Thursday, October 30, 2014

OPTOGENETICS Cognitive Manipulation Through Colored Light: Scientist: New Green Algae/Plant Virus Found In HUMANS - Chlorella virus 1, or ATCV-1,

30 October 2014


TOFFLER ASSOC 2008 TECHNOLOGY AND INNOVATIONS 2025

Toffler Associates published a report looking forward, TECHNOLOGY AND INNOVATION, 2025 held in 2008, experts in various fields, gathered as panelists from National Intelligence, DARPA, Google, Microsoft, Universities, and a myriad of other disciplines who were asked to give their opinions on these emerging science and technologies.
Here is an excerpt:

'WILD CARD" Technologies -
"(3) the ability to leverage neuroscience and neurotechnology to directly affect the cognitive functions of human being from outside the bodies."

The potential of such "wild card" science and technology developments, and others, could change society in myriad ways that even the most forward thinking analysts are only now becoming able to understand"

Here are some quotes from participants in reference to 'WILD CARD TECHNOLOGIES'

"I can design peptides to disrupt cognition. I can put it in water or food."

"You can use neuroscience as a weapon. You can disrupt someone's behavior without killing them. You can make everyone stupid."

"You can do memory hacking."

"You can put codes in the brain. They are working on this in rats."

"You could also make people dumber, and they'd be more apt to be suicide bombers"

"One of the fastest moving sciences is neurotechnology - understanding how the brain works and connections to the brain - the mechanical or drug interface with the brain, manipulation of the brain, etc - could be electrical manipulation devices."

At the end of this report it states -
"US Government officials held a separate Conference on 2025 technology Implications on June 18, 2008. Technical Experts from across the government assessed the potential impacts of the technology advances described in this report. Their conclusions and judgments are classified."


Here is a list of the PARTICIPANTS who made the ABOVE COMMENTS
(to view: click on image, Right click-scroll to View Image, use ( + ) to zoom on document)





The Quotes

- THIS JUST CAME OUT IN THE SCIENTIFIC JOURNALS -  

These SCIENTISTS KNEW EXACTLY what they were doing, and there was NO SURPRISE - because they GAVE THEMSELVES AWAY - by stating they were conducting a RANDOM Study on COGNITIVE FUNCTIONS - these LIARS know about Optogenetics and Green Algae


  "The researchers, whose paper appeared Oct. 27 in Proceedings of the National Academy of Science, found DNA resembling that of an algae-native chlorovirus while taking throat swabs from healthy subjects during a study on cognitive functioning. "

 

More information needs to be obtained about the - Forty of 92 participants, who volunteered for this Cognitive Functioning Study:

Where are these Subjects from?  What state was this experiment conducted in?  What are the demographics, i.e. what are their socio-economics,  ethnicity of predominance, geographical cluster locations from within the city and state the Study was conducted?  

This will provide a clear indication of WHOM is being INFECTED for Cognitive Control.   Now, if it turns out it is RANDOM with no clear, distinctions, i.e. socio-economics, ethnicity of predominance, clustered geographical regions - Then, it becomes the representation of approximately (43%) of the population of the region i.e. city or state the study was conducted in who are in essence,  having their "cognitive, optical/visual, and motor skills diminished" on PURPOSE/Premeditated - so to speak.  

The FINAL QUESTION:  HOW ARE THEY DISTRIBUTING IT INTO THE GENERAL POPULATION?

 

Algae in Your Throat? Scientists Discover Algae Virus in Humans 

http://newsroom.unl.edu/releases/2014/10/27/UNL,+Johns+Hopkins+researchers+identify+DNA+of+algae+virus+in+humans 

The DNA of a virus once thought confined to the cells of algae may in fact invade the biological kingdom of mice and men, according to a new study from researchers at Johns Hopkins University in Baltimore and the University of Nebraska-Lincoln.

            The researchers, whose paper appeared Oct. 27 in Proceedings of the National Academy of Science, found DNA resembling that of an algae-native chlorovirus while taking throat swabs from healthy subjects during a study on cognitive functioning.
            
The discovery represents the first documented case of chlorovirus gene sequences in the human throat cavity, the researchers reported.


            "Chloroviruses are worldwide," said senior author James Van Etten, William Allington Distinguished Professor of Plant Pathology and a co-director of the Nebraska Center for Virology at UNL, who helped discover their existence in green algae more than 30 years ago. "They're very common among inland bodies of fresh water such as lakes and ponds.

            "But I don't know of many examples of viruses jumping from one kingdom to another. If this turns out to be true, this is quite rare and a total surprise."

 

Chlorella virus 1, or ATCV-1 Algae Virus

Some people harboring the virus have subtle changes in cognitive function
Release Date: October 27, 2014

Fast Facts:

  • Scientists have discovered that some healthy people carry in their throats a green algae virus previously thought to be non-infectious to humans.
  • The virus may cause subtle cognitive changes in some.
  • The study highlights the potential of otherwise innocuous organisms to affect physiologic functions without causing outright disease.
Scientists from Johns Hopkins and the University of Nebraska have discovered an algae virus never before seen in the throats of healthy people that may subtly alter a range of cognitive functions including visual processing and spatial orientation in those who harbor it. A report on the team’s findings is published online Oct. 27 in Proceedings of the National Academy of Science. 

Yolken and colleagues stumbled upon the algae virus unexpectedly while analyzing the microbial population of the throats of healthy humans for a non-related study. Investigators obtained throat swabs and performed DNA analysis designed to detect the genetic footprints of viruses and bacteria. To their surprise, the researchers say, they discovered DNA matching that of Acanthocystis turfacea Chlorella virus 1, or ATCV-1, known to infect green algae. Green algae include more than 7,000 water-dwelling organisms that resemble plants but belong to a separate biologic kingdom. They are commonly found in aquatic environments like ponds, lakes and the ocean.

Forty of 92 participants in the study tested positive for the algae virus. The group that harbored the virus performed worse overall on a set of tasks to measure the speed and accuracy of visual processing. While their performance was not drastically poorer, it was measurably lower, the researchers say. For example, people who harbored the virus scored, on average, nearly nine points lower on a test that measured how quickly they could draw a line between sequentially numbered circles on a piece of paper. Viral carriers also scored seven points lower, on average, on tests measuring attention.

