Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By @OratorBlog Information Warrior
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

The Shocking True Capabilities of NSA Wireless Remote Mind Control. By @OratorBlog

% of readers think this story is Fact. Add your two cents.


The Shocking True Capabilities of NSA Wireless Remote Mind Control @OratorBlog

NSA Clinical Psychologist Indicted for Covert Psychological Warfare Against Innocent Americans. Committing Psychotronic Wireless Directed Energy Weapon Attacks. (See Below)

Can You Say:  NSA Wireless Remote Neural Monioring-Mind Control. Super Computer Pre-Crime Thought Police? (No Psychics Needed, Only Psychos)

“We are rapidly entering the age of no privacy, where everyone is open to surveillance at all times: where there are no secrets from the government” ~ William O. Douglas (U.S. Supreme Court Justice)

(NSA) National Security Agency – No Such Agency – Not Secret Anymore

LEARN THE SHOCKING TRUE CAPABILITIES OF THE NSA REMOTE MIND CONTROL TECHNOLOGY

HOW THE NATIONAL SECURITY AGENCY (NSA) ILLEGALLY AND UNCONSTITUTIONALLY HARASSES LAW-ABIDING AMERICANS EVERYDAY. 

HOW, YOU ASK? QUITE SIMPLY, ACTUALLY. IT’S DONE BY EMF OR ELF RADIO WAVES, AND A TECHNOLOGY KNOWN AS “REMOTE NEURAL MONITORING”. 

HAVEN’T YOU EVER WONDERED ABOUT THAT RINGING IN YOUR LEFT EAR? 

WELL, HERE ARE THE REASON(S). AND JUST WHY SHOULD THE NSA DO THIS, YOU ASK? 

TO SILENCE ANY WHO DARE TO SPEAK OUT AGAINST THEM OR ANY OTHER AGENCY, OR THE GOVERNMENT OR SIMPLY TO THINK FOR THEMSELVES, AND “OUTSIDE THE BOX”. 

IF YOU THINK NOT? THEN, READ ON……….

SEE BELOW: “DOMESTIC SURVEILLANCE & MIND CONTROL TECHNOLOGY “

 

Everyone knows the NSA Spies on EVERYTHING EVERYONE DOES Online or Over the Phone.

But that is NOTHING Compared to what else they Can Really Do-

REMOTE NEURAL MONITORING

(They Can see What You See, Hear What You Hear and Know what You are Thinking)

Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country.

Read Your Mind Wirelessly in Real Time

Access Your Memories

See What You See

Hear What You Hear

Monitor Your EEG Brainwaves

Wirelessly Identify Specific Individuals through Unique Resonant Frequencies

But Wait, It Gets Worse.

They Can IMPLANT Thoughts, Memories, Sights and Sounds Subliminally without the Target Even Knowing.
Or, Directly Communicate Visual and Auditory Signals, not only Detectable but Unignorable and Unescapable.

They Can Even Simulate the Tactile Sense of Touch

Untold Tens of Thousands of Victims have been TORTURED and DRIVEN INSANE.

THE LEVEL OF TECHNOLOGY IS OUT OF CONTROL

THEY ARE PLAYING GOD WITH THE LIVES AND MINDS OF INNOCENT VICTIMS

THEY ARE SPYING ON EVERYONE IN THE WORLD

THEY ARE DESTROYING LIVES

THEY ARE COMMITTING UNSPEAKABLE CRIMES AGAINST HUMANITY

THESE CRIMINALS MUST BE STOPPED

(The next time someone tries to Punk You with a “TIN FOIL HAT INSULT” shove this in their face and promptly inform them they are being an insensitive ass towards Innocent Victims of PSYCHOLOGICAL TORTURE)

@OratorBlog – 12-27-2021    For the Record:  I Am Not Suicidal. Suicide Goes Against my Religious Beliefs

The Kassandra Project: Freedom From disinformation
Government Thought Policing: The NSA and Remote Neural Monitoring (RNM)

Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). 

These can be decoded into a person’s brain-states and thoughts. 

The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. 

The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM)

and Electronic Brain Link (EBL). 

EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. 

The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.” 

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. 

The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret. 

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. 

NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously.

The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. 

EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link.  (In military fighter aircraft, for example) 

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. 

RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). 

NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. 

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. 

NSA operatives see what the surveillance subject’s eyes are seeing. 

Visual memory can also be seen. 

RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control. Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.
National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain. 

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. 

Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.” 

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” 

The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain. 

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). 

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. 

EMF Brain Stimulation can also change a person’s brain-states and affect motor control. 

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). 

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. 

It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. 

That frequency is then modulated in order to impose information in That specific brain area. 

