GANG-STALKING defined & explained:

https://lawyer.zone/what-is-gang-stalking/

Table of Contents

What Is Gang-Stalking

Gang stalking, also written as gangstalking or gang-stalking, refers to a person being followed, harassed, or victimized by others.

In other words, gang stalking is when a group of people harass, intimidate, or use other organized gang stalking methods and tactics to victimize another person or group of people.

There are many reasons why someone or a group of people can be gang stalked.

The most common reasons could be differences in their core beliefs, racism, or other differences that may be cultural or based on their lifestyle.

According to an article from the International Journal of Environmental Research and Public Health, about 0.66% of women and 0.17% of men in the western world believe that they have been group-stalked at some point in their lives.

As such, this type of activity is more widespread than we may initially believe.

Gang Definition

According to the Merriam-Webster dictionary, a gang is defined as follows:A group of persons working to unlawful or antisocial endsAuthor

As you can see from this definition, a gang is a group of people acting in a coordinated and organized manner for unlawful ends.

For example, you can have gang harassment or gang bullying representing an illegal activity performed by a group of people.

“Gang stalking” is also another unlawful activity performed by a “group” of people against another person or another group.

Stalking Definition

According to The United States Department of Justice, stalking is defined as follows:The term “stalking” means engaging in a course of conduct directed at a specific person that would cause a reasonable person to fear for his or her safety or the safety of others or suffer substantial emotional distress.Author

As you can see from this definition, stalking is characterized by:

  • A person
  • Engaging in a conduct 
  • Directed at another person 
  • Causing the other person to fear for his or her safety or that of others
  • Or suffer emotional distress

Another definition of “stalking” can be found on the Merriam-Webster dictionary indicating that stalking is defined as:To pursue obsessively and to the point of harassmentAuthor

The term stalking can also mean to obsessively “pursue” another person.

Gang Stalking Definition

Now that we have a good understanding of what a “gang” means and the specific definition of “stalking”, we can better define gangstalking.

“Gangstalking” refers to conduct or behavior adopted by a group of people against another person or group of people with the objective to cause others to fear for their safety or the safety of others or leading them to feel harassed or psychologically disturbed.

Gang performing stalking activities use group stalking techniques to achieve their end.

A member of the gang stalking another person is generally referred to as a gang stalker.

The person being the victim of gang stalking is the “victim” or if there are many people, they are the “targeted individuals”.

How Gang Stalking Works

There are various gang stalking methods and organized stalking tactics employed by gang stalkers.

Gang Stalker 

To start with, the “gang” can be composed of a few people up to a large number of people.

The moment you have over three or four people, you can consider that it’s a gang.

What’s more, you can also have gangstalking taking place within a family when the family is large enough (this can be referred to as gangstalking family members).

Organized stalking methods can take place in a public environment, at the workplace, within a community, within a family, or at any place the victim or targeted individuals conduct their personal, religious, cultural, or professional activities.

For the group stalking activity to be organized, the gang members will generally communicate to one another about who to pursue, how to pursue the targeted individuals, what type of stalking tactics to deploy, for how long, and so on.

Gang Stalking Tactics

The gang members can make use of high-tech tools and weapons to harass another or use psychological means to cause fear and emotional distress in their victim.

Some of the common stalking tactics are:

  • Repeatedly following someone 
  • Repeatedly threatening someone 
  • Making unwanted phone calls
  • Sending unwanted emails
  • Sending unwanted text messages 
  • Leaving threatening voice mails
  • Approaching the victim at his or her workplace
  • Approaching the victim in grocery stores or shopping malls
  • Leaving threatening notes for the victim to find
  • Leaving objects for the victim to find 
  • Breaking into the victim’s home 
  • Breaking into the victim’s car 

As you can see, most of the gang stalk activities and methods are covert methods used to psychologically harass the victim.

One objective that the gang stalkers may want to achieve is to harass the victims to a point where the victims lose credibility in society where they may be perceived as “crazy” or “deranged”.

If the gang stalkers are successful in their unlawful behavior, their victim may eventually be perceived as dangerous, mentally disturbed, or impaired in some ways leading them to be forced to undergo a mental and psychological evaluation.

