Originally shared by Justin Case
"The oral administration of sodium bicarbonate diminishes the severity of the changes produced by uranium in the kidneys."
-- The Journal of Experimental Medicine, Vol 25, 693-719 The Rockefeller Institute for Medical Research New York
Sodium bicarbonate can safely remove paint, grease, oil and smoke residue, decreasing workers’ exposure to harsh chemicals and eliminating much of the hazardous waste associated with other cleaners. "Sodium bicarbonate is able to clean in areas where other substances pose fire hazards, because baking soda is a natural fire extinguisher," says Kenneth Colbert, a general manager for Arm & Hammer. This is the reason it’s used by oncology centers to control chemo agent spills and its actually used intravenously to protect patients from the hazardous toxicity of chemotherapy.
http://drsircus.com/medicine/sodium-bicarbonate-baking-soda/reducing-radiation-damages-with-bicarbonate
Sunday, May 29, 2016
Saturday, May 28, 2016
PRIVATEGRITY PROMISES BETTER, FASTER ONLINE PRIVACY THAN TOR
PRIVATEGRITY PROMISES BETTER, FASTER ONLINE PRIVACY THAN TOR
https://greycoder.com/privategrity/
https://greycoder.com/privategrity/
USING JONDONYM’S PROXY SERVICE FOR ONLINE PRIVACY
USING JONDONYM’S PROXY SERVICE FOR ONLINE PRIVACY
https://greycoder.com/using-jondonyms-proxy-service-for-online-privacy/
https://greycoder.com/using-jondonyms-proxy-service-for-online-privacy/
Riseup: Private Email For Activitists and Those Being Censored
Riseup: Private Email For Activitists and Those Being Censored
Riseup provides private and secure email, mailing lists and chat services for individuals and organization
https://greycoder.com/riseup-secure-email-need-avoid-censorship/
Riseup provides private and secure email, mailing lists and chat services for individuals and organization
https://greycoder.com/riseup-secure-email-need-avoid-censorship/
CounterMail: A Diskless, Encrypted Email Service - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/countermail-a-diskless-pgp-encrypted-email-service/
https://greycoder.com/countermail-a-diskless-pgp-encrypted-email-service/
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
Originally shared by Government GangStalking and Electronic Harassment
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/
WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES
Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
Originally shared by Government GangStalking and Electronic Harassment
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.
Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.
Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.
Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.
You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:
Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.
It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/
THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS
Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.
Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.
Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.
Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.
You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:
Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.
It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Prism Break provides a well-researched list of software that can help you opt of of surveillance.
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
FOR:
MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/
Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.
FOR:
MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/
FBI Used U.S. University to Attack Tor Privacy - GreyCoder
Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/fbi-tor/
https://greycoder.com/fbi-tor/
A Review Of Anonymous Credit Cards
If you WANT TO BUY SOMETHING ANONYMOUSLY WITH A CREDIT CARD
You can get a Vanilla Visa or Simon card, See this article for more information.
http://greycoder.com/vanilla-visa-an-inexpensive-anonymous-credit-card/
http://greycoder.com/vanilla-visa-an-inexpensive-anonymous-credit-card/
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?
TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES
DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/
AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.
KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/
ALSO DO NOTE ;
1- Privatoria
With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/
2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/
3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/
4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/
5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/
6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/
7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/
8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/
9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/
10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/
FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/
TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES
DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/
AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.
KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/
ALSO DO NOTE ;
1- Privatoria
With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/
2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/
3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/
4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/
5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/
6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/
7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/
8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/
9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/
10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/
FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/
WANT MORE ANONYMITY — I WANT TO USE AN ENTIRE ANONYMOUS OPERATING SYSTEM
WANT MORE ANONYMITY — I WANT TO USE AN ENTIRE ANONYMOUS OPERATING SYSTEM
do not use only one
remember this
http://greycoder.com/anonymous-linux-distributions/
https://tails.boum.org/
do not use only one
remember this
http://greycoder.com/anonymous-linux-distributions/
https://tails.boum.org/
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article
ALSO NOTE THE HELPFUL ARTICLES HERE:
1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/
2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/
3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/
4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/
See Usenet. ?
BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/
If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article
ALSO NOTE THE HELPFUL ARTICLES HERE:
1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/
2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/
3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/
4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/
Friday, May 27, 2016
Thursday, May 26, 2016
Help Targeted Individuals
Originally shared by Government GangStalking and Electronic Harassment
http://peacepink.ning.com/group/helptargetedindividuals?commentId=2351430%3AComment%3A548119&xg_source=activity
http://peacepink.ning.com/group/helptargetedindividuals?commentId=2351430%3AComment%3A548119&xg_source=activity
[ELUDING] [NEURAL MONITORING] Myth 2, Part 2: TIs cannot successfully elude because their brains are geolocated via...
Originally shared by Government GangStalking and Electronic Harassment
https://m.reddit.com/r/TargetedEnergyWeapons/comments/3r1osa/eluding_neural_monitoring_myth_2_part_2_tis/?ref=search_posts
https://m.reddit.com/r/TargetedEnergyWeapons/comments/3r1osa/eluding_neural_monitoring_myth_2_part_2_tis/?ref=search_posts
StopPsyWar.com--Also StopBeamWeapons.com, StopCOINTELPRO.com, StopMKULTRA.com, etc.
Originally shared by Government GangStalking and Electronic Harassment
http://www.stopbeamweapons.com/index.html#detecting_hi_tech_political_persecution
http://www.stopbeamweapons.com/index.html#detecting_hi_tech_political_persecution
Tuesday, May 24, 2016
READ THIS PART VERY CAREFULLY
READ THIS PART VERY CAREFULLY
BECAUSE IT REFERS TO BRAIN WAVE SIGNATURE TRACKING EVASION
DO NOTE THAT WE ARE BEING TRACKED BY 4 METHODS THAT I KNOW OF AS OF NOW:
1-BRAINWAVE SIGNATURE TRACKING
2-CARDIAC SIGNATURE TRACKING -SEE OTHER POSTS FOR THAT
3-RFID CHIP IMPLANTATION TRACKING
4-CELLPHONE TRACKING
I HEARD AND READ OF TRACKING US BY REMOTELY ACTIVATING A LOJACK TYPE PARTIAL INSTALLATION IN OUR LAPTOPS BUT I DO NOT KNOW MUCH ABOUT THIS NOW. IN ADDITION, THE NEW LAPTOPS HAVE A BUILT IN BATTERY AND THIS, AS I WAS TOLD, ENABLES THE SAME TYPE OF TRACKING AS THE CELLPHONES.
I WILL HAVE MORE INFO ON THESE SUBJECT MATTERS IN THE FUTURE WHEN I DO RESEARCH ON THEM.
IF ANYONE ALREADY HAS KNOWLEDGE ABOUT THESE MATTERS THEN PLEASE DO SHARE FOR THE COMMON GOOD AND FOR THE COMMON BENEFIT FOR ALL.
ALSO SEE
http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm
Detecting EMF Fields in Humans for Surveillance
A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.
With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours a day.
The NSA can pick out and track anyone in the US.
Show less
http://www.bibliotecapleyades.net/ciencia/ciencia_matrix57k.htm
BECAUSE IT REFERS TO BRAIN WAVE SIGNATURE TRACKING EVASION
DO NOTE THAT WE ARE BEING TRACKED BY 4 METHODS THAT I KNOW OF AS OF NOW:
1-BRAINWAVE SIGNATURE TRACKING
2-CARDIAC SIGNATURE TRACKING -SEE OTHER POSTS FOR THAT
3-RFID CHIP IMPLANTATION TRACKING
4-CELLPHONE TRACKING
I HEARD AND READ OF TRACKING US BY REMOTELY ACTIVATING A LOJACK TYPE PARTIAL INSTALLATION IN OUR LAPTOPS BUT I DO NOT KNOW MUCH ABOUT THIS NOW. IN ADDITION, THE NEW LAPTOPS HAVE A BUILT IN BATTERY AND THIS, AS I WAS TOLD, ENABLES THE SAME TYPE OF TRACKING AS THE CELLPHONES.
I WILL HAVE MORE INFO ON THESE SUBJECT MATTERS IN THE FUTURE WHEN I DO RESEARCH ON THEM.