...   Infected animals had worse recognition memory and spatial orientation than uninfected mice. For example, they had a harder time finding their way around a maze, failing to recognize a new entry that was previously inaccessible. In addition, infected animals were less likely to pay attention to a new object, spending nearly 30 percent less time exploring it than uninfected mice, a finding that suggest shorter attention span and greater distractibility



ILLEGAL HUMAN EXPERIMENTATION - ON RANDOM PEOPLE, WHO MAY NOT KNOW THEY ARE TARGETED - THE ONLY WAY FOR HUMANS TO CARRY An ALGAE PLANT VIRUS LIKE ABOVE ARTICLE - IS BECAUSE THEY WERE EXPOSED OR INJECTED WITHOUT THEIR KNOWLEDGE OR CONSENT - 




Using optogenetics, scientists control brain cells with algae genes and light

Optogenetic techniques require adding new genes to an animal’s neurons. A crucial early success in the field involved placing a gene found in green algae into mouse neurons grown in a dish. This gene provides instructions to make a protein called channelrhodopsin2 which forms ion channels that open in response to light.


In algae, these ion channels allow the tiny one-celled organisms to sense light and gravitate toward sunnier locales. But in neurons the channels produce spikes as the cell is exposed to blue light and positive ions rush in through the open channels.


Genes from other microbes can be used to turn off cells. For example, halorhodopsin is a protein – produced from a gene found in salt-loving halobacteria – that pumps negative ions into the cell in response to yellow light, suppressing spikes in neurons that have it. The whole class of similar proteins that respond to light, including halorhodopsin and channelrhodopsin, are called opsins.


Once opsin genes have been added to an animal’s neurons, researchers can then insert a fiber optic cable into the relevant part or parts of the animal’s brain and turn the cells there on or off with remarkably precise timing using differently colored light, inducing individual spikes or suppressing them at will. (This temporal precision is one of the key advantages of optogenetics over other neuromodulaiton methods.) The animal is still free to move around and behave as it normally would, but now we can observe changes in this behavior that result from precise manipulation of specific groups of neurons.

But how does one get algae genes into neurons? With a virus! The same tiny pathogens that commandeer a host cell’s machinery to replicate their own DNA can themselves be commandeered and repurposed to deliver scientifically interesting genes into an animal’s cells. (This is also the mechanism behind some forms of gene therapy.)

 ... Snippets of regulatory DNA, called promoter regions, largely determine how much or how little of a protein gets made from a given gene and account for why different cells express different proteins. In this case, researchers injected a virus with the green algae gene described earlier into the lateral hypothalamus, but a promoter region was attached to it such that only hypocretin producing neurons expressed the gene. So when the researchers placed a fiber optic cable into the area and pumped in blue light, only the hypocretin cells were activated, leaving the other cell types living adjacent to them unaffected.

 

(There are Five residential apartment locations that flash the following colors out their windows, three are across the street S. Catalina, and two James E Woods - Many times the Apartments off S. Catalina, will have their Windows Wide Open - which means any Passing Vehicles will also be subjected to the Light Color Changes -

The following Images of Orange/Red, Blue, White flash from these Apartments - all facing either into the back parking area, or the driveway going in/out from S. Catalina.   They appears to be utilized to TRIGGER/s)


Based on the Government Documents and High Level Think Tank Analysis - in each case it is known what the potential dangers and impacts are.  

On the Need for neurotechnology in the national intelligence and defense agenda: Scope and trajectory 
 Chris Forsythe, PhD, James Giordano, PhD

excerpt:
In this light, we have identified four interactive areas of neuroscience that could affect and be important for national security; these are:
1.
Nano-neuroscience: Nano-substances and devices may be engineered to alter neural networks, induce changes in properties of the nervous system from periphery to brain, and affect sensitivity to internal and/or external stimuli. Nano-neurotechnologies could therefore be used to modify cognitive, emotional and/or behavioral functions, and in this way affect mental and motor capacity, alter mood or cause near- and long-term disability. Such capability might be used to modify the function of national intelligence and security personnel, 

and/or could be employed in a) combat (both to enhance performance of troops, as well as impair function of enemy warfighters

and/or b) by our enemies as a form of biological-technological terrorism and a means of mass subjugation.

The last sentence is CRITICAL because the DoD/DNI/NSA, et al already KNOW how dangerous the advent of Neurotechnologies are.  If, THEY assume that the Perceived Adversaries/Enemies i.e. North Korea China, Middle East, et al governments are developing them - 

Then, the DoD will be conducting MASS HUMAN SUBJECT Experiments, on WHOLE GROUPS or COMMUNITIES OF PEOPLE  - to see how it works and what they can do -  

I, as a solo target am a done deal from head to toe, but the Masses i.e. Whole Groups of People, Whole Community's, Whole Geographical Regions - would be considered MASS, and the Question for them would then be: Can they ALL be SUBJUGATED?

  SO - HOW IS IT SPREAD THEORY - 
THROUGH A VIRUS, right? - and VACCINATIONS as PROPHYLACTICS i.e preventative measure - actually Infect the person with the virus, but provide antibodies to fight against the virus i.e. Flu, H1N1, etc. but what it will not do is fight against say, the ALGAE VIRUS, that may be experimentally placed in Random batches of that years 'Flu Vaccine', because it is not designed to fight against that particular plant Virus...which then allows it to spread into the human subjects...

Now, you may ask, but how does it get into the Brain?  The vast majority of Annual Flu Vaccines are now in the form of FluMist, or Nasal Spray Vaccine, whereby you Inhale it through your Nose.  This... then, goes into the brain or has the capability of bypassing the Blood/Brain Barrier

This little known article came out, that leads me to the WHOM are being Infected (poor), and the WHO KNOWS (rich) what is going on.



Vaccination rates are plummeting at top Hollywood schools, from Malibu to Beverly Hills, from John Thomas Dye to Turning Point, where affluent, educated parents are opting out in shocking numbers (leaving some schools’ immunization rates on par with South Sudan) as an outbreak of potentially fatal whooping cough threatens L.A. like “wildfire” ...


AND, JUST TO BE REAL CLEAR, THIS IS NOT THE ONLY MASS HUMAN SUBJECT EXPERIMENT'S THAT ARE TAKING PLACE.  THE FOLLOWING ARTICLE PUBLISHED AND THE KEYWORD IS PUBLISHED - WHICH MEANS THAT BLACK OPERATIONS AND BLOOD FUNDING - HAS ALREADY PERFECTED THE BRAIN-MACHINE INTERFACES - 


Your Future Brain-Machine Implant: Ultrasonic Neural Dust

Imagine thousands of particle-sized CMOS chips living in your brain.

The future of brain-machine interfaces may be less, umm, visible if cutting-edge research by scientists at the University of California Berkeley proves viable.

