Sei sulla pagina 1di 66

FORBIDDEN

FORBIDDEN
TECH
TECH
The
The Complete
Complete Guide
Guide to Energy, Social
to Energy, Social and
and Biological
Biological
Technologies
Technologies
that
that they
they did
did not
not want
want you
you to
to know
know about.
about.

by
by

Naima Morris and Tivon Rivers

THIS IS A CONDENSED SAMPLE FOR THE


THE FULL
FULL BOOK
BOOK

COMPLETE TABLE OF CONTENTS


CONTENTS SHOWN
SHOWN
Table of
Table of Contents
Contents

INTRODUCTION
INTRODUCTION 1 1

WHY WE WROTE THIS BOOK 1 1


COMMON MISCONCEPTIONS 4 4

ENERGY VOCABULARY
ENERGY BASICS
VOCABULARY BASICS 6 6

PLANNED OBSOLESCENCE 7 7
OVERUNITY 8 8

COP
C O P OVER
OVERI1 9 9

EARLY INVENTORS AND SCANDALS 1 3 13

INVENTOR: MICHAEL FARADAY 1 3 13


INVENTOR: THOMAS EDISON 1 5 15
INVENTOR: NIKOLA TESLA 1 7 17
THE CURRENT WAR 2 1 21
TESLA SPOKE TO ALIENS 2 7 27
ASYMMETRICAL AND SYMMETRICAL SYSTEMS 3 1 31
THE LAWS OF NATURE 3 4 34
FLIGHT OF THE BUMBLEBEE 3 6 36
ZERO POINT ENERGY 3 8 38

PATENTS AND SOLUTIONS 3 9 39

THE PATENT TRAP 3 9 39


THE DIFFERENCE BETWEEN A PATENT AND COPYRIGHT 4 2 42
THE U.S. PATENT OFFICE CLASSIFICATION SYSTEM 4 3 43
SECRECY ORDERS 4 3 43
OVER 5,000
5.000 PATENTS CENSORED 4 7 47
MAIN STREAM AND GOVERNMENT FUNDED LABS,
LABS. RESEARCH AND EDUCATION 4 47
7
EXAMPLES OF
EXAMPLES OF GOVERNMENT-FUNDED RESEARCH SCENARIOS
GOVERNMENT-FUNDED RESEARCH SCENARIOS 4 9 49
GRASSROOTS ENGINEERING
GRASSROOTS ENGINEERING 5 2 52
CO-DEVELOPMENT
CO-DEVELOPMENT 5 5 55
CYBERLABS
CYBERLABS 5 5 55

ENERGY INDUSTRY
ENERGY INDUSTRY SUPPRESSION
SUPPRESSION 5 7 57

ENERGY INDUSTRY COVERUP 5 7 57


80 PERCENT OF EVERY DOLLAR IS SPENT ON ENERGY 6 0 60
FREE ENERGY MAFIA 6 1 61
ENERGY SUPPRESSION TACTICS 6 2 62
DEATHS RELATED TO FREE ENERGY RESEARCH
DEATHS 6 5 65
STANLEY MEYER AND CARS THAT RUN ON WATER 6 7 67
BRUCE DE PALMA'S N MACHINE 7 5 75
PARAMAHAMSA TEWARI 7 7 77
COLD FUSION 8 0 80
STANLEY PONS AND MARTIN FLEISHCMANN 8 2 82
SCIENCE BY VOTE 8 3 83
COLD FUSION TODAY 8 4 84
ANDREA ROSSI 8 6 86
E-CAT LENR 8 7 87
DR. EUGENE MALLOVE 9 1 91
MALLOVE'S MURDER 9 5 95

MORE ALTERNATIVE ENERGY TECHNOLOGY 9 7 97

ELECTRIC
ELECTRIC MOTORS 9 7 97
SOLAR POWER 1 1 5 115
WIND POWER 1 1 8 118
NANO
NANO TECHNOLOGY AND PLASMA 1 2 0 120
SUPERCONDUCTIVITY 1 2 3 123
PLASMA
PLASMA 1 2 4 124
RADIANT
RADIANT ENERGY 1 2 7 127
EM FIELD 1 2 7 127
SKIN EFFECT 1 2 9 129
TESLA'S HAIRPIN CIRCUIT 1 3 0 130
COMBUSTION ENGINES AND GEET 1 3 3 133
CURRENT LARGE
CURRENT LARGE SCALE
SCALE SUPPRESSION
SUPPRESSION TACTICS
TACTICS 1 4 4 144

COINTELPRO 1 4 4 144
HISTORY OF COINTELPRO 1 4 8 148
GANGSTALKING 1 6 4 164
ENERGY INDUSTRY MOTIVES FOR INTERNET DEFAMATION CAMPAIGNS 1 8 183
3

FREE ENERGY TROLLING 1 8 4 184


HOW MUCH A TROLL IS PAID 1 8 7 187
HOW TO PROTECT YOURSELF 1 9 1 191

ENERGY WEAPONS 1 9 4 194

ELECTRONIC HARASSMENT 1 9 4 194


TESTIMONY OF V2K TECHNOLOGY VICTIM 2 0 1 201
MODE OF ATTACK FOR A TARGETED INDIVIDUAL 2 0 8 208
THE HUTCHINSON EFFECT 2 1 3 213
V2K PATENTS 2 2 4 224
FRACTAL ANTENNAS 2 2 6 226
CHEMTRAILS AND HAARP 2 3 2 232

TRANS HUMANISM: THE ASCENT OF THE NEW MAN


TRANSHUMANISM: 2 3 7 237

MORGELLONS DISEASE 2 3 8 238


QUANTUM DOTS 2 4 3 243
WHAT IS BIOFILM.
BIOFILM, HAS IT BEEN WEAPONIZED? 2 4 4 244
TRACKING PATENTS 2 5 0 250

SOLUTIONS 2 5 3 253

A WORD OF ENCOURAGEMENT 2 5 4 254


DETOX DETOX DETOX 2 5 6 256
MAGNETIC PULSE THERAPY 2 5 9 259
ORGONE ENERGY 2 6 3 263
THE DR. WILHELM
THE DR. WILHELM REICH
REICH BLOOD
BLOOD TEST
TEST (RBT)
(RBT) 2 6 6 266
ORGONITE
ORGONITE 273
273
CONCLUSION
CONCLUSION 278
278
We dedicate this book to our parents,
and our
and our Lord
Lord and Savior Jesus
and Savior Jesus Christ
Christ

No part of
No part of this
this publication
publication may
may be
be reproduced
reproduced and/or
and/or sold
sold without
without written
written
permission of
permission of the publisher. For
the publisher. For information
information regarding
regarding permission,
permission, sales
sales promotions,
promotions,
fund-raising
fund-raising and
and educational needs, complete
educational needs, complete the
the contact
contact form
form on
on
www.forbiddentech.online

Text
Text copyright
copyright
0 2017
2017 by
by Naima
Naima D.
D. Morris
Morris and
and Tivon
Tivon A.
A. Rivers
Rivers
Introduction
Introduction

Why
Why we
we wrote
wrote this
this book
book

Whether
Whether you
you are
are an
an engineer, a do-it-yourself
engineer, a do-it-yourself enthusiast,
enthusiast, scientist,
scientist,
or
or just
just your average Jane
your average Jane or Joe, this
or Joe, this book
book was
was written
written for
for you.
you. It
It does
does
not matter who
not matter who you
you are,
are, if
i f you
you are
are alive
alive and
and living
living on
on this
this planet,
planet, you
you
are affected by
are affected technology. We
by technology. We all use energy
all use energy every
every day.
day. We
We all
all breathe
breathe
the chemicals in
the chemicals in the
the air
air and
and eat
eat them
them in
in our
our food.
food. We
We are
are all
all part
part of
of
society
society that has been
that has been using
using covert
covert operations
operations on
on its
its citizens.
citizens. Its
It's time
time
for us to
for us to wake
wake up and understand
up and understand what
what has been going
has been going on
on in
in our
our world
world
when
when it comes to
it comes to hidden
hidden technologies.
technologies. IIff more
more people
people make
make the
the choice
choice
to educate
educate themselves
themselves on some of these basic fundamentals, then itit
will be harder
will be harder for
for the
the opposing
opposing powers
powers to
to fool
fool the masses into
the masses into
accepting the state
accepting the state of
of things
things in
in the
the world.
world.

The authors of
The authors of this book have
this book have traveled
traveled the
the world
world building
building prototypes
prototypes
for
for alternative energy devices.
alternative energy devices. During
During this
this time,
time, weve
we've met
met aa lot
lot of
of
people and have
people and have come
come up
up against
against aa lot
lot of
of opposition. Perhaps the
opposition. Perhaps the most
most
shocking
shocking thing
thing weve
we've encountered
encountered was
was the
the level
level of
of ignorance
ignorance around
around

1
the kind of technology
technology that exists in the world today. We wanted to do
something to change that.

We believe
believe that
that the best
best way to help
help change
change things in our world is to
educate people
people about the
the technologies that have been hidden from
them. If
I f you
you try to do research
research on your own, it can
can be
be confusing and
overwhelming. There is
overwhelming. There is aa lot
lot of
of disinformation
disinformation and
and propaganda
propaganda on
on the
the
internet, and sadly
internet, and a lot
sadly a lot of
of scams
scams that
that take
take advantage
advantage of
of people. The
people. The
true
true nuggets
nuggets of
of wisdom and facts
wisdom and facts are
are very
very hard
hard to
to find,
find, we
we know
know
because weve
because spent years
we've spent years searching
searching for
for them.
them. With
With this
this book,
book, weve
we've
taken
taken everything weve found
everything we've and compiled
found and compiled it
it into
into one
one basic
basic crash
crash
course. Weve cut
course. We've cut out
out all
all of
of the
the fluff, and brought
fluff, and brought you
you right
right to
to the
the
heart of the matter.

While the average


While the average person
person knows
knows about
about some
some of
of the
the basic
basic forms
forms of
of
energy and technology
energy and technology that
that is
is promoted
promoted in
in controlled main stream
controlled main stream
outlets, there are
outlets, there are so
so many
many more
more areas
areas that
that remain
remain hidden.
hidden. Many
Many
inventors have been
inventors have been undermined
undermined by
by administrations,
administrations, their
their devices
devices
taken
taken in
in government
government raids,
raids, their
their lives and their
lives and their familys
family's lives
lives
threatened, and even
threatened, and some attacked,
even some beaten and
attacked, beaten and killed.
killed.
Psychological tactics are
Psychological tactics are actively
actively employed
employed on
on aa mass
mass scale
scale to
to
influence the public
influence the perception. These
public perception. These tactics
tactics infiltrate
infiltrate the
the human
human
mind and encourage
mind and encourage the
the lowest
lowest levels
levels of
of human
human behavior,
behavior, effectively
effectively
turning us into
turning us a weak-willed
into a weak-willed society
society of
of people
people that
that police
police themselves
themselves
and unwittingly uphold
and unwittingly uphold the
the oppressive
oppressive structures
structures of
of corporate
corporate
domination and control.
control.

2
It is vital that these hidden technologies are released. A lot of them
them
would end suffering, save lives and
and end financial slavery. No one
one can
can
deny that there is an unspeakable amount of
of human
human suffering on this
planet. So
So much
much of the pain humanity faces has
has to do with the lack of
of
access to
to energy.
energy. Can
Can you afford to survive? Can you stay warm?
warm? Can
Can
you get
get well when you are
are sick? Can you get food and
and water? All
All of
of
this has to
this has to do
do with
with your
your ability
ability to access energy.
to access energy.

We believe that
We believe that these
these technologies have been
technologies have been kept
kept from
from the
the public
public for
for
aa reason.
reason. Energy
Energy is
is the
the underpinning
underpinning of
of our
our entire
entire society
society through
through our
our
economy.
economy. If
I f new
new energy
energy technology
technology is set free
is set free world
world wide. The change
wide. The change
would be profound,
would be profound, it
it would
would affect
affect everybody
everybody and
and it
it would
would be
be
applicable everywhere.
applicable everywhere.

Authors Naima
Authors Naima and
and Tivon
Tivon during
during aa free
free energy
energy interview
interview

33
Common Misconceptions

There are some common misconceptions that youll


you'll hear
hear aa lot when
when itit
comes to
to some
some of the topics
topics that we are covering in this book. We
would like to
would to take
take this opportunity now to address
address them.