Since the gang can operate through multiple people, the emotional distress and fear caused to the victims and targeted individuals may appear to them as more intense and grave.

Particularly, if the victims are aware that the gang members are wanted criminals or individuals with a long criminal history, they may have a heightened fear for their lives and that of their friends or family members.

Targeted Victims

The victims of gang stalking and psychological harassment can be individuals of any racial and cultural background.

The victims can be males or females, of any age, of any educational background, or within any community.

The point here is that anyone can unfortunately become a victim of gang stalking.

Generally, the gangs identify their victims based on a perceived difference of opinion, racial prejudice, jealousy, cultural differences, or other perceived differences between the “gang” and the victims.

For example, you can have a gang of white males gang stalking a group of black families.

You can have a group of educated professionals gang stalking another group of professionals at the workplace.

You can have a gang stalking family victimize another family or former family friends.

The gangstalking phenomenon, over the past 15 years, has gotten more and more attention from professionals and in the media.

The gangstalking victims are in a difficult situation as they may be harassed by multiple people, using different stalking behavior, and potentially for a long period of time.

Some of the common gangstalking tactics used and reported by the victims are:

  • The gang performs the same activities as the victim 
  • The gang enters and exists a place at the same time as the victim 
  • The gang records private conversations 
  • The gang films the victim in various private settings 
  • The gang places unwanted calls from different numbers 

Another way victims are psychologically assaulted is that the gang members frame another innocent person as the perpetrator of the stalking behavior and conduct.

For example, the gang can frame an innocent co-worker to be the person who may be repeatedly stealing the victim’s personal belongings.

With this type of technique, the victim may suspect an “innocent” co-worker to be the thief or the person causing the harassment.

Gang Stalking Consequences

Just like any other crime, gang stalking is a crime that is punishable by law.

In some states, gang stalking is classified as a misdemeanor.

However, in most states, gangstalking is a felony and will have more severe consequences such as:

  • Fines
  • Prison or jail time
  • Probation 
  • Community service 
  • Rehabilitation programs

Depending on the nature of the conduct and the gang member’s past criminal history, the court may impose a stricter sentence than a person who is a first-time offender.

There may also be aggravating factors that the court may take into consideration for the sentencing, such as the violent nature of the criminal conduct or other circumstances relating to the crime.

Gang Stalking Meaning Takeaways 

There you have it folks!

What is gangstalking?

What are the gangstalking tactics used?

What is the most common type of stalking?

We can define gang stalking to refer to a group of people coordinating their efforts to harass or cause psychological distress in another person or a group of people.

When a person is stalked, he or she is being pursued obsessively by another person to a point that the victim no longer feels safe or suffers emotional distress.

Gangstalking is essentially the same type of stalking behavior performed by a group in a coordinated and organized fashion.

The consequences of being gang stalked are much more severe for the victims (at least subjectively for them) as they are followed or harassed by many.

Generally, gang stalking behaviors are considered criminal offenses and are punishable by law.

In most states, gangstalking is considered a felony whereas in a few states it’s a misdemeanor.

The methods and tactics used by gang stalkers can be the common type of stalking behaviors, such as:

  • Repeated phone calls
  • Videotaping the person in private settings
  • Recording the person’s voice 
  • Sending many unwanted text messages
  • Showing up and random places near the victim
  • Showing up at the person’s workplace
  • Showing up at the person’s school
  • Showing up at the person’s home 
  • Breaking into the person’s car
  • Breaking into the person’s house
  • Leaving objects and notes for the person to find

And so on…

If you are the victim of gangstalking or need help, there are various stalking resources that you can contact, such as:

You can also call the National Center for Victims of Crime at 1-855-4VICTIM (1-855-484-2846).

In cases where there’s an emergency, you’ll need to contact the police authorities for immediate assistance.

Let’s look at a summary of our findings.