... One of the biggest challenges for brain-machine interfaces (BMI) is how to create one you could use indefinitely (like for a lifetime). Even in The Matrix, connecting to the cloud seems awfully inconvenient: sit back in a chair, stab yourself in the skull. Existing real-world BMI systems are clumsier still. As KurzweilAI notes: “Current BMI systems are also limited to several hundred implantable recording sites, they generate tissue responses around the implanted electrodes that degrade recording performance over time, and are limited to months to a few years.”

What if, instead, we built entire armies of tiny dust-sized sensor nodes that could be implanted in the brain (though not autonomously — this isn’t colonize-your-brain-stem time yet) to facilitate communication of whatever sort, in this case keeping high-res tabs on neural signals and relaying data back to aggregation devices via ultrasound?

Here’s how it might work: First you pop through the skull and the brain’s dura (the membrane surrounding the brain), dipping into the brain’s neural sea itself, roughly two millimeters down, where you position thousands of low-powered CMOS chips (the “neural dust,” each as tiny as millionths of a meter) to begin capturing neural signals using electrodes and piezoelectric sensors, which convert the data to ultrasonic signals. Those signals are then picked up by a sub-dural transceiver (sitting just above the “dust” chips and simultaneously powering them ultrasonically), which relays the data to an external transceiver resting just outside the skull (ASIC, memory, battery, long-range transmitter), which in turn communicates wirelessly with whatever computing device.

 

Ok - Think of the Wireless Devices/Sensors not in the Heart but in Your Brain and Your EEG or Brain Waves are feeding out into a Wireless Bio-Metric Base Station that Feeds this Bio-Metric Data to a Dedicated SERVER - Which external 3rd Parties can then log into - and ALTER biological functions.  

What the OTHER END is probably Viewing - in a much more crude animated visual, more like being able to Push Buttons via Cross Hair ( + ) targeting.  or Numeric i.e. 1. Shock Feet, 2. Pulse Neck, 3. Shock arm, etc. As it is being field tested by the General Public against Target's.

 

WHO IS DOING IT CURRENTLY 

  

LAPD IA Officer Direct Contact Phone Information DISABLED/NO LONGER IN SERVICE: LAPD HEADQUARTERS NO CYBERCRIME DETECTIVES ON DUTY

30 October 2014

in Full Operational Mode - 
Affecting Landline Communications as well, not just Internet, WiFi, or Cell ...
09:27 AM PDT
(213) 473-6703
Los Angeles Police Department
Internal Affairs Direct number to
Officer A. Garcia.

Upon dialing this number to speak with this Officer to get additional information about Policy Issues in how an LAPD Officer is supposed to respond to a Citizen coming into their Local Precinct and requesting an Incident Report in reference to Cybercrime.

The Following Transpired



The number provided, which I have used to call before, and was left a voice mail that I missed.  Is now NO LONGER IN SERVICE.

They attempted to get me to go to the following address - but I wanted to speak with a Detective at the LAPD Headquarters.

251 6th Street  - Commercial Crimes -

The older Male, sitting, who said he was building security, but not an LAPD Officer.  - He was really not wanting to speak with me.  (compromised, or not willing to go along with what he was instructed to do, either way he was not happy about me being there. )

Officer Jaramillo #17510, Standing and was helpful - He was nice



Because I was denied access to speak with a Detective, or the Internal Affairs in reference to the Policies that involved Cyber Crime at the Downtown Los Angeles Police Department Headquarters' and asked to return 31 October 2014 - I ensured that I signed into the Desk Log for the Department to Prove that I had shown up at the Headquarters - 




WHAT CAME OUT OF IT - I WAS ASKED TO RETURN TOMORROW MORNING AND I NEEDED TO COME BACK AND SPEAK WITH THE CYBERCRIMES DETECTIVE - 





31 October 2014
12:50 PM PDT Arrive at 
LAPD Headquarters, 100 West 1st Street, Los Angeles, CA 

Jones 16723 (17 yrs on the force) on Left Nice,  Officer Camarrilo 14908 (19 yrs on the force) on Right, Nice, but questionable because made various inflammatory statements, that would appear to come from compromised, but it was only after speaking with someone ? on phone  -  Front Desk Officers, who can only Call 'UPSTAIRS" and see if a Detective will speak with me  -  they attempted to help based on what they could do, they called necessary areas, but finally a Sargent Jones, 4989 came down to first get me to leave basically, but after citing California Penal Code 502 - he, went away, then came back and told Officer Jones to Do a Report for Hacking/Telecom and Computer.  Also, Camarrilo dialed the number provided on the LAPD IA Business Card - and got the Disconnect as well.

At one point, they contacted a Detective Dallas, and I was handed the phone to briefly describe what was transpiring.  She told me to "GO TO THE POLICE STATION and REPORT IT..."  
At that point... I simply handed the phone back to the Officer's and said, She told me to Go to the Police Station and Report it...  


Tuesday, October 28, 2014

OBSTRUCTION OF JUSTICE : MALWARE Coding that Pinpoints Specific App "CAMERA ROLL" on MS Ops System: Blocks Viewing of Photos or Videos on Cell Phone

27 October 2014

T-MOBILE CELL PHONE NETWORK and MICROSOFT OPERATING SYSTEM "CAMERA ROLL" APPLICATION - HOW BOTH ARE COMPROMISED - WHICH THEN COMPROMISES - ME THE USER -  

Without an Operational Network (T-Mobile) - No Malware can Infiltrate an Operating System (Microsoft) and then Place Pinpoint Specific Coding that BLOCKS me from Viewing Photos or Videos TAKEN FROM my Cell Phone, yet CANNOT BE VIEWED ON my cell phone...


OBSTRUCTION OF JUSTICE : THIS IS YET ANOTHER ATTEMPT BY WHICH TO PLACE MALWARE AND CODING THAT SPECIFICALLY TARGET'S - A PDA/CELL PHONES OPERATIONAL CAPABILITIES - IN THIS CASE THE CAMERA ROLL APPLICATION TO INSTANTLY VIEW PHOTOS OR VIDEOS TAKEN.