Misconception:
Free energy is impossible because it breaks the first law
Free law of
of
thermodynamics
thermodynamics which states,energy
which states, 'energy can
can neither
neither be
be created
created nor
nor
destroyed. Heat and
destroyed. Heat and mechanical
mechanical work
work being
being mutually
in c o n vconvertible.
ertible.'

This is not
This is not correct.
correct. The
The laws
laws of
of thermodynamics
thermodynamics are
are aa part
part of
of the
the laws
'laws
of
of physics
physics' which are themselves
which are themselves incomplete.
incomplete. Fifty
Fifty percent
percent of
of the
the
original theories that
original theories that created
created the
the laws
laws of
of physics
physics were
were purposefully
purposefully
redacted
redacted from
from our
our public knowledge base
public knowledge base by
by the
the financial
financial interests
interests of
of
JP Morgan, Hendrick
JP Morgan, Hendrick Lorenz and Thomas
Lorenz and Thomas Edison.
Edison. The
The missing
missing
theories are found in the laws
'laws of nature,
nature,' for which there are several
law-breaking examples, such
law-breaking examples, such as
as the
the flight
flight of
of the
the bumblebee
bumblebee which
which is
is
fully explained in
fully explained the section
in the section of
of this
this book
book called
called Maxwells
Maxwell's Theories
Theories
Redacted.

Misconception:
Misconception:
Perpetual motion
Perpetual motion is
is impossible.
impossible.

If
I f this were true,
this were then how
true, then does the
how does the earth
earth rotate?
rotate? How
How do
do electrons
electrons
spin around an
spin around an atom? There are
atom? There are many
many examples
examples of
of perpetual
perpetual motion
motion all
all
around us, yet
around us, yet we are told
we are to believe
told to believe that
that this
this is
is not
not possible.
possible. We
We cover
cover

4
this in the Laws of Nature
Nature section and also provide many examples
throughout that show examples of natural
natural energetic phenomena
phenomena that
that
cant
can't be explained by the incomplete Laws of Physics.
Physics.

Misconception:
No one
No one has
has ever
ever successfully
successlidly demonstrated
demonstrated a device which produces
more energy than
more energy than is
is fed
fed into
into it.
it. If
I f anyone
anyone ever
ever did
did they
they would
would instantly
instantly
be a
be billionaire.
a billionaire.

Again
Again this
this is
is not
not true.
true. We
We cover
cover some
some of
of them
them in
in this
this book
book including,
including,
Stanley
Stanley Meyer, Paul Pantone,
Meyer, Paul Pantone, Bruce DePalma, and
Bruce DePalma, and Pons
Pons &
&
Fleischman. These inventors were ridiculed, threatened, and
and even
even
murdered
murdered in
in one case. Their
one case. Their inventions
inventions were
were silenced,
silenced, and
and they
they usually
usually
were
were made
made financially
financially destitute.
destitute.

Misconception:
Misconception:
IIff you believe any
you believe any of
of this
this stuff
stuff you
you are
are aa crazy, tin foil
crazy, tin M I hat-wearing
hat-wearing
conspiracy
conspiracy theorist.
theorist.

This
This is
is aa prime
prime example
example of
of social
social programming.
programming. Many
Many conspiracy
conspiracy
theories have been
theories have been recently
recently proven
proven to
to be
be conspiracy
conspiracy facts.
facts.
Nevertheless, most people
Nevertheless, most people just
just disregard
disregard many
many new
new technologies
technologies as
as
conspiracy theories. Governments
conspiracy theories. Governments and
and energy
energy companies
companies have
have spent
spent
decades, and billions
decades, and billions of
of dollars
dollars in
in social
social engineering
engineering programs
programs to
to
influence people. We
influence people. We cover
cover this
this in
in our
our sections
sections on
on JTRIG,
ITRIG,
COINTELPRO, Gangstalking and
COINTELPRO, Gangstalking and Electronic Harassment. Some
Electronic Harassment. Some of
of the
the
measures
measures that
that have been taken
have been taken are
are diabolical
diabolical to
to say
say the
the least.
least.

55
Energy
Energy Vocabulary Basics
Vocabulary Basics

In the world
In the world of
of free energy development,
free energy development, youll
you'll hear
hear aa lot
lot of
of terms
terms
tossed around. Here
tossed around. Here are
are aa few
few definitions
definitions to
to help
help you
you with
with some
some of
of the
the
basics:

Free
Free Energy
Energy
Free energy means
Free energy means energy
energy at
at no
no cost,
cost, like
like mechanical
mechanical energy
energy which
which
drives a wind
drives a mill, or
wind mill, or light
light in
in aa solar
solar cell
cell which
which is
is transformed
transformed into
into DC
DC
electric current. Energy
electric current. Energy from
from free
free sources
sources include
include wind,
wind, solar,
solar, water,
water,
atmospheric electricity, resonance
atmospheric electricity, resonance and
and mechanical
mechanical vibrations,
vibrations, earth
earth
batteries, chemical
batteries, chemical reactions, and pressure
reactions, and pressure system
system changes. These are
changes. These are
all ways of
all ways of generating
generating or
or accumulating
accumulating energy
energy that
that cannot
cannot be
be bought,
bought,
metered or sold.
Efficiency
Efficiency
Efficiency is the
Efficiency is the useful
useful energy
energy (output)
(output) from
from aa device,
device, over
over the
the energy
energy
that is put
that is put into the device
into the device (input).
(input). AAnd
n d if
i f you
you want
want to
to find
find the
the percent,
percent,
like this motor is 75% of ......
o orr this transformer is 95% efficient and
the energy efficiency,
the energy you would
efficiency, you use the
would use the following
following equation;
equation; it
it is
is

66
energy output over energy input times 100 percent.

Currently the systems we are using right now are extremely wasteful
and inefficient. For example, the average home backup generator
generator
requires 15kw worth
requires 15kw worth of
of power
power in
in (in
(in the
the form
form of
of gasoline
gasoline for
for example)
example)
in order to
in order generate 10kw
to generate 10kw of
of electrical
electrical power
power out.
out. Most
Most generators
generators
operate
operate at a loss.
at a loss. They
They are designed this
are designed this way
way in
in order
order to
to encourage
encourage the
the
consumption
consumption of
of fossil
fossil fuels.
fuels.

Planned Obsolescence
Planned Obsolescence
Planned obsolescence, or
Planned obsolescence, or built-in
built-in obsolescence,
obsolescence, is
is aa design
design policy
policy
followed
followed in
in big industrial manufacturing
big industrial manufacturing that
that gives
gives aa product
product aa planned
planned
artificially
artificially limited
limited useful
useful life.
life. This means the
This means the product
product will
will become
become
obsolete or unfunctional
obsolete or unfunctional after
after aa certain
certain period
period of
of time.
time. The
The logic
logic
behind
behind this strategy is
this strategy is to generate long
to generate long term
term sales
sales volume
volume by
by reducing
reducing
the time between
the time between repeat
repeat purchases. The result
purchases. The result is
is lower
lower quality
quality products
products
that
that just
just dont
don't last as long
last as as they
long as they should.
should.

They
"They just
just dont
don't build
build them
them like
like they
they used
used to
to" is
is aa term
term you
you hear
hear aa lot
lot
when
when it comes to
it comes to appliances
appliances and
and devices
devices that
that we
we depend
depend on
on in
in our
our
daily lives. In
daily lives. In truth
truth it
it would be more
would be more accurate
accurate to
to say
say They
"They dont
don't build
build
them
them like they should.
like they The technology
should." The technology exists
exists to
to build
build more
more efficient
efficient
and longer lasting
and longer lasting products.
products. Inefficient
Inefficient motors
motors is
is aa prime
prime example
example of
of
something
something that
that could
could be
be improved. However current
improved. However current corporate
corporate

77
structuring (that many customers feel is corrupt) wont
won't allow for
quality improvement to effect their profit margin.

mood
nogqi
seem on 0
.6ga onno

Outdated
Outdated cell phones are an example of
of planned
planned obsolescence
obsolescence

Overunity
Overunity
Overunity
Overunity simply means you
simply means get more
you get more energy
energy out
out than
than you
you put
put in,
in, the
the
scientific term meaning
scientific term meaning greater
greater than
than 1.
1. This
This is
is when
when the
the useful
useful energy
energy
output
output versus the useful
versus the useful energy
energy input
input is
is higher
higher than
than 100%.
100%. IIn
n physics
physics
(and elsewhere) unity
(and elsewhere) unity is
is another
another name
name for
for 1.
1. It
It is
is confused
confused with
with
perpetual motion
perpetual because the
motion because the idea
idea then
then is
is that
that you
you could
could connect
connect an
an
over-unity device's output
over-unity device's output to
to its
its input
input and
and then
then itit would
would run
run itself.
itself

Perpetual
Perpetual Motion
Motion
A hypothetical
A hypothetical machine
machine that
that can
can do
do work
work indefinitely
indefinitely without
without an
an
energy source (exists
energy source (exists in
in isolation)
isolation) often
often confused
confused with
with overunity.
overunity. The
The
theory
theory of
of such
such aa device
device is
is that
that it can exist
it can exist in
in isolation
isolation meaning,
meaning, it
it
operates on its
operates on its own
own without
without any
any additional external support
additional external support system.
system.

88
However it does access a reservoir of
of energy.
energy. IItt is not something
something that
that
is bound by a closed system.

COP over
COP over 1
1
The Co-efficiency of Performance
Performance is similar to overunity. IItt is the
same equation,
equation, basically.
basically. It's
It's normal to express the co-efficient as the
ratio of energy output to the
the energy input, so
so it's basically the
the same.
The examples
examples normally used deal with temperatures because this
equation was
was based
based on the efficiency of heat
heat pumps. What
What is well
well
known
known is
is that
that with
with the heat pumps
the heat you can
pumps you can get
get efficiency
efficiency over
over 1
1
regularly because you
regularly because you are
are not
not dealing
dealing with
with transferring
transferring that
that heat
heat from
from
one
one form
form into another, like
into another, like electrical.
electrical. With
With heat
heat pumps
pumps you
you are
are
measuring
measuring how
how much
much energy
energy you use to
you use create that
to create that heat,
heat, and
and using
using that
that
to heat other
to heat other parts
parts of
of your
your system.
system. Typical
Typical heat
heat pumps
pumps operate
operate from
from aa
source temperature of
source temperature of 5 degrees centigrade
5 degrees centigrade and
and are
are designed
designed for
for
heating
heating only a COP
only a COP of
of 3,
3, which
which is
is over
over 1. Whereas aa reversal
1. Whereas reversal machine
machine
of
of the same conditions
the same conditions would
would have
have aa COP
COP of
of 2.6. The point
2.6. The point is,
is, these
these
are
are co-efficient performance over
co-efficient performance over 1;
1; you
you put
put so
so much
much energy
energy in
in and
and
you get aa lot
you get lot of
of energy
energy in
in the
the form
form of
of heat
heat stored
stored that
that is
is being
being used
used for
for
that period of
that period of time.
time.

EMF
EMF and Back EMF
EMF

Electromotive
Electromotive force, also called
force, also called EMF,
EMF, is the voltage
is the voltage developed
developed by
by any
any
source
source of
of electrical energy, such
electrical energy, such as
as aa battery
battery or
or dynamo.
dynamo. It
It is
is defined
defined
as the electrical
as the electrical potential
potential for
for aa source
source in
in aa circuit.
circuit.

Back
Back EMF, also known
EMF, also as counter-electromotive
known as counter-electromotive force
force (CEMF),
(CEMF), is
is the
the

99
voltage, or electromotive force, that pushes against the current which
induces it. CEMF is the voltage drop in an alternating current (AC)
(AC)
circuit caused
caused by
by magnetic
magnetic induction.

The term
term back
back electromotive force, or just back-EMF, is commonly
used to refer to the
the voltage
voltage that occurs in electric motors where there is
relative motion between
relative motion between the
the armature
armature of
of the
the motor
motor and
and the
the magnetic
magnetic
field
field from
from the
the motor's
motor's field magnets, or
field magnets, or windings.
windings.