Gangstalking Definition

  • Gangstalking is defined as the obsessive, coordinated, and organized stalking techniques used by a group of people (a gang) against another person (victim) or group of people (targeted individuals)
  • Gang stalkers will perform unwanted and repeated surveillance of their victim causing the victim to fear for safety, feel harassed, and intimidated
  • In today’s context, stalking can be done by calling, texting, sending unwanted gifts, placing objects to be found, emailing, instant messaging, videotaping, audio recording, and so on
  • Any person can become a member of a “gang” stalker to the extent they carry out stalking activities with their fellow gang members
  • Any person can become a victim of gang stalking as well no matter their cultural, racial, professional, ethnic, sexual, or other backgrounds

https://lawyer.zone/what-is-gang-stalking/

Posted in gangstalking defined, THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , , , , , , , , , , | 2 Comments

Nanoparticles can turn off genes in bone marrow cells

Using these new particles, researchers could develop treatments for heart disease and other conditions.Anne Trafton | MIT News OfficePublication Date:October 5, 2020

https://news.mit.edu/2020/nanoparticles-bone-marrow-rnai-1005

Nanoparticles can turn off genes in bone marrow cells

RNAi nanoparticles inside bone marrow

Caption:MIT researchers have shown they can deliver RNAi nanoparticles to the bone marrow, influencing their function. At top right, the bone marrow is not yet treated with particles that turn off a gene called SDF1. At bottom right, the number of neutrophils (blue) decreases, indicating that they have been released from bone marrow after treatment. At left, treatment with a control nanoparticle does not affect the number of neutrophils before and after treatment. Credits:Image courtesy of the researchers 

Using specialized nanoparticles, MIT engineers have developed a way to turn off specific genes in cells of the bone marrow, which play an important role in producing blood cells. These particles could be tailored to help treat heart disease or to boost the yield of stem cells in patients who need stem cell transplants, the researchers say.

This type of genetic therapy, known as RNA interference, is usually difficult to target to organs other than the liver, where nanoparticles would tend to accumulate. The MIT researchers were able to modify their particles in such a way that they would accumulate in the cells found in the bone marrow.

“If we can get these particles to hit other organs of interest, there could be a broader range of disease applications to explore, and one that we were really interested in this paper was the bone marrow. The bone marrow is a site for hematopoiesis of blood cells, and these give rise to a whole lineage of cells that contribute to various types of diseases,” says Michael Mitchell, a former MIT postdoc and one of the lead authors of the study.

In a study of mice, the researchers showed that they could use this approach to improve recovery after a heart attack by inhibiting the release of bone marrow blood cells that promote inflammation and contribute to heart disease.

Marvin Krohn-Grimberghe, a cardiologist at the Freiburg University Heart Center in Germany, and Maximilian Schloss, a research fellow at Massachusetts General Hospital, are also lead authors of the paper, which appears today in Nature Biomedical Engineering. The paper’s senior authors are Daniel Anderson, a professor of chemical engineering at MIT and a member of MIT’s Koch Institute for Integrative Cancer Research and Institute for Medical Engineering and Science, and Matthias Nahrendorf, a professor of radiology at MGH.

Targeting the bone marrow

RNA interference is a strategy that could potentially be used to treat a variety of diseases by delivering short strands of RNA that block specific genes from being turned on in a cell. So far, the biggest obstacle to this kind of therapy has been the difficulty in delivering it to the right part of the body. When injected into the bloodstream, nanoparticles carrying RNA tend to accumulate in the liver, which some biotech companies have taken advantage of to develop new experimental treatments for liver disease.

Anderson’s lab, working with MIT Institute Professor Robert Langer, who is also an author of the new study, has previously developed a type of polymer nanoparticles that can deliver RNA to organs other than the liver. The particles are coated with lipids that help stabilize them, and they can target organs such as the lungs, heart, and spleen, depending on the particles’ composition and molecular weight.

“RNA nanoparticles are currently FDA-approved as a liver-targeted therapy but hold promise for many diseases, ranging from Covid-19 vaccines to drugs that can permanently repair disease genes,” Anderson says. “We believe that engineering nanoparticles to deliver RNA to different types of cells and organs in the body is key to reaching the broadest potential of genetic therapy.”

In the new study, the researchers set out to adapt the particles so that they could reach the bone marrow. The bone marrow contains stem cells that produce many different types of blood cells, through a process called hematopoiesis. Stimulating this process could enhance the yield of hematopoietic stem cells for stem cell transplantation, while repressing it could have beneficial effects on patients with heart disease or other diseases.

