service to be installed in order to track directed radio signals around victims (contact Greg Gamache at mothership010@gmail.com; see federation.wall.fm for updates; and you may join freely if you do not have $10.00 as detailed in the latest bulletins).
Consider contacting a Private Investigator (Todd Sterling of trackastalker.com conducts a situational analysis for $75.00, and Doug Belmar and Roger Tolces are other targeted investigators).
Purchase a digital voice recorder with a wide frequency response range (consider the Olympus WS600 recorder, which costs less than $60 and maintains a response range starting from 40Hz) and obtain the free AVS Audio Editor from avs4you.com (this editor's easily operated frequency analysis option has proved especially useful in categorizing sound types by record-ability, ability for others to hear the signature, and other characteristics; and some of these signatures, I have learned, are apparently forms of encrypted audio, whose signature is often characteristic of the type of sound (loud pounding unheard by anyone else is evidenced by notable, >30 decibel signatures within the range of human hearing [20Hz-20KHz] that should be heard by all; seemingly playful knocking on the ceiling unheard by anyone else is captured as fast, repetitive, and seemingly playful spikes in the same frequency region, which lies within the range of human hearing) and directed sound, whose signature or "trace" conveys the general message of increased intensity: see An Introduction to Records on scribd.com/EdmundIgberaese and the November 2012 Recordings Guide (edmundlogs.blogspot.com). Further, results of frequency analysis and categorization of sound types should be summarized as well as recorded, via camera [I suggest the eye-glass camera from trackastalker.com], in order to obtain evidence.
Obtain a video camera with audio, video, and capture capabilities, and this should be used to record harassment (I have noticed that smaller, less complex and cheaper cameras, such as key-chain cameras and the eye-glass camera from trackastalker.com, are less likely to suddenly fail or lose power, in spite of previous lack of use, when a significant incident of harassment begins).
Begin reading the following introductory books: Revolutionary Methods for Political Control by Mark Rich, Activist, The Matrix Deciphered by Robert Duncan, whistle-blower, and Project: Soul-catcher (Volumes I & II) by Robert Duncan, whistle-blower; and follow the follow the stories and testimonies of the following people online: Vic Livingston, first to expose the Silent Holocaust in 2009 (nowpublic.com/scrivener & VicLivinston.blogspot.com; Jesse Beltran (ICAACT.org); Barrie Trower, former British Military Engineer; Ted Gunderson, F.B.I. whistle-blower; Donald Truax, S.A.I.C. whistle-blower (theominousparallels.blogspot.com); Robert Duncan, Department of Defense Whistleblower; John St. Clair Akwei, N.S.A. whistle-blower; and William Taylor, F.B.I. whistle-blower.
Begin to keep a daily journal recording your ongoing harassment.
Seek to spread 10 flyers per week (see detailed flyers on scribd.com/EdmundIgberaese) announcing your plight, and use activist Jesse Beltran's October 2012youtube.com interview with an international reporter exposing non-consensual experimentation programs and laws being introduced to freely experiment on anyone found unconscious (http://www.youtube.com/watch?v=E1XrbLPQKqI&feature=em-uploademail-new), along with the infamous cases of Bob Boyce (non-consensual VeriChip implantation: http://pesn.com/2010/12/07/9501740_Bob_Boyce_verichip_removed/) and James Walbert (landmark U.S. court case in 2008; see the wired.comnews article), as presentation material to town halls and official figures.
Join a local T.I. community, which may be found on the freedomfchs.com website.
Absorb as much information as possible pertaining to your situation (read the books mentioned in this post, and follow their authors, review Deborah Dupre's Examiner.com articles, and join freedomfchs.com in order to receive weekly newsletters that offer newer articles and areas of research, along with tips, surveys, and other materials).
Secure your computer and other electronics (see my "Computer Security Tips" page; see N.S.A. whistle-blower John St. Clair Akwei's lawsuit against the N.S.A. for information on R.F.-induced tampering with logic boards; and other informative materials).
If you are a target of remote, electronic harassment, first learn of the nature of electromagnetism and the effects of electromagnetic fields on human brains (a good starter would be U.N. speaker Dr. Nick Begich's Controlling the Human Mind [2006]) before obtaining shielding, on which you should not spend more than $50.00 (search at first for basic, effective materials, including copper mesh, which can be easily unwrapped from $2.00 Brillo pot scrubbers, steel sheets easily and cheaply purchased from hardware stores, Mylar blankets, a pack of which can be obtained from amazon.com for less than $10.00, and other cheap, conductive items: aluminum-mesh cages, aluminum mesh screens, magnetic shielding alloys from lessemf.com (see guidelines for installing magnetic shielding and a <1 minute video for a very simple but effective magnetic shielding idea), aluminum shavings, orgone materials (research orgonomics), and others; it should be noted that the ability of electromagnetic waves to alter the human brain stems largely from their magnetic component, and emphasis should be made on protecting from magnetic fields via the use of ferromagnetic materials [see lessemf.com's guidelines for installing magnetic shielding]). Further, in shielding, the target should avoid purchasing single items "promised to work" for a significant price as many targets are victimized by especially adaptive, well-developed weaponry (review "frequency-hopping" mechanisms and frequency-modulation). Lastly, grounding should be seriously considered, and a sudden "snapping of fingers" when placed in what has been described as a trance-like state induced via directed radio waves (review Radio-Hypnotic Intracerebral control) often aids in regaining consciousness.
Secure your finances by limiting your spending and routinely changing banking passwords; also, in order to protect your passwords, you should avoid typing them into your computer's web browser and seriously consider obtaining the Random Password Generator freely available from iobit.com (with this system, you can easily copy & paste your hidden, possibly 64-character passwords in the generator's database to online log-in forms).
Think positively, and consider adopting meditation, prayer, and other expressions of spirituality.
Circulate the business plan for the establishment of a safe community cooperative for targeted individuals in New York State, which may be found atgovsponsoredstalking.info.
Create a blog detailing your victimization, which can be easily done by using the Gmail blogger feature on blogspot.com.
Record as much as you can, and try to avoid appearing to be "insane." This can be done by avoiding the terms "mind control" and "directed energy weapon" in conversations with non-TIs, even though there exist much evidence for the reality of these concepts. Instead, as detailed in Eleanor White's "Information Handling-OSEH" article (posted on this blog), use the terms "psychological harassment" and "illegal electromagnetic devices," and allude to former FBI official Ted Gunderson's revelation of the new, more arbitrary CoIntelPro, former NSA employee John St. Clair Akwei's lawsuit against the National Security Agency concerning the agency's extensive "brain fingerprinting" network and Remote Neural Monitoring (RNM) program, Dennis Kucinich's thwarted Space Preservation Act of 2001, the recent Washington Post article outlining 10 reasons why the United States of America is no longer a free country, state laws prohibiting the illegal use of electromagnetic devices, including those of Michigan and Maine, and James Walbert's 2008 landmark court case against non-consensual implantation.
Lastly and most importanly, stay calm. Remember the goals of OSREH: forced suicide, forced admission into a mental institution, and orchestrated violence resulting in incarceration..."