10
10
Early
Early Inventors
Inventors and Scandals
and Scandals

Asymmetrical
Asymmetrical and
and Symmetrical
Symmetrical Systems
Systems
The Laws of
The Laws of Physics are indeed
Physics are indeed the
the Laws
Laws of
of Physics. However, they
Physics. However, they
are not complete.
are not complete. Did
Did you
you know
know that
that fifty
fifty percent
percent of
of them
them have
have been
been
redacted?

In his ORIGINAL
In his ORIGINAL work:
work: The
'The Dynamical
Dynamical Theory
Theory of
of the
the
Electromagnetic
Electromagnetic Field,
Field', Maxwell
Maxwell identified
identified two
two separate
separate systems,
systems, both
both
of
of which
which were
were completely
completely different
different from
from each
each other:
other:

1) Asymmetrical system
1) Asymmetrical system -- an
an open
'open' system
system (solar
(solar panels,
panels, wind,
wind, those
those
types
types of
of things) that allows
things) that the creation
allows the creation of
of aa series
series of
of exchange
exchange of
of
energy
energy reaction
reaction to
to our
our inputs,
inputs, based
based on
on electromagnetic
electromagnetic resonance
resonance or
or
electromagnetic feedback in
electromagnetic feedback in every
every spin
spin (on
(on aa motor),
motor), or
or in
in every
every pulse
pulse
of
of input
input in a static
in a static coil. One of
coil. One of the
the first
first asymmetrical
asymmetrical motors
motors was
was
Faraday's
Faraday's Unipolar
'Unipolar Motor,
Motor,' later
later modified
modified by
by Nikola
Nikola Tesla.
Tesla. These
These
systems generate their
systems generate their own energy and
own energy and do
do not
not require
require fossil
fossil fuels.
fuels.

2)
2) Symmetrical
Symmetrical system aa closed
system 'closed' system
system that
that cancels
cancels the
the
electromagnetic resonance with
electromagnetic resonance with every
every spin,
spin, which
which creates
creates wasted
wasted

11
11
energy in the form of excess heat, and requires an additional energy
source to run, such as fossil fuels. These are the symmetrical obsolete
systems we
we use
use every day in all of our
our electrical appliances.

Solar panels
panels and
and wind power are examples
examples of open
open systems. These
These
systems have
have been
been available, but we've
we've been using outdated and
wasteful closed
wasteful closed systems.
systems. Closed
Closed systems
systems were
were built
built so
so that
that itit would
would
require fossil fuels
require fossil to run,
fuels to run, thus
thus controlling
controlling the
the supply
supply of
of power.
power.

12
12
Flight
Flight of
of the bumblebee
the bumblebee

Ralph
Ralph Ring is an
Ring is an innovative technician who
innovative technician who worked
worked with
with Otis
Otis T.
T. Carr,
Carr,
aa direct apprentice of
direct apprentice of Nikola
Nikola Tesla.
Tesla. In
In his
his presentation
presentation at
at the
the
Breakthrough
Breakthrough Energy
Energy Movement
Movement Conference,
Conference, (below)
(below) Mr.
Mr. Ring
Ring gives
gives
an amazing explanation
an amazing explanation of
of the
the flight
flight of
of the
the bumblebee:
bumblebee:

"Next
"Next to the larynx
to the larynx in
in the
the bumblebees
bumblebee's throat,
throat, there
there is
is aa tiny
tiny hollow
hollow
tube that acts
tube that acts as
as aa resonance
resonance cavity
cavity that
that accumulates
accumulates frequency.
frequency. When
When
the bee starts
the bee starts beating
beating its
its wings,
wings, it
it does
does this
this to
to accumulate
accumulate frequency
frequency
which bounces back
which bounces back and
and forth
forth in
in the
the resonator
resonator cavity
cavity until
until itit reaches
reaches
the same frequency
the same frequency of
of the earth, known
the earth, known as
as the
the Schumann
Schumann frequency.
frequency.
Once the bee
Once the bee reaches
reaches the
the same
same frequency
frequency as
as its
its surroundings
surroundings it
it evens
evens
out
out into what is
into what is known
known as
as zero
zero point. When anything
point. When anything reaches
reaches zero
zero
point
point you can then
you can then change the energy.
change the The bee
energy. The bee is
is now
now free
free from
from the
the
gravitational
gravitational influence around it,
influence around creates its
it, creates its own
own little
little magnetic
magnetic bubble
bubble
and hovers around.
and hovers around. There
There are some lizards
are some lizards and
and hummingbirds
hummingbirds that
that do
do
the same thing.
the same thing.

And
And if
if you see the
you see the way
way aa bee
bee flies
flies and
and the
the way
way aa hummingbird
hummingbird fly
fly it's
it's

13
13
almost magical. IItt doesn't sit there and exert tons of energy. The only
energy. The
reason why it's beating its wings is to make something vibrate inside to
change the
the magnetic field around itit so that itit can
can hover.

When
When you can tune
you can something to
tune something to vibrate at the
vibrate at the same
same frequency
frequency as
as the
the
earth and reach
earth and zero point,
reach zero point, you
you are
are freed
freed from
from the
the frequency
frequency influence
influence
of
of your
your environment and can
environment and can then
then change
change the
the energy
energy into
into anything
anything you
you
want, including
want, including levitation,
levitation, or
or electrical
electrical energy.
energy."

14
14
Patents
Patents and
and Solutions
Solutions


Eng E l l
ofk-J-.;,7..- a l a i = =ugh.
/ . N N N WEER STEVL
,m11,W&&m1E saw ut_W
/ r i n g ffi"A
B E IAWW.&
M
ElliTairtaa
Aww-t
11.10-1111,

The U.S. Patent


The U.S. Patent Office
Office classification
classification system
system

The U.S. Patent Office has a nine-member committee that


that screens
screens

patents
patents in
in order
order to protect national
to protect 'national security.
security.' Another
Another purpose
purpose of
of this
this
committee
committee is to find
is to find and
and remove
remove from
from public
public access,
access, energy-related
energy-related
patents
patents which
which could threaten the
could threaten the fossil
fossil fuel
fuel and
and power
power monopolies.
monopolies.
Anytime someone applies
Anytime someone applies for
for aa patent,
patent, it
it goes
goes through
through this
this screening
screening
process.
process. If
I f the device has
the device has anything
anything to
to do
do with
with the
the production
production of
of free
free
energy
energy they
they classify
classify it, confiscate it,
it, confiscate it, conceal
conceal it
it in
in aa vault
vault and
and forbid
forbid the
the
inventor to reproduce
inventor to reproduce it.
it.

15
15
Over 5,000
5,000 patents
patents censored
censored

By 1991, there
By 1991, there were
were 6,193 patent secrecy
6,193 patent secrecy orders issued, mostly
orders issued, mostly on
on
private citizens
private citizens and
and independent
independent inventors.
inventors. As the orders
As the orders need
need to
to be
be
renewed
renewed on a yearly
on a basis the
yearly basis the number
number of
of orders
orders has
has shrunk
shrunk over
over the
the
years. As of
years. As of today, there are
today, there are still
still over
over 5,000
5,000 patents
patents censored.
censored.

16
16
Energy Industry Suppression

Energy
Energy Industry
Industry Coverup
Coverup

Why, oh why
Why, oh why would anyone want
would anyone want to
to cover
cover up
up cheap
cheap energy
energy sources?
sources?
How can it
How can be covered
it be covered up?
up? Surely
Surely its
it's just a tinfoil-hat-crazy-nutty
just a tinfoil-hat-crazy-nutty
crazy
crazy whack-job conspiracy theory?
whack-job conspiracy Right?
theory? Right?

To understand the
To understand the bigger
bigger picture
picture lets
let's take
take aa look
look at
at the
the energy
energy industry
industry
as a whole.
as a Defined by
whole. Defined by mainstream
mainstream standards,
standards, the
the energy
energy industry
industry is
is
the
the totality
totality of
of all
all of
of the
the industries
industries involved
involved in
in the
the production
production and
and sale
sale
of
of energy, including fuel
energy, including fuel extraction,
extraction, manufacturing,
manufacturing, refining
refining and
and
distribution. Our society
distribution. Our society consumes
consumes large
large amounts
amounts of
of fuel,
fuel, and
and the
the
energy
energy industry
industry is a crucial
is a crucial part
part of
of the
the infrastructure and maintenance
infrastructure and maintenance
of
of society
society in
in almost
almost all countries.
all countries.

17
17
80 percent of every dollar is spent on energy
In addition to this, the price of fuel
fuel makes up the price structure of
of
every product and
and service we consume. When calculating this cost, the
price of energy makes
price makes up
up 80%
80% of every
every dollar we spend. Energy prices
underpin the entire
entire structure of aa societys
society's economy. If
I f suddenly
suddenly
individual people
people had
had free
free power and got back 80% of
of their
their income
income
required
required for
for energy
energy costs,
costs, it
it would change the
would change the paradigm
paradigm of
of the
the world
world
we live
we live in, and in
in, and in many
many ways
ways could
could collapse
collapse our
our society
society ifif itit happened
happened
too quickly. For
too quickly. For this reason, new
this reason, new innovations
innovations are
are planned
planned to
to roll
roll out
out
slowly
slowly to help ease
to help ease the
the shock.
shock. This
This is a long
is a long time
time battle
battle that
that has
has been
been
raging
raging for decades, that
for decades, that will
will hopefully
hopefully come
come to
to an
an end
end one
one day
day as
as the
the
old systems are
old systems are made
made obsolete.
obsolete.

- -YOU NEVERCHANGETHINGSBY
FIGHTINGTHEEXISTINGREALITY.
TOCHANGESOMETHING,BUILDA
NEWMODELTHATMAKESTHE
EXISTINGMODELOBSOLETE-
BUCKMINSTERFULLER

Attl, ,

18
18
More
More Alternative
Alternative Energy
Energy Technology
Technology

Nano Technology and


Nano Technology and Plasma
Plasma

Nanotechnology is
Nanotechnology is the
the study
study of
of matter
matter at
at an
an incredibly
incredibly small
small scale,
scale,
generally
generally between
between one and 100
one and 100 nanometers.
nanometers. The
The nanoscale
nanoscale is
is so
so tiny
tiny
that a sheet
that a sheet of
of paper
paper is
is about
about 100,000
100,000 nanometers
nanometers thick.
thick.

Uses
Uses for
for Nanotechnology
Nanotechnology include:
include:

-Water
-Water purification
purification methods
methods by
by removing
removing pollutants
pollutants from
from groundwater
groundwater
and soil.

-Creating more efficient


-Creating more efficient solar
solar panels,
panels, stronger
stronger lighter
lighter weight
weight wind
wind
turbines, lighter car
turbines, lighter car parts and improved
parts and improved fuel
fuel efficiency.
efficiency.

-Medical uses in
-Medical uses in the body for
the body for detecting
detecting and
and treating
treating conditions
conditions

19
19
-Weapons such as chemical and biological weapons, and also to create
shielding against such weapons.

-Electronics that are faster smaller, more


more portable and can
can store
store larger
larger
amounts of energy and
and information.

Buckyballs
Buckyballs

Bucky
Bucky balls
balls
Bucky balls are
Bucky balls are soccer
soccer ball shaped molecules
ball shaped molecules composed
composed entirely
entirely of
of
carbon and measuring
carbon and measuring approximately
approximately aa nanometer
nanometer in
in diameter.
diameter. They
They
are one of
are one of the many nanomaterials
the many that enable
nanomaterials that enable the
the innovations
innovations
described here.

Nano-coating
Nano-coating
Nano coating
Nano coating or
or nano
nano sealing
sealing is
is the
the result
result of
of an
an application
application where
where nano
nano
structures build a consistent network of
of molecules
molecules on aa surface of
of the
the
target object. This
target object. This is
is aa chemical
chemical process
process where
where the
the surface
surface can
can be
be

20
designed as:

hydrophobe/superhydrophobe
which means
means that
that liquids, which strike the surface are repelled and
flow away immediately

Or
Or

hydrophil/superhydrophil
hydrophilisuperhydrophil
which means that
which means that liquids,
liquids, which
which strike
strike the
the surface
surface build
build aa plain
plain film
film on
on
the surface and
the surface and mostly
mostly flow
flow away
away too.
too.