“If we could develop technologies that could control cellular activity in bone marrow and the hematopoietic stem cell niche, it could be transformative for disease applications,” says Mitchell, who is now an assistant professor of bioengineering at the University of Pennsylvania.

The researchers began with the particles they had previously used to target the lungs and created variants that had different arrangements of a surface coating called polyethylene glycol (PEG). They tested 15 of these particles and found one that was able to avoid being caught in the liver or the lungs, and that could effectively accumulate in endothelial cells of the bone marrow. They also showed that RNA carried by this particle could reduce the expression of a target gene by up to 80 percent.

The researchers tested this approach with two genes that they believed could be beneficial to knock down. The first, SDF1, is a molecule that normally prevents hematopoietic stem cells from leaving the bone marrow. Turning off this gene could achieve the same effect as the drugs that doctors often use to induce hematopoietic stem cell release in patients who need to undergo radiation treatments for blood cancers. These stem cells are later transplanted to repopulate the patient’s blood cells.

“If you have a way to knock down SDF1, you can cause the release of these hematopoietic stem cells, which could be very important for a transplantation so you can harvest more from the patient,” Mitchell says.

The researchers showed that when they used their nanoparticles to knock down SDF1, they could boost the release of hematopoietic stem cells fivefold, which is comparable to the levels achieved by the drugs that are now used to enhance stem cell release. They also showed that these cells could successfully differentiate into new blood cells when transplanted into another mouse.

“We are very excited about the latest results,” says Langer, who is also the David H. Koch Institute Professor at MIT. “Previously we have developed high-throughput synthesis and screening approaches to target the liver and blood vessel cells, and now in this study, the bone marrow. We hope this will lead to new treatments for diseases of the bone marrow like multiple myeloma and other illnesses.”

Combatting heart disease

The second gene that the researchers targeted for knockdown is called MCP1, a molecule that plays a key role in heart disease. When MCP1 is released by bone marrow cells after a heart attack, it stimulates a flood of immune cells to leave the bone marrow and travel to the heart, where they promote inflammation and can lead to further heart damage.

In a study of mice, the researchers found that delivering RNA that targets MCP1 reduced the number of immune cells that went to the heart after a heart attack. Mice that received this treatment also showed improved healing of heart tissue following a heart attack.

“We now know that immune cells play such a key role in the progression of heart attack and heart failure,” Mitchell says. “If we could develop therapeutic strategies to stop immune cells that originate from bone marrow from getting into the heart, it could be a new means of treating heart attack. This is one of the first demonstrations of a nucleic-acid-based approach of doing this.”

At his lab at the University of Pennsylvania, Mitchell is now working on new nanotechnologies that target bone marrow and immune cells for treating other diseases, especially blood cancers such as multiple myeloma.

The research was funded in part by the National Institutes of Health, the European Union’s Horizon 2020 research and innovation program, the MGH Research Scholar Program, a Burroughs Wellcome Fund Career Award at the Scientific Interface, a Koch-Prostate Cancer Foundation Award in Nanotherapeutics, the Koch Institute Marble Center for Cancer Nanomedicine, and the Koch Institute Support (core) Grant from the National Cancer Institute.

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Leave a comment

Functional Near-Infrared Spectroscopy (fNIRS) Cognitive Brain MonitorNew signal-processing techniques excludes motion artifacts to yield more accurate data