IF ANYONE ALREADY HAS KNOWLEDGE ABOUT THESE MATTERS THEN PLEASE DO SHARE FOR THE COMMON GOOD AND FOR THE COMMON BENEFIT FOR ALL.
ALSO SEE
http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm
Detecting EMF Fields in Humans for Surveillance
A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.
With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours a day.
The NSA can pick out and track anyone in the US.
Show less
http://www.bibliotecapleyades.net/ciencia/ciencia_matrix57k.htm
READ THIS PART CAREFULLY:
Originally shared by Government GangStalking and Electronic Harassment
READ THIS PART CAREFULLY:
https://everydayconcerned.net/2015/08/13/holistic-doctors-sudden-cardiac-arrest-targeted-individuals-remote-radiation-heart-attack-weaponry-how-to-protect-yourself/
READ THIS PART CAREFULLY:
https://everydayconcerned.net/2015/08/13/holistic-doctors-sudden-cardiac-arrest-targeted-individuals-remote-radiation-heart-attack-weaponry-how-to-protect-yourself/
Sunday, May 22, 2016
READ THIS PART IN EEG CLONING SECTION:
Originally shared by Government GangStalking and Electronic Harassment
READ THIS PART IN EEG CLONING SECTION:
"Americans are being selected for disposal, no indictment, no trials, no jury. Go directly to torture and death sentence. Thousands of Americans are deliberately being murdered after being selected for “total access”. They are slandered out of their employment which leads to losing their homes, losing everything through a Nazi-like selection process. The death sentence is in these programs: Morgellons, Radiation and Gangstalking."
https://authenticmentoring.wordpress.com/2015/12/21/hell-on-earth-being-created-by-dod-sentient-world-simulation-and-eeg-cloning/
READ THIS PART IN EEG CLONING SECTION:
"Americans are being selected for disposal, no indictment, no trials, no jury. Go directly to torture and death sentence. Thousands of Americans are deliberately being murdered after being selected for “total access”. They are slandered out of their employment which leads to losing their homes, losing everything through a Nazi-like selection process. The death sentence is in these programs: Morgellons, Radiation and Gangstalking."
https://authenticmentoring.wordpress.com/2015/12/21/hell-on-earth-being-created-by-dod-sentient-world-simulation-and-eeg-cloning/
Thursday, May 19, 2016
Tuesday, May 17, 2016
[AYT] Causality Inversion, and How it Looks Like Delusions of Reference
Originally shared by Government GangStalking and Electronic Harassment
http://www.zersetzung.org/mind-control/mc-research-docs/61-temp/ayt-articles/317-causality-inversion
http://www.zersetzung.org/mind-control/mc-research-docs/61-temp/ayt-articles/317-causality-inversion
How to Defend yourself during Jade Helm’s Frequency Weapons and Psychological Warfare
Originally shared by Government GangStalking and Electronic Harassment
https://authenticmentoring.wordpress.com/2015/06/06/how-to-defend-yourself-during-jade-helms-psychological-warfare-2/
https://authenticmentoring.wordpress.com/2015/06/06/how-to-defend-yourself-during-jade-helms-psychological-warfare-2/
Sunday, May 8, 2016
TIs sharing shileding tips
TIs sharing shileding tips
http://peacepink.ning.com/profiles/blogs/shielding-tips-www-freedomfchs-com
http://peacepink.ning.com/profiles/blogs/shielding-tips-www-freedomfchs-com
Protection from Mind Control Weapons
Originally shared by Government GangStalking and Electronic Harassment
http://www.jacobsm.com/projfree/protection.html
http://www.jacobsm.com/projfree/protection.html
Lone Star Consulting, Inc. Ultrasound/Infrasound Subliminal,Mind Control,Entrainment,Electronic Attack
Originally shared by Government GangStalking and Electronic Harassment
http://www.lonestarconsultinginc.com/mindcontrol2.htm
http://www.lonestarconsultinginc.com/mindcontrol2.htm
Solutions
Originally shared by Government GangStalking and Electronic Harassment
http://www.stopthecrime.net/flyers.html
http://www.stopthecrime.net/flyers.html
Wednesday, May 4, 2016
Electronic Technological Harassment Research Information For Victims (Huge Post) in Electronic Technological...