With metals, nano-coating


With metals, nano-coating is
is aa chemical
chemical process
process where
where sodium
sodium
hydroxide acts on
hydroxide acts on a
a metal
metal to
to produce
produce aa hydroxide
hydroxide of
of this
this metal.
metal. IIn
n
some cases it
some cases decomposes into
it decomposes into aa simple
simple oxide.
oxide.

Nano-Coating

Water drop takes


up dirt particles

Dirt particles

Nano-Coated
Surface

21
Plasma
Plasma

Plasma is a gas in which the outer


outer electrons are freed from any
particular atom. Plasma
particular Plasma is also the
the fourth state of
of matter
matter along with
your gas,
gas, solid,
solid, and
and liquid. The
The freed electrons can
can now
now move freely
and thus
thus create
create electrical
electrical conductivity. When
When electrons enter
enter an
an atom,
the atoms gain
the atoms gain energy.
energy. And
And then
then releases
releases energy
energy in
in the
the form
form of
of photons
photons
or
or light.
light.

Conducting
Conducting plasma
plasma produces
produces light. Plasma can
light. Plasma can be
be seen
seen when
when ::

-You contain the


-You contain the target gas in
target gas in aa low-pressure
low-pressure glass
glass vacuum
vacuum tube
tube and
and
apply
apply high voltage to
high voltage to charge
charge the gas, turning
the gas, turning it
it into plasma and
into plasma and light.
light.

-You charge the


-You charge the local atmosphere with
local atmosphere with aa high
high enough
enough voltage
voltage to
to see
see
visible plasma streams
visible plasma streams emitted
emitted from
from aa source
source of
of high
high voltage
voltage
(potential), i.e., aa Tesla
(potential), i.e., Tesla coil
coil top
top load.
load.

By
By this point, many
this point, many people
people have
have seen
seen what
what aa Tesla
Tesla coil
coil looks
looks like
like
when
when it's
it's discharging
discharging arcs, and those
arcs, and those arcs are plasma.
arcs are As
plasma. A s aa result,
result, there
there
should be a
should be a visible faint glow
visible faint glow in
in the
the darkened
darkened room and the
room and the distinct
distinct
smell
smell of
of ozone. There are
ozone. There are real
real physical
physical effects
effects that
that occur
occur in
in the
the
presence of
presence of plasma.
plasma.

22
Tesla
Tesla Coil
Coil Plasma
Plasma Example
Example

The
The following images are
following images are two examples of
two examples of plasma.
plasma. In
In the
the first
first
application, the person
application, the person is
is holding
holding the
the tip
tip of
of aa plasma
plasma torch,
torch, and
and is
is not
not
feeling any pain.
feeling any pain. How
How is
is this possible? Inside
this possible? Inside the
the torch
torch is
is aa piezo
piezo
electric resonator that vibrates so
so much, that there is an air flow
coming
coming from the back
from the back of
of the
the pen
pen to
to the
the tip. You
tip. Yo u see
see aa black
black cable
cable
around the tip
around the which charges
tip which charges the
the air as it's
air as it's coming
coming through
through that
that small
small
tube. What you
tube. What you get
get is a glowing
is a glowing plasma
plasma stream
stream emitted
emitted from
from the
the tip.
tip.
In the next
In the next photograph
photograph you can actually
you can see the
actually see the plasma
plasma discharging
discharging
onto the finger.
onto the finger.

23
Plasma
Plasma

The next image


The next image is a glass
is a glass plasma
plasma globe
globe that
that aa lot
lot of
of us
us have
have seen
seen in
in
novelty stores. TThis
novelty stores. is a
h i s is a classic example of
classic example of low
low pressure
pressure plasma
plasma
under a vacuum.
under a The gasses
vacuum. The gasses contained
contained within
within the
the glass
glass container
container
discharge when given
discharge when a high
given a high voltage
voltage potential.
potential.

Plasma Ball

24
Radiant Energy, Testa
Tesla Hair Pin Circuit, Spark Gaps, EM
EM field
field

Radiant energy is a form of energy


energy that is very different from your
standard form of electricity.
electricity. IItt is the energy of
of electromagnetic
electromagnetic waves,
aa form of energy that can
can travel through space. This makes
makes it very
difficult to
to measure
measure or meter,
meter, as
as it travels freely
freely through the air.

Each time electric


electric and
and magnetic forces come together
together they
they induce an
an
electromagnetic
electromagnetic field
field around
around them.
them. An
An example
example of
of electric
electric force
force is
is
when
when you get a
you get a shock
shock from
from touching
touching aa doorknob
doorknob after
after walking
walking across
across aa
carpet. Magnetic force
carpet. Magnetic force is
is the
the pull
pull that
that attracts
attracts metals
metals to
to aa magnet.
magnet.
When
When they
they combine
combine they
they produce
produce electromagnetic
electromagnetic waves
waves that
that travel
travel
through a vacuum.
through a vacuum. You
You cannot see the
cannot see the waves,
waves, but
but you
you can
can see
see their
their
effects.

An
An electromagnetic
electromagnetic field
field (also
(also EM
EM field)
field) is
is aa physical
physical field
field produced
produced
by
by electrically charged objects.
electrically charged objects. It
It is
is comprised
comprised of
of electrical
electrical and
and
magnetic potentials, and
magnetic potentials, and affects
affects the
the behavior
behavior of
of charged
charged objects
objects in
in the
the
vicinity
vicinity of
of the
the field. The electromagnetic
field. The electromagnetic field
field extends
extends indefinitely
indefinitely
throughout space and
throughout space and describes
describes the
the electromagnetic
electromagnetic interaction.
interaction.

There are different


There are different kinds
kinds of
of electromagnetic
electromagnetic waves
waves and
and all
all of
of them
them
have
have different wavelengths, properties,
different wavelengths, properties, frequency
frequency and
and power.
power. All
All of
of
them interact with
them interact with matter
matter differently.
differently.

25
THE ELECTROMAGNETIC SPECTRUM

Micro- I n f r a r e d Visible
Radio waves w a v e s radiation l i g h t X-rays G a m m a - r a y s

1 I t Or4.1Ly
1111111111111111111111111111111111WA
li H
i 111111111111mm
il n
il
1o3 1 1 o-3 1 o-7 l o g l o - " 1 0-13

Radiant
Radiant energy changes matter
energy changes matter when
when it comes into
it comes into contact
contact with
with it, this
it, this
is
is how
how microwaves
microwaves cook
cook food. Other ways
food. Other ways of
of detecting
detecting radiant
radiant energy
energy
is
is through
through fluorescent
fluorescent light
light bulbs. Fluorescent light
bulbs. Fluorescent light bulbs
bulbs work
work by
by
ionizing mercury vapor
ionizing mercury vapor in
in aa glass
glass tube, causing electrons
tube, causing electrons in
in the
the gas
gas to
to
emit photons at
emit photons at UV
UV frequencies. When radiant
frequencies. When radiant energy
energy comes
comes in
in
contact
contact with a fluorescent
with a fluorescent light
light bulb
bulb it
it lights up.
lights up.

26
Skin Effect
Skin Effect

An interesting phenomenon that happens when electricity is at


at high
high
frequencies (as
(as is the
the case
case with radiant energy and also AC energy) is
something called the skin effect.
effect. This
This is when high frequency currents
have aa tendency to flow near
near the outer
outer surface of
of an
an electrical
electrical
conductor, such as a metal wire. This also can
can be demonstrated on aa
human
human body, as Tesla
body, as Tesla was
was fond
fond of
of doing
doing in
in front
front of
of audiences
audiences of
of
astounded onlookers.

Spark
Spark Gaps
Gaps

A spark gap
A spark is aa space
gap is space between
between electrical
electrical terminals
terminals across
across which
which aa
transient discharge passes.
transient discharge passes. Something
Something unique
unique about
about spark
spark gaps
gaps is
is that
that
when this discharge
when this discharge occurs,
occurs, it
it is
is producing
producing aa wide
wide range
range of
of different
different
electromagnetic waves or
electromagnetic waves or frequencies
frequencies at
at the same time.
the same time. IIn
n rare
rare
instances and under
instances and under the
the right
right conditions, spark gaps
conditions, spark gaps may
may generate
generate
green sparks, indicating
green sparks, indicating that
that they
they are
are pulling
pulling in
in energy
energy from
from the
the
atmosphere. Tesla used
atmosphere. Tesla used spark
spark gaps
gaps in
in aa lot
lot of
of his
his inventions
inventions as
as he
he was
was
working
working with
with radiant
radiant energy.
energy. A
A spark
spark gap
gap transmitter
transmitter is
is aa radio
radio
transmitter
transmitter circuit
circuit with a spark
with a spark gap
gap on
on it. They are
it. They are illegal
illegal in
in aa lot
lot of
of
countries because they
countries because they are so effective
are so effective that
that they
they interfere
interfere with
with radio
radio
transmissions.

27
LEYDEN . 1 R 5
TUN/MG COlL
MP'
TOE
gtR
I

1;y0 TELEGRAPH KEY

Teslas
Testa's Hairpin Circuit
Hairpin Circuit
Tesla studied radiant
Tesla studied radiant energy
energy and
and built
built aa simple
simple circuit
circuit that
that would
would
generate radiant energy
generate radiant energy so
so its
its effects
effects could
could be
be easily
easily demonstrated.
demonstrated.
This circuit goes
This circuit goes against
against everything
everything weve
we've been
been taught
taught about
about
electricity.
electricity.

Also called
Also called 'Stout
Stout Copper
Copper Bars, the device
Bars,' the device creates
creates standing
standing waves
waves
which separate
which separate the
the magnetic
magnetic component
component and
and the
the dielectric
dielectric component
component
of
of electricity
electricity from
from each other. The
each other. The dielectric nodes of
dielectric nodes of electricity
electricity can
can
then be used
then be used to
to light
light all manner of
all manner of light bulbs in
light bulbs in very
very unconventional
unconventional
fashions, one of
fashions, one of which includes lighting
which includes lighting an
an incandescent
incandescent bulb
bulb that
that can
can
then be safely
then be safely submerged
submerged in
in water
water (cant do that
(can't do that with
with standard
standard electric
electric
current). This form
current). This form of
of energy can open
energy can open aa whole
whole new
new range
range of
of
phenomena and technological
phenomena and technological applications.
applications.

28
6 - B.?

ir

nos, 1 8 3 1 1 and 183c


Tesla
Testa Hairpin
Hairpin Circuit
Circuit

29
Hairpin circuit with light submerged
submerged in water
water

30
Current Large Scale Suppression Tactics

Gangstalking
Gangstalking

How does COINTELPRO


How does COINTELPRO apply
apply to
to gangstalking
gangstalking and
and those
those who
who are
are on
on
multiple blacklists today?
multiple blacklists today? There
There is a historical
is a historical record
record of
of this
this happening
happening
as a western
as a western phenomenon
phenomenon during the height
during the height of
of the
the Cold
Cold War
War as
as aa
means to covertly
means to covertly suppress
suppress the
the social
social change
change that
that was
was occurring
occurring in
in the
the
height
height of
of the
the Vietnam
Vietnam War. Now
War. N o w we
we have
have aa similar
similar situation
situation today,
today, but
but
it's a lot
it's a more dangerous
lot more dangerous II believe
believe because
because we're
we're in
in aa post-911
post-911 world
world
where for almost two decades it's been about the 'War on
on Terror'.
Terror'.

We've seen an
We've seen an erosion
erosion of
of civil
civil liberties and civil
liberties and civil rights
rights in
in the
the western
western
world. We live
world. We live in
in aa time
time of
of technology,
technology, of
of internet
internet hacking
hacking and
and
surveillance tools that
surveillance tools that are
are far
far beyond
beyond what
what existed
existed in
in the
the 50's,
50's, and
and
certainly
certainly in the 70's.
in the 70's.

And that's where


And that's where we are today.
we are today. Either
Either it's
it's the
the war
war on
on terror
terror or
or the
the
economic crisis, etc.
economic crisis, etc. IItt appears
appears there
there is
is aa program
program of
of distraction
distraction that
that
must persist. AAnd
must persist. this is
n d this is where
where we
we get
get into
into gangstalking.
gangstalking.