Innovators at NASA’s Glenn Research Center have developed a Functional Near-Infrared Spectroscopy (fNIRS) Cognitive Brain Monitor with improved signal processing to obtain more accurate data. fNIRS has been used successfully to monitor cognitive states and activity, and Glenn’s system can be used to continuously monitor brain function during safety-critical tasks, such as flying an airplane or driving a train. Using head-worn sensors, the technique employs near-infrared light and advanced signal processing to allow real-time, in-task monitoring. The system not only determines changes in cognitive state by tracking blood hemoglobin levels in the brain, but also filters non-relevant artifacts, such as the probes’ own motion, rendering the collected data even more accurate. Glenn’s novel use and refinement of fNIRS signals stands to improve safety in a wide variety of applications and environments.
Benefits
Improved safety: Continuous monitoring of brain activity during safety-critical tasks could prevent serious accidents
High accuracy: Removing motion artifacts allows real-world data capture to approach laboratory quality
Portability: The system features comfortable head-worn sensors, and is compact enough to fit into smaller spaces
Applications
Safety simulations, training, and monitoring for airline pilots, train and mass transit engineers, ship captains, truck drivers, crane and other heavy-equipment operators, and air traffic controllers
Military simulations and training
In-home, real-time monitoring and feedback during patient rehabilitation for cognitive impairment or depression
Replacement for or supplement to functional brain imaging
The Technology
Glenn’s system can be used to continuously monitor brain function during safety-critical tasks, such as flying an airplane
Glenn’s system can be used to continuously monitor brain function during safety-critical tasks, such as flying an airplane
Functional near-infrared spectroscopy (fNIRS) is an emerging hemodynamic neuroimaging brain-computer interface (BCI) technology that indirectly measures neuronal activity in the brain’s cortex via neuro-vascular coupling. fNIRS works by quantifying hemoglobin-concentration changes in the brain based on optical intensity measurements, measuring the same hemodynamic changes as functional magnetic resonance imaging (fMRI). With enough probes in enough locations, fNIRS can detect these hemodynamic activations across the subject’s entire head, thus allowing the determination of cognitive state through the use of pattern classification. fNIRS systems offer low-power, low-cost, highly mobile alternatives for real-time monitoring in safety-critical situations.

Glenn’s specific contribution to this field is the algorithms capable of removing motion artifacts (environment- or equipment-induced errors) from the device’s head-worn optical sensors. In other words, Glenn’s adaptive filter can determine the presence of a potential motion artifact based on a phase shift in the data measured; identify the artifact by examining the correlation between the phase shift and changes in hemoglobin concentration; and finally remove the artifact using Kalman filtering whenever changes in hemoglobin level and changes in the phase shift are not correlated. Glenn’s breakthrough allows the advantages of fNIRS to be used for non-invasive real-time brain monitoring applications in motion-filled environments that could potentially save lives.
Download a PDF fact sheet for this technology.
Details
Category Health, Medicine and Biotechnology
Reference Number LEW-TOPS-84
Case Number(s) LEW-18952-1
Patent(s) 9,848,812

Contact Us About This Technology
Glenn Research Center
21000 Brookpark Road
Cleveland, OH 44135
216-433-3484
grc-techtransfer@mail.nasa.gov

https://technology.nasa.gov/patent/LEW-TOPS-84

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 1 Comment

The Origin of Consciousness in the Breakdown of the Bicameral Mind,

Bicameralism[Note 1] (the condition of being divided into “two-chambers”) is a hypothesis in psychology that argues that the human mind once operated in a state in which cognitive functions were divided between one part of the brain which appears to be “speaking”, and a second part which listens and obeys—a bicameral mind. The term was coined by Julian Jaynes, who presented the idea in his 1976 book The Origin of Consciousness in the Breakdown of the Bicameral Mind,[1] wherein he made the case that a bicameral mentality was the normal and ubiquitous state of the human mind as recently as 3,000 years ago, near the end of the Mediterranean bronze age.

The Origin of ConsciousnessEdit

Jaynes uses governmental bicameralism as a metaphor to describe a mental state in which the experiences and memories of the right hemisphere of the brain are transmitted to the left hemisphere via auditory hallucinations. The metaphor is based on the idea of lateralization of brain functionalthough each half of a normal human brain is constantly communicating with the other through the corpus callosum. The metaphor is not meant to imply that the two halves of the bicameral brain were “cut off” from each other but that the bicameral mind was experienced as a different, non-conscious mental schema wherein volition in the face of novel stimuli was mediated through a linguistic control mechanism and experienced as auditory verbal hallucination.

Bicameral mentalityEdit

Bicameral mentality would be non-conscious in its inability to reason and articulate about mental contents through meta-reflection, reacting without explicitly realizing and without the meta-reflective ability to give an account of why one did so. The bicameral mind would thus lack metaconsciousness, autobiographical memory, and the capacity for executive “ego functions” such as deliberate mind-wandering and conscious introspection of mental content. When bicamerality as a method of social control was no longer adaptive in complex civilizations, this