The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. An example of EMF Brain Stimulation:

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived. The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years. The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

Remote RNM Devices
a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.
b) [Information missing from original]
c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.
NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

THE VA HOSPITAL IN ANN ARBOR MICHIGAN REMOTE NEURAL MONITORING

Remote Neural Monitoring is a form of functional neuroimaging, claimed [1] to have been developed by the National Security Agency (NSA), that is capable of extracting EEG data from the human brain at a distance with no contacts or electrodes required. 

It is further claimed that the NSA has the capability to decode this data to extract subvocalizations, visual and auditory data. 

In effect it allows access to a person’s thoughts [2] without their knowledge or permission. 

It has been alleged that various organizations have been using Remote Neural Monitoring on US and other citizens for surveillance and harassment purposes.[3]

-EEG can mean: Electroencephalography – the method and science of recording and interpreting traces of brain electrical activity as recorded from the skull surface or the device used to record such traces Emperor Entertainment Group – A Hong Kong entertainment company. … The human brain In animals, the brain (enkephale) (Greek for in the skull), is the control center of the central nervous system, responsible for behavior. …

HISTORY OF REMOTE NEURAL MONITORING
Remote Neural Monitoring has its roots in the infamous MKULTRA project of the 1950s which, although it focused on drugs for mind control, also included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. 

The earliest non-classified references to this type of technology appear in a 1976 patent by R.G. Malech Patent #3951134  “Apparatus and method for remotely monitoring and altering brain waves” USPTO granted 4/20/76. 
The patent describes a technique using the transmission of 100 and 210 MHz signals to the brain yielding a 110 MHz signal which is modulated by the brain waves and can be detected by a receiver for further processing. Wikipedia does not yet have an article with this exact name. …

In the early 1980s it is claimed that the NSA began extensive use of Remote Neural Monitoring. Much of what is known about it stems from evidence presented as part of a 1992 court case brought by former NSA employee John St. Claire Akwei against the NSA. It describes an extensive array of advanced technology and resources dedicated to remotely monitoring hundreds of thousands of people in the US and abroad. Capabilities include access to an individual’s subvocalizations as well as images from the visual cortex and sounds from the auditory cortex. 

(Meaning, They Can see What You See, Hear What You Hear and Know what You are Thinking)
—-

Robert C. Gunn, PhD, Arbor, Michigan, is an NSA clinical psychologist involved in the human and Constitutional rights violations of Mind Control. He has committed unthinkable atrocities, worldwide 
Gunn is involved in covert psychological warfare against innocent Americans and other global citizens. He is among the developers of Psychotronic attacks, which is a highly advanced, surreal form of mind control that is intended to induce suicide among its thousands of targets.

The mind control technology is known as Remote Neural Monitoring.

The technology employs Satellite-delivered (ELF) Extra Low Frequencies to communicate voice-to-skull transmissions. This produces schizophrenic symptoms.

Robert C. Gunn, PhD, Arbor, Michigan is among the Developers of Psychotronic Wireless Directed Energy Weapon Attacks, which is a highly advanced, surreal form of mind control that is intended to induce suicide among its thousands of targets.

Recently, the infamous National Security Agency (NSA) of the U.S.A. has developed a very efficient method of controlling the human brain.

This technology is called Remote Neural Monitoring (R.N.M.) and is expected to revolutionize crime detection and investigation.

The below information is based on the statement by Robert C. Gunn, Ph.D., NSA clinical psychologist currently indicted for human and constitutional rights violations of Mind Control.

R.N.M. works remotely (ever wondered why have we all been driven relentlessly towards wireless systems?) to control the brain under the objective to detect any criminal thought taking place inside the mind of a possible culprit.

Yeah, No. That is ILLEGAL. But that has NEVER Stopped the Criminal Psychopaths in our Military, Government or Intelligence Agencies.

This undertaking is based on two principles:

1) The research studies have shown that the human intellect thinks at a speed of about 60 bits per second and, therefore, does not have the capability to contest with supercomputers acting via satellites, implants, and biotelemetry.

2) The human brain has a characteristic set of bioelectric resonance structures. By using supercomputers, the R.N.M. system can home in on it, and send messages through an embedded individual’s nervous system in order to affect their performance in a preferred way.

The entire system has been developed after about 50 years (!) of neuro-electromagnetic human experimentations, claimed to be involuntary, but there is no evidence to support this claim.

According to some scientists involved in this program (their names are not revealed for obvious reasons), within a few years, it is expected that DNA microchips, under the guise of medical breakthroughs that will be presented to launch the disease cure processes on speed and efficiency, might be implanted in the human cerebrum, which would make it inherently controllable. R.N.M. would then have the ability to read and govern a person’s emotional mental procedures along with the involuntary and visions.