Originally shared by Government GangStalking and Electronic Harassment
http://osinformers.lefora.com/topic/16267059/Electronic-Technological-Harassment-Research-Information-Vi#.VyqlblUrKM8
http://osinformers.lefora.com/topic/16267059/Electronic-Technological-Harassment-Research-Information-Vi#.VyqlblUrKM8
A TI's take on dew shielding
A TI's take on dew shielding
https://sites.google.com/site/thetargetedtruth/targetprotection
https://sites.google.com/site/thetargetedtruth/targetprotection
VERY IMPORTANT INFORMATION
VERY IMPORTANT INFORMATION
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3vt3qa/wiki_dew_detection_using_meters_spectrum/
DEW: Detection using meters, spectrum analyzers, thermal imaging and infrared cameras apps
ALSO SEE
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3r0klf/wiki_lasers_including_new_infrared_laser_electric/
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3vt3qa/wiki_dew_detection_using_meters_spectrum/
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3vt3qa/wiki_dew_detection_using_meters_spectrum/
DEW: Detection using meters, spectrum analyzers, thermal imaging and infrared cameras apps
ALSO SEE
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3r0klf/wiki_lasers_including_new_infrared_laser_electric/
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3vt3qa/wiki_dew_detection_using_meters_spectrum/
INSIDE THIS DOCUMENT SEARCH FOR THE TERMS "DIRECTED ENERGY WEAPONS" AND YOU WILL GET INFORMATION ABOUT THESE...
INSIDE THIS DOCUMENT SEARCH FOR THE TERMS "DIRECTED ENERGY WEAPONS" AND YOU WILL GET INFORMATION ABOUT THESE CAMERAS' ABILITY TO DETECT THEM
http://www.flir.com/uploadedFiles/Thermography_USA/Products/Product_Literature/flir-infrared-cameras-for-research-and-science-brochure.pdf
http://www.flir.com/uploadedFiles/Thermography_USA/Products/Product_Literature/flir-infrared-cameras-for-research-and-science-brochure.pdf
THEY ARE HERE TOO
THEY ARE HERE TOO
LOOK FOR THE BETTER ONES IF YOU WANT TO DETECT LASER ATTACKS
https://play.google.com/store/apps/details?id=com.fingersoft.thermalvisioncamera&hl=en
LOOK FOR THE BETTER ONES IF YOU WANT TO DETECT LASER ATTACKS
https://play.google.com/store/apps/details?id=com.fingersoft.thermalvisioncamera&hl=en
Microwave and Terahertz wave sensing with
Microwave and Terahertz wave sensing with
metamaterials
http://people.bu.edu/xinz/pdf/Opt_Exp-2011_19_21620-21626.pdf
metamaterials
http://people.bu.edu/xinz/pdf/Opt_Exp-2011_19_21620-21626.pdf
IF YOU CAN AFFORD THEM, YOU CAN DOCUMENT MICROWAVE LASER ATTACKS
IF YOU CAN AFFORD THEM, YOU CAN DOCUMENT MICROWAVE LASER ATTACKS
MORE OF THESE CAMERAS HERE
http://www.ferret.com.au/ODIN/PDF/Showcases/22182.pdf
AND HERE (THESE HAVE THERMAL SENSORS)
http://www.videal.ch/files/documents/thermal-imaging-cameras-with-thermal-sensor.pdf
http://www.naffco.com/downloads/pdf/flir-2013-catalogue-en.pdf
MORE OF THESE CAMERAS HERE
http://www.ferret.com.au/ODIN/PDF/Showcases/22182.pdf
AND HERE (THESE HAVE THERMAL SENSORS)
http://www.videal.ch/files/documents/thermal-imaging-cameras-with-thermal-sensor.pdf
http://www.naffco.com/downloads/pdf/flir-2013-catalogue-en.pdf
Privacy Apocalypse: 5 Devices You Can’t Hide From
Originally shared by Government GangStalking and Electronic Harassment
http://www.survivopedia.com/devices-that-you-cant-hide-from/
http://www.survivopedia.com/devices-that-you-cant-hide-from/
Subscribe to:
Posts (Atom)