31
Gangstalking is by its very nature COINTELPRO, with an
an electronic
electronic
database that blacklisted the target (making it COINTELPRO 2.0).
Today if you research the origin of
you research of the
the word gangstalking there are
some within the
the online
online community
community who will say it's not the
the proper
proper
term. Some
Some researchers
researchers of this phenomenon suggest that it should be
this phenomenon be
called covert
covert war or something else. The
The reasoning is that the term
'gangstalking'
'gangstalking' has been co-opted
has been and ifi f anyone
co-opted and uses that
anyone uses that term
term it's
it's
disinformation. II don't think so. What
What I know is that in 2014, II was
put under
put under surveillance and my
surveillance and my electronic
electronic torture began. This
torture began. This was
was done
done
without my
without my consent
consent and
and II don't
don't appreciate
appreciate it. Gangstalking was
it. Gangstalking was the
the
word
word II found
found online that described
online that described the
the system
system II was
was placed
placed under,
under, thus
thus
seems to be
seems to be the
the word that everyone
word that everyone had been using
had been using up
up to
to that
that point.
point.

I've read the


I've read the testimonials
testimonials of
of the persecuted who
the persecuted who were
were placed
placed in
in this
this
program before
program me, and
before me, and they
they used
used the
the word
word 'gangstalking'. So, I'm
'gangstalking'. So, I'm
sticking
sticking with that. Like
with that. Like the
the COINTELPRO
COINTELPRO program
program of
of the
the past,
past, it
it is
is
meant to discredit
meant to discredit the
the target
target and
and to also possibly
to also possibly recruit
recruit others
others to
to
participate. NNow
participate. as II mentioned
o w as mentioned earlier, targets can
earlier, targets can be
be whistleblowers,
whistleblowers,
and good Samaritans.
and good Samaritans. Maybe
Maybe you're
you're researching
researching cancer
cancer cures,
cures, or
or
engaged
engaged in an alternative
in an alternative energy
energy project. Perhaps you
project. Perhaps you fit
fit in
in aa couple
couple of
of
the
the following categories; minorities,
following categories; minorities, artists,
artists, activists, and any
activists, and any other
other
from
from aa large
large group
group of
of people
people who have been
who have been labeled
labeled as
as aa domestic
domestic
threat and aa deplorable.
threat and deplorable.

Once someone is
Once someone is blacklisted
blacklisted and placed into
and placed this program,
into this program, aa covert
covert
investigation is then
investigation is then performed
performed which
which may
may take
take months
months or
or years.
years.

32
Through covert or overt surveillance, everything about your life
life is
black-holed. Your online social activities, sexual
sexual habits, employment,
friendships, family ties and finances are all monitored, To make
make things
things
worse, aa corrupt psychological
psychological profile and false record
record is
is made
made that
that
follows you
you everywhere you go. Could this be one of
of the
the main reasons
some spy
spy agencies eagerly
eagerly want to collect too much data
data on
on everyone?
The power of
The power of coercion
coercion and
and blackmail
blackmail is
is too
too tempting
tempting to
to let
let go.
go. It's
It's well
well
known
known that the very
that the same agencies
very same agencies intentionally
intentionally engineer
engineer 'backdoors'
'backdoors'
in electronic consumer
in electronic consumer products
products to
to covertly
covertly eavesdrop
eavesdrop on
on
conversations and video
conversations and video feeds.
feeds. The
The data
data collected
collected could
could also
also be
be hi-
hi-

jacked by
jacked by criminal
criminal organizations
organizations using
using the
the same
same if
if not
not better
better remote
remote
hacking
hacking equipment
equipment than
than those
those government
government intelligence
intelligence organizations
organizations
that
that claim
claim to be spying
to be spying for
'for your
your safety. A savvy
safety. A savvy criminal
criminal cyber
cyber team
team
could then take
could then take the
the data
data collected about you
collected about and use
you and use itit as
as aa tool
tool for
for
extortion and blackmail.

In addition, this
In addition, this black
black record
record is used to
is used to fabricate
fabricate aa script.
script. Hired
Hired
perpetrators
perpetrators (who've
(who've committed
committed this
this script
script to
to memory) use itit to
memory) use to create
create
aa smear
smear campaign
campaign about
about you
you to
to your
your neighbors,
neighbors, your
your friends,
friends, your
your co-
co-
workers, etc. II can
workers, etc. can tell
tell you
you first
first hand
hand that
that itit isn't
isn't very
very pleasant
pleasant when
when aa
group
group of
of people spread rumors,
people spread rumors, slander
slander and
and bare
bare false
false witness
witness against
against
you.
you. All the while,
All the you're being
while, you're being tortured
tortured and harassed.
and harassed.

Imagine the following


Imagine the scenario: You've
following scenario: You've lived
lived in
in aa neighborhood
neighborhood for
for aa
few years, and
few years, and for
for the
the most
most part, are comfortable
part, are comfortable with
with the
the
environment.
environment. You
You also are an
also are an active
active anti-war
anti-war protestor,
protestor, and
and recently
recently

33
you were interviewed by a local television station about the latest
scandal pertaining to the government war budget. A
A few weeks later,
you notice that
that there's
there's a
a shift. Random
Random people start giving you strange
stares for no reason
reason at all. You
You notice when youre
you're walking down the
street, scenarios
scenarios seemed
seemed to be
be setup in front of
of you
you in order
order to illicit aa
response in public.

Someone
Someone might
might act
act out
out in
in front
front of
of you
you and
and start
start aa fight
fight or
or aa similar
similar
situation
situation that
that you
you want
want to
to take
take no
no part
part in. Disengage and
in. Disengage and avoid
avoid it.
it.
Friends that you
Friends that knew for
you knew for years
years all
all of
of aa sudden
sudden stop
stop communicating
communicating
with you.
with you. Or
Or you
you might
might find
find yourself
yourself at
at work
work and
and the
the people
people in
in the
the
environment
environment distance themselves from
distance themselves from you. Basically, the
you. Basically, the end
end result
result is
is
aa virtual
virtual isolation
isolation control
control grid that's created
grid that's created around
around you.
you. For
For many
many
people who
people who are
are targeted,
targeted, it
it might
might just
just stop
stop there,
there, however,
however, it
it can
can go
go
much
much farther
farther for
for others. This requires
others. This some physical,
requires some physical, trackable
trackable
information
information about
about you
you in
in order
order for
for it
it to
to go
go into
into full
full blown
blown electronic
electronic
harassment.

It is possible
It is possible some
some of
of these
these individuals are selected
individuals are as an
selected as an experiment
experiment to
to
study the human
study the human psyche under constant
psyche under constant duress. Perhaps in
duress. Perhaps in preparation
preparation
for some future
for some future attempt
attempt to
to directly
directly manipulate
manipulate aa large
large swathe
swathe of
of the
the
population? IIn
population? n my
my opinion, however, it
opinion, however, seems some
it seems some of
of these
these people
people
were made targets
were made targets simply as aa means
simply as means of
of removing
removing them
them from
from society
society
without the
without the perpetrators
perpetrators getting
getting their
their hands
hands dirty.
dirty. It
It is
is indeed
indeed aa very
very
seductive
seductive social
social engineering
engineering tool.
tool.

As
As II mentioned
mentioned previously, there is
previously, there is an
an intended
intended outcome
outcome for
for one's
one's

34
gangstalking and covert harassment. Thankfully,
Thankfully, there are solutions to
this, and your life doesn't have to end according to any of
of their
their
'scripts.' Knowing the intended outcomes of this
this heinous program is
the first step
step towards empowerment. As an
an empowered
empowered individual,
individual, you
you
can then take the
the necessary
necessary steps
steps to avoid the
the traps these monsters
have laid.
laid. The
The name
name of their
their game is to utterly crush your free will
will
while destroying you
while destroying mind, body
you mind, body and
and spirit. Eventually, they
spirit. Eventually, they want
want one
one
or
or more
more of
of the
the intended
intended outcomes:
outcomes:

To create aa violent
To create violent reaction
reaction within
within the
the target,
target, leading
leading to
to aa
criminal
criminal offense and imprisonment.
offense and imprisonment. This
This program
program in
in theory
theory
could be used
could be used to
to socially
socially engineer
engineer an
an un-awakened
un-awakened populace,
populace,
thus perpetuate the
thus perpetuate need for
the need for aa police state in
police state in reaction
reaction to
to aa
growing
growing 'domestic threat'. Later,
'domestic threat'. Later, we
we will
will discuss
discuss how
how
technology
technology is
is currently
currently being
being deployed
deployed to
to try
try to
to remotely
remotely
program
program individuals placed in
individuals placed in this
this program,
program, turning
turning them
them into
into
Manchurian Candidates.

Repeat
Repeat incarceration
incarceration of
of the
the targeted
targeted person
person due
due to
to minor
minor
offenses, leading to
offenses, leading to professional
professional and
and financial
financial ruin.
ruin. Most
Most likely
likely
this person was
this person was psychologically
psychologically triggered
triggered prior
prior to
to committing
committing
the offense. Corrupt
the offense. Corrupt law
law enforcement
enforcement officers
officers may
may also
also be
be
involved
involved in
in the setup to
the setup the arrest.
to the arrest.


TTo force or
o force or coerce
coerce detention
detention in
in aa psych
psych ward.
ward. A
A victim
victim of
of
Voice-to-Skull
Voice-to-Skull technology
technology is
is encouraged
encouraged to
to seek
seek 'professional
'professional

35
help' ifif they tell acquaintances, friends or family
family that they
they hear
hear
voices. They are often misdiagnosed as suffering from
schizophrenia, even
even though there isn't any history of
of this
this
mental illness in the family
family (very important
important consideration). In
fact, you will soon
soon discover why the medical profession
profession is
is
woefully inadequate
inadequate to get
get to the root of
of the
the problem. The next
subsection
subsection in
in this
this book
book gives
gives aa summary
summary of
of the
the current
current state
state of
of
electronic harassment and
electronic harassment and ways
ways to
to dramatically
dramatically weaken
weaken ifif not,
not,
completely
completely eliminate
eliminate the signal' response
the 'signal' response by
by the
the human
human body
body
entirely.
entirely.

Induced Suicide. Physically,


Induced Suicide. Physically, mentally
mentally and
and spiritually
spiritually crushed,
crushed,
depression
depression and
and financial
financial ruin
ruin compels
compels the
the victim
victim to
to commit
commit
suicide
suicide (WHICH
(WHICH IS
IS THE
THE PRIME
PRIME MOTIVE
M O T I V E OF
OF THIS
THIS
COINTELPRO 2.0 PROGRAM).
COINTELPRO 2.0 PROGRAM). If
I f the
the victim
victim dies,
dies, this
this
form
form of
of assassination
assassination is
is also
also called
called 'soft
'soft kill.'
kill.' Directed
'Directed Energy
Energy'
may
may also have been
also have been used
used to weaken the
to weaken the body
body and
and trigger
trigger the
the
heart muscle to
heart muscle beat irregularly.
to beat We must
irregularly. We must also
also ask
ask ifif the
the person
person
had a pace
had a pace maker
maker or
or electronic
electronic implant
implant during
during the
the time
time of
of
death.

If
I f you are ever
you are ever targeted and put
targeted and put in
in this
this program,
program, remember
remember the
the
previous prescribed
previous prescribed paths to destruction
paths to destruction are
are only
only what
what these
these
psychopaths wish
psychopaths wish of
of you.
you. It
It doesn't
doesn't mean
mean it
it will
will manifest.
manifest. In
In fact,
fact,
ignore any and
ignore any and all
all negative suggestions that
negative suggestions that you
"you cannot
cannot win
win" or
or
you'll never get
"you'll never get out
out of
of 'The
'The Program.'
Program.' " Yo
Youu must
must understand
understand its
it's

36
important for the covert types to isolate you from your friends and
family. This is very important! Do not allow yourself
yourself to
to become
isolated! But rather, become more visibly active and document all
all
unusual events.
events. Form
Form tight knit, long
long enduring
enduring relationships starting
starting
with strengthening your spiritual
spiritual relationship with The Creator. You
will need
need aa spiritual foundation. There
There is more information on what
you can do
you can do to help reduce
to help reduce or
or eliminate
eliminate your
your persecution
persecution after
after we
we cover
cover
Electronic Harassment.
Electronic Harassment.

We
We will
will now end this
now end this chapter
chapter with
with the
the testimonial
testimonial of
of aa family
family that
that lived
lived
in a neighborhood
in a that was
neighborhood that engaged in
was engaged in an
an organized
organized gangstalking
gangstalking
campaign. Members in
campaign. Members in the
the neighborhood
neighborhood started
started aa horn
horn blowing
blowing
campaign at all
campaign at hours around
all hours around the
the property
property of
of the
the targeted
targeted family
family after
after
there was aa dispute
there was dispute with
with one
one of
of the
the longtime
longtime residents
residents of
of the
the
community. This resident
community. This resident happened
happened to
to also
also be
be the
the Fire
Fire Chief
Chief of
of the
the
town
town fire
fire department.
department.

37
Energy
Energy Weapons
Weapons

Electronic Harassment
Electronic Harassment

Were going to
We're going to move
move into
into Electronic Harassment. Specifically,
Electronic Harassment. Specifically, we
we
will discuss
will discuss the
the underlying
underlying infrastructure
infrastructure that
that enables
enables this
this population-
population-
destroying
destroying platform
platform to operate. It
to operate. It is
is important
important to
to understand
understand that
that what
what
we are dealing
we are dealing with
with is a de-centralized
is a de-centralized technological
technological network
network that
that is
is
covertly managed by
covertly managed by both
both state
state and
and non-state
non-state entities
entities -- the
the genre
genre of
of
which is the
which is the result
result of
of both
both Nikola
Nikola Teslas
Tesla's technology,
technology, and
and Nazi
Nazi and
and
Cold
Cold War
War government research.
government research.

In the military
In the military industrial
industrial complex
complex playing
playing field,
field, directed
directed energy
energy
hardware and research
hardware and research and
and development
development is expensive, yet
is expensive, yet highly
highly
funded. Hence, buyers
funded. Hence, buyers of
of the
the technology
technology we
we are
are about
about to
to describe
describe tend
tend
to be governments,
to be corporations, well
governments, corporations, well backed
backed private
private foundations,
foundations, and
and
other secret organizations.
other secret organizations. In
In the
the black
black market,
market, it's
it's the
the platform
platform of
of
choice
choice for despots, well-funded
for despots, well-funded fascist
fascist movements, and contracted
movements, and contracted hit
hit
squads. In many
squads. In many countries, this has
countries, this has resulted
resulted in
in the
the rise
rise of
of judicial-
judicial-

38
usurping criminal fascist mafias that roam throughout society,
society,
removing and culling political opponents, whistle-blowers, and other
lawful citizens.
lawful citizens.

The weapons
weapons deployed
deployed are silent and can be hidden away from the
target (as
(as are
are its operators).
operators). Unchecked,
Unchecked, the opening of
of this
this seductive
Pandora's box will
Pandora's box will lead
lead to the collapse
to the collapse of
of nations
nations and
and economies,
economies,
create
create civil wars, and
civil wars, and eventually
eventually global
global conflicts. So its
conflicts. So it's really
really all
all
connected.
connected.

V2K Patents

Reading testimonies like


Reading testimonies like this
this makes
makes it very real!
it very real! W
When
h e n you
you find the
find the
patents to these
patents to these devices,
devices, you'll
you'll see
see aa lot
lot of
of block diagrams and
block diagrams and just
just aa
general basic schematic
general basic schematic because
because that
that 'idea'
'idea' would
would be
be implemented
implemented in
in
all kinds of
all kinds of platforms.
platforms.

U.S. P a t e n t 4 8 7 7 0 2 7 O c t o b e r 31, 1 9 8 9
P a t e n t I s s u e d To Wa y n e B. B r u n k a n

FM
AUDOI CAPABLE (18 MC
I ROWAVE
INPUT PULSE GENERATOR
GENERATOR
10 11
16 1
142
22
VOLTAGE COMPARATOR
STANDARD
.N1
Microwave Hearing Via Broadcast
Not A T h e o r y

39
Silent Sound S ubliminal Mind Control
S t e a d y tone, n e a r the A p u t p u t is n o w
h i g h e n d o f the h e a r i n g m o r e o r less a
r a n g e , s a y, 1 5 , 0 0 0 H z steady tone,
s o u d i n g like
tinnitus, b u t
1 LJJ with hypnosis
embedded
LI
4 5
2 H y p n o t i s t ' s
89 , Brain can h e a r
voice & understand
Voice, v a r y i n g
from, say, 3 0 0 H z
liar]
to 4,000 Hz

mic.r
2
cykr)
LI-
5
Ear only
hears a "tone"
5D
or "buzzingiringing"
Output can be via open air broadcast or piggybacked on -TV/radio signals
U.S. P a t e n t 5 1 5 9 7 0 3 i s s u e d O c t 27, 1 9 9 2

This next patent


This next patent shows
shows two
two different
different microwave
microwave frequencies
frequencies to
to get
get
sound and voice.
sound and voice. AAnd
n d the
the effects are that
effects are that you
you can
can get
get hearing
hearing or
or you
you
hear a ringing
hear a or buzzing
ringing or buzzing in
in your
your actual
actual physical
physical ear
ear even
even though
though the
the
noise thats taking
noise that's taking place,
place, the
the perceived noise is
perceived noise is inside
inside your
your brain.
brain.

Tom Bearden is
Tom Bearden is aa retired
retired army
army Lieutenant
Lieutenant Colonel
Colonel and has managed
and has managed aa
website at http://www.cheniere.orgi.
website at http://www.cheniere.org/. This
This website
website has
has been
been active
active since
since
the early internet.
the early internet. He
He was
was one
one ooff the
the first
first people
people to
to talk
talk about
about this
this
technology and its
technology and its effects
effects on
on free
free energy.
energy. W
What youre looking
h a t you're looking at
at in
in
the diagram (below)
the diagram (below) is
is how
how you
you can
can mix
mix electromagnetic
electromagnetic fields
fields tto
o
create effects that
create effects that are
are like
like sound
sound waves,
waves, or create things
or create things like changes
like changes
in temperature and
in temperature and pressure
pressure iin the volume
n the volume ooff space
space where
where they
they
intersect. Very interesting
intersect. Very interesting indeed!
indeed!

40
/ t
S C A L A R
X M TR # 1
V E C T O R
E N E R G Y Z O N E
lif
( E N E R G Y B O T T L E )

S C A L A R S C A L A R
I N T E R F E R O M E T E R X M T R

C A N BE F O C U S E D T O A S P E C I F I C D E P T H
IN THE E A R T H . THE OCEAN. O R I N S I D E
AN ENCLOSURE.

SCALAR
RCAIR,ANITIVI
[SCAN

SNALL
I N E G A T I V E
V S I A S / TARGET
TRACTION
ZONE

SC . . . . . SMALL
I N 1 - t m r e n e N C t S C R E E N N E G AT I V E
BIAS
S C A L A R

In this diagram
In this diagram you
you have
have the
the shaded
shaded region
region where
where the
the beams
beams intersect.
intersect.
This is the
This is the space
space that
that is
is affected.
affected. SSo within this
o within this space
space you
you can
can have
have
special electromagnetic phenomenon
special electromagnetic phenomenon occur
occur such
such as
as sound,
sound, changes
changes in
in
electrical pressure and/or
electrical pressure and/or temperature.
temperature. YYou can have
o u can have all
all kinds
kinds ooff
effects depending on
effects depending on what
what power
power and
and pairs
pairs of
o f frequencies you apply.
frequencies you apply.
Now imagine
Now imagine that
that the
the transmitters
transmitters 11 and
and 22 iin this diagram
n this diagram are
are two
two
different cell towers.
different cell towers. IIff you
you had the means
had the means of
of controlling
controlling aa signal
signal from
from
two or more
two or more such
such microwave
microwave sources,
sources, imagine
imagine what
what you can do
you can with
do with
the technology. This
the technology. This is
is basically
basically outlining
outlining the
the general
general idea
idea behind
behind that.
that.

41
Solutions
Solutions

Whew! Thanks for


Whew! Thanks for hanging
hanging in
in there
there with us. Its
with us. It's aa lot
lot of
of really
really ugly
ugly
stuff, but like
stuff, but like II said
said in
in the
the beginning, theres real
beginning, there's real things
things you
you can
can do
do to
to
protect yourself.
protect As hinted
yourself As hinted in
in the
the previous
previous chapter, those suffering
chapter, those suffering
from aerosol based illness and electronic harassment have aa common
enemy. They represent
enemy. They represent the
the tip
tip of
of the
the spear
spear of
of what
what will
will be
be aa growing
growing
trend
trend of
of afflictions and persecution
afflictions and persecution thrusted
thrusted upon
upon an
an awakening
awakening public.
public.
Fortunately, its now
Fortunately, it's now being
being realized
realized that
that there
there is
is indeed
indeed aa common
common
enemy
enemy to the human
to the human condition
condition and
and life as aa whole.
life as whole. We
We want
want to
to give
give
you a high-level
you a high-level perspective
perspective of
of where
where things
things are
are headed,
headed, and
and know
know
where, and how
where, and how to
to look
look for
for answers.
answers. You
You dont
don't have
have to
to be
be afraid
afraid of
of
these things. They
these things. They exist
exist but
but we
we can
can beat
beat them. So lets
them. So let's talk
talk about
about some
some
solutions.

42
A
A Word of Encouragement
Encouragement

To Targeted Individuals (TIs) &


& victims of Electronic
Electronic Harassment

For those who are targeted with electronic harassment, ignore/dismiss


'inserted' threats,
threats, fears
fears and
and negative
negative thoughts. Anyone
Anyone whos being
who's being
electronically harassed understands
electronically harassed understands that
that this
this is
is aa daily
daily battle. To be
battle. To be aa
victim
victim of
of energy
energy direct
direct V2K
V2K is
is something
something that
that Id
I'd never
never wish
wish on
on
anyone to experience.
anyone to experience. Threats
Threats and
and fear
fear is
is meant
meant to
to ultimately
ultimately destroy
destroy
you
you mentally
mentally and
and spiritually
spiritually from
from the
the inside
inside out.
out. Dismiss
Dismiss them.
them.

When
When you
you feel depressed, or
feel depressed, or are
are receiving
receiving what
what II call
call signals,
'signals,'
(technically
(technically they're
they're not
not really
really voices,
voices, they're
they're signals),
signals), understand
understand that's
that's
all they are.
all they are. They
They are
are suggestions
suggestions that
that block
block your
your mind
mind from
from engaging
engaging
in things that
in things that you
you like
like to do in
to do in this
this world.
world. If
I f you
you feel
feel that
that you're
you're out
out in
in
public and you
public and you have
have someone
someone coming
coming to
to you
you in
in aa certain
certain way
way to
to elicit
elicit aa
certain response, stop
certain response, stop and recognize what
and recognize what that
that might
might be.
be. Try
Try not
not to
to
give
give them
them too much attention
too much attention but
but instead
instead collect
collect evidence
evidence and
and post
post on
on
online. Tell your
online. Tell your story, and reprove,
story, and reprove, rebuke,
rebuke, expose
expose this
this fraud.
fraud.
Remember, these are
Remember, these are perverts
perverts for
for spying
spying on
on you
you and
and invading
invading your
your
privacy. Take photos
privacy. Take photos and
and videos
videos of
of suspicious
suspicious activities
activities and
and build
build aa
case file. It's
Its a lot of time
time and effort but worth it.

If
I f you have the
you have the budget, you can
budget, you can also
also resort
resort to
to surveillance
surveillance equipment
equipment
to record the
to record the citizen
citizen stalking.
stalking. It
It can
can be
be expensive,
expensive, but
but that's
that's basically
basically
what people have
what people had to
have had to resort
resort to
to in
in order
order to
to prove
prove their
their case.
case. Continue
Continue
to research ways
to research ways of
of gathering
gathering more
more technical
technical evidence
evidence of
of your
your

43
electronic harassment, and hire your own investigator. Join the
research to find ways to attenuate the electromagnetic effects upon
upon
yourself and your family, and
and share with the online and
and local TI
community.

Continue to
to do
do the
the things in your life that
that make you happy. You
You must
make this aa conscious
make this conscious decision
decision daily
daily to
to help
help reprogram
reprogram your
your mind.
mind.
And also
And also the
the more
more you do this
you do this you're
you're also
also learning
learning how
how to
to cope
cope with
with
these negative suggestions,
these negative suggestions, you
you will
will gain
gain an
an internal
internal strength
strength you
you
didn't realize was
didn't realize was in
in you.
you.

Daily
Daily remind
remind yourself
yourself that
that you
you are
are aa human
human being,
being, wonderfully
wonderfully and
and
fearfully made. If
fearfully made. I f you are aa TI,
you are you probably
TI, you probably also
also understand
understand the
the
power of
power of prayer.
prayer. If
I f youre a victim
you're a victim of
of this
this stuff,
stuff, there
there are
are times
times you
you
feel
feel like
like youre
you're losing
losing your
your mind. Regardless of
mind. Regardless of what
what belief
belief system
system or
or
religious background you
religious background you may
may come
come from,
from, prayer
prayer in general is
in general is
extremely
extremely effective
effective to combat this
to combat this kind
kind of
of attack. We, too,
attack. We, too, have
have been
been
through some tough
through some tough times, where Im
times, where I'm with
with Tivon
Tivon and
and hes
he's been
been
undergoing an attack
undergoing an attack of
of sorts and we
sorts and we stop
stop and
and pray
pray together
together and
and that
that
stops the attacks.
stops the attacks. Just
Just know
know that
that ultimately,
ultimately, God
God is
is your
your source.
source.

There are also


There are also support
support groups out there
groups out there (both
(both brick
brick 'n'
'n' mortar
mortar and
and
online). Find one
online). Find one and
and join. Have aa close
join. Have close friend
friend or
or partner
partner in
in your
your
journey. That's
journey. Thats really
really helpful because trying
helpful because trying to
to tell
tell others
others that
that youre
you're
being electromagnetically
being tortured, and
electromagnetically tortured, and they
they dont
don't support
support you,
you, is
is
really hard to
really hard to deal
deal with. So try
with. So try to
to find
find aa good
good friend
friend that
that gets
gets it,
it, and
and
that you can
that you can talk
talk to.
to.

44
In truth,
truth, the
the operators
operators who
who are
are iin these programs
n these programs tend
tend tto not do
o not do
anything more
more than
than t the occasional surveilling
h e occasional surveilling (the
(the platform
platform iis
s
Artificial Intelligence
Intelligence based), and will not overtly project themselves
themselves
too much
much or
or else
else then
then the
the budget
budget grows.
grows. Remember,
Remember, there
there is always
always a
a
budget! So,
So, iiff you
you ever
ever do
do become
become targeted,
targeted, make
make sure
sure you
you it
it very
very
expensive for
for them.
them. Te
Tell others to
l l others to do
do the
the same.
same. Some
Some consortium,
consortium,
foundation or government
foundation or government has
has put
put aa lot
lot of
o f money
money in this program
in this program to
to
find ways to
find ways to break
break the
the human
human psyche
psyche and
and ruin
ruin people's
people's lives.
lives. IItt is
is our
our
goal
goal to make sure
to make sure that
that you are given
you are given knowledge and the
knowledge and the tools
tools to
to live
live aa
long and fruitful
long and fruitful life,
life, and
and that
that you
you Choose
Choose Life.
Life. LLet's expose these
e t ' s expose these
criminals for what
criminals for what they
they are. Lets beat
are. Let's beat this
this leviathan
leviathan together!
together!

45
Orgone Energy

Wilhelm Reich was


Wilhelm Reich was an
an Austrian
Austrian psychoanalyst.
psychoanalyst. Author
Author ooff several
several
influential books, mmost
influential books, notably Character
o s t notably Character Analysis,
Analysis, TThe Mass
h e Mass
Psychology ooff Fascism
Psychology Fascism and
and The
The Sexual
Sexual Revolution.
Revolution. Reich
Reich became
became
known as one
known as one o
off the most radical
the most radical practitioners
practitioners of
o f psychiatry. Reich's
psychiatry. Reich's
discovery also revealed
discovery also revealed the
the role
role ooff emotional-sexual
emotional-sexual energy
energy iin the
n the
psychosomatic process.
psychosomatic process. WWhat
h a t aatt f ifirst appeared tto
r s t appeared o bbe
e oonly
nly
bioelectricity was later
'bioelectricity' was later clarified
clarified by
by Reich
Reich as
as a
a much
much more
more complex
complex
and powerful bioenergetic
and powerful bioenergetic force,
force, aa form
form of
of life-energy at work
life-energy at work within
within
living organisms, expressing
living organisms, expressing itself
itself as
as emotion
emotion and
and sexuality,
sexuality, but
but also
also
directly observable in
directly observable the microscope
in the as a
microscope as a bluish-glowing
bluish-glowing field
field around
around
living
living blood
blood cells and other
cells and other substances.
substances.

This
This bluish-glowing energy, which
bluish-glowing energy, which he
he eventually
eventually called
called Orgone
Orgone
Energy
Energy (to preserve its
(to preserve its relationship
relationship with
with living
living processes),
processes), is
is an
an
observable physical phenomenon
observable physical phenomenon similar
similar to
to the
the older
older ideas
ideas of
of vital
'vital
force
force' and cosmic ether combined.
'cosmic ether'

46
Reich's Orgone Accumulator Box
Cutaway View of Box Layers

Ambient
Orgone + + +
(Merle) + + + Accumulated
Energy
- O r g o n e
+ + _ (Ethenc)
+ _ +
+. + _ + Energy

Key: + Positive Orgone (Etheric) Energy (a.k.a., 'OR"/ 'POR')

Deadly Orgone (Negative Etheric) Energy (a.k.a., "DOR')

Cross-section
Cross-section of
o f an
an orgone accumulator

During the course


During the course of
of Reich's investigations, he
Reich's investigations, he developed
developed aa special
special
metal-lined enclosure which
metal-lined enclosure which attracted
attracted aa high
high charge
charge of
of orgone
orgone energy
energy
inside itself, directly
inside itself, directly from
from the atmosphere. He
the atmosphere. He called
called his
his device
device the
the
orgone energy accumulator.
orgone energy The orgone
accumulator. The orgone accumulator
accumulator (ORAC)
(ORAC) was
was
proven
proven to
to charge seeds, increase
charge seeds, increase garden
garden plant
plant growth, speed the
growth, speed the
healing
healing of
of burns and cuts,
bums and cuts, and
and there
there are
are aa number
number of
of physical
physical
experiments
experiments which demonstrate anomalous
which demonstrate phenomena inside
anomalous phenomena inside the
the
accumulator. Reich observed
accumulator. Reich that certain
observed that certain kinds
kinds of
of low-energy
low-energy illness,
illness,
such as cancer,
such as cancer, would
would symptomatically
symptomatically yield
yield to
to careful
careful application
application of
of
the orgone accumulator.
the orgone accumulator.

47
Wilhelm Reichs Orgone Accumulator treating
Wilhelm Reich's treating a patient

Reich's experiments in
Reich's experiments in these
these directions
directions led
led to
to even
even more
more controversy.
controversy.
He developed new
He developed new methods
methods for
for ending
ending drought
drought and
and greening
greening deserts
deserts
which led
which led to
to the
the development
development of
of his cloudbuster, and
his cloudbuster, and new
new approaches
approaches
to the problem
to the problem of
of nuclear waste detoxification.
nuclear waste detoxification. The
The cloudbuster
cloudbuster was
was aa
device with rows
device with rows ooff 15-foot
15-foot aluminum
aluminum pipes
pipes mounted
mounted on
on aa mobile
mobile
platform, connected
platform, connected tto cables that
o cables that were
were inserted
inserted into
into water.
water. HHe
e
believed that
believed that itit could
could unblock
unblock orgone
orgone energy
energy in
in the
the atmosphere
atmosphere and
and
cause rain.

48
The Dr. Wilhelm Reich Blood Test (RBT)

Orgone energy experiments can be readily replicated. We believe that


Dr. Reich's
Reich's theories deserve
deserve an
an unbiased, scientific investigation. One
One
of the more
more famous
famous of
of these experiments has
has to do with Dr. Reich's
Reich's
Orgone Accumulators (ORACs).
(ORACs).

A recent experiment
A recent experiment was
was conducted
conducted by
by Despina
Despina Malkotsi
Malkotsi who
who is
is in
in
charge
charge of
of Heraclitus
'Heraclitus' Microscopic Research Laboratory.
Microscopic Research Laboratory. Under
Under strict
strict
scientific procedures, the
scientific procedures, the experiment
experiment calls
calls for
for aa laboratory
laboratory
examination
examination to
to verify
verify or
or refute
refute the
the claim
claim that
that ORACs
ORACs energize
energize aa
person's red blood
person's red blood cells,
cells, thus
thus preserving
preserving their
their vital
vital state
state longer
longer than
than in
in
ambient conditions. The
ambient conditions. The RBT
RBT can
can detect
detect biopathic
biopathic situations
situations that
that are
are
active
active in
in the organism without
the organism without arriving
arriving to
to aa specific
specific diagnosis.
diagnosis. The
The
RBT is based
RBT is based on
on the
the direct
direct observation
observation of
of the
the blood
blood immediately
immediately after
after
its extraction from
its extraction from the
the body's vessels, and
body's vessels, and without
without biochemical
biochemical
processing.
processing.

According
According to
to Dr. Reich, as
Dr. Reich, as soon
soon as
as the
the red
red blood
blood cells
cells leave
leave the
the blood
blood
vessels, they begin
vessels, they begin disintegrating
disintegrating into cysts (the
into cysts (the decay
decay process
process begins).
begins).
Reich
Reich called these cysts
called these cysts bions. He observed
'bions.' He observed that
that bions
bions pulsated
pulsated and
and
were
were motile. Intriguingly, in
motile. Intriguingly, in healthy
healthy organisms
organisms they
they gave
gave off
off an
an
intense blue light.
intense blue Classic Biology
light. Classic Biology also
also describes
describes bions as
bions as
characteristic protrusions of
characteristic protrusions of the
the cell
cell membrane.
membrane. This
This phenomenon
phenomenon was
was
called bebbling.
called 'bebbling.'

Dr. Reich recognized


Dr. Reich recognized aa very
very primitive
primitive and
and undifferentiated
undifferentiated stage
stage of
of the
the

49
living state in bions. This is described
described in detail in his book The
'The Bion
Experiments. Numerous
Experiments.' Numerous such
such experiments
experiments were
were conducted
conducted in Oslo
between 1936
between 1936 and
and 1939,
1939, where
where he
he showed
showed the disintegration
disintegration of
of living
living
and non-living
non-living matter,
matter, and
and the
the subsequent
subsequent organization
organization ooff bions
bions iin
n
formations manifesting
manifesting characteristics of living
living and functioning.

Red blood cells


Red cells (left)
(left) disintegrate
disintegrate into cyst/bion colonies
colonies (right) once extracted
extracted from
from
the
the body
body

RBT Procedure

The most recent


The most recent replication
replication compared
compared the
the disintegration
disintegration of
of two
two blood
blood
samples taken simultaneously
samples taken simultaneously from
from the
the same
same person.
person. One
One sample
sample is
is
placed in
placed in the
the ORAC device, while
ORAC device, while the
the other
other is
is placed
placed in
in aa simple
simple box,
box,
made
made of
of only
only organic material. For
organic material. For the
the procedure
procedure they
they used:
used:


aan orgone accumulator
n orgone accumulator (ORAC),
(ORAC), 3-layer
3-layer per
per side,
side, measuring
measuring
35 x 35 x 35 cm


aa 'control' box of
'control' box of similar
similar dimensions, made of
dimensions, made of wood.
wood.


AA 3-layer orgone blanket
3-layer orgone blanket


aa small metal box

50
50

aa laboratory microscope (Zeiss Axioskop
Axioskop 2)

They used a magnification of


of 1600x
1600x initially, but when there was aa
need for a more detailed observation of
of the
the sample, they increased
increased the
magnification to 4000x.

The blood
blood used
used in the test
test was
was taken
taken from the
the capillaries
capillaries of
of the
the
volunteer in sterile conditions. The
The blood was saline
was then mixed with saline
solution at a ratio of 1:40, and then the team prepared two slides
1:40, and slides each
each
containing the blood
containing the sample from
blood sample from the
the same
same person.
person. The
The team's
team's main
main
concern was to obtain the red blood cells in their natural condition. If
If

the red bloods


the red bloods cell
cell were
were destroyed, the samples
destroyed, the samples were
were considered
considered
unsuitable.

Next, one
Next, one slide
slide was
was placed
placed in
in the
the ORAC
ORAC for
for 15 minutes. It
15 minutes. It was
was first
first
placed
placed in
in the
the small
small metal
metal box
box then
then wrapped
wrapped in
in the
the orgone
orgone blanket
blanket that
that
was inside the
was inside the ORAC. The second
RAC. The second blood
blood sample
sample was
was placed
placed in
in the
the
wooden
wooden control
control box.
box. The
The two samples were
two samples were then
then microscopically
microscopically
examined successively, at
examined successively, at the same time.
the same time. They
They observed
observed the
the processes
processes
occurring
occurring in
in both
both samples
samples during
during their
their death
death and
and ongoing
ongoing decay
decay (into
(into
cysts/bions).
cysts/bions).

Every 5 minutes
Every 5 minutes the
the team
team observed and recorded
observed and recorded the
the following
following
characteristics
characteristics of
of the
the red
red blood
blood cells
cells (erythrocytes):
(erythrocytes): vigor,
vigor, pulse
pulse and
and
motility, width of
motility, width of energy
energy field, rate of
field, rate of disintegration
disintegration into
into bions,
bions, bion
bion
size and distribution
size and distribution in
in the
the inner
inner part
part of
of the
the cell
cell disk.
disk. The
The goal
goal of
of the
the
examination
examination was to find
was to differences in
find differences in the
the two
two samples
samples as
as regards
regards to
to

51
51
the erythrocytes' characteristics mentioned above. In this way, they
determined the effects of the
the different conditions existing in the two
boxes on
on the
the red
red blood cells. The
The two samples
samples were thus checked
successively at
at the
the same
same time and
and recorded.
recorded.

ORAC sample is
ORAC sample is on the left and the control is on the right
right

J 6 0 8 0 0

0 0

20 minutes after blood draw:

Both samples,
Both samples, the
the red
red blood
blood cells
cells show
show good
good mobility
mobility and
and pulse;
pulse; the
the
rate
rate of
of disintegration was calculated
disintegration was calculated at
at about
about 1%
1%

52
52
25 min. after blood draw:

Both samples
Both samples still
still show
show motility
motility and
and pulse. The red
pulse. The red blood
blood cells
cells kept
kept in
in
the
the control
control box
box show
show loose membranes and
loose membranes and amount
amount of
ofdisintegration
disintegration is is
2-3%. The amount
2-3%. The amount of of disintegration
disintegration for
for the
the red
red blood
blood cells
cells kept
kept in
in the
the
ORAC
ORAC (left)
(left) is
is about
about 1%1%

The
The red
red blood
blood cells
cells kept
kept in
in the
the control
control box
box (right)
(right) still
still show
show pulsation,
pulsation,
but
but most
most of
of them are immobile
them are immobile andand the
the percentage
percentage ofof disintegration
disintegration is
is
2-8%. The red
2-8%. The red blood
blood cells
cells kept
kept in the accumulator
in the accumulator continue
continue toto show
show
motility
motility and
and pulsation, and thier
pulsation, and thier disintegration
disintegration is is 2-3%
2-3%

53
53
, 00 0 b
00T) 0
A : 1 0 4 4 '44.* d

50 min. after blood draw:

The differences between


The differences between the
the two
two samples
samples examined
examined are
are even
even more
more
obvious.
obvious. The red blood cells kept in the control box (right) show aa
The red blood cells kept in the control box (right) show
disintegration
disintegration of
of 40-50%, while the
40-50%, while the ones
ones in
in the
the ORAC
ORAC (left)
(left) of
of only
only

Conclusion
Conclusion of
of RBT
RBT Replication
Replication

From the findings


From the findings of
of the
the microscopic examination of
microscopic examination of the
the two
two samples,
samples,
Dr. Despina's team
Dr. Despina's team observed
observed the
the following:
following:


TThe red blood
h e red blood cells kept in
cells kept in the
the accumulator
accumulator showed
showed motility
motility for
for
longer
longer time.
time.


TTheir
h e i r disintegration
disintegration into
into bions
bions was
was slower.
slower.


TTheir
h e i r membrane
membrane tension
tension was
was also
also preserved
preserved for
for aa longer
longer time.
time.

The above findings


The above as well
findings as as more
well as more data
data were
were collected
collected during
during the
the
examination. Blood cell
examination. Blood samples of
cell samples of 10
10 individuals,
individuals, for
for 44 times
times each,
each, at
at

54
54
different weather
different conditions were
weather conditions were tested.
tested. The team also
The team also observed:
observed:


TThe
h e red blood cells kept in the accumulator showed more
motility at a rate of about
about 60-70%.


T The rate of disintegration
h e rate disintegration into bions/cysts was
was slower
slower by
by 70%
and
and the
the bions'
bions' size
size was larger at
was larger at aa rate
rate of
of about
about 90%.
90%.

It was also
It was also observed
observed that
that when
when the
the humidity
humidity of
of the
the environment
environment
was high, the
was high, the differences
differences of
of the
the quality
quality characteristics
characteristics of
of the
the
red
red blood cells in
blood cells in the
the two boxes were
two boxes were greatly
greatly smaller.
smaller.

In summary they
In summary they stated,
stated, In
"In conclusion,
conclusion, we
we can
can say
say that
that the
the orgone
orgone
accumulator has a
accumulator has a clear
clear biological
biological effect
effect on
on the
the blood
blood examined
examined
with
with the
the method
method of
of the
the Reich
Reich Blood
Blood Test,
Test, improving
improving the
the vigor
vigor of
of
the red blood cells.
cells."

We
We thank
thank the
the laboratory
laboratory research team at
research team at Heraclitus
Heraclitus Microscopic
Microscopic
Research Laboratory
Research Laboratory for
for this
this ground-breaking
ground-breaking research!
research!

55
55
Orgonite

Orgonite was invented by Karl Hans Welz (Austrian). Orgonite is aa


mixture of catalyzed epoxy resin with metal shavings, particles or
powders, poured
poured into
into molds.
molds. It attracts Orgone energy similarly to
Reich's accumulators.
accumulators. Some
Some people also add
add quartz crystals to the
mixture to
to enhance
enhance the
the performance of the orgonite.

How
How Orgonite
Orgonite Works
Works

In recent years
In recent the new
years the new age
age movement
movement and
and occultists
occultists have
have done
done aa lot
lot to
to
discredit
discredit the science of
the science of orgonite. There have
orgonite. There have been
been wild
wild outlandish
outlandish
claims that orgonite
claims that can do
orgonite can do all
all manner
manner of
of supernatural
supernatural things
things from
from
opening cosmic portals
opening cosmic portals to
to communicating
communicating with
with little
little green
green men.
men. We
We
hope to clear
hope to clear up this confusion,
up this confusion, by
by explaining
explaining the
the basic
basic scientific
scientific
effects that orgonite
effects that has and
orgonite has and how
how you
you can
can use
use orgonite
orgonite to
to clean
clean the
the
environment
environment around you.
around you.

Orgonite converts positive


Orgonite converts charge (bad)
positive charge (bad) into negative charge
into negative charge (good)
(good) in
in
the
the form
form of negative ions
of negative ions (good
(good for
for you).
you). It
It acts as aa passive
acts as passive ionizer
ionizer
for the environment.
for the environment. Orgonite
Orgonite emits
emits soft
soft electrons
electrons that
that can
can be
be detected
detected
with an
with an ion
ion counter. The resin
counter. The resin in
in orgonite
orgonite shrinks
shrinks during
during the
the curing
curing
process, permanently
process, permanently squeezing
squeezing the
the quartz
quartz crystal
crystal which
which creates
creates aa
well-known
well-known piezoelectric
piezoelectric effect inside the
effect inside the crystal,
crystal, meaning
meaning its
its end-
end-
points become polarized
points become polarized electrically. This causes
electrically. This causes itit to
to function
function more
more
effectively as aa positive
effectively as energy generator.
positive energy generator. Although
Although crystals
crystals improve
improve

56
56
the function of orgonite,
orgonite, they are not necessary for the orgonite to
work. Orgonite also changes the pH of
work. Orgonite of tap
tap water, makes water more
more
alkaline based, and structures the water by energizing it.

What this all means


means for the average person, is that Orgonite is an
an
effective
effective tool
tool to help protect
to help protect you
you from
from the
the harmful
harmful effect
effect of
of electro-
electro-
magnetic frequencies, or
magnetic frequencies, or EMFs.
EMFs. As
As we
we have
have covered
covered in
in other
other sections
sections
of
of this book, several
this book, several energy
energy technologies
technologies in
in our
our world
world have
have deleterious
deleterious
effects on
on health. AAs
saa quick review here are some of
of the
the effects that
many
many people
people suffer
suffer from caused by
from caused by EMFs:
EMFs:

-Protein
-Protein Changes
Changes in
in Skin
Skin
-Excited Brain Cells
-DNA Damage
-DNA Damage
-Brain
-Brain Cell Damage
Cell Damage
-Aggressive
-Aggressive Growth
Growth in
in Leukemia
Leukemia Cells
Cells
-Increased Blood Pressure

-Changes
-Changes in
in Hormone
Hormone Levels
Levels
-Reproductive
-Reproductive Health Issues
Health Issues
-and more

57
57
When freezing water above orgonite, a tornado pattern is frozen in
in the
ice, giving the water a crystalline structure when it thaws as seen
seen in the
picture below:
picture below:

Orgone
Orgone 'plate'
Plate' made
made from
from materials
materials toto create
create orgonite. This charging
orgonite. This charging plate
plate forms
forms aa
tornado pattern in
tornado pattern in ice crystals while
ice crystals while water
water freezes.
freezes.

Anyone can
Anyone can build these devices
build these devices with
with easy
easy to
to find
find materials.
materials. Orgonite
Orgonite is
is
simply
simply aa mix
mix of
of metal and resin
metal and resin (polyester, urethane or
(polyester, urethane or epoxy).
epoxy). It
It can
can
be poured
be poured into
into all
all kinds
kinds of
of shapes: pyramids, cones,
shapes: pyramids, cones, disks,
disks, cylinders
cylinders
and pendants, to
and pendants, to name
name a
a few.
few.

58
58
SICE L

(PoWDSk)
nownomment-

4 1 0

I R N O X I E)E

Some people
people use
use Orgonite to combat pollution and cell tower
radiation. Others
Others use
use it for clearing or purifying energies in their
houses, or to
houses, or enhance the
to enhance the growth
growth of
of plants
plants in
in their
their garden.
garden. It
It seems
seems to
to
work
work also
also really
really well
well in
in various kinds of
various kinds of spiritual
spiritual healing
healing work.
work. We
We
have received positive
have received positive feedback
feedback on
on the
the orgonite
orgonite given
given to
to our
our friends.
friends. II
have personally found
have personally found it
it very
very effective
effective in
in combating
combating chemtrails
chemtrails
overhead and improving
overhead and improving my
my overall
overall health
health against
against electronic
electronic
harassment
harassment when
when worn as pendants.
worn as pendants. Even
Even your
your pets
pets will
will be
be drawn
drawn to
to
these objects! How
these objects! How good
good is that?
is that?

59
59
Not all Orgonite is
Not is the
the same. The
The orgonite shown previously was made
using powders instead
using powders instead of
of larger
larger items
items inside
inside the
the resin. The reason
resin. The reason for
for
this is that
this is that powders
powders have
have more
more surface area, and
surface area, and the
the greater
greater the
the surface
surface
area (once inside
area (once inside the
the resin) the more
resin) the more effective
effective or
or powerful
powerful the
the orgone
orgone
device
device will be. There
will be. There are
are some
some Orgone
Orgone devices
devices that
that are
are aesthetically
aesthetically
pleasing and
pleasing and very
very ornamental. However, they
ornamental. However, they are
are nowhere
nowhere near
near as
as
effective when tested
effective when tested against
against powder-based
powder-based orgone
orgone devices.
devices. Testing
Testing
includes; using the
includes; using the ion
ion meter, comparing crystalline
meter, comparing crystalline structures
structures in
in ice,
ice,
and plant growth.
and plant growth.

60

Potrebbero piacerti anche