At present, around the world, supercomputers are watching millions of people at the same time, with the speed of 20 terabits per second.
—–
How does R.N.M. work? It employs a set of programs functioning at different levels, like:

1) The signals intelligence system which applies electromagnetic frequencies (EMF), to excite the brain for the system and the electronic brain link (EBL).

2)The Brain Stimulation system that has been planned as particle emission intelligence, which means receiving information from unintentionally created electromagnetic waves in the environment. However, it is not related to radioactivity or nuclear detonation.

3) The recording machines that have electronic equipment to examine electrical action in human beings from afar. This computer-generated brain charting can always record all electrical events in the cerebrum.
 

The recording aid system deciphers individual brain maps for security purposes.
The underlining technology of this system takes into consideration that the electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. R.N.M. can send encrypted signals to the audio cortex of the brain directly circumventing the ear.

This encoding assists in detecting audio communication. It can also perform electrical mapping of the cerebrum’s activity from the visual center, which is achieved by avoiding the eyes and optic nerves, consequently projecting imageries from the subject’s mind onto a video display. With this visual and audio memory, both can be visualized and analyzed.
—–

The machinery involved can, remotely and non-invasively, detect information by digitally decoding the evoked potentials in 30-50Hz, 5 mW electromagnetic emissions from the cerebrum.

Evoked potentials are called the spikes and patterns created by the nerves, as they produce a shifting electrical pattern with an ever-changing magnetic instability, which then puts on a constant number of electromagnetic waves. The interesting part about this is that the entire exercise is carried out without any physical contact with the subject.

The EMF emissions can be decoded into current thoughts and audiovisual perception, in the subject’s gumption. It sends complicated ciphers and electromagnetic pulse signals to activate evoked potentials inside the mind, consequently generating sound and visual input in the neural circuits.

With its speech, auditory and visual communication arrays, R.N.M. allows for a comprehensive audio-visual mind-to-mind connection or a mind-to-computer association.
——-
The mechanism needs to decrypt the resonance frequency of each specific site to modulate the input of information in that specific location of the cerebrum.
Furthermore, R.N.M. can detect audio via microwaves, and features the broadcast of precise directives into the subconscious, producing visual disorders, illusions, and instillation of words and numbers into the brain through radiation waves.
With all the given paybacks for tracing the unlawful and traitorous activities, there are many alarms and dangers being pointed out by human rights advocates and scientists. The agencies of human rights, worldwide, have criticized the system as an affront to the basic human rights because it violates privacy and the dignity of considerations and events of life.
Several countries have opposed it and refer to it as an offense on their human and civil rights. Along with other biological concerns voiced by scientists, R.N.M. remains a controversial technology, which is being used in many countries for security maintenance and surveillance.
References:
1) Robert C. Gunn, Ph.D., Arbor, Michigan, NSA clinical psychologist currently indicted for human and constitutional rights violations of Mind Control. Extracts from the passage of the affidavit of the indictment.
2) Declassified documents by NSA of the MKULTRA project
3) R.G. Malech Patent #3951134  “Apparatus and method for remotely monitoring and altering brain waves” USPTO granted 4/20/76

—–
While use of this technology by organizations like the NSA is difficult to validate, recent advances in non-classified areas are already demonstrating what is possible:

Subvocal recognition using attached electrodes has already been achieved by NASA [4].
BCIs for gaming consoles from companies like NeuroSky perform primitive “thought reading” in that they can be controlled with a helmet on the player’s head, where the player can execute a few commands just by thinking about them.
Ambient has demonstrated a motorized wheelchair that is controlled by thought [5].

A brain-computer interface (BCI), sometimes called a direct neural interface or a brain-machine interface, is a direct communication pathway between a human or animal brain (or brain cell culture) and an external device. …

DOMESTIC SURVEILLANCE & MIND CONTROL TECHNOLOGY 
The NSA’s mission and the NSA’s domestic intelligence operations-

1) Communications Intelligence (COMINT) Blanket coverage of all electronic communications in the U.S. and the world to ensure national security. 
(The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960’s. NSA technology is developed and implemented in part from private corporations, academia, and the general public.)

2) Signals Intelligence (SIGINT) The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic field around it which gives off EMF waves. The NSA/DOD has developed proprietary advanced digital equipment which can remotely analyze all object whether (tran-maze?) or organic that have electrical activity.

3) Domestic Intelligence (DOMINT) The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easy and can effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S. and involves thousands of NSA personnel, and tracks millions of persons simultaneously. Cost-effective implementation of operations is achieved by NSA computer technology designed to minimize operations costs.