IT IS A BLATANT MEANS BY WHICH TO OBSTRUCT, DELAY,  BLOCK, AND STOP MY ABILITY TO UTILIZE THIS BUILT IN MICROSOFT SOFTWARE APPLICATION TO POPULATE PHOTOS OR VIDEOS TAKEN BY MY PDA/CELL PHONE - THAT I AM LEGALLY DOCUMENTING IN REFERENCE TO THE CRIMES TAKING PLACE, UPON AND AGAINST ME by RECRUITED MEMBERS OF THIS DOMESTIC TERRORIST ORGANIZATION, IN WHICH INFORMATION VIA VIDEO OR PHOTOS TAKEN CANNOT BE INSTANTLY VIEWED VIA MY NOKIA LUMIA, 521 MICROSOFT OPERATING SYSTEM SOFTWARE APPLICATION - CAMERA ROLL 

IT OBSTRUCTS MY ABILITY TO VIEW THE CONTENT THAT I HAVE CREATED OR TAKEN, AND SHOULD ANY LEGAL OR LAW ENFORCEMENT AGENCY WANT TO VIEW THE CONTENT - THEY, TOO WOULD BE BLOCKED FROM INSTANT VIEWING -

WHAT THIS LATEST ROOTKIT/MALWARE IS DOING IS TO PROVIDE THIS EXTERNAL THIRD PARTY OF DOMESTIC TERRORIST'S WITH THE ABILITY TO COPY THAT INFORMATION - AND IF THEY FEEL IT INCRIMINATES ANY MEMBER OR MEMBERS OF THEIR ORGANIZATION - TO DEGRADE AND OR OUTRIGHT DESTROY THAT CONTENT OF DOCUMENTED INFORMATION - EVEN BEFORE I CAN TAKE IT OUT OF MY CELL PHONE - UPLOAD IT TO MY DESKTOP AND VIEW ITS CONTENT - 





On, 27 October 2014 I purchased a new 32 G MicroSD Card for my PDA/Cell Phone, Nokia Lumia 521.  Upon inserting the MicroSD Card, rebooting the phone, and launching the Camera - It queued me with the following prompt

Camera Roll
Press the camera button,
snap a few pictures, and 
they'll be saved here.

You can take a photo even
when your phone is locked,
Press and hold the camera
button and away you go.
Upon doing exactly that and going back to the Camera Roll to see the Test Photos I had taken, the photos were nowhere to be found.  The above information continues to show, and the photos and videos cannot be viewed.

Immediately, I thought it was a damaged or corrupted, brand new MicroSD Card, but that was not the case because upon taking it out of the phone, and placing it in an Adapter, then into the the SD Card Reader onto my Desktop and populating the MicroSD card - ALL the Test Photos and Videos populated.

Steps I took
1. Rebooted by, Powering Down, took out battery, and the MicroSD Card , reinserted - Powered back on (no result)
2. Powered Down, took out the MicroSD Card, inserted into Adapter, placed in SD Card Reader and populated the card on the Desktop
a. Camera Software Copied to MicroSD Card
b. Test photos and videos were saved to MicroSD Card

Conclusion:  There is NO REASON why the CAMERA ROLL FUNCTION is not Operational on the PDA/Cell Phone Camera.  Yet, this function will not Show any of the Test photos or videos Taken - EVEN with the following

1. No Corruption or Bad MicroSD Card
2. Cell Phone Camera Appears to be Working
a. via Test Photos and Videos
b. Copied Camera Software to MicroSD Card
c. Test Photos and Video were Saved to MicroSD Card

Due to the above facts of operational capabilities via the Cell Camera and MicroSD Card, there is NO REASON the PDA/Cell Phone is not DISPLAYING those photos after taking on the phone.  Unless, there is external 3rd Party Tampering has TAMPERED with the Software, which Denys my ability to VIEW the Content / Photos or Videos that I take, without first having to remove the SD Card 

ALSO NOTE: Upon after speaking to the Telecommunication Provider -
1. We were also unable to BACK UP other Content to the Microsoft Cloud, in order to do additional troubleshooting

27 October 2014
15:52 PM PDT
611 Customer Care to TMOBILE
Omar
Via trouble shooting of the phone, and my refusal to WIPE my Nokia Lumia PDA clean
1. Back Up Option Disabled
2. Camera Roll - One section Disabled
3. Plug phone via USB to Desktop/Computer and Transfer data -

All three options via the Microsoft Operating System have been CODE SPECIFIC BLOCKED -
 Because this is a Criminal issues, due to the SPECIFIC NATURE of what has been SYSTEMATICALLY DISABLED on my Cell Phone - it warranted having TMobile do more analysis, and then provide me with assistance to contact law enforcement to conduct a Criminal Investigation.

I was told to take my Cell Phone to a TMobile Store, ask the Store Clerk to Contact the Technical Department at TMobile, and figure out what else could be done, and how TMobile needed to assist me in Filing a Police Report for criminal investigation  - as opposed to Wiping the phone clean in which EVIDENCE would be DESTROYED.  


28 October 2014
Approximately 12:00 PM PDT
Arrive at the TMobile Store #7519, Hollywood and Western 

Speak with a Justin, explain the situation, and let him know that I need then to contact TMobile Tech. and figure out what can be done, without Wiping the Phone and possible evidence of a crime from my cell phone.  I am met with nothing but OBSTRUCTIONS, and Queued DENIAL of SERVICE - told that there was nothing they could do, other than for me to WIPE the PHONE CLEAN - which was NOT REGISTERING that if a Crime can be FOUND within Cell Phone that is EVIDENCE of a CRIME - and therefore, NOT AN OPTION.

Justin went around in circles, on queue - and I finally said Get me the Manager.   At various stages in the process, this employee felt uncomfortable at the sheer level of obstructing that was transpiring at the TMobile Store, even though he was fully aware that I would be arriving to discuss with them the need to have TMobile assist me with Law Enforcement Filing of the Possible Security breach in my Telecommunications. 

DAVID was the name of the proclaimed manager, whom I have NEVER seen in the TMobile Store, and I have gone there every month for almost a year to pay my bill.  This so called Manager, continued OBSTRUCT the due process of law, by also REFUSING to CONTACT the TMobile Technical Support from the Store and Work with the engineers. 

His refusal and dismissive attitude only severed to INCITE the already Negative situation of Non Compliance of a Customer Request, when explaining the situation to TMobile this store manager.  In the End, not only did this Store Manager NEVER CONTACT Technical Support for me, but delayed throughout the process, and upon speaking with the Hollywood/Wilcox Police Station,  Stated to the LAW ENFORCEMENT OFFICER on the LINE - "THANK YOU FOR HELPING US ON THIS ONE" - Upon questioning this Employee about HELPING ON WHAT ONE?  He could not answer - Meaning, Los Angeles Police Department was already NOTIFIED that they would be CONTACTED about Me filing a Criminal Incident Report about the latest in Computer Network/Telecommunication Network Cyber Crime -

What made what this DAVID said recognizable, was in the fact that he was in the back room, and should have had NO IDEA that I was contacting Local Law Enforcement from the store.

I spent the next couple hours on the phone with 611 to TMobile inside the TMobile Store due to REFUSAL to CONTACT adequately the TMOBILE Technical Support - Thus, inside the TMobile Store, I had to USE MY OWN PHONE - to CONTACT TMOBILE -

611 - 
13:11 PM PDT TO 14:33 PM PDT - ON THE PHONE WITH TMOBILE TECHNICAL SUPPORT VIA MY OWN PHONE as I was inside the TMobile Store - 

 Thomas - Same Talking POINT - WIPE THE PHONE CLEAN, and go to the police to file a report, then TMobile would act - but they would not do it for me the customer, only if asked by Law Enforcement -

LUIS - Same Talking Point - WIPE THE PHONE CLEAN - but he did inform me that TMobile has the capability to do forensic analysis on the line of customers to determine all areas compromises have transpired but I had to contact local law enforcement, and have them contact TMobile.  

14:35 PM - 
 213.382-9102 - After Automated Queue, connection, then no answer via perpetual ringing

14:39 PM
877.275-5273 - After Automated Queue, connection, then no answer via perpetual ringing 
213.382-9102 - After Automated Queue, connection, then no answer via perpetual ringing

14:41 PM -
877.275-5273 - After Automated Queue, connection, then no answer via perpetual ringing

Figured my phone was compromised so I asked another TMobile Clerk if I could utilize the Landline from the store.  I dialed the numbers and the same action happened. 

I then asked the clerk if he would dial for me to see what he got, so he used another phone, and dialed the number for me.  He got the same thing, no answer, just perpetual ringing.

He then went online and found the number to the 

Hollywood/Wilcox Station and provided me with the number 

213.972-2971 - via the landline at the TMobile Store - 

Same Outcome - After Automated Queue, connection, then no answer via perpetual ringing

When both of us got the perpetual ringing, he then decided to try another phone in the store and dial via the wireless in the store.  Upon dialing the number from the Random Display Cell Phone - it was immediately answered after the automated queue.

The Clerk handed me the phone, and the moment I stated that I was in the TMobile store, this Officer at the Hollywood/Wilcox Station immediately went into Defense Mode and basically utilized all the standard talking points in order to obstruct me from filing an incident report with LAPD.
1. Call the FBI
2. What exactly happened, well that is not a crime
3. We don't have the capabilities to do that kind of work
4. Let me talk to the Manager - Upon speaking with the Manager, David - he made reference to I was claiming my phone was Hacked - that it was getting bad, and then he THANKED THIS OFFICER FOR GOING ALONG WITH IT...

At, Approximately 
15:30 PM PDT
LAPD Olympic Station

Front Desk, Officer Stilkey #17277
Same Talking Points as above, to include
Well, I don't go running to the cops every time I get malware in my computer...









 










Friday, October 24, 2014

ESTABLISHED - PREMEDITATED MALICIOUS INTENT BY RESIDENTS' TO USE THEIR VEHICLES AS WEAPONS OF EXTREME HARASSMENT




24 October 2014

I have finally been able to show and prove PREMEDITATION with Malicious Intent to Use Resident's (all of whom want me OUT of this Building) are using their Vehicles as Weapons of Pervasive, and Extreme Harassment by Impeding, Obstructing and Blocking Safe, Easy, and Timely Passage and Travel for myself, and my vehicle by way of Deliberate Obstruction, Impeding, and Blocking of my Vehicle to Maneuver Out of My Space and Onto the Street.  



NOTE: 24 October 2014: 
16:57 PM PDT

Korean Male, accepted a Check from the female house manager, in what appears to be Payment to utilizing his White Lexus CA License Plate: 5WHC737 -as a Weapon to Impede, Obstruct and Make Safe Vehicle Movement - near impossible.  This payment was more than likely dropped off by the Property Owner, who showed up today, and once again, witnessed the Carmy's obstruction, and did NOTHING about it.  The bottom line there is a MONEY TRAIL - that can be TRACKED -
 













HERE ARE THE MATHEMATICAL REALITIES OF WHAT IS BEING DONE - PAINTING THE FENCE BLACK IS A PHOTOGRAPHIC AND VIDEO MANIPULATION TO GIVE THE FALSE APPEARANCE OF ADDITIONAL DEPTH - THE REALITY IN TERMS OF ACTUAL MEASUREMENTS - and IT MUST ALWAYS BE TAKING INTO CONSIDERATION - NO OTHER TENANT WITH AN ASSIGNED PARKING IS SUBJECTED TO THE SAME IMPEDING, OBSTRUCTIONS OR BLOCKING - 

 From the line of my space to the gate there is approximately 15/16 feet if backed STRAIGHT OUT, but I lose Space because that Center Position is where the Slider Bar is Located, so the Gate can Open either Left or Right - you lose six to eight inches due to that middle Post/Bar  - but I cannot back straight out.   I have to first Clear My Vehicle of the Two Vehicles Next to Me, (see video of White Lexus and How this Resident Parks over that line, which,  drastically reduces my Clearance, and ability to Move my almost 14 foot vehicle to the left or right).  Upon Clearing these two vehicles, I then have to Maneuver My vehicle to the Left or Right, in order to Back Straight out of the Narrow Gate Opening, and this is when there is just the two vehicles besides me, who deliberately park their vehicles at various angeles to make even this as difficult as possible.  

With the Grey Camry who was told NOT TO PARK - and the Property Owner, Song Cha Choe, who does nothing about it - even though she and her son specifically stated ONLY TWO VEHICLES - i.e. (6) spaces, with vehicles in each space. - makes Safe Passage Impossible - 

What I have Established today - via the above videos is to PROVE and SHOW - 
1. THE CONTINUED PERVASIVE USE OF THESE RESIDENT'S VEHICLES as WEAPONS for EXTREME levels of HARASSMENT, by PARKING, IMPEDING, OBSTRUCTIONS and BLOCKING, MY VEHICLE, MY PRIVATE PROPERTY, AND MY ABILITY FOR SAFE, EFFICIENT, AND TIMELY TRAVEL - DONE WITH DELIBERATE, PREMEDITATED, MALICIOUS INTENT

2. THAT THE RESIDENTS ARE CONSPIRING TO USE THEIR VEHICLES AS WEAPONS - 

3. THAT IT IS BEING DONE WITH THE INTENT TO MAKE MY LIVING ENVIRONMENT AS HOSTILE AND UNSAFE AS POSSIBLE - 

Here are some Facts about the Size of the VEHICLES - the REALITY just how Difficult it is to Maneuver when you only have less than two feet if that to position such a vehicle to the left or right in order to safely back out -

1998 Honda Civic Specifications
Exterior
  • Width: 67.1 in.
  • Height: 54.1 in.
  • Length: 164.5 in. (13.6 feet long)
  • Ground clearance: 5.9 in.
  • Curb weight: 2295 lbs.
  • Wheel base: 103.2 in.
NOW ADD THIS CAMRY THAT IS 15 FEET IN LENGTH - 
Camry - Exterior Measurements
WIDTH 5 ft. 11.7 in. (71.7 in.)
LENGTH 15 ft. 9.2 in. (189.2 in 









THIS IS PREMEDITATED, MALICIOUS INTENT - USING RESIDENT'S VEHICLES AS WEAPONS - IMPEDING, OBSTRUCTING, BLOCKING, AND CREATING AN UNSAFE PASSAGE FOR MYSELF AND MY VEHICLE - DUE TO EXTREME LEVELS OF HOSTILITIES, MAKING MY LIVING EXTREMELY DIFFICULT, AND BEING DONE WITH THE INTENT TO DRIVE ME OUT OF THIS RESIDENTIAL LOCATION -

Thursday, October 23, 2014

REAL TIME CENSORSHIP? COMPROMISE OR BREACH IN TALKSHOE, Inc NETWORK? YET, ANOTHER FULL SCALE TALKSHOE, Inc ISSUE? - Oct 23, 2014 LIVE BROADCAST, AUDIO STREAM DISABLED, RECORDING CONTENT QUESTIONABLE

 23 October 2014

Censorship

Censorship is the suppression of speech, public communication or other information which may be considered objectionable, harmful, sensitive, politically incorrect or inconvenient as determined by governments, media outlets, authorities or other such entities.

Governments, private organizations and individuals may engage in censorship. When an individual such as an author or other creator engages in censorship of their own works or speech, it is called self-censorship. Censorship may be direct or it may be indirect, in which case it is called soft censorship. It occurs in a variety of different media, including speech, books, music, films, and other arts, the press, radio, television, and the Internet for a variety of claimed reasons including national security, to control obscenity, child pornography, and hate speech, to protect children or other vulnerable groups, to promote or restrict political or religious views, and to prevent slander and libel.

Direct censorship may or may not be legal, depending on the type, place, and content. Many countries provide strong protections against censorship by law, but none of these protections are absolute and frequently a claim of necessity to balance conflicting rights is made, in order to determine what can and cannot be censored. There are no laws against self-censorship.

I am being Systematically Censored for EXPOSING and Covering Relevant Material on current Political Issues in reference to Pervasive, Criminal Invasion of Privacy, Exploitation, Distribution, and Sharing of Privately Held Information,  COINTELPRO Tactics, 21st Century McCarthy Era Blacklisting, Invasion of Solitude, Criminal, Warrantless Wiretapping, Cutting Edge Military Grade Electronic Warfare, Felony Stalking, Hate Crimes, Domestic Terrorism and Domestic Terrorist Activities on the Streets of Los Angeles, CA  -  Blacklisted State/Corporate Sponsored Targeting - Covering, Relevant and Sourced Material and I am being Deliberately BLOCKED, DISRUPTED and CENSORED -   

In addition, I record my shows within the Privacy of My Living Space, therefore -  ALL those who Seek to Actively, Aggressively, and Violently Silence and Censor My Rights to Freedom of Speech - Can Simply TUNE OUT, and NOT LISTEN.. but their Extremism is so Indoctrinated and Radicalized, that for these Civilian Sleeper Cells they are Obsessed and Driven, that even the Thought of Me, or other Target's simply Documenting Via Online Sources i.e. Blogs, Websites, Live Broadcasts, You Tube, etc - or  Opening My Show, Recording Information, Documenting Information - ALL OF WHICH - these Civilian Domestic Terrorists - CAN MOST LITERALLY - TUNE OUT, NOT READ, NOT VIEW, NOT LISTEN TO - but they no longer can.  Like Moths drawn to light - their Extremists Intolerance, and Bigotry - seeks to Extinguish Anything that Target's like me are doing - 

Yet, the vast majority i.e. 99% of these Civilian Domestic Radicalized Extremists' are total Strangers to Target's like me.  There is zero connection to me, other than what their Leader's claim there is.  I do not interfere with, obstruct, connect, or have contact with these people - OTHER than what they FORCE upon me, through their deliberate doings,  provocations, interferences, etc.  I do not affect or effect their human living lives, because they are strangers, or individuals' who I have already determined are not worth my time, due to their overt, attention seeking, and most of all negative behaviors towards me - YET... these same radicalized extremists', go out of 'their' way and ways to orchestrate, execute provocations, obstruct, interfere with, and in many ways become desperate in their overt and at times futile attempts to be Noticed by Target's - is really, like ... Not Normal...

NOW .. THAT IS, so RADICAL, it, actually... Surpasses... RADICALIZED EXTREMISM ...

 

And, least we NOT FORGET, the below Group of CHRISTIAN, RADICALIZED EXTREMIST, RELIGIOUS ZEALOTS' and FUNDAMENTALISTS', who show up at the Funeral's of Fallen, United States Soldiers' to Protest, Carrying, Hate Filled, Highly Offensive and Derogatory Signs, Yell At, Berate, and Ridicule the Grieving Families of these fallen, United States Soldiers -but, can continue to do so -  BECAUSE the SUPREME COURT RULED THEY HAVE A RIGHT - TO THEIR RELIGION AND SPEECH, WHICH ARE PROTECTED BY THE MOTHERFUCKING ... FIRST AMENDMENT

Supreme Court: Westboro Baptist Church Funeral Protests Are Protected Speech



 ...
WASHINGTON — The First Amendment protects hateful protests at military funerals, the Supreme Court ruled on Wednesday in an 8-1 decision.


“Speech is powerful,” Chief Justice John G. Roberts Jr. wrote for the majority. “It can stir people to action, move them to tears of both joy and sorrow, and — as it did here — inflict great pain.”


But under the First Amendment, he went on, “we cannot react to that pain by punishing the speaker.” Instead, the national commitment to free speech, he said, requires protection of “even hurtful speech on public issues to ensure that we do not stifle public debate.”



CENSORSHIP - AGAIN...

11:30 AM PDT - Registers for TalkShoe, Inc 02:30 PM EDT

Opened  

10/23/2014 02:30 PM EDT
1:18:25
EPISODE699-Internet TROLLS,CIA/Torture, BlkWater,C.Hedges
Opened the Show, started the Recording, and then was informed by the Guests that there was no Audio coming into the Chat.  I am waiting to see what Uploads to my Past Recordings/Archives, but chances are it will be Blank Air for  1:18:25 or One Hour and Eighteen Minutes of me Covering Content and Providing my own Intellectual Property of Commentary.  
What this shows is a Pervasive Pattern of Disruption to the TalkShoe, Inc Network, and the constant tampering with the internet connection on my end so as to Interfere with my First Amendment Right to Freedom of Speech.  
Due to the FACT that I was speaking for over an hour, the Content that I had selected to cover has been BLOCKED from being Shared with the Guests in the Room, and the Recording - but even more Criminal - are MY WORDS, and COMMENTARIES, which are MY INTELLECTUAL PROPERTY - being not only Silenced Deliberately, but also STOLEN - whereby, there is now no Record - other than what this DOMESTIC TERRORIST ORGANIZATION is SHARING - and STEALING - 
 
The following Chat Grabber is for LEGAL DOCUMENTATION PURPOSES - TO PROVIDE THE LINKS AND LIST OF ALL CONTENT I HAD SELECTED TO PROVIDE on MY LIVE BROADCAST  - AND HOW THIS CONTENT - ALONG WITH THE THEFT OF MY INTELLECTUAL PROPERTY IN THE FORM OF MY COMMENTARIES - WERE NOT ONLY BLOCKED BUT ALSO STOLEN - 

EARLY AM WAKE UP via Biological-Technological Weapons MANIPULATION and DELIBERATE WAKE UP

DOCUMENTING the EARLY AM WAKE UP and the RESIDENT'S along with SURROUNDING CIVILIAN RECRUITS WHO ARE GATHERING AT THESE EARLY AM HOURS TO ACCESS AND MANIPULATE ELECTRONIC WARFARE CAPABILITIES i.e. COMPUTER NETWORK OPERATIONS, COMPUTER NETWORK EXPLOITATION, COMPUTER NETWORK ATTACKS, ALONG WITH TELECOMMUNICATIONS - BIOLOGICAL-TECHNOLOGICAL WEAPONS OF MASS DESTRUCTION - in the OFFENSIVE, CRIMINAL, AND ILLEGAL, COERCIVE MECHANICAL ABUSIVE USE OF NEUROTECHNOLOGIES - AKA NUEROWEAPONS

22 October 2014:
06:00 AM PDT

 Coercive Mechanical Use of a Biological-Technological Weapons systems to
1. via Illegally Implanted Wireless Subcutaneous Neurological Weapons BioSensors /Devices - which track my EEG Signals - and can be used to magnetically Target specific regions of the brain in order to elicit negative: Cognitive, Motor, Central Nervous System, and or Behavioral outcomes, 99.9% of these biological-technological ATTACKS are used Offensively for the sole purpose of mechanically, through coercive force Negative Biological and/or Neurological Outcomes.  Offensive to impair, degrade, incapacitate, and inflict pain and negative harm - to include biologically i.e. other ORGANS i.e Heart, Kidney, etc.

2. Heavy EEG Tracking via these Wireless Subcutaneous Devices/Sensors - and upon EEG signal track when I am in the Wake / Sleep state THETA state where a person is at their most Hyper-Suggestive - upon monitoring the feedback that feeds out into a dedicated Bio-Metric Base Station that is Close Range, appears to be in the Upper unit directly above me -

3. Bone Conduction Acoustic Weapons Technologies are blasted into my living space via Directional Ultrasound and Infrasonic Resonance generating machines = which create a continuous Vibro-Acoustic affect or extremely low frequency vibration throughout my living space.  This allows for the Bone Conduction Acoustic Weapons to Transmit or Extract into or from based on EEG signals.   (lay description of how bone conduction works

What is being done is Biological-Technological Terrorism in the Offensive Manipulation and Sadistic Abusive Use of Neurotechnologies, as NEUROWEAPONS - and in the hands of a Radicalized Extremist Civilian Network of Domestic Terrorist's, who are using it to Do Grave Bodily Injury to an Unarmed Defenseless Human being.  Sleep is a person's most Vulnerable State - and Using these Neurotechnologies in this manner - is akin to ATTACKING someone without any DEFENSES - It is some of the most Pervasive Forms of Heinous and Egregious Crimes against another persons Human Biology - by a Group of Radicalized Extremist Civilian's with NO REGARD towards Me - and the Extensive Levels of Biological and/or Neurological DAMAGE they are DELIBERATELY INFLICTING -

Stages of Sleep

Wakefulness includes Gamma, High Beta, Mid Beta, Beta Sensory Motor Rhythm, Alpha, and Theta brain waves. Our composite brain wave, that is, what you would see if you had an EEG (electro-encephalo-graph, or picture of the electrical activity in your brain), would be made up of many of the brain waves named above, all at the same time.
Stage One
When we are preparing to drift off, we go though Alpha and Theta, and have periods of dreaminess, almost like daydreaming, except we are beginning to fall asleep. These are interesting states, in that we experience them throughout the day and some people may have more of these waves than others.

Those who practice meditation, or deep prayerfulness, often kinda “hang out” in Alpha. It’s a restful place. During this stage, it’s not unusual to experience strange and extremely vivid sensations or a feeling of falling followed by sudden muscle contractions. These are known as hypnogogic hallucinations. You may even feel like you are hearing someone call your name, or the phone ringing. Recently, I thought I heard the doorbell, but realized that it was a hypnogogic hallucination and went back to sleep.

We then begin to enter Theta, which is still a relatively light period between being awake and asleep. This usually lasts for 5-10 minutes. Research has shown that the average sleeper takes about 7 minutes to fall asleep. You may fall asleep sooner, or take longer. 


23 October 2014
06:10 AM PDT

Another early AM wake up call - Same use of Bone Conduction to transmit information, waking up because it is not dreaming, but actual Neuroweaponry being used to
a. Track EEG to find out what State of Sleep/Rest I am in
b. Start Bombarding the Subconscious with their influencing by utilizing the Neurotechnologies being used Offensively and Criminally as a Biological-Technological Weapon of Mass Destruction. 

was noticed when I went outside
1. Prius Up
2. Casey and the Korean with the White Lexus Vehicles were both gone - (both appear to be at the VERY EARLY AM BIOLOGICAL-TECHNOLOGICAL WEAPONS GATHERING/TRAINING - whereby, the NEUROTECHNOLOGIES being USED OFFENSIVELY as BIO-TECH WEAPONS are BLASTED at MY SLEEPING NEUROLOGY - and then these RESIDENTS are provided with WHAT to do and what TRIGGERS TO USE. 

Upon returning into my room - the following was done
a. padlock on exterior door was opened.  
b.  light in laundry area, was on - 

Went out again with the flashlight
3. Two of the Caucasian Males, Patrick and another 37 year old who moved into Ms. Kim's Old room were up.  He stated he started work at 7am, more like gathering west of here for more training by this Domestic Terrorist Organization.



Upon attempting to UPLOAD the 2 Minute CELL Phone Video the Following Error Message Transpired on this Google Blog - it shows two things.  I have loaded longer videos from the cell phone camera - but THE CODES that have been CRIMINALLY WRITTEN OVER - this BLOG - DENY my the ability to do what ALL OTHERS that UTILIZE this GOOGLE, Inc Blog are ALLOWED -

1. Google working directly with this Domestic Terrorist Organization under the guise and color of law - to assist in Tampering with my Google sponsored Accounts in order to Obstruct my ability to Document the Crimes taking place at this Residential location

2. Cell Phone Video files have been tampered with so that these small videos are Expanded to appear as if they are much larger than they really are.  This would take TAMPERING with the actual Phone and Video Card of the Phone in order to cause RESOLUTION TO INCREASE TWO OR MORE FOLD - thus making these video files in SIZE take up more Memory.  This is noticed in a 32 Gig MicroSD Card, hardly any photos or videos - not enough to suck up the memory of this external SD card.

3. Real Time Tampering with Online Activities, to include INFILTRATION into these Google Run Accounts i.e. Blogger.com, Google+, You Tube, and Google Web - this would mean
a. Google, Inc Collusion with these Government or Private Security Agencies
b. Google, Inc FULL SCALE INFILTRATION - through their Network Security into ALL GOOGLE, Inc Run Accounts.

 In any and ALL CASES - there is HEAVY INFILTRATION - directly into these GOOGLE, Inc run SITES - that BLOCK me from being able to my DOCUMENTING - and ENSURE the INFORMATION about the DOMESTIC TERRORISM, DOMESTIC TERRORIST ACTIVITIES, along with CRIMINAL, ILLEGAL ACCESS TO DEPARTMENT OF DEFENSE WEAPONIZED TECHNOLOGIES, AND BIOLOGICAL-TECHNOLOGICAL WEAPONS OF MASS DESTRUCTION - ARE ALL EXPOSED - 



Wednesday, October 22, 2014

ELECTRONIC WARFARE: COMPUTER and TELECOMMUNICATION EXPLOITATION: RADAR/RADIO FREQUENCY WAVEFORM : WARRANTLESS SURVEILLANCE, and ATTACKS

22 October 2014

THIS IS ALSO TO BE CRIMINALLY NOTATED THAT ALL THESE ELECTRONIC WARFARE: NETWORK, AND TELECOMMUNICATION OPERATIONS, EXPLOITATION, EX-FILTRATION, AND ATTACKS TRANSPIRE WHILE HOOKED UP TO THE INTERNET CONNECTION PROVIDED TO ALL RESIDENT'S BY THE PROPERTY OWNER, SONG CHA CHOE - AS SUCH, SHE HAS, KNOWINGLY AND WILLINGLY BEEN AND CONTINUES TO PROVIDE MATERIAL SUPPORT, LODGING, AND HOUSING OF EQUIPMENT FOR DOMESTIC TERRORIST ACTIVITIES VIA A DOMESTIC TERRORIST ORGANIZATION.

The following Still Photo and Video are to show the Latest in a Long list of ELECTRONIC WARFARE Attacks that I have Sustained while Residing at 901 / 903 S. Catalina, Los Angeles, CA -

VERTICAL Lines are now burned onto my desktop screen, but also shows that it is a Continuous Radar or Radio Frequency Waveform (see video) that is moving across the screen at all times, but because of its continued abusive use, has actually burned onto the desktop screen.  




This is the video to actually show the Continuous Radar or Radio Frequency Waveform that Travels through my Computer.  Thus, the PDA/Cell Phone is also doing the same.  The Vertical Lines are now Burned onto my Desktop Screen. 


Here is another Sample of Near Field Communication Criminal Sync to My PDA/Cell Phone to Deliberately DISRUPT / DEGRADE video quality on Direct Facial and Body Recognition   Note how the Residents Perp Michael H. is able to completely Distort/Degrade his facial and body recognition as my PDA/Cell Phone Video/Camera comes into Range of this Resident Perps Apple iPhone Cell ..  at all times either before, after, or when I move out of the NFC range are crystal clear.

This also necessitates a CRIMINAL INVESTIGATION that a CIVILIAN has Access to an Application that can SYNC with any WIRELESS Digital RF Feed in this case My Cell Phone, and can manipulate and disrupt the Digital Signals via Near Field Communication and  COMPLETELY WASH OUT / DEGRADE their FACIAL IDENTIFICATION from any Digital Video - If they can do this with my Cell Phone - they can also do it to CCTV and other Law Enforcement Surveillance Capabilities that run those devices off of WIRELESS Radio Frequency / Electromagnetic Digital Signals.  

It is akin to a Wireless Hand Held Device, which are Military Grade Wireless/RF Bomb Jammer - that Seeks out Wireless/RF Signals, Locks into them, then has the capability of Jamming that Wireless/RF Signal/Feed.  

Based Upon the Size, Scope, Nature of Capabilities via a PDA/Cell Phone - this is Cutting Edge Electronic Warfare Capabilities - that Only United States Military/National Security, Other Federal Agencies, Other Government Agencies, to include Private Security Firms would have access to: NOT FUCKING, CIVILIAN'S


The link will show the progression in terms of SIZE and Capabilities of Military and Law Enforcement Grade Wireless/Radio Frequencies Bomb and Other Wireless/RF Signals Jamming Capabilities.  From Large, to Vehicle Mounted, to Man Portable.  This was HAND HELD and BEING USED VIA AN iPhone APPLICATION the Resident Perp was logged into.
 For the Capability to now be HAND HELD and coming from a PDA/Cell Phone, which can Sync to My PDA/Cell Phone - via Near Field Communications (NFC) - that is CUTTING EDGE MILITARY GRADE Electronic Warfare Capabilities -