User:Pnnguyen86/sandbox

  Phong Nhu Nguyen   

Phong Nhu Nguyen (born in January 22, 1991) is an Vietnamese-American dedicating his time in the engineering and culinary field.

Content 1 Personal Life 2 Education 2.1 - California State University, Long Beach - Long Beach, California 2.2 - Golden West College - Huntington Beach, California 2.3 - Fashion Institute of Design and Merchandise - FIDM - Los Angeles, California 2.4 - Otis College of Art and Design - Los Angeles, California 2.5 - New York Film Academy - Los Angeles, California 3 Electronic Harassment 3.1 - Hypersonic Sound System 3.2 - Psycho-electronic Weapons Effect 3.3 - Electrophysiology 4 Federal Government and Military Government - Advanced Technological Advancements 4.1 - Central Intelligence Agency - CIA 4.2 - Federal Bureau Investigation - FBI 4.3 - National Security Agency - NSA 4.4 - Department of Defense - The Pentagon 4.5 - United States Air Force - Air Force Research Laboratory (AFRL) 5 Treaty of Mutual Cooperation and Security between the United States and Japan 5.1 - US Forces in Japan 6 History of Artificial Intelligence 7 References 8 External Links

Personal Life

Nguyen was born in Fountain Valley, California and currently lives with his father and mother in Orange County for more than 20 years. He has two little brothers and two little sisters. He received his education in Westminster School District and Huntington Beach Union School District before he turned 18 years old. He attended to Blessed Sacrament Church to receive his confirmation in 2007.

He has spent his time getting his education at California State University, Long Beach in Mechanical Engineering and graduated with a Bachelor's in 2015.

He had issues getting jobs during his unemployment days. A couple of jobs that he applied for that would be recognized immediately are Federal Bureau Investigation (FBI) and Central Intelligence Agency (CIA) as a Counter Intelligence Analyst and Engineer. He later got his computer and smartphones hacked by an unknown source in later 2017. His BlackBerry Classic was hacked to the point it was a flip phone, and could not receive any phone calls or utilize it when he was out in Los Angeles for three days. He managed to survive for the rest of 2017 and got a job as a Dishwasher in January 2018.

He has been job hopping recently but he is trying desperately to get into Fashion Design. More updates will come along the way.

He deals with electronic harassment every day since September 2017. He says that he hears voices (hypersonic sound system), goes through random body pains (psycho-electronic weapons effect), and deals with body control (electrophysiology). He got frustrated and did research on how this was possible. He later found out that it was coming from a satellite, and found out that the federal government and military government were responsible for the development of this technology. More information on this technology will be provided below in the section called 'Federal Government and Military Government - Advanced Technological Advancements'.

Education

2.1 - California State University, Long Beach

He majored in Mechanical Engineering and graduated in August 2015. During his college there at California State University, he took his general education and major courses such as Calculus and Senior Design. He did get accused for cheating later in 2015 and is not truly aware of the status of his degree.

He later in July 2023 received recognition from [Honor's Society] for doing well at this university and got marked with Honor's with a 3.2 GPA or higher.

2.2 - Golden West College

After two years of unemployment, he decided to go to Golden West College to major in Studio Arts and plans on finishing in less than three years.

Update: He only took one course, which was English. He later decided not to finish his AA degree at Golden West College due to complications.

2.3 - Fashion Institute of Design and Merchandise - FIDM

While working at Electric Bike Company as an Electrical Engineer, he met with a corporate worker at Hurley and found an interest in fashion design when he saw the display shown in the office. He started to do research and purchased Adobe Illustrator and Adobe Photoshop to learn how to design clothes and create graphic images. He later talked to an advisor from FIDM in Los Angeles, California and got accepted to FIDM Los Angeles. Due to complications, he was not allowed to attend to this university.

2.4 - Otis College of Art and Design

He got accepted to Otis College of Art and Design in Los Angeles, California for the Fashion Design program but he decided not to go to.

2.5 - New York Film Academy

He got accepted to New York Film Academy in Burbank, California. He will be starting next year in 2024 and will be majoring in Acting in Film.

Electronic Harassment [Hypersonic Sound System] [Psycho-Electronic Weapons Effect] [Electrophysiology] [Brainwashing]

[Electronic harassment] is a conspiracy theory that government agents make use of electromagnetic radiation (such as the microwave auditory effect), radar, and surveillance techniques to transmit sounds and thoughts into people's heads, affect people's bodies, and harass people.

[Brainwashing] (also known as mind control, menticide, coercive persuasion, thought control, thought reform, and forced re-education) is the concept that the human mind can be altered or controlled by certain psychological techniques. Brainwashing is said to reduce its subject's ability to think critically or independently, to allow the introduction of new, unwanted thoughts and ideas into their minds,[1] as well as to change their attitudes, values, and beliefs.[2][3]

The term "brainwashing" was first used in English by Edward Hunter in 1950 to describe how the Chinese government appeared to make people cooperate with them during the Korean War. Research into the concept also looked at Nazi Germany, at some criminal cases in the United States, and at the actions of human traffickers. In the late 1960s and 1970s, the CIA's MKUltra experiments failed with no operational use of the subjects. Scientific and legal debate followed, as well as media attention, about the possibility of brainwashing being a factor when lysergic acid diethylamide (LSD) was used,[4] or in the conversion of people to groups which are considered to be cults.[5]

[Psychological warefare] (PSYWAR), or the basic aspects of modern psychological operations (PsyOp), have been known by many other names or terms, including Military Information Support Operations (MISO), Psy Ops, political warfare, "Hearts and Minds", and propaganda.[1] The term is used "to denote any action which is practiced mainly by psychological methods with the aim of evoking a planned psychological reaction in other people".[2]

Various techniques are used, and are aimed at influencing a target audience's value system, belief system, emotions, motives, reasoning, or behavior. It is used to induce confessions or reinforce attitudes and behaviors favorable to the originator's objectives, and are sometimes combined with black operations or false flag tactics. It is also used to destroy the morale of enemies through tactics that aim to depress troops' psychological states.[3][4]

Target audiences can be governments, organizations, groups, and individuals, and is not just limited to soldiers. Civilians of foreign territories can also be targeted by technology and media so as to cause an effect on the government of their country.[5]

Mass communication such as radio allows for direct communication with an enemy populace, and therefore has been used in many efforts. Social media channels and the internet allow for campaigns of disinformation and misinformation performed by agents anywhere in the world.[6]

Most modern uses of the term psychological warfare refer to the following military methods:

Demoralization:

- Distributing pamphlets that encourage desertion or supply instructions on how to surrender.

- Shock and awe military strategy.

- Projecting repetitive and disturbing noises and music for long periods at high volume towards groups under siege like during Operation Nifty Package.

- Propaganda radio stations, such as Lord Haw-Haw in World War II on the "Germany calling" station.

- Renaming cities and other places when captured, such as the renaming of Saigon to Ho Chi Minh City after Communist victory in the Vietnam War.

- False flag events.

- Terrorism[40]

- The threat of chemical weapons.[41]

- Information warfare.

Most of these techniques were developed during World War II or earlier, and have been used to some degree in every conflict since. Daniel Lerner was in the OSS (the predecessor to the American CIA) and in his book, attempts to analyze how effective the various strategies were. He concludes that there is little evidence that any of them were dramatically successful, except perhaps surrender instructions over loudspeakers when victory was imminent. Measuring the success or failure of psychological warfare is very hard, as the conditions are very far from being a controlled experiment.

Lerner also divides psychological warfare operations into three categories:[42][page needed]

White propaganda (omissions and emphasis): Truthful and not strongly biased, where the source of information is acknowledged.

Grey propaganda (omissions, emphasis and racial/ethnic/religious bias): Largely truthful, containing no information that can be proven wrong; the source is not identified.

Black propaganda (commissions of falsification): Inherently deceitful, information given in the product is attributed to a source that was not responsible for its creation.

Lerner says grey and black operations ultimately have a heavy cost, in that the target population sooner or later recognizes them as propaganda and discredits the source. He writes, "This is one of the few dogmas advanced by Sykewarriors that is likely to endure as an axiom of propaganda: Credibility is a condition of persuasion. Before you can make a man do as you say, you must make him believe what you say."[42]: 28  Consistent with this idea, the Allied strategy in World War II was predominantly one of truth (with certain exceptions).[citation needed]

In Propaganda: The Formation of Men's Attitudes, Jacques Ellul discusses psychological warfare as a common peace policy practice between nations as a form of indirect aggression. This type of propaganda drains the public opinion of an opposing regime by stripping away its power on public opinion. This form of aggression is hard to defend against because no international court of justice is capable of protecting against psychological aggression since it cannot be legally adjudicated.

"Here the propagandists is [sic] dealing with a foreign adversary whose morale he seeks to destroy by psychological means so that the opponent begins to doubt the validity of his beliefs and actions."[43][44]

Individuals who claim to experience electronic harassment call themselves "targeted individuals" (TIs). [Targeted Individuals] are people who are illegally harassed, tortured, mind controlled, gang-stalked, and spied upon 24/7 by organized groups of persons. Targeting can be covert, or overt.

[Kameron Bernard Kesley vs. United States, Electronic Harassment]

CASE NO. 3:18-cv-1009-J-32MCR

12-14-2018

KAMERON BERNARD KELSEY, Plaintiff, v. UNITED STATES, Defendant.

Amended Complaint

"Classified"

Psychotronic Technology

Weapons of Mass Destruction

New Evidence Discovered

Amended Complaint for the Recovery of Damages

Caused by Assault - "Secret" Pyschotronic [sic] Technology

Weapons of Electromagnetic Torture & Murder

(Military Intelligence) Toward "Remote Mind Control"

Non-Consensual Guinea Pig Experiment, False

Arrest/False Imprisonment, Negligence, Gross Negligence,

& Intentional Infliction of Emotional Distress Under

The Federal Tort Claims Act "Law Enforcement Proviso" (Doc. 7 at 1.) Then, over the next 75 pages, without utilizing "numbered paragraphs, each limited as far as practicable to a single set of circumstances," Fed.R.Civ.P. 10(b), Plaintiff proceeds to provide an "Introduction [to the] Justice System." (Id. at 2-76.) In a narrative form, he lays out the history of the Federal Bureau of Investigations ("FBI") under several administrations, touching upon alleged abuses in the system, several scandals, and a number of conspiracies. (Id.) In the second section of the Amended Complaint, titled "Analysis," Plaintiff proceeds to explain in great detail how the "FBI violated the Rule of law and the most sacred principles in the American criminal justice system." (Id. at 76-77.) Again, without utilizing "numbered paragraphs, each limited as far as practicable to a single set of circumstances," Plaintiff begins by citing to various statutory provisions and case law, then proceeds to explain the criminal justice process in the State of Georgia, and provides what appear to be excepts of motions and pleadings filed in the criminal case initiated against him in the State of Georgia for an armed bank robbery. (Id. at 77-119.) Also included in the Analysis section are frequently asked questions with corresponding answers pertaining to the FBI. (Id. at 93-115.) The "allegations" in both the Introduction and the Analysis sections seem to be redundant, immaterial, and/or impertinent to any of Plaintiff's claims.

In the third section titled "Parties," which starts on page 119 of the Amended Complaint, Plaintiff introduces the parties to this action. (Id. at 119-130.) Plaintiff is alleged to be a "former resident of Bibb County, Macon, Georgia, and Rockdale County, Conyers, Georgia," and a current "resident of Jacksonville, Duval County, in the [S]tate of Florida." (Id. at 119.) Plaintiff describes himself as "a 42 year old African-American outside the box 'free-thinker' who challenges and conquers any evil and injustice set in motion against him and his mother." (Id.) Plaintiff allegedly "has 3 years of college in criminal justice with a 3.0 career G.P.A., who's [sic] Pell grant award and school finances has [sic] been sabotaged by defendant United State's [sic] department of education." (Id.)

Plaintiff refers to Defendant, United States of America, interchangeably as the FBI, the Department of Defense ("DOD"), the U.S. Army, the U.S. Air Force, the Central Intelligence Agency ("CIA"), the National Security Agency ("NSA"), and the DOD's Air Force Research Laboratory ("AFRL"). (Id. at 120-24.) Defendant's involvement is described, in part, as follows:

6. At all material times to this action, defendant United State's [sic] agency [FBI] contracted with private investor Patricia Harden. . ., for the purposes of gaining access to plaintiff [sic] mother's house prior to closing to install microwave spy-link in the walls and microwave powered wall bug sensor towards the "Remote Mind Control" experiment (plaintiff's mother "Sherry Roberts"). 7. At all material times to this action, defendant United State's [sic] agency [FBI] contracted with AT & T and other various disguised communication vehicles including, but not limited to FED Ex, UPS, etc., transporting psychotronic weapons to neighbors and installing them underground in neighbors [sic] yards toward the "Remote Mind Control" experiment (Sherry Roberts). 8. At all material times to this action, defendant United State's [sic] [DOD,] U.S. Army[,] U.S. Air Force Military intelligence and "Black Helicopter" constantly carries [sic] and discharges [sic] psychotronic weapons toward the "Remote Mind Control" experiment (Sherry Roberts). . . . 30. At all material times to this action, Defendant United State's [sic] agency [FBI] collaborated with the [CIA] to infiltrate Willis-Knight Hospital in Shreveport, Louisiana, to implant biochip in plaintiff's mother for the purposes of Remote Neural Monitoring (RNM) and EMF Brain Stimulation radiation and genocide experiment. . . . (Id. at 119-20, 126.) Plaintiff further alleges that the FBI collaborated with the Georgia Bureau of Investigation ("GBI") "to impose organized gang stalking and gang stalking groups against [P]laintiff and [his] mother in the [S]tate of Georgia, [S]tate of Maryland, and ongoing in the [S]tate of Florida." (Id. at 125.) In addition, the FBI allegedly "recruited Bishop Eddie L. Long (Senior pastor) as a[] privilege informant, at Newbirth Baptist Church in Lithonia, Georgia, for the purposes of monitoring [P]laintiff and electronically harassing [P]laintiff's mother." (Id.) Plaintiff claims that "[a]t all material times to this action, [P]laintiff and his mother are not by any means delusional, mentally ill, irrational, nor paranoid." (Id. at 120.)

In section IV, titled "Standing," Plaintiff alleges that he "has standing to bring this action because he has been directly affected and victimized by the negligence, wrongful acts, omissions, and intentional inflictions and certain intentional torts." (Id. at 130.) Although mentioned throughout the Amended Complaint, Plaintiff's mother, Sherry Roberts, is not a named party to this action. (See generally id.)

In section V, titled "Jurisdiction and Venue," Plaintiff alleges that this Court has subject matter jurisdiction over this matter: (1) "pursuant to 28 U.S.C. § 1331 in that this action arises under the laws of the United States of America and is premised on the acts and omissions of the Defendant acting under color of federal law"; (2) "pursuant to 28 U.S.C. § 1346(b) in that this is a claim against the Defendant United States of America, for money damages accruing on or after January 1, 1945, for personal injury caused by the negligent and wrongful acts and omissions of employees of the Government while []acting within the course and scope of their office or employment, under the circumstances where the Defendant United States of America, if a private person, would be liable to the Plaintiff"; and (3) "pursuant to 18 U.S.C. § 2712 in that any person who is aggrieved by any willful violation of this chapter or of chapter 119 of this title or of sections 106(a), 305(a), or 405(a) of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. § 1801 et. seq.) may commence an action in United States [District Court against the United States] to recover money damages." (Doc. 7 at 130-31.) Plaintiff also alleges that pursuant to the Federal Tort Claims Act ("FTCA"), 28 U.S.C. § 2671, et. seq.:

[O]n March 21, 2015,. . . [Plaintiff] presented his claim to the appropriate federal agency for administrative settlement under the FTCA demanding certain sum of $150,000,000. By letter [of] April 7, 2015, Plaintiff's claim was forwarded by the Department of Justice to the F.B.I., and was buried by deputy general counsel ordered by FBI Deputy Director and FBI Director. The F.B.I. agency has yet to give Plaintiff a decision up to this day (3 years and five months) and the Administrative claim is "deemed denied." Since then new evidence has been discovered that was not capable of being discovered during Administrative Tort Claim presentation and higher damages has [sic] been demanded in this Amended Complaint. (See Attached Exhibits 19-21) (Doc. 7 at 132; see also Docs. 7-1, 7-2, 7-3.) Plaintiff continues with general allegations as to the United States' limited waiver of sovereign immunity in section VI, concealment in section VII, equitable estoppel in section VIII, continuing tort doctrine in section IX, classified information in section X, declassification in section XI, misuse of the classification system in section XII, and remedies in section XIII. (See Doc. 7 at 133-45.) In sections XIV and XV, Plaintiff alleges that the animosity of certain individuals towards him have influenced his criminal case. (Id. at 145.)

Over the next 129 pages, in section XVI, Plaintiff presents a long and detailed narrative about his own and other individuals' criminal histories, including Plaintiff's arrest and prosecution for an armed bank robbery in Georgia state court, as well as events that took place after Plaintiff's release from prison. (Id. at 145-274.) This narrative also seems to include excerpts of various state court documents. (See, e.g., Id. at 187-207, 210-17, 227, 248-61.)

Plaintiff advises that in 2013, he consulted with, inter alia, the Law Offices of Gary, Williams, Parenti, Watson & Gary, P.L., in Stuart, Florida, about representation for a civil rights suit against the State of Georgia, and later contacted the Office for Civil Rights in Washington, D.C., about investigating his case for civil rights violations. (Doc. 7 at 223.) Plaintiff further advises that in 2014, he filed a § 1983 lawsuit against State detective Nathaniel Jordan and Bibb County Municipality after allegedly discovering new evidence in his criminal case. (Id. at 224.) Plaintiff alleges that the FBI's involvement in his Georgia criminal case was revealed to him in 2015. (Id. at 230-34.) He describes it as follows:

524. On December 15, 2003, [P]laintiff's mother had one of the family members to write up a letter of the injustice prosecution of her son and the case involving a federal bank was distributed to the public media and newspapers exposing corruption. 525. The FBI behind the scenes started retaliation against [P]laintiff's mother through legal counselors, house foreclosure, and vehicle tracking. 526. At [P]laintiff's 2004 MNT hearing, the FBI behind the scenes forced [P]laintiff's appellant [sic] counsel Leighton Berry to move out of Macon and relocate for exposing State Det. Jordan on the witness stand, who nearly exposed FBI [sic] file and record of activity on the case. 527. In 2005, the FBI behind the scenes paid bribes to [P]laintiff's mother's bankruptcy attorneys' [sic] Robert House and Calvin Jackson to twist paperwork on Chapter 7 filing [sic] for the purpose of illegally foreclosing on house [sic] of 22 years. 528. In January of 2006, the FBI behind the scenes forced [P]laintiff's trial counsel Lesley Beaty out of practicing law and into an unknown location for the purpose of being called to testify on discovery issues. 529. On October 6, 2007, the FBI behind the scenes influenced McCalla Raymer, LLC in Roswell, Georgia, representing Federal Home Loan Mortgage Corporation to do a quick foreclosure and sale of [P]laintiff's mother (Sherry Roberts) [sic] house of 22 years. . . . 539. December 19, 2007- April 2008, [P]laintiff's mother lived for time [sic] in her car and the FBI behind the scenes started vehicle tracking through people using their blackberry phones and ipods and the FBI was conducting vehicle surveillance of [P]laintiff's mother. (Id. at 271-74.) In section XIX, titled "Preliminary Statement," Plaintiff continues with his allegations of "FBI domestic intelligence targeting [P]laintiff's mother in connection with [P]laintiff's FBI file no. 513230EBO." (Id. at 274.) He alleges, in part:

540. . . . [The] United States of America is transmitting, intercepting, tampering, and blocking the content of a significant portion of the [P]laintiff and his mother's phone calls, emails, instant messaging, text messaging, electronic and wireless communications, and other communications domestically, including [P]laintiff's family in other states and practically every American[,] including the Trump team before the election[,] and specifically for the past 14 years of [P]laintiff's mother, beginning on or about January 2004 in Lake Wildwood in Macon, Georgia. 541. Plaintiff's FBI file no. 513230EBO, will show communications are intercepted, manipulated, tempered with, stored, (data mining), electronic harassment and electronic surveillance, and impeded since 2008. 542. Plaintiff is not delusional and has documents from credible sources, whistle blowers, and expert investigators. (Id. at 274-75.) Although Plaintiff's mother is not a party to this action, Plaintiff makes a number of allegations regarding her, including the following: • Plaintiff's mother was gang stalked by the FBI in collaboration with the Central Command Headquarters in 2008; • Plaintiff's mother was forced to move from place to place in 2010-2012 "to avoid the increased intensity of the electronic harassment that was in full operation 24 hours a day and 7 days a week"; • In 2010, she developed a cyst in her gums as a result of the electronic harassment and high frequency electrical shocks; • In 2011, she underwent oral surgery to remove the cyst, but on the morning of the surgery, the doctor who was scheduled to perform it "was replaced by six unknown surgeons that [P]laintiff and [P]laintiff's mother believed to have planted a biochip (which hooks the target to the air waves of the electronic harassment activities, tracks the target, and controls the mind and body of the target 'Remote Neural Monitoring' (RNM))"; • The implanted biochip "was orchestrated behind the scenes by the FBI and carried out by the Deep State"; and • "In 2012, the FBI behind the scenes conspired with the I.R.S. to intentionally file [P]laintiff's mother under 1040. . . for the purpose of financial sabotage." (Id. at 285-87; see also id. at 332-33.) Plaintiff adds that their neighbors were gang stalking and using Hi-Tech devices on him and his mother in Georgia since 2013. (Id. at 288.) He alleges that as a result of such interference "at public libraries, school's learning resource center, and home personal computers," he has been "unable to create pdf documents. . . and turn in key school assignments." (Id. at 294.)

In section XX, Plaintiff purports to introduce the "U.S. Intel community - Shadow Government & Deep State 'Secret' Patterns & Practices." (Id. at 294-99.) In section XXI, he gives a background of the intelligence community, including some allegedly "classified" information regarding "electronic torture, electromagnetic torture, microwave torture, electronic murder, electromagnetic murder, cooked alive, electronic mind control, brain zapping, [and] people zapper." (Id. at 299-304.) Interestingly, Plaintiff alleges that a victim of such conduct "[d]oes not know how harassment is happening or by whom," does not know why it is happening, and cannot get away no matter where he goes. (Id. at 304; but see id. at 284 (providing ways to block or distort most forms of electronic harassment), 293-94.)

Plaintiff further alleges:

628. In 2013-2018 and ongoing, the FBI behind the scenes launched Narus systems with the use of Military intelligence. . . for the purpose of carrying psychotronic weapons. . . toward the "Remote Mind Control" experiment ([P]laintiff's mother). 629. Military helicopters and fighter jets relentless [sic] and continuously[,] 7 days a week and 24 hours a day[,] fly directly over [P]laintiff's and his mother's house carrying psychotronic weapons. . . . . . . 655. In 2013- 2017, [P]laintiff and his mother's duplex apartment. . . in Conyers, Georgia was "wiretapped" by the FBI behind the scenes gaining access through property landlord. . . and the ceiling was "bugged" with an installed wall bug sensor functioning like a microphone. 656. Prior to the September 22, 2017, closing of house [sic]. . . in Jacksonville, Florida, the FBI behind the scenes gained access to the house through Patricia Harden (Owner) to install microwave spy-link and microwave powered wall bug sensor. 657. On November 7, 2017, plaintiff found wiretap equipment outside installed in the ground connected to the wall bug sensor. (Id. at 312-13, 346.) In Section XXII of the Amended Complaint, titled "Conclusion," Plaintiff continues to make general conspiracy allegations and provides a list of "symptoms" suffered by him and his mother. (Id. at 347-411.) In Section XXIII, titled "Tort Damages," Plaintiff cites the law regarding damages, and in Section XXIV, he lists case law awarding damages from other jurisdictions. (Id. at 411- 14.)

Starting on page 414 the Amended Complaint, in section XXV, Plaintiff begins the discussion about his eight causes of action. (Id. at 414.) The First Cause of Action is for "Violation of Judicial Process of Court Proceedings and Procedural Due Process." (Id.) Plaintiff claims that he was denied due process by SA Rolince, acting on behalf of the United States, by being held in solitary confinement without a telephone call and without a hearing. (Id.)

As discussed in more detail later, it is nearly impossible to determine which facts are relevant to a particular cause of action, because the Amended Complaint is a shotgun pleading. The Second Cause of Action is for "Violation of Substantive Due Process." (Id. at 415.) Plaintiff claims that his lengthy solitary confinement, without counsel and without a telephone call, amounted to punishment of a pre-indictment detainee in violation of state and federal laws. (Id. at 415-16.)

The Third Cause of Action is for "Negligence Under [the FTCA]." (Id. at 416.) Plaintiff claims that SA Rolince, SA Jones, SAC Jackson, and ASAC Hatfield, jointly and individually, acting on behalf of the United States, breached their duty to protect Plaintiff's right to counsel during interrogation and jail booking, and his right to a phone call during solitary confinement; and for such allegedly negligent conduct, Plaintiff seeks money damages. (Id. at 416-17.)

The Fourth Cause of Action is for "False Arrest/False Imprisonment Under [the FTCA] (Law Enforcement Proviso)." (Id. at 417.) Plaintiff claims that SA Rolince, SA Jones, SAC Jackson, and ASAC Hatfield, jointly and individually, acting on behalf of the United States, willfully and recklessly violated Plaintiff's federal and state rights, because his prolonged detention in solitary confinement was not justified, and, thus, it constituted false imprisonment. (Id. at 418.)

Plaintiff alleges that all material times, he was held as an unindicted detainee in a state facility in Macon, Georgia. (Doc. 7 at 121-22.) However, one of his exhibits shows that he was sentenced on July 11, 2003 and was discharged from the custody of the Georgia Department of Corrections on January 5, 2013. (Doc. 6-1.) The Fifth Cause of Action is for "Re-False Imprisonment/Misrepresentation/Deceit/Fraud under the [FTCA] (Law Enforcement Proviso)." (Id.) Plaintiff claims that SA Rolince, acting on behalf of the United States, inter alia, deceived his retained counsel, coerced the State of Georgia to backdate case documents, concealed documents in a secret FBI file to control the outcome of the case, and meddled in the voir dire process, discovery, pretrial motions, and Brady materials. (Id. at 419-22.) Plaintiff further claims that SAC Jackson, ASAC Hatfield, SA Rolince, SA Jones, SA Ward, and SA Allard, jointly and individually, acting on behalf of the United States, covered up omissions and wrongful acts by concealing documents indefinitely in a secret FBI file. (Id. at 419.)

The Sixth Cause of Action is for "Invasion of Privacy (Wiretap and Remote Mind Control) Under [the FTCA]." (Id. at 427.) Plaintiff claims that two addresses—one in Conyers, Georgia and one in Jacksonville, Florida—were wiretapped by the FBI, behind the scenes, by installing microwave spy-link in walls and microwave-powered wall bug sensor towards the "Remote Mind Control" experiment with Plaintiff's mother. (Id.) Plaintiff alleges that the actions of the United States were willful, wanton, and in gross and reckless disregard of his and his mother's privacy rights in violation of 18 U.S.C. § 1513(b). (Id.)

The Seventh Cause of Action is for "Assault ('Classified' Electromagnetic and Pschotronic [sic] 'Technology' Weapons) & Attempted Murder (Genocide) Under the [FTCA] (Law Enforcement Proviso)." (Id.) Plaintiff claims that he has been suffering from severe emotional distress as a result of the United States' energy attacks and intentional use of weapons of mass destruction pursuant to 18 U.S.C. § 2332. (Id. at 428.)

No such section exists. The Eighth Cause of Action is for "Gross Negligence under the [FTCA] - Non-Compliance of [sic] the Attorney General's Guideline Regarding the Use of Confidential Informants." (Id.) Plaintiff claims that SA Rolince, acting on behalf of the United States, "failed to comply with the 2001 Revised Attorney General's Confidential Informant Guidelines by intentionally failing to propose to operate [sic] [d]eactivated [c]onfidential [i]nformant Bernard Taylor," and by failing to do a suitability review of confidential informant Taylor. (Id. at 505-08.) The Amended Complaint acknowledges that "[n]othing in these Guidelines is intended to create or does create an enforceable legal right or private right of action by a [confidential informant] or any other person." (Id. at 437.)

How did electronic harassment start and where did it originally came from:

3.1 - [Hypersonic Sound System]

[Woody Norris] joined the [United States Army Air Force] in 1956. He was given an dishonorable discharge in 1959 and he started his own company. He is a inventor, and the technology that he is well known for is the "Hypersonic Sound System". Mentioned in [USA Today], the hypersonic sound system is a device/technology where it can deliver sound waves towards a person's brain and the brain can hear voices.

In conjunction with American Technology Corp. (now Genasys Inc.), [Woody Norris] worked on HSS and other audio technologies, including a compact sub-woofer and “sonic bullets,” which emit intense beams of sound at targeted individuals who pose a threat to others, giving them painful [migraines].

Rumor has it that this technology has been improved and a bigger system was created to deliver messages towards a person's brain. This improved system was mentioned to be a satellite.

[Satellite] is an object that is intentionally placed into orbit. These objects are called artificial satellites to distinguish them from natural satellites such as Earth's Moon. On 4 October 1957, the Soviet Union launched the world's first artificial satellite, Sputnik 1. Since then, about 8,900 satellites from more than 40 countries have been launched. According to a 2018 estimate, about 5,000 remained in orbit. Of those, about 1,900 were operational, while the rest had exceeded their useful lives and become space debris. In terms of countries with the most satellites, the United States has the most with 2,944 satellites, China is second with 499, and Russia third with 169.

3.2 - [Psycho-Electronic Weapons Effect]

Psycho-electronic weapons effect is similar term to [electronic harassment]. Electronic harassment is mentioned above in this same section. Psycho-electronic weapons effect is delivering electromagnetic radiation to every part of the human body. A diagram of these effects will be provided if you click on the subtitle that says Psycho-Electronic Weapons Effect, which will explain most of the effects that can be done on the human body. [WikiLeaks] was created by [Julian Assange], who is an Australian editor, publisher and activist.

There was a document provided by one of the users on [WikiLeaks] that has a list of people that went through electronic harassment and/or psycho-electronic weapons effect. This list includes about 100 people all around the world and they describe what kind of issues that they went through. The link will be provided right here and you just need to click on it. [FW: IMPEACH THESE CRIMINALS PLEASE - with 100 attached TORTURE CASE SUMMARIES]

Another person that should be mentioned is Stan J. Caterbone. He went to the U.S. Supreme Court and he was in the Eleventh Circuit Court of Appeals to petition to stop mind control. A link to this documentation will be provided here: [Stan J. Caterbone - United States Supreme Court - Mind Control - Petition Documentation]

NWO Totureware 666 [NWO Tortureware 666] [NWO Tortureware 666, Picture 1][NWO Tortureware 666, Picture 2][NWO Tortureware 666, Picture 3]



About

A robust software solution for targeted individual management. Voice to Skull Utility. No touch remote neural monitoring. Front end application for connection with global neural monitoring database. Quick convenient command line input. Not responsible for any improper use of this software, think before you type Voice To Skull Electronic (V2K), Remote Neural Monitoring, Monarch Slave Programming, SATAN, and Gangstalking.

Platforms: PC

Release date: Oct 8, 2022

Developer: Deltabop

Age rating: Not rated

Tags: occult, artificial-intelligence, mind-control, remote, v2k, voice-to-skull, neural, mkultra, monitoring

3.3 - [Electrophysiology]

[Greg Gage] is the co-founder and CEO of Backyard Brains, an Ann Arbor-based company started as a neuroscience graduate student at the University of Michigan. He is a published neuroscientist and engineer and develops tools, curriculum and experiments that allow the general public participate in neural discovery.

He is known for finding a technology called "electrophysiology". He created a software, which is pretty common for Electrical Engineers and Software Engineers. He also has equipment where two users wear the gear. Using this software, two people wear wires and pads on their arm. One of them is the main user while the other is going to be controlled by the main user. The one that is being controlled can not do anything. A video was provided by [Ted] where Greg Gage explains how electrophysiology and how it works. The link will be provided here: [Greg Gage - How to Control Someone Else's Arm with Your Brain]

Federal Government and Military Government - Advanced Technological Advancements [Targeted Justice] [Targeted Individual Diagram]

A [hacker] is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations.

[Watch This Russian Hacker Break Into Our Computer In Minutes | CNBC]

The video above is showing a Russian that can use his computer and hack to another person's device using the building's internet. Once the victim connects their computer to the Wi-Fi, the Russian hacker can view the computer's information and data and do whatever he likes. He can spy on their camera (take pictures or watch their every move), look at what they have done on their internet, etc.

As mentioned above, the phones that were owned by Phong were hacked by a professional hacker. It was to the point where no phone calls could be made, no text messages could be sent, and none of the apps could be used. The BlackBerry Classic that he purchased in 2015 worked pretty well despite the apps being not being effective such as the maps and sending photos on the smart phone. Later in 2017, he got hacked by an unknown professional hacker for almost a year during 2017-2018. He almost drowned in Huntington Beach, California and lost his BlackBerry Classic. He ended up getting an iPhone 6 from [Book Off] in Westminster, California. He went through the same issues just like the BlackBerry Classic but he managed to survive with it for three years. He is currently using an iPhone 10 (XR) and he is still getting hacked a little.

3.1 - Central Intelligence Agency - CIA

[Central Intelligence Agency - CIA], known informally as the Agency and historically as the Company, is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT) and performing covert actions. As a principal member of the United States Intelligence Community (IC), the CIA reports to the Director of National Intelligence and is primarily focused on providing intelligence for the President and Cabinet of the United States. President Harry S. Truman had created the Central Intelligence Group under the direction of a Director of Central Intelligence by presidential directive on January 22, 1946, and this group was transformed into the Central Intelligence Agency by implementation of the National Security Act of 1947.

Unlike the Federal Bureau of Investigation (FBI), which is a domestic security service, the CIA has no law enforcement function and is officially mainly focused on overseas intelligence gathering, with only limited domestic intelligence collection. The CIA serves as the national manager for the coordination of HUMINT activities across the U.S. intelligence community. It is the only agency authorized by law to carry out and oversee covert action at the behest of the President. It exerts foreign political influence through its tactical divisions, such as the Special Activities Center. The CIA was also instrumental in establishing intelligence services in several U.S. allied countries, such as Germany's BND. It has also provided support to many foreign political groups and governments, including planning, coordinating, training in torture, and technical support. It was involved in carrying out several regime changes, terrorist attacks, and planned assassinations of foreign leaders.

Since 2004 the CIA is organized under the Office of the Director of National Intelligence (ODNI). Despite transferring some of its powers to the DNI, the CIA has grown in size as a response to the September 11 attacks. In 2013, The Washington Post reported that in the fiscal year 2010, the CIA had the largest budget of all IC agencies, exceeding previous estimates.

The CIA has increasingly expanded its role, including covert paramilitary operations. One of its largest divisions, the Information Operations Center (IOC), has officially shifted focus from counter-terrorism to offensive cyber-operations.

The agency has been the subject of many controversies, including human rights violations, domestic wiretapping and propaganda, and allegations of drug trafficking. It has also appeared in works of fiction, including books, films and video games.

[Project MKUltra] was the code name of an illegal human experimentation program designed and undertaken by the U.S. Central Intelligence Agency (CIA). The experiments were intended to develop procedures and identify drugs such as LSD that could be used in interrogations to weaken individuals and force confessions through brainwashing and psychological torture. MKUltra used numerous methods to manipulate its subjects' mental states and brain functions, such as the covert administration of high doses of psychoactive drugs (especially LSD) and other chemicals, electroshocks, hypnosis, sensory deprivation, isolation, and verbal and sexual abuse, in addition to other forms of torture.

The [U.S. Army Biological Warfare Laboratories (USBWL)] were a suite of research laboratories and pilot plant centers operating at Camp (later Fort) Detrick, Maryland, United States beginning in 1943 under the control of the U.S. Army Chemical Corps Research and Development Command. The USBWL undertook research and development into biocontainment, decontamination, gaseous sterilization, and agent production and purification for the U.S. offensive biological warfare program.[1] The laboratories and their projects were discontinued in 1969.

Something worth remembering:

[Ku Klux Klan] The Ku Klux Klan (/ˌkuː klʌks ˈklæn, ˌkjuː-/),[c] commonly shortened to the KKK or the Klan, is the name of several historical and current American white supremacist, far-right terrorist organizations and hate groups. The Klan was "the first organized terror movement in American history."[39][40] Their primary targets are African Americans, Hispanics, Jews,[41][42][43][44][45] Latinos, Asian Americans, Native Americans,[46] Italian Americans, Irish Americans, and Catholics, as well as immigrants, leftists, homosexuals,[47][48][49][50] Muslims,[51][52][53] atheists,[29][30][31][32] and abortion providers.[54][55][56]

The first Klan was founded in Pulaski, Tennessee, on December 24, 1865,[86] by six former officers of the Confederate army:[87] Frank McCord, Richard Reed, John Lester, John Kennedy, J. Calvin Jones, and James Crowe.[88] It started as a fraternal social club inspired at least in part by the then largely defunct Sons of Malta. It borrowed parts of the initiation ceremony from that group, with the same purpose: "ludicrous initiations, the baffling of public curiosity, and the amusement for members were the only objects of the Klan", according to Albert Stevens in 1907.[89] The manual of rituals was printed by Laps D. McCord of Pulaski.[90] The origins of the hood are uncertain; it may have been appropriated from the Spanish capirote hood,[91] or it may be traced to the uniform of Southern Mardi Gras celebrations.[92]

Another one worth remembering:

[Nazism] ,[1] the common name in English for National Socialism (German: Nationalsozialismus, German: [natsi̯oˈnaːlzotsi̯aˌlɪsmʊs]), is the far-right totalitarian socio-political ideology and practices associated with Adolf Hitler and the Nazi Party (NSDAP) in Nazi Germany.[2][3][4] During Hitler's rise to power in 1930s Europe, it was frequently referred to as Hitlerism (German: Hitlerfaschismus). The later related term "neo-Nazism" is applied to other far-right groups with similar ideas which formed after the Second World War. Nazism is a form of fascism,[5][6][7][8] with disdain for liberal democracy and the parliamentary system. It incorporates a dictatorship,[4] fervent antisemitism, anti-communism, anti-Slavism,[9] scientific racism, white supremacy, Nordicism, social Darwinism and the use of eugenics into its creed. Its extreme nationalism originated in pan-Germanism and the ethno-nationalist Völkisch movement which had been a prominent aspect of German ultranationalism since the late 19th century. Nazism was strongly influenced by the Freikorps paramilitary groups that emerged after Germany's defeat in World War I, from which came the party's underlying "cult of violence".[10] It subscribed to pseudo-scientific theories of a racial hierarchy,[11] identifying ethnic Germans as part of what the Nazis regarded as an Aryan or Nordic master race.[12] Nazism sought to overcome social divisions and create a homogeneous German society based on racial purity which represented a people's community (Volksgemeinschaft). The Nazis aimed to unite all Germans living in historically German territory, as well as gain additional lands for German expansion under the doctrine of Lebensraum and exclude those whom they deemed either Community Aliens or "inferior" races (Untermenschen).

Japan and the Holocaust [Japan and the Holocaust]

Background[edit]

Map of territories held by the Japanese in 1942 See also: Jewish settlement in the Japanese Empire; The Holocaust; and Germany–Japan relations § Rapprochement, Axis and World War II (1920–1945)

In 1936, the German–Japanese Pact, also known as the Anti-Comintern Pact, was concluded between Nazi Germany and Japan,[7]: 111  and it was directed against the Communist International (Comintern). It was signed by German ambassador-at-large Joachim von Ribbentrop and Japanese ambassador to Germany Kintomo Mushanokōji.[8]: 188–189  The Japanese signatories had hoped that the Anti-Comintern Pact would effectively be an alliance against the Soviet Union, which is certainly how the Soviets perceived it.[9]: 226  There was also a secret additional protocol which specified a joint German-Japanese policy specifically aimed against the Soviet Union.[6]: 188–189 [10]: 197  After August 1939, Japan distanced itself from Germany as a result of the Molotov–Ribbentrop Pact.[9]: 24 [11]: 40  The Anti-Comintern Pact was followed by the September 1940 Tripartite Pact, which identified the United States as the primary threat rather than the Soviet Union, however by December 1941 this too was virtually inoperative.[12] The Anti-Comintern Pact was subsequently renewed in November 1941 and saw the entry of several new members into the pact.[13]: 49

Tripartite Pact

The [Tripartite Pact], also known as the Berlin Pact, was an agreement between Germany, Italy, and Japan signed in Berlin on 27 September 1940 by, respectively, Joachim von Ribbentrop, Galeazzo Ciano, and Saburō Kurusu (in that order) and in the presence of Adolf Hitler.[1] It was a defensive military alliance that was eventually joined by Hungary (20 November 1940), Romania (23 November 1940), Bulgaria (1 March 1941), and Yugoslavia (25 March 1941) as well as by the German client state of Slovakia (24 November 1940). Yugoslavia's accession provoked a coup d'état in Belgrade two days later. Germany, Italy, and Hungary responded by invading Yugoslavia. The resulting Italo-German client state, known as the Independent State of Croatia, joined the pact on 15 June 1941.

The Tripartite Pact was, together with the Anti-Comintern Pact and the Pact of Steel, one of a number of agreements between Germany, Japan, Italy, and other countries of the Axis Powers governing their relationship.[2]

The Tripartite Pact formally allied the Axis Powers with one another, and it was directed primarily at the United States.[3] Because of the distance difference between Japan and the two European Powers, the pact recognized two different regions that were to be under Axis rule.[4] Japan recognized "the leadership of Germany and Italy in the establishment of a new order in Europe". In return, Germany and Italy recognized Japan’s right to establish a new order "in Greater East Asia".[5] But the pact's practical effects were limited since the Italo-German and Japanese operational theatres were on opposite sides of the world, and the high contracting powers had disparate strategic interests. As such, the Axis was only ever a loose alliance.[6] Its defensive clauses were never invoked,[7] and signing the agreement did not oblige its signatories to fight a common war per se.[8]

The [Central Intelligence Agency] (CIA; /ˌsiː.aɪˈeɪ/), known informally as the Agency[6] and historically as the Company,[7] is a civilian foreign intelligence service of the federal government of the United States, officially tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT) and conducting covert action through its Directorate of Operations. As a principal member of the United States Intelligence Community (IC), the CIA reports to the Director of National Intelligence and is primarily focused on providing intelligence for the President and Cabinet of the United States. Following the dissolution of the Office of Strategic Services (OSS) at the end of World War II, President Harry S. Truman created the Central Intelligence Group under the direction of a Director of Central Intelligence by presidential directive on January 22, 1946,[8] and this group was transformed into the Central Intelligence Agency by implementation of the National Security Act of 1947.

Unlike the Federal Bureau of Investigation (FBI), which is a domestic security service, the CIA has no law enforcement function and is mainly focused on intelligence gathering overseas, with only limited domestic intelligence collection.[9] The CIA serves as the national manager for HUMINT, coordinating activities across the IC. It also carries out covert action at the behest of the President.[10][11] It exerts foreign political influence through its paramilitary operations units, such as the Special Activities Center.[12] The CIA was instrumental in establishing intelligence services in many countries, such as Germany's BND. It has also provided support to several foreign political groups and governments, including planning, coordinating, training in torture, and technical support. It was involved in many regime changes and carrying out terrorist attacks and planned assassinations of foreign leaders.[13][3]

Since 2004, the CIA is organized under the Office of the Director of National Intelligence (ODNI). Despite having had some of its powers transferred to the DNI, the CIA has grown in size as a response to the September 11 attacks. In 2013, The Washington Post reported that in the fiscal year 2010, the CIA had the largest budget of all IC agencies, exceeding previous estimates.[3][14]

The CIA has increasingly expanded its role, including covert paramilitary operations.[3] One of its largest divisions, the Information Operations Center (IOC), has officially shifted focus from counterterrorism to offensive cyber operations.[15]

The agency has been the subject of many controversies, including torture, human rights violations, domestic wiretapping, propaganda, and allegations of drug trafficking.

Operation Paperclip

[Operation Paperclip] was a secret United States intelligence program in which more than 1,600 German scientists, engineers, and technicians were taken from the former Nazi Germany to the U.S. for government employment after the end of World War II in Europe, between 1945 and 1959. Conducted by the Joint Intelligence Objectives Agency (JIOA), it was largely carried out by special agents of the U.S. Army's Counterintelligence Corps (CIC). Many of these Germans were former members and some were former leaders of the Nazi Party.[1][2]

[Operation Paperclip - Annie Jacobsen]

Operation Paperclip: The Secret Intelligence Program that Brought Nazi Scientists to America

The “remarkable” story of America's secret post-WWII science programs (The Boston Globe), from the New York Times bestselling author of Area 51.

In the chaos following World War II, the U.S. government faced many difficult decisions, including what to do with the Third Reich's scientific minds. These were the brains behind the Nazis' once-indomitable war machine. So began Operation Paperclip, a decades-long, covert project to bring Hitler's scientists and their families to the United States.

Many of these men were accused of war crimes, and others had stood trial at Nuremberg; one was convicted of mass murder and slavery. They were also directly responsible for major advances in rocketry, medical treatments, and the U.S. space program. Was Operation Paperclip a moral outrage, or did it help America win the Cold War?

Drawing on exclusive interviews with dozens of Paperclip family members, colleagues, and interrogators, and with access to German archival documents (including previously unseen papers made available by direct descendants of the Third Reich's ranking members), files obtained through the Freedom of Information Act, and dossiers discovered in government archives and at Harvard University, Annie Jacobsen follows more than a dozen German scientists through their postwar lives and into a startling, complex, nefarious, and jealously guarded government secret of the twentieth century.

In this definitive, controversial look at one of America's most strategic, and disturbing, government programs, Jacobsen shows just how dark government can get in the name of national security.

"Harrowing...How Dr. Strangelove came to America and thrived, told in graphic detail." —Kirkus Reviews

3.2 - Federal Bureau Investigation - FBI

Federal Bureau Investigation [FBI] was not cited for any illegal activity from what Phong knows. He asked for their help and he is not aware if FBI has done anything with the information that he submitted on phone and on their websites. The websites below were used to send information to the FBI. If any of you are going through hacking or are a victim, use these websites and have FBI help you on whatever you are dealing with.

FBI Websites:

[FBI - Submit a tip]

[Complaint Referral Form Internet Crime Complaint Center]

3.3 - National Security Agency - NSA

[National Security Agency - NSA] is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees.

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget, but information available as of 2013 indicates that the CIA pulled ahead in this regard, with a budget of $14.7 billion. The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end. The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program. The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices in high value targets (such as presidential palaces or embassies). SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, [and] breaking and entering".

Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage, the NSA does not publicly conduct human-source intelligence gathering. The NSA is entrusted with providing assistance to, and the coordination of, SIGINT elements for other government organizations – which are prevented by law from engaging in such activities on their own. As part of these responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which facilitates cooperation between the NSA and other U.S. defense cryptanalysis components. To further ensure streamlined communication between the signals intelligence community divisions, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

The NSA's actions have been a matter of political controversy on several occasions, including its spying on anti–Vietnam War leaders and the agency's participation in economic espionage. In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden, a former NSA contractor. According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens. The documents also revealed the NSA tracks hundreds of millions of people's movements using cellphones' metadata. Internationally, research has pointed to the NSA's ability to surveil the domestic Internet traffic of foreign countries through "boomerang routing".

A former NSA employee exposed this federal government agency and his name is [Edward Snowden]. He is an American former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and subcontractor. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments, and prompted a cultural discussion about national security and individual privacy.

[Edward Snowden] made a film called [Snowden], a 2016 biographical thriller film directed by Oliver Stone and written by Stone and Kieran Fitzgerald. Based on the books The Snowden Files (2014) by Luke Harding and Time of the Octopus (2015) by Anatoly Kucherena, the film stars Joseph Gordon-Levitt as Edward Snowden, a Central Intelligence Agency (CIA) subcontractor and whistleblower who copied and leaked highly classified information from the National Security Agency (NSA) beginning in 2013. In addition to Gordon-Levitt, the film features an ensemble cast including Shailene Woodley, Melissa Leo, Zachary Quinto, Tom Wilkinson, Scott Eastwood, Logan Marshall-Green, Timothy Olyphant, Ben Schnetzer, LaKeith Lee Stanfield, Rhys Ifans and Nicolas Cage. An international co-production of Germany, France, and the United States, principal photography began on February 16, 2015 in Munich.

The video link below shows the activity that the National Security Agency does on the daily with their computers. Professional hackers do this every day to see whether they can find threats to their country but they abuse their responsibilities and spy on whoever they want.

[Snowden NSA mass surveillance scene]

3.4 - Department of Defense - The Pentagon

[Department of Defense - The Pentagon] is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national security and the United States Armed Forces. The DOD is the largest employer in the world,[6] with over 1.4 million active-duty service members (soldiers, marines, sailors, airmen, and guardians) as of 2021.[7] More employees include over 826,000 National Guard and reservists from the armed forces, and over 732,000 civilians[8] bringing the total to over 2.8 million employees.[2] Headquartered at the Pentagon in Arlington, Virginia, just outside Washington, D.C., the DoD's stated mission is to provide "the military forces needed to deter war and ensure our nation's security".[9][10]

The Department of Defense is headed by the secretary of defense, a cabinet-level head who reports directly to the president of the United States. Beneath the Department of Defense are three subordinate military departments: the Department of the Army, the Department of the Navy, and the Department of the Air Force. In addition, four national intelligence services are subordinate to the Department of Defense: the Defense Intelligence Agency (DIA), the National Security Agency (NSA), the National Geospatial-Intelligence Agency (NGA), and the National Reconnaissance Office (NRO). Other Defense agencies include the Defense Advanced Research Projects Agency (DARPA), the Defense Logistics Agency (DLA), the Missile Defense Agency (MDA), the Defense Health Agency (DHA), Defense Threat Reduction Agency (DTRA), the Defense Counterintelligence and Security Agency (DCSA), the Space Development Agency (SDA) and the Pentagon Force Protection Agency (PFPA), all of which are subordinate to the secretary of defense. Additionally, the Defense Contract Management Agency (DCMA) is responsible for administering contracts for the DoD. Military operations are managed by eleven regional or functional Unified combatant commands. The Department of Defense also operates several joint services schools, including the Eisenhower School (ES) and the National War College (NWC).

[Department of Defense - The Pentagon] is known for taking care of all of their military branches in the United States of America. These branches include Marines, Air Force, Navy, Army, Coast Guard, and National Guard.

The Department of Defense was cited for developing a technology where they used a satellite and delivered feeds to a person's brain. These feeds were messages or words that could be heard in the person's brain. This technology was cited and written by [Sharon Weinberger] of the [Washington Post]. It was written on January 14, 2007 and the title is [The Washington Post - Mind Games].This article explains how the federal government and military government developed this technology and used it to spy and hurt people using a device or in this case, a satellite.

More information will be provided as Phong continues to contact the Department of Defense and the Department of Justice to find out who is hacking his devices and giving him psycho-electronic weapons effect.

https://www.ted.com/talks/sharon_weinberger_inside_the_massive_and_unregulated_world_of_surveillance_tech Mention Sharon Weinberger on her Ted Talk.

3.5 - United States Air Force - Air Force Research Laboratory (AFRL) [AFRL]



[Air Force Research Laboratory] is a scientific research organization operated by the United States Air Force Materiel Command dedicated to leading the discovery, development, and integration of aerospace warfighting technologies, planning and executing the Air Force science and technology program, and providing warfighting capabilities to United States air, space, and cyberspace forces. It controls the entire Air Force science and technology research budget which was $2.4 billion in 2006.

The Laboratory was formed at Wright-Patterson Air Force Base near Dayton, Ohio, on 31 October 1997 as a consolidation of four Air Force laboratory facilities (Wright, Phillips, Rome, and Armstrong) and the Air Force Office of Scientific Research under a unified command. The Laboratory is composed of eight technical directorates, one wing, and the Office of Scientific Research. Each technical directorate emphasizes a particular area of research within the AFRL mission which it specializes in performing experiments in conjunction with universities and contractors.

Since the Laboratory's formation in 1997, it has conducted numerous experiments and technical demonstrations in conjunction with NASA, Department of Energy National Laboratories, DARPA, and other research organizations within the Department of Defense. Notable projects include the X-37, X-40, X-53, HTV-3X, YAL-1A, Advanced Tactical Laser, and the Tactical Satellite Program.

The Laboratory may face problems in the future as 40 percent of its workers are slated to retire over the next two decades, while since 1980 the United States has not produced enough science and engineering degrees to keep up with demand.

There were a couple of people who served in Air Force that developed technology that is being used by the federal government and military government. These people would be Woody Norris and Louis B. Rosenberg.

[Woody Norris] joined the [United States Army Air Force] in 1956. He was given an dishonorable discharge in 1959 and he started his own company. He is a inventor, and the technology that he is well known for is the "Hypersonic Sound System". Mentioned in [USA Today], the hypersonic sound system is a device/technology where it can deliver sound waves towards a person's brain and the brain can hear voices.

[Louis B. Rosenberg] worked as a researcher at NASA (Ames Research Center) and at the Air Force Research Laboratory (formally Armstrong Labs) creating the Virtual Fixtures system, the first functional Augmented Reality system built and tested. The resulting studies were the first to show that AR overlays could amplify human performance in real-world physical tasks.

The technology that Louis B. Rosenberg researched on is very similar to [Motion Capture], which is currently being used by entertainment industries such as Warner Brothers Studios, Walt Disney Studios, Marvel Entertainment. Actors and actresses wear suits, and they make any kind of movements that can be recorded by a computer software. This technology is being exposed by Phong because he is currently going through it right now. None of you will believe him but if this group of professional hackers are found, you will find their equipment and you will be surprised.

Every military branch uses satellites to do their work on whatever they need to defend their country. The one that Phong notices a lot is the satellite camera. The satellite camera can zoom in on a certain area on Earth and they can see buildings, cars, and humans. This group of professional hackers have been following him since September 2017, and Phong believes that he is being recorded wherever he goes. The video link provided below shows how the military uses the satellite camera to do their work.

[U.S. military's real-time Google Street View- Airborne spy camera can track an entire city in 1800MP]

Treaty of Mutual Cooperation and Security between the United States and Japan

[Treaty of Mutual Cooperation and Security between the United States and Japan]

The Treaty of Mutual Cooperation and Security between the United States and Japan (日本国とアメリカ合衆国との間の相互協力及び安全保障条約, Nihon-koku to Amerika-gasshūkoku to no Aida no Sōgo Kyōryoku oyobi Anzen Hoshō Jōyaku), more commonly known as the U.S.-Japan Security Treaty in English and as the Anpo jōyaku (安保条約) or just Anpo (安保) in Japanese, is a treaty that permits the presence of U.S. military bases on Japanese soil, and commits the two nations to defend each other if one or the other is attacked "in the territories under the administration of Japan". Over time, it has had the effect of establishing a military alliance between the United States and Japan.

The current treaty, which took effect on June 23, 1960, revised and replaced an earlier version of the treaty, which had been signed in 1951 in conjunction with the signing of the San Francisco Peace Treaty that terminated World War II in Asia as well as the U.S.-led Occupation of Japan (1945–1952). The revision of the treaty in 1960 was a highly contentious process in Japan, and widespread opposition to its passage led to the massive Anpo protests, which were the largest popular protests in Japan's history.[1]

The 1960 treaty significantly revised the U.S.-Japan security agreement in the direction of greater mutuality between the two nations. The original 1951 treaty had contained a provision permitting the United States to use forces based in Japan throughout East Asia without prior consultation with Japan, made no explicit promise to defend Japan if Japan were attacked, and even contained a clause allowing U.S. troops to intervene in Japanese domestic disputes.[2] These defects were remedied in the revised version of the treaty in 1960. The amended treaty included articles delineating mutual defense obligations and requiring the US, before mobilizing its forces, to inform Japan in advance.[3] It also removed the article permitting U.S. interference in Japanese domestic affairs.[3]

The treaty also included general provisions for the further development of international understanding and improved economic collaboration between the two nations. These provisions became the basis for the establishment of the United States–Japan Conference on Cultural and Educational Interchange (CULCON), the United States–Japan Committee on Scientific Cooperation, and the Joint United States–Japan Committee on Trade and Economic Affairs, all three of which are still in operation in some form.[4]

The U.S.-Japan Security Treaty has never been amended and thus has lasted longer in its original form than any other treaty between two great powers since the 1648 Peace of Westphalia.[5] The treaty had a minimum term of 10 years but provided that it would remain in force indefinitely unless one party gives one year's notice of wishing to terminate it.

5.1 - US Forces in Japan

[US Forces in Japan]

About USFJ Welcome to Headquarters, U.S. Forces, Japan, (USFJ) and Yokota Air Base, Japan! Japan, the very word conjures up images of fans, kimonos, samurai and swords, cherry blossoms, and Mt Fuji. Such things are much a part of Japan; if you take full advantage of the wonderful adventure before you, you'll find there is much more to the "Land of the Rising Sun" than you ever dreamed. The springboard for your adventure will, of course, be your new home...Yokota Air Base. Whether you're active duty, a civilian government employee, or a family member, you're sure to find that the quality of life at Yokota is as good as anywhere else you have ever lived.

Yokota Air Base is located on the island of Honshu, Japan, on the Kanto Plain, 28 miles northwest of Tokyo, at the foot hills of the Okutama Mountains. The base lies within the political boundaries of six municipalities. These are Akishima, Fussa, Hamura, Mizuho, Musashi-Murayama, and Tachikawa.

The following provides a brief overview of USFJ, Yokota Air Base, and the local community. A joint assignment opportunity with USFJ is both challenging and rewarding.

HEADQUARTERS U.S. FORCES, JAPAN

Originally established at Fuchu Air Station on July 1, 1957, USFJ, with its U.S. Army, U.S Marine Corps, U.S Navy, and U.S Air Force elements, consists of approximately 54,000 military personnel, 45,000 dependents, 8,000 DoD civilian and contractor employees, and 25,000 Japanese workers. U.S. forces are stationed in Japan pursuant to the U.S.-Japan Treaty of Mutual Cooperation and Security of 1960.

Headquarters U.S. Forces Japan is located at Yokota Air Base. Approximately 160 military, DoD civilians, and Japanese national employees comprise the Commander, U.S. Forces, Japan's, (COMUSJAPAN) joint staff. The joint staff administers unilateral and bilateral defense issues. HQ USFJ focuses on war planning, conduct of joint/bilateral exercises and studies, administering the Status of Forces Agreement, improving combat readiness, and enhancing the quality of life of military and DOD civilian personnel and their dependents.

One of the most significant events in USFJ history took place on January 19, 1960. Christian A. Herter and Douglas MacArthur II signed the Treaty of Mutual Cooperation and Security for the United States. This treaty, with its related diplomatic notes and implementation arrangements, authorized the U.S. military presence in Japan. Of singular importance to USFJ was the signing of the Status of Forces Agreement (SOFA) on that same day. The U.S.- Japan Joint Committee established under the prior Administrative agreement was continued as the means for inter-governmental consultations on general matters regarding implementation of the SOFA, on U.S. facilities.

COMUSJAPAN's mission stems directly from the treaty and the resulting presence of U.S. forces in Japan. The commander is responsible for developing plans for the defense of Japan and must be prepared, if contingencies arise, to assume operational control of assigned and attached U.S. forces for the execution of those plans. The commander's peacetime responsibilities include representing the Commander, U.S. Pacific Command, in relations among U.S. forces and other Department of Defense elements, the U.S. Ambassador, the Japan Ministry of Defense, and other Government of Japan agencies.

The USFJ insignia was approved by the Institute of Heraldry in May 1977. The insignia portrays the close professional working relationship between USFJ and the Japan Self Defense Forces.

Japan has implemented a series of "Defense Buildup Plans" since fiscal year 1958 which coincide with USFJ's longevity. The 1960s were a time of turmoil for USFJ, with the return of many of the bases and facilities held since the end of the war, the intense activities at depots and bases in support of American forces deployed in Southeast Asia, and anti-war and anti-base demonstrations among some elements of the Japanese public.

A major change in USFJ responsibilities occurred with the 1972 reversion of Okinawa to the Japanese government, and some related changes to the Status of Forces Agreement -- a major expansion of USFJ activities. Military-related problems formerly handled by the High Commissioner, Ryukyu Islands, became the responsibility of USFJ. An Okinawa Area Field Office was established to represent USFJ interests there.

In 1976, the Subcommittee for Defense Cooperation was established. This subcommittee, consisting of military and civilian members of both countries, permits consultation concerning mutual defense issues.

Return of U.S. facilities and areas, as well as joint usage, continued during the 1970s, especially on the main islands. The U.S. Air Force's Fifth Air Force transferred its tactical aircraft from the main islands and consolidated other activities in the Kanto Plain area. Support and military housing facilities in many areas were closed. Army depots were reduced or closed.

Besides reduction in facilities, there was a decrease in the number of Japanese nationals employed by USFJ. On July 1, 1957, USFJ was one of the largest employers in Japan with a main island workforce of 152,000. Overall labor costs were low -- with an average annual payroll cost of $1,181 per employee. Today, the Japanese national workforce is about 25,000; with an average annual payroll of over $56,000 per appropriated employee.

During the final four months of 1974, the headquarters of USFJ was relocated from Fuchu Air Station to Yokota Air Base.

A real milestone in U.S. and Japan military relations came in November 1978, when both governments approved a document known as the Guidelines for Defense Cooperation. This document formed the basis for definitive and comprehensive military planning and other activities between U.S. forces and Japan Self Defense Forces. The two key elements of the guidelines are: guidance and direction for planning to meet other contingencies in the Far East that would affect Japan's security; and provisions for studies and analyses to be performed in several areas related to and supportive of the two main efforts.

Another milestone was the New Special Measures Agreement, signed by the Government of Japan in January 1991. This agreement, combined with previously-agreed-to Labor Cost Sharing agreements and a generous Facilities Improvement Program, clearly established Japan as our most generous ally in Host Nation Support. Japan pays most yen-based labor expenses (appropriated and non-appropriated funds) and a portion of utility costs (fuel, electricity, sewage, and water). The SMA was renewed in 2011.

U.S. military forces are dispersed among 85 facilities located on Honshu, Kyushu, and Okinawa. Total acreage of U.S. bases is approximately 77,000 acres. USFJ bases and facilities range in size from a several thousand acre training area to a single antenna site.

The National Defense Program Outline, approved in 1995, delineates the basic concepts for Japan's security policy, and reaffirms the importance of the U.S.-Japan security relationship and includes efforts that should strengthen Japan's regional and global role with the United States.

In September 1997, new Guidelines for U.S.-Japan Defense Cooperation were issued. The revised Defense Guidelines are designed to provide the foundation for more effective bilateral defense coordination and will improve peacekeeping operations, humanitarian relief operations, rear area support to U.S. forces, and intelligence sharing activities.

The U.S.-Japan alliance is essential to the free world posture in the Pacific. In the mutual security treaty, the United States and Japan acknowledge that they have a common stake in the security and peaceful progress of the Far East region. USFJ has made a positive contribution to the peace and security of the Far East and to the preservation of world peace.

On mainland Japan, there are seven different bases/posts. Yokota and Misawa, representing the Air Force; Camp Zama, representing the Army; Iwakuni; the Marine Corps; and Yokosuka, Atsugi, and Sasebo, the Navy. The closest of these is Camp Zama, which is approximately 20 miles from Yokota. The drive time, due to the traffic congestion in Japan, can be anywhere between one to two hours. The next largest facility on the island is Yokosuka, which is 70 kilometers away and can take two to three hours by car.

UNITED STATES ARMY JAPAN & I CORPS (FORWARD)

U.S. Army, Japan, consists of about 2,000 soldiers and is charged, during peacetime, with operating port facilities and a series of logistics installations throughout Honshu and Okinawa. USARJ participates actively with the Japan Ground Self Defense Force in bilateral training exercises and the development of bilateral plans. It commands and supports U.S. Army assigned units, attached units, and augmentation forces and employs these forces in support of the Commander. USARJ maintains and strengthens the credibility of deterrent power in the Pacific through maintenance of defense facilities, war reserves and operational project stocks. USARJ/9th TSC is headquartered at Camp Zama.

III MARINE EXPEDITIONARY FORCE

III MEF, which is under the operational command of Marine Forces Pacific, are garrisoned primarily on Okinawa and Southern Honshu. III MEF is headquartered at Camp Courtney, Okinawa.

MARINE CORPS INSTALLATIONS COMMAND - PACIFIC

Marine Corps Installations Pacific provides oversight of Marine Corps installations in Hawaii, Japan and the Republic of Korea. MCIPACs primary mission is to implement policies, develop regional strategies and plans, prioritize resources and provide services, direction, and oversight to all assigned U.S. Marine Corps installations in order to support the operating forces, tenant commands and activities. Specifically in Japan, MCIPAC consists of two air stations and 10 camps/housing areas throughout Okinawa and mainland Japan. Headquarters for MCIPAC resides aboard Camp Foster in Okinawa.

The total number of Marines in Japan is approximately 18,000.

COMMANDER, NAVAL FORCES JAPAN

Commander, Naval Forces, Japan, consisting of about 6,000 personnel, is responsible for maintaining and operating the port facilities and providing base and logistic support for those surface, subsurface, aviation and amphibious elements of the U.S. Seventh Fleet that operate from Japan as part of the Forward Deployed Naval Forces (FDNF). U.S. Commander Navy Forces, Japan, participates with the Japan Maritime Self Defense Force in exercises and planning. CNFJ is headquartered at Yokosuka.

COMMANDER, U.S. 7TH FLEET

U.S. Seventh Fleet, which is under the operation control of Commander, Pacific Fleet, has about 13,000 sailors, 18 ships, and 100 airplanes operating from Japan as part of the Forward Deployed Naval Forces.

5TH AIR FORCE

The Fifth Air Force supports the Defense of Japan, advances United States (US) interests, and promotes broader Asia-Pacific security and stability by advancing bilateral air, space, and cyberspace operations capability and interoperability, enabling United States Air Force (USAF) forces and capabilities in Japan, and rapidly responding to crises.

History of the Japanese in San Francisco [History of the Japanese in San Francisco]

During World War II, San Francisco saw the largest and oldest enclave of Japanese outside of Japan, Japantown, completely empty out its ethnic Japanese residents as a result of Executive Order 9066 that forced all Japanese of birth or descent in the United States to be interned. By 1943 many large sections of the neighborhood remained vacant due to the forced internment.

Executive Order 9066

[Executive Order 9066] was a United States presidential executive order signed and issued during World War II by United States president Franklin D. Roosevelt on February 19, 1942. "This order authorized the forced removal of all persons deemed a threat to national security from the West Coast to "relocation centers" further inland – resulting in the incarceration of Japanese Americans."[1] Two-thirds of them were U.S. citizens, born and raised in the United States.

Notably, far more Americans of Asian descent were forcibly interned than Americans of European descent, both in total and as a share of their relative populations. German and Italian Americans who were sent to internment camps during the war were sent under the provisions of Presidential Proclamation 2526 and the Alien Enemy Act, part of the Alien and Sedition Act of 1798.

Termination, apology, and redress

President Gerald Ford signs a proclamation confirming the termination of Executive Order 9066 (February 19, 1976) In 1943 and 1944, Roosevelt did not release those incarcerated in the camps despite the urgings of Attorney General Francis Biddle, Secretary of Interior Harold L. Ickes. Ickes blamed the president's failure to act on his need to win California in a potentially close election. In December 1944, Roosevelt suspended the Executive Order after the Supreme Court decision Ex parte Endo. [16] Detainees were released, often to resettlement facilities and temporary housing, and the camps were shut down by 1946.[12]

In the years after the war, the interned Japanese Americans had to rebuild their lives after having suffered heavy personal losses. United States citizens and long-time residents who had been incarcerated lost their personal liberties; many also lost their homes, businesses, property, and savings. Individuals born in Japan were not allowed to become naturalized US citizens until after passage of the Immigration and Nationality Act of 1952.[12]

On February 19, 1976, President Gerald Ford signed a proclamation formally terminating Executive Order 9066 and apologizing for the internment, stated: "We now know what we should have known then – not only was that evacuation wrong but Japanese-Americans were and are loyal Americans. On the battlefield and at home the names of Japanese-Americans have been and continue to be written in history for the sacrifices and the contributions they have made to the well-being and to the security of this, our common Nation."[17][18]

In 1980, President Jimmy Carter signed legislation to create the Commission on Wartime Relocation and Internment of Civilians (CWRIC). The CWRIC was appointed to conduct an official governmental study of Executive Order 9066, related wartime orders, and their effects on Japanese Americans in the West and Alaska Natives in the Pribilof Islands.

In December 1982, the CWRIC issued its findings in Personal Justice Denied, concluding that the incarceration of Japanese Americans had not been justified by military necessity. The report determined that the decision to incarcerate was based on "race prejudice, war hysteria, and a failure of political leadership". The Commission recommended legislative remedies consisting of an official Government apology and redress payments of $20,000 to each of the survivors; a public education fund was set up to help ensure that this would not happen again (Pub. L.Tooltip Public Law (United States) 100–383).

On August 10, 1988, the Civil Liberties Act of 1988, based on the CWRIC recommendations, was signed into law by [Ronald Reagan]. On November 21, 1989, George H. W. Bush signed an appropriation bill authorizing payments to be paid out between 1990 and 1998. In 1990, surviving internees began to receive individual redress payments and a letter of apology. This bill applied to the Japanese Americans and to members of the Aleut people inhabiting the strategic Aleutian islands in Alaska who had also been relocated.[19]

Artificial Intelligence [History of Artificial Intelligence]

In 1981, the Japanese Ministry of International Trade and Industry set aside $850 million for the Fifth generation computer project. Their objectives were to write programs and build machines that could carry on conversations, translate languages, interpret pictures, and reason like human beings.[152] Much to the chagrin of scruffies, they chose Prolog as the primary computer language for the project.[153]

Other countries responded with new programs of their own. The UK began the £350 million Alvey project. A consortium of American companies formed the Microelectronics and Computer Technology Corporation (or "MCC") to fund large scale projects in AI and information technology.[154][155]DARPA responded as well, founding the Strategic Computing Initiative and tripling its investment in AI between 1984 and 1988.[156]

 List of diplomatic missions of the United States 

[US Embassy]

The United States has the second most active diplomatic posts of any country in the world after the People's Republic of China,[1] including 249 bilateral posts (embassies and consulates) in 168 countries as well as 11 permanent missions to international organizations and seven other posts (as of 2021[2]). It maintains "interest sections" (in other states' embassies) in Afghanistan, Iran, North Korea, and Syria.

Targeted Justice [Targeted Justice]

Our Main Message:

1) More than 300,000 Targeted Individuals in the U.S., are being tracked and attacked with High-Powered Microwave (HPM) weapons, from satellites and cell towers, 24/7.   These weapons are controlled from Schriever Air Force Base in Colorado.  See our pictures of microwave burns as proof:     https://www.targetedjustice.com/microwave-burns1.html      This is the same weapon system, used on the U.S. Diplomats in Cuba, resulting in "Havana Syndrome."

Many famous people are Targeted Individuals: Ed Snowden, Julian Assange, and William Binney. Roseanne Barr, Cardi B, Joni Mitchell, Van Morrison, Senator Ron Johnson (R-WI), Dr Steven Greer MD, Randy Quaid, Dennis Kucinich (former Congressman), Brian Wilson (Beach Boys), Billy Koch (former Oakland A's pitcher), John Frusciante (Red Hot Chili Peppers) and John McAfee (dec.). They are hit with microwave attacks, or Morgellons, or Voice-to-skull (V2K) every day.

2) Most people in the world, are being precisely tracked by microwave pulses using Lockheed GPS satellites, operated by the U.S. Space Force, Squadron 2, at Schriever Space Force Base in Colorado Springs. This is the largest satellite operations facility in the world.    https://satellitemap.space/?constellation=GPS

3) Panel antennas on cell towers are part of a "global distributed weapon system."  The antennas use digital beamforming to create microwave "bullets," that can be very painful, and even lethal.   U.S. Patent 10,164,694

4) Subliminal messages are directed from Cell Towers, at everyone, 24/7.  Schriever Space Force Base is the control source.  U.S. Patent 4,877,027.  Senators, Congressmen, Judges, and even the President, are being hit with specific subliminal messages to affect their decisions.  This is the technology behind "Mass Formation Psychosis."  (See the Joe Rogan interview with Dr Robert Malone at 2:37:00)

5) Approximately 1/3 of the global population is "highly suggestible" and easily manipulated by these subliminal messages, because many are effectively in a Deep Trance, even while their eyes are open.  These people can be commanded to say or do, almost anything.   Many secondary personalities are also involved.

6) The CIA controls and funds this illegal program, with direction from the Council on Foreign Relations (CFR).  The program is based on MK-Ultra mind control technology, and the FBI's illegal COINTELPRO.

7) Many people can feel the satellite-tracking microwave pulse, on the top-back part of your head – about one pulse each second. Many people can hear the cell tower tracking "popcorn," by cupping your hands over your ears for 60 seconds.

8) This news article quotes NSA data -  as of 2019, there are 200,000 Targeted Individuals in the United States, and more than 5.5 million worldwide.  The FBI calls these people "Targets," or "Non-Investigative Subjects (NIS)." https://www.nytimes.com/2021/04/26/us/politics/fbi-fisa-surveillance.html

...

Here are handouts for talking to Legislators, Lawyers, family members, etc.

The CIA & FBI's corrupt history of MK-ULTRA and COINTELPRO. These illegal programs were never shut down.

COINTELPRO. Known tactics included: Discrediting, smearing, character assassination. Covert campaigns to destroy interpersonal relationships, Harassment, Conspicuous surveillance (also known as stalking), anonymous letters and phone calls, IRS tax audits, legal harassment, Manipulation or strong-arming of parents, employers, landlords, school officials and others to create problems for targets. Threats, intimidation, surreptitious home searches and "black bag" jobs, vandalism, "Sneak & Peak," Constant surveillance.

MK-ULTRA features and goals include: Create a subject who is easier to control and manipulate, create programmed assassins, develop more effective means of torture and interrogation, break down the personality of the subject and insert new belief systems, ethics, politics, personality traits; performed on unwitting and unwilling subjects; manipulate mental states and alter brain function; surreptitious drugging; isolation; verbal and sexual abuse; various forms of torture employed; promote illogical thinking and impulsiveness in the subject so that they will be discredited in public; attempt to produce amnesia for periods of time; surreptitious production of shock or confusion in subject over extended periods of time; attempt to alter the subject’s personality; attempt to lower the subject's ambition and work efficiency; attempt to impair eyesight and/or hearing; attempt to activate specific behavior by remote means.

Ethnic Cultures and Groups

Asian Boyz

The [Asian Boyz], also known as ABZ, AB-26, or ABZ Crips,[12] are a street gang based in Southern California. They were founded in the late 1980s to protect[13][14] Cambodian refugees from other American gangs.[15][16] According to the FBI, the gang has about 12,000 members, who are predominantly Southeast Asian and especially Cambodian.[12] Many Asian Boyz are also members of the U.S. military, some of whom use their position to traffic drugs.[14] According to the FBI's 2009 National Gang Threat Assessment, the Asian Boyz are active in 28 different cities in 14 different states across the U.S.[3]

Mexican Mafia

The [Mexican Mafia] (Spanish: Mafia Mexicana), also known as La eMe (Spanish for "the M"), is a Mexican American criminal organization in the United States.[1][3] Despite its name, the Mexican Mafia did not originate in Mexico, and is entirely a U.S. criminal prison organization. Law enforcement officials report that the Mexican Mafia is the deadliest and most powerful gang within the California prison system.[26]

Government officials state that there are currently 400–500 official members of the Mexican Mafia[citation needed] with thousands of hitmen and associates within prison and an estimate of more than 50,000 foot soldiers who also carry out its illegal activities on the streets in the hopes of becoming full members. The Mexican Mafia has influence over every Hispanic street gang in Southern California, including the notoriously brutal MS-13 and 18th Street Gang, since in the prison system inmates are recruited into gangs based on race regardless of street gang affiliation. The U.S. Government considers the Mexican Mafia to be "among the most powerful, dangerous and feared criminal organizations in the world".

African-American Organized Crime

In the late 19th and early 20th centuries, [African-American Organized Crime] emerged following the first and second large-scale migration of African Americans from the Midwest to major cities of the Northeast, Midwest, and later the West Coast. In many of these newly established communities and neighborhoods, criminal activities such as illegal gambling (e.g. the numbers racket), speakeasies and were seen in the post-World War I and Prohibition eras. Although the majority of these businesses in African American neighborhoods were operated by African Americans, it is often unclear the extent to which these operations were run independently of the larger criminal organizations of the time.

Mafia

[Mafia] is an informal term that is used to describe criminal organizations that bear a strong similarity to the Italian Mafia. The central activity of such an organization would be the arbitration of disputes between criminals as well as the organization and enforcement of illicit agreements between criminals through the use of or threat of violence.[1] Mafias often engage in secondary activities such as gambling, loan sharking, drug-trafficking, prostitution, and fraud.

The term "mafia" was originally applied to the Sicilian Mafia. The term has since expanded to encompass other organizations of similar methods and purpose, e.g., "the Russian Mafia" or "the Japanese Mafia". The term was coined by the press and is informal; the criminal organizations themselves have their own names (e.g. the Sicilian Mafia and the related Italian-American Mafia refer to their organizations as "Cosa Nostra"; the "Japanese Mafia" calls itself "Ninkyō dantai" but is more commonly known as "Yakuza" by the public; "Russian Mafia" groups often call themselves "Bratva".)

When used alone and without any qualifier, "Mafia" or "the Mafia" typically refers to either the Sicilian Mafia or the Italian-American Mafia and sometimes Italian organized crime in general (e.g., Camorra, 'Ndrangheta, etc.).

Today the 'Ndrangheta, originating in the Southern Italian region of Calabria, is widely considered the richest and most powerful mafia in the world.[2][3] The 'Ndrangheta has been around for as long as the better-known Sicilian Cosa Nostra, but was only recently designated as a Mafia-type association in 2010 under Article 416 bis of the Italian penal code.[4][5] Italy's highest court of last resort, the Supreme Court of Cassation, had ruled similarly on 30 March 2010.[6]

Ku Klux Clan

The [Ku Klux Clan] (/ˌkuː klʌks ˈklæn, ˌkjuː-/),[c] commonly shortened to the KKK or the Klan, is the name of several historical and current American white supremacist, far-right terrorist organizations and hate groups. The Klan was "the first organized terror movement in American history."[39][40] Their primary targets are African Americans, Hispanics, Jews, Latinos, Asian Americans, Native Americans, Italian Americans, Irish Americans, and Catholics, as well as immigrants, leftists, homosexuals, Muslims, atheists, and abortion providers.

Three separate Klans have existed in three non-overlapping time periods. Each comprised local chapters with little or no central direction. Each has advocated extremist reactionary positions such as white nationalism, anti-immigration and—especially in later iterations—Nordicism, antisemitism, anti-Catholicism, Prohibition, right-wing populism, anti-communism, homophobia, anti-atheism, and Islamophobia. The first Klan, founded by Confederate veterans in the late 1860s,[41] would assault and murder politically active Black people and their allies in the South. The second iteration of the Klan originated in the late 1910s, and was the first to use cross burnings and white hooded robes. The KKK of the 1920s had a nationwide membership in the millions and reflected a cross-section of the native-born white population.[42] The third Klan formed in the mid 20th century, largely as a reaction to the growing civil rights movement. It committed murders and bombings to achieve its aims. All three movements have called for the "purification" of American society, and are all considered far-right extremist organizations. In each era, membership was secret and estimates of the total were highly exaggerated by both friends and enemies.

The first Klan, established in the wake of the Civil War, was a defining organization of the Reconstruction era. According to historian Fergus Bordewich, the Klan was "the first organized terror movement in American history."[40] Federal law enforcement began taking action against it around 1871. The Klan sought to overthrow Republican state governments in the South, especially by using voter intimidation and targeted violence against African-American leaders. The Klan was organized into numerous independent chapters across the Southern United States. Each chapter was autonomous and highly secretive about membership and plans. Members made their own, often colorful, costumes: robes, masks and pointed hats, designed to be terrifying and to hide their identities.

The second Klan started in 1915 as a small group in Georgia. It suddenly started to grow after 1920 and flourished nationwide in the early and mid-1920s, including urban areas of the Midwest and West. Taking inspiration from D. W. Griffith's 1915 silent film The Birth of a Nation, which mythologized the founding of the first Klan, it employed marketing techniques and a popular fraternal organization structure. Rooted in local Protestant communities, it sought to maintain white supremacy, often took a pro-Prohibition stance, and it opposed Jews, while also stressing its opposition to the alleged political power of the pope and the Catholic Church. This second Klan flourished both in the south and northern states; it was funded by initiation fees and selling its members a standard white costume. The chapters did not have dues. It used K-words which were similar to those used by the first Klan, while adding cross burnings and mass parades to intimidate others. It rapidly declined in the latter half of the 1920s.

The third and current manifestation of the KKK emerged after 1950, in the form of localized and isolated groups that use the KKK name. They have focused on opposition to the civil rights movement, often using violence and murder to suppress activists. This manifestation is classified as a hate group by the Anti-Defamation League and the Southern Poverty Law Center.[43] As of 2016, the Anti-Defamation League puts total KKK membership nationwide at around 3,000, while the Southern Poverty Law Center puts it at 6,000 members total.[44]

The second and third incarnations of the Ku Klux Klan made frequent references to a false mythologized perception of America's "Anglo-Saxon" blood, hearkening back to 19th-century nativism.[45] Although members of the KKK swear to uphold "Christian morality", Christian denominations widely denounce them.[46]

Events in USA

[World Trade Center]

Destruction Main article: Collapse of the World Trade Center See also: September 11 attacks, American Airlines Flight 11, and United Airlines Flight 175

A fireball rises in the immediate aftermath of United Airlines Flight 175 hitting the South Tower during the September 11 attacks.

The World Trade Center site after the September 11 attacks seen from above the original building locations (outlined in yellow) On September 11, 2001, Islamist terrorists hijacked two flights and crashed them into the Twin Towers. One group led by Mohamed Atta crashed American Airlines Flight 11 into the northern facade of the North Tower[193] at 8:46:40 a.m.; the aircraft struck between the 93rd and 99th floors. Seventeen minutes later, at 9:03:11 a.m.,[a] a second group led by Marwan al-Shehhi crashed the similarly hijacked United Airlines Flight 175 into the southern facade of the South Tower, striking it between the 77th and 85th floors.[198]

The terrorist organization al-Qaeda, led by Osama bin Laden, carried out the attacks in retaliation for certain aspects of American foreign policy, particularly U.S. support of Israel and the presence of U.S. troops in Saudi Arabia. The damage caused to the North Tower by Flight 11 destroyed any means of escape from above the impact zone, trapping 1,344 people.[199] Flight 175 had a much more off-centered impact compared to Flight 11, and a single stairwell was left intact; however, only a few people managed to descend successfully before the tower collapsed. Although the South Tower was struck lower than the North Tower, thus affecting more floors, a smaller number (fewer than 700) were killed instantly or trapped.[200]

At 9:59 a.m., the South Tower collapsed after burning for approximately 56 minutes. The fire caused steel structural elements, already weakened from the plane's impact, to fail. The North Tower collapsed at 10:28 a.m., after burning for approximately 102 minutes.[201] At 5:20 p.m., 7 World Trade Center began to collapse with the crumbling of the east penthouse and collapsed completely at 5:21 p.m.[202] due to uncontrolled fires causing structural failure.[203]

The Marriott World Trade Center hotel was destroyed during the two towers' collapse. The three remaining buildings in the WTC plaza were extensively damaged by debris and later demolished.[204] The cleanup and recovery process at the World Trade Center site took eight months.[205] The Deutsche Bank Building across Liberty Street from the World Trade Center complex was later condemned because of the uninhabitable toxic conditions inside; it was deconstructed, with work completed in early 2011.[206][207] The Borough of Manhattan Community College's Fiterman Hall at 30 West Broadway was also condemned due to extensive damage, and it was demolished and completely rebuilt.[208]

In the immediate aftermath of the attacks, media reports suggested that tens of thousands might have been killed in the attacks, as over 50,000 people could have been inside the World Trade Center. The National Institute of Standards and Technology (NIST) estimated approximately 17,400 individuals were in the towers at the time of the attacks.[209] Ultimately, 2,753 death certificates (excluding those for hijackers) were filed relating to the 9/11 attacks.[23]

There were 2,192 civilians who died in and around the World Trade Center, including 658 employees of Cantor Fitzgerald L.P. (an investment bank on the 101st to 105th floors of One World Trade Center),[210] 295 employees of Marsh & McLennan Companies (located immediately below Cantor Fitzgerald on floors 93 to 101, the location of Flight 11's impact), and 175 employees of Aon Corporation.[211] In addition to the civilian deaths, 414 sworn personnel were also killed: 343 New York City Fire Department (FDNY) firefighters, including 2 FDNY paramedics and 1 FDNY chaplain, and 71 law enforcement officers, including 37 members of the Port Authority Police Department (PAPD) and 23 members of the New York City Police Department (NYPD). Eight EMS personnel from private agencies also died in the attacks.[212][213][214] Ten years after the attacks, the remains of only 1,629 victims had been identified.[215] Of all the people who were still in the towers when they collapsed, only 20 were pulled out alive.[216]

Pentagon Renovation Program

The [Pentagon Renovation Program] (PENREN) was a long-term project by the United States Department of Defense to perform a complete slab-to-slab renovation of the Pentagon in Arlington, Virginia. The program began in the 1990s, and was completed in June 2011.[1][2]

The full-scale renovation became necessary because by the mid-1990s, the Pentagon had never undergone a major renovation and building systems had deteriorated beyond repair, requiring complete replacement. Asbestos throughout the building made almost any building work complex and disruptive.[3]

The Defense Authorization Act of 1991 transferred control of the Pentagon Reservation from the General Services Administration to the Department of Defense, and established the Pentagon Reservation Maintenance Revolving Fund, designed to fund Pentagon renovations. This move enabled the Secretary of Defense to determine rental rates for Pentagon tenants to help fund the renovation.[3]

Navy build-out 2A1 The Navy Build-Out project is located in the basement of Wedge 4 and consists of approximately 30,000 square feet (2,800 m2) of occupiable space. Demolition and abatement of this space was completed in November 2001. The build-out contract was awarded in September 2001 and construction began in early November 2001. The contractor designed and constructed office space, conference/training rooms, and supporting spaces including mechanical rooms, telephone closets, electrical closets, bathrooms, equipment rooms, etc. to house the Navy.[6]

In order to fulfill the new structural requirements of the renovation design over 200 helical screwed piles were installed through the existing slab on grade to support a new floor slab. The original completion date was set as March 2003, with tenant move in scheduled for April 2003. The project was completed in June 2003.[7]

Pentagon Athletic Center The original facility, the Pentagon Officers Athletic Club was located east of the Pentagon on the opposite side of the abandoned railroad track. It had never undergone a physical renovation. PAC management made it a point to keep the facility updated with modern equipment. However, the projected increase in usage would soon exceed the amount of space available. The replacement PAC is located on the north side of the Pentagon next to the Remote Delivery Facility and new helipad and is more than 50% larger, and accommodates 8,000 members per day, compared to the 2,000 members per day supported by the POAC. The additional space increased the facility's capacity to bring in more workout equipment, allow for more varied exercise areas and rooms, and help to reduce crowded conditions during peak hours.[8]

Pentagon Library and Conference Center The Pentagon Library and Conference Center project, also known as PLC2, transformed the former Pentagon Athletic Center into the new home for the Army library, 16 conference rooms operated by the Department of Defense Concessions Committee, several offices under the Pentagon Force Protection Agency, and also a cafe for catering purposes. Design elements include a two-story grand hall entrance, terrazzo flooring, and large skylights to provide natural light.

Due to the former Pentagon Athletic Center's being completely underground, in creating the new facility, PENREN had to completely demolish the original structure, leaving only the surrounding walls and roof intact.[9]

Events here in Southern California

[Robert Citron] (April 14, 1925 – January 16, 2013) was the longtime Treasurer-Tax Collector of Orange County, California, when it declared Chapter 9 bankruptcy on December 6, 1994. The bankruptcy was brought on by Citron's investment strategies,[2] which seemed to be an effort to earn high incomes for the county, without raising taxes, through risky, leveraged positions in bonds. The strategy paid out at first. In 1994, a cash crunch occurred when interest rates increased and financiers for the county required increased collateral from the county.[1] It was later revealed that Citron relied upon a mail-order astrologer and a psychic for interest rate predictions as the county's finances began to falter.[3]

[Orange County, California Wildfires in 1993]

[The 1993 - Our World Looked So Different]

The National Fire Protection Association ranked the ‘93 fire 15th out of the 25 largest fire losses in United States history. The conflagration engulfed almost 16,000 acres, destroyed or severely damaged more than 400 residences and generated $528 million in damage.

References


 * 1) Weinberger, Sharon. The Washington Post - Mind Games. The Washington Post - Mind Games Retrieved on May 23, 2022
 * 2) Snowden, Edward. Snowden, Edward Levitt, Joseph Gordon. Snowden - Eye of Intelligence - Body Hackers - Manipulation and Control Retrieved September 27, 2018.
 * 3) Nguyen, Phong. BlackBerry Classic. BlackBerry Classic - Malfunction Part 1 Retrieved September 27, 2018.
 * 4) Nguyen, Phong. BlackBerry Classic. BlackBerry Classic - Malfunction Part 2 Retrieved September 27, 2018.
 * 5) Nguyen, Phong. BlackBerry Classic. BlackBerry Classic - Full View of My Daily Issues Part 2 Retrieved September 27, 2018.
 * 6) Nguyen, Phong. Alien. Alien - Potrayal of Me and My Family in the Future Retrieved September 27, 2018.
 * 7) Senate Intelligence Committee Report on CIA torture. Senate Intelligence Committee Report on CIA Torture Retrieved January 17, 2019.
 * 8) Project MKUltra. Project MKUltra Retrieved January 17, 2019.
 * 9) Electronic Harassment. Electronic Harassment Retrieved January 17, 2019.
 * 10) McKinney, Julianne. Microwave Harassment and Mind-Control Experimentation Retrieved January 17, 2019.
 * 11) Ewing, Zakaos Breedlove. Dismantle The CIA - Zakaos Breedlove Ewing Retrieved January 14, 2024.
 * 12) Kelsey vs. United States - Electronic Harassment. Kelsey vs. United States - Electronic Harassment Retrieved January 14, 2024.

External Links

Behance [Phong Nguyen]

YouTube [Phong Nguyen]