NSA personnel serve in quasi-public positions in their communities and run cover business and legitimate businesses that can inform the intelligence community of persons they would want to track. NSA personnel in the community usually have cover identities such as social workers, lawyers, and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwilling citizens by NSA operatives is likely to happen. NSA DOMINT has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network
As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has advanced technology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information on the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PCs. Thus, the NSA can gain wireless modem-(?) entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Detecting EMF Fields in Humans for Surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation
NSA Signals Intelligence uses (EMF) Electro-Magnetic-Frequency Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). 

EMB Brain Stimulation has been in development since the MK Ultra program of the early 1950’s which included neurological research into “radiation (non-ionizing EMF) and bioelectric research and development. 

The resulting secret technology is categorized at the National Security Archives as “Radiation intelligence” defined as “information from unintentionally emanated electromagnetic waves in environment, not including radioactivity or nuclear detonation.”                                    
 

“Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public.

There are also international intelligence agreements to keep this technology secret.”

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all of the electrical activity in the brain continuously.

The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for bring-to-computer links. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communications direct to the brain (bypassing the ears).

NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM
There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audiovisual information in their brain.

This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. 

Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control.
Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audiovisual brain-to-computer link.

NSA Signals Intelligence Electronic Brain Link Technology

NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields.
The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz 5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz 5-milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or net of “evoked potentials”. The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SIGINT uses EMF-transmitted Brain Stimulators as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects for a non-perceptible level).

EMF Brain stimulation works by sending a completely coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brains’ neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way electronic Brain-Link is done by remotely monitoring neural audiovisual information while transmitting sound to the auditory cortex-

(Bypassing the ears) and transmitting faint images to the visual cortex

(Bypassing the optic nerves and eyes). The images appear as floating 2-D screens in the brain.

Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz. to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation: 

Information Induced Through Modulation

Motor Impulse Coordination

Sound which Bypasses the Ears

Images in the Brain Bypassing the Eyes

Phantom Touch Sense

Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

Brain Area / Motor Control Cortex / Auditory Cortex / Visual Cortex / Somatosensory Cortex / Thought Center / Bioelectric Resonance Frequency / 10 Hz / 15 Hz / 25 Hz / 9 Hz / 20 Hz
—–
NSA Capabilities, Techniques and Resources

Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country.

A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on covertly by the NSA.

Remote RNM Devices

NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send mental images through the nervous system to affect their performance.

Now I know you aren’t going to read all of them, they are doing it and it’s much more complicated than that, and think what this means to those with whom you have come to love, to your family and to yourself???

REFERENCE:

THE NSA’S NEW SIGINT ANNEX JANUARY 19, 2021
On January 13, 2021, the National Security Agency (NSA) released a redacted version of new internal guidance designed to regulate signals intelligence (SIGINT) activity that implicates U.S. persons’ privacy and the Fourth Amendment to the U.S. Constitution. The NSA is part of the Department of Defense (DOD), and the new guidance is in the form of an annex to the manual of rules governing all DOD elements, DOD Manual 5240.01, which was last revised on August 8, 2016 (DOD Manual). The official title of the new NSA guidance is DOD ManualS5240.01-A, but I will refer to it here as the “SIGINT Annex” to the DOD Manual (and cite it as “SA”). Both the DOD Manual and the SIGINT Annex were promulgated under the authority of Section 2.3 of Executive Order 12333, which provides that “[e]lements of the Intelligence Community are authorized to collect, retain, or disseminate information concerning United States persons only in accordance with procedures” established by the head of the relevant agency with the approval of the Attorney General (AG) after consultation with the Director of National Intelligence (DNI).
THE NSA’S NEW SIGINT ANNEX JANUARY 19, 2021 78 Page pdf:

I. HISTORY OF THE NSA’S SIGINT MISSION
B. Creation of NSA
(1) Formulating necessary operational plans and policies for the conduct of the U.S. COMINT activities
(2) Conducting COMINT activities, including research and development, as required to meet the needs of the departments and agencies which are authorized to receive the products of COMINT.
(3) Determining, and submitting to appropriate authorities, requirements for logistic support for the conduct of COMINT activities, together with specific recommendations as to what each of the responsible departments and agencies of the Government should supply.
(4) Within NSA’s field of authorized operations prescribing requisite security regulations covering operating practices, including the transmission, handling and distribution of COMINT material within and among the COMINT elements under [NSA’s] operational or technical control [l]; and exercising the necessary monitoring and supervisory control, including inspections, if necessary, to ensure compliance with the regulations.
(5) Subject to the authorities granted the Director of Central Intelligence under NSCID No. 5 [available here], conducting all liaison on COMINT matters with foreign governmental communications intelligence agencies.
F. SIGINT Tradecraft
To understand the SIGINT Annex, and the regulation of SIGINT more generally, it is important to understand something about how SIGINT is actually done. Without that understanding, the rules don’t make as much sense. NSA’s website has a page devoted to “Frequently Asked Questions about Signals Intelligence (SIGINT).” This SIGINT FAQ page explains that NSA “collects SIGINT from various sources, including foreign communications, radar and other electronic systems. This information is frequently in foreign languages and dialects, is protected by codes and other security measures, and involves complex technical characteristics.” Here is former DIRNSA Michael Hayden’s more detailed description of SIGINT in 2002:

Surveillance & Society – The Pursuit of Full Spectrum Dominance From The Archives of the NSA 13 Page pdf:
Full Spectrum Dominance
Hard Power
Bumblehive
The Archive 
Archival Tools
Collect It All 
Treasuremap
Conclusion
The declared aim of the US military to achieve full spectrum dominance is surely an ambitious undertaking that will likely never be accomplished. It stresses the need for a well-organized and vigilant surveillance system that directly translates observations of threatening behaviour to an appropriate and pre-emptive response that exorcises unwanted emergences. The efforts to achieve full spectrum dominance, which stretches its reach into the future, are to an increasing extent coordinated by the data archive that seeks to capture and direct the entire flow of global data into the NSA’s data centers to build a complete representation of the real. The NSA’s surveillance program enlists the centripetal force of the archive in organizing a vast security apparatus, enhancing the governmental capabilities of perceptual awareness. From awareness to pre-emptive intervention, more power will be delegated to computational tools that process the library of the real to envision future threats and automatically mobilize lethal technological measures to pre-empt the specters of a contingent future. Here, it is the algorithm which deems certain patterns so deviant from a fluctuating norm that appropriate and potentially violent measures must be inserted whether soft or hard. The data archive and practices surrounding it conditions this venture into dataveillance that monitors personalized data representations for abnormal tendencies. The actual exercise of force will gradually be outsourced to progressively independent technical agents whose operations are based on an algorithmic logic creating legal aporias in terms of liability (Schuppli 2014). The indiscriminate collection practices reflected in the US federal archival project coordinated by the NSA thus enable algorithmic governance that bases decisions on the associative potential of the data double stored in proprietary data repositories—an archive inaccessible to public scrutiny. In stressing the importance of the fantasies that surround the archive, this article has indicated the inherent logic of governance working to manage any and all unpredictable emergences of the future. Attaining this capability may be a pipe dream based in a brash confidence in a new epistemological shift and big data. Nonetheless, the veneer of objectivity and technological efficiency may work to both undermine human supervision and amplify existing biases on account of imminent danger. 

Bumblehive
In 2014, the US government completed the Utah Data Center, code-named “Bumblehive,” that serves as a data storage facility for the US Intelligence Community led by the NSA. The structure takes up 1–1.5 million square feet (90,000–140,000 m2); costs $1.5 billion plus another estimated $2 billion for hardware, software, and maintenance; and requires sixty-five megawatts of electricity and uses 1.7 million gallons of water daily for its chiller plant (Miller 2013). The Utah Data Center is an immense physical structure that draws on finite natural resources to work efficiently, particularly water.2 The imposing material existence of the data center is a prerequisite for the omnipresent extent of its network. The pervasive surveillant assemblage is dependent on digitalized networks that render information readable and interactive as well as an intensification of computational efficiency in storing capabilities and processing power. The inconspicuous delivery-infrastructure that feeds the expanding collections of data is cloud computing, which traffics centripetal data circuits through bifurcated fiberoptic networks towards the centralized data storing facilities of corporate cloud service providers (Hu 2015: 7). The ubiquity of cloud computing, transmitted through a global network of interfaces, accentuates the reality of the control societies in which disciplinary environments of enclosure (Foucault 1995) open into a smooth and limitless milieu of biopolitical pervasive regulation of individual behavior through computational communication, tracking, and checkpoint technology (Haggerty and Ericson 2000). The subsistence of the control society is, however, mediated by identifiable and energy-hungry data archives: the modulatory power of the “corporation” in societies of control, announced by Gilles Deleuze (1992), is presupposed by the data factory. The apparent decentralization of power into digital networks is coordinated by the centralizing force of the cloud. As Tung-Hui Hu (2015: 79) states: “for the cloud to appear decentralized, its data must first be centralized.” It is the data archive that renders visible the deconstruction of the real and the mediated network occurring in societies of control that enables “dataveillance: a form of continuous surveillance through the use of (meta)data” (van Dijck 2014: 198). The power to monitor, track, and regulate emanates from these centralizing archives that house endless rows of servers collecting private and public information in concurrence with NSA’s raison d’etre: “collect it all” (Chamayou 2015b; van der Velden 2015). In a swarm of collected data, data mining becomes a significant tool in coordinating appropriate interventions in pursuit of full spectrum dominance. In other words, the eventual material expressions of hard power, for instance manifested in a drone strike, are increasingly guided by information gathered and derived through discreet digital networks. The suspension of the law inherent to the exceptional decision expressed in hard power is therefore integrated into the algorithmic calculations in the data center to assert exceptional dominance if deemed necessary (Agamben 2005: 84). Infusing the data archive with this toponomological principle 
 2 The Utah Data Center is the NSA’s central and biggest data center. It is not, however, the NSA’s only center for storing and processing data. The NSA has data centers in Georgia, Texas, Colorado, and Hawaii as well as at its headquarters in Fort Meade, Maryland. In combination, these data centers serve as a “colossal network of backup hard drives ensuring that failure at one facility is easily recovered from another” (Hogan 2015: 3)prompts a Derrida-inspired “archiviological” investigation of the state-founded archive that propagates new overnmental perceptive abilities and temporal regulation inconceivable without the machine vision of computation. Fantasies of temporal dominance are thus structured by the archival capabilities of the data center, which warrants a consideration of governmental surveillance potentiated by technological data capture that starts with the archive.

What is the National Security Agency (NSA)?
The National Security Agency (NSA) is a federal government intelligence agency that is part of the United States Department of Defense and is managed under the authority of the director of national intelligence (DNI).

https://www.techtarget.com/searchsecurity/definition/National-Security-Agency

In October 2017, Attorney General Loretta Lynch signed new guidelines enabling the NSA to provide intercepted communications and raw SIGINT — before applying domestic and foreign privacy protections — to 16 government agencies, including the FBI and Central Intelligence Agency.
Although the organization’s number of employees — as well as its budget — falls into the category of classified information, the NSA lists among its workforce analysts, engineers, physicists, linguists, computer scientists, researchers, customer relations specialists, security officers, data flow experts, managers, and administrative and clerical assistants.
It also claims to be the largest employer of mathematicians in the U.S. and possibly worldwide. NSA/CSS mathematicians perform the agency’s two critical functions: They design cryptographic systems to protect U.S. communications, and they search for weaknesses in the counterpart systems of U.S. adversaries.
The NSA denies reports claiming that it has an unlimited black budget — undisclosed even to other government agencies. Nevertheless, the agency admitted that, if it were judged as a corporation, it would rank in the top 10% of Fortune 500 companies.

NSA programs
It’s been known that the NSA listens in on every international phone call made to and from the U.S., but that’s just one aspect of the agency’s work. Another aspect is the agency’s focus on intelligence gathering.
It was believed that the NSA only focused on international intelligence gathering. However, that belief was derailed in 2013 when details about some of the NSA’s other surveillance programs became public.
That’s when former Booz Allen Hamilton contractor Edward Snowden leaked troves of confidential NSA information to the national and international press. The documents indicated the agency had broadened its domestic surveillance activities to bulk collection of U.S. communications.

Snowden told the press about 10 NSA surveillance programs:

INDEX VERY INTERESTING LINKS:
https://www.electrospaces.net/p/index_15.html

EXAMPLE-

What is known about NSA’s PRISM program

NSA Glossary (Updated: April 15, 2021)


Below is a glossary of terms and definitions related to the NSA and the collection of foreign signals intelligence.

https://www.electrospaces.net/p/glossary.html

NSA Nicknames and Codewords REFERENCE
THIS IS VERY INTERESTING. Though just a summary list, it gives an interesting peak into a wide range of Spying 

Intelligence Practices
EXAMPLES:

ARGYLEALIEN – Method to cause a loss of data by exploiting zeroization of hard-drives *

AIRSTEED – Cell phone tracking program of the Global Access Operations (GAO) *

BLACKHEART – Collection through FBI implants *

CAJABLOSSOM – Automated system for analyzing and profiling internet browsing histories

CANDYGRAM – Laptop mimicking GSM cell tower, sends out SMS whenever registered target enters its area, for tracking and ID of targets

CARBOY II – Units of ECHELON which break down satellite links into telephone and telegraph channels

CENTRICDUD – Tool that can read and write bytes in the CMOS of a targeted Windows computer *

TEMPEST – Spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations (codename originally from a COMSEC point of view, not an attacker’s one)

WIKIPEDIA:  U.S. National Security Agency specification and a NATO certification [1][2] referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.[3][4] TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).[5]
https://en.wikipedia.org/wiki/Tempest_(codename)

XKEYSCORE (XKS) – Computer system that combines high-speed filtering of data traffic from different sources with techniques for discovering targets who use the internet anonymously. XKEYSCORE is deployed at US and Five Eyes interception sites around the world.* *

WIKIPEDIA:  XKeyscore (XKEYSCORE or XKS) is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada’s Communications Security Establishment, New Zealand’s Government Communications Security Bureau, Britain’s Government Communications Headquarters, Japan’s Defense Intelligence Headquarters, and Germany’s Bundesnachrichtendienst.[1]
https://en.wikipedia.org/wiki/XKeyscore

Signals intelligence and human rights
the ECHELON report Prepared by Duncan Campbell
for the Electronic Privacy Information Center epic.org 9 June 2000
http://cryptome.info/0001/sigint-hr-dc/sigint-hr-dc.htm
(THIS IS A VERY INTERESTING AND INFORMATIVE REPORT, NOT DRY READING)

LAWSUIT: The Plaintiff learned of RNM by being in two-way RNM contact with the
Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to the authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24 hours-a-day at Ft. Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operation method.

***********
The following information was evidence provided in a civil suit against the federal government in the case Akewi v. NSA (92-0449). John St. Clair Akewi is a former National Security Agency employee and whistle-blower who exposed the use of neural monitoring to spy on individuals. The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. (REMOVED FROM THE INTERNET)

SIGINT for Anyone
The Growing Availability of Signals Intelligence in the Public Domain
This research was conducted within the Cyber and Intelligence Policy Center of the RAND National Defense Research Institute.

https://www.rand.org/pubs/perspectives/PE273.html
This Perspective examines and challenges the assumption that signals intelligence (SIGINT) is an inherently governmental function by revealing nongovernmental approaches and technologies that allow private citizens to conduct SIGINT activities. RAND researchers relied on publicly available information to identify SIGINT capabilities in the open market and to describe the intelligence value each capability provides to users. They explore the implications each capability might provide to the United States and allied governments.
The team explored four technology areas where nongovernmental SIGINT is flourishing: maritime domain awareness; radio frequency (RF) spectrum mapping; eavesdropping, jamming, and hijacking of satellite systems; and cyber surveillance. They then identified areas where further research and debate are needed to create legal, regulatory, policy, process, and human capital solutions to the challenges these new capabilities provide to government.
This was an exploratory effort, rather than a comprehensive research endeavor. The team relied on unclassified and publicly available materials to find examples of capabilities that challenge the government-only paradigm. They identified ways these capabilities and trends may affect the U.S. government in terms of emerging threats, policy implications, technology repercussions, human capital considerations, and financial effects. Finally, they identified areas for future study for U.S. and allied government leaders to respond to these changes.

Communications intelligence (COMINT) is information gathered from the communications of individuals, including telephone conversations, text messages and various types of online interactions.

THE RISE AND FALL OF INTELLIGENCE

Signal decoding solutions for SIGINT & COMINT systems
(State of the Art Spy Software)
Founded by and for SIGINT professionals, COMINT Consulting produces Krypto500 and Krypto1000 HF VHF UHF signal decoding software for COMINT, SIGINT, Electronic Warfare (both Electronic Attack (EA) and Electronic Support Measures (ESM), SIGINT Systems) and radio monitoring applications for ANY platform.
Krypto1000 is aimed at the VHF UHF decoding of telemetry, Digital Mobile Radio (DMR), Trunk Mobile Radio (TMR), satellite modems and other wideband signals found in the VHF UHF range. This multichannel SIGINT COMINT software contains High-Definition (HD) spectral and analytic displays and is a market-leading collection of decoders for COMINT, SIGINT, Electronic Warfare (both Electronic Attack (EA) and Electronic Support Measures (ESM), SIGINT Systems) and radio monitoring. Krypto1000 can be used with any modern Software-Defined Radio (SDR) receiver, digital acquistion and capture cards, SIGINT COMINT wideband, multichannel recorders, wideband tuners and digitizers. Its architecture is an adaptive client-server architecture appropriate for the most demanding tactical or strategic COMINT, SIGINT, Electronic Warfare (both Electronic Attack (EA) and Electronic Support Measures (ESM), SIGINT Systems) and radio monitoring operations. The Krypto1000 COMINT SIGINT software signals decoder suite may also be used (and is already) as the interface (GUI) for tactical systems such as COMINT SIGINT and EW manpack systems that boot to Krypto1000.
Krypto500 is multichannel SIGINT COMINT signal decoding software suitable for tactical or strategic radio monitoring, Electronic Warfare (both Electronic Attack (EA) and Electronic Support Measures (ESM), SIGINT Systems) and of course, COMINT and SIGINT applications on ANY platform. Krypto500 contains a market-leading collection of decoders, analysis tools as well as precision classification, radio fingerprinting (RadioID), and tools for cryptanalysis, traffic analysis, nodal analysis and network diagramming. It contains more decoders than ANY other software in the world, with nearly 140 decoders more than its closest ‘competitor in 2019. Perhaps more importantly, its decoders contain solutions to numerous variants to standard protocols and variant waveforms and can be used for COMINT, SIGINT, Electronic Warfare (both Electronic Attack (EA) and Electronic Support Measures (ESM), SIGINT Systems) and radio monitoring operations. Its collection of decoders are mainly used against narrowband HF target modems and COMINT Consulting produces some 13x more new HF VHF UHF decoding solutions than any other COMINT, SIGINT or Electronic Warfare (EW) company, worldwide. The Krypto500 COMINT SIGINT decoding software can be run in multiple instances with just one license and with up to 32 modules of any type and combination (decoder, classification,, analysis, fingerprinting, network diagramming, cryptanalysis) running concurrently – thereby attacking several hundred channels of target activity simultaneously.
The Krypto1000 VHF UHF decoding software suite can also be used to control a wideband tuner used as a front end receiver – and then stream unlimited IQ channels to workstations equipped with Krypto500 and Krypto1000 to process many hundreds of HF VHF UHF target modems at once! As Krypto1000 has no bandwidth or channel number limits except those imposed by the limitations of the hardware, the connection to an SDR or those of the COMINT SIGINT operator, analyst or linguist – you can easily create an enormous COMINT SIGINT capability with a very modest investment.
COMINT Consulting develops advanced COMINT and SIGINT suites for analysis, demodulation, classification, traffic and and nodal analysis, automatic network diagramming, decoding, parsing and radio fingerprinting.

HF Multichannel COMINT – SIGINT software suite Unequalled Decoding, Collection, Analysis, Precision Classification and RadioID

SIGNET Surviellance/Attack Systems
Krypto1000 overview
https://video.wixstatic.com/video/49522c_5e3fe73924c3479cbc07bca0660dc96f/360p/mp4/file.mp4
Krypto500 overview 
https://video.wixstatic.com/video/49522c_9620788b50da459e9e2aab0f2e7d4e88/360p/mp4/file.mp4

Remote Neural Monitoring: Is It Possible to Spy on Someone’s Thoughts?


High-bandwidth neuroelectronic interfaces?

Neural engineering?

Increasing the bandwidth of neuroelectronic interfaces in terms of spatial resolution and sensitivity in a wide frequency rang?

Biocompatible intracranial neural probes?

Long-term and highly sensitive neural recordings?

They Say- neuroscience and biomedical engineering applications

I Say- Wireless Remote Brain Spying. Even Worse. If they can Recieve Signals, they can Also Send Them = Wireless Remote Mind Control.

64 CHANNEL GRAPHENE BIO-SENSOR ARRAY WIRELESS BRAIN SIGNAL MONITORING AND RECORDING

Graphene active sensor arrays for long-term and wireless mapping of wide frequency band epicortical brain activity

https://www.nature.com/articles/s41467-020-20546-w

https://www.nature.com/articles/s41467-020-20546-w.pdf

FRACTL

 

 



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Humic & Fulvic Liquid Trace Mineral Complex

HerbAnomic’s Humic and Fulvic Liquid Trace Mineral Complex is a revolutionary New Humic and Fulvic Acid Complex designed to support your body at the cellular level. Our product has been thoroughly tested by an ISO/IEC Certified Lab for toxins and Heavy metals as well as for trace mineral content. We KNOW we have NO lead, arsenic, mercury, aluminum etc. in our Formula. This Humic & Fulvic Liquid Trace Mineral complex has high trace levels of naturally occurring Humic and Fulvic Acids as well as high trace levels of Zinc, Iron, Magnesium, Molybdenum, Potassium and more. There is a wide range of up to 70 trace minerals which occur naturally in our Complex at varying levels. We Choose to list the 8 substances which occur in higher trace levels on our supplement panel. We don’t claim a high number of minerals as other Humic and Fulvic Supplements do and leave you to guess which elements you’ll be getting. Order Your Humic Fulvic for Your Family by Clicking on this Link , or the Banner Below.



Our Formula is an exceptional value compared to other Humic Fulvic Minerals because...


It’s OXYGENATED

It Always Tests at 9.5+ pH

Preservative and Chemical Free

Allergen Free

Comes From a Pure, Unpolluted, Organic Source

Is an Excellent Source for Trace Minerals

Is From Whole, Prehisoric Plant Based Origin Material With Ionic Minerals and Constituents

Highly Conductive/Full of Extra Electrons

Is a Full Spectrum Complex


Our Humic and Fulvic Liquid Trace Mineral Complex has Minerals, Amino Acids, Poly Electrolytes, Phytochemicals, Polyphenols, Bioflavonoids and Trace Vitamins included with the Humic and Fulvic Acid. Our Source material is high in these constituents, where other manufacturers use inferior materials.


Try Our Humic and Fulvic Liquid Trace Mineral Complex today. Order Yours Today by Following This Link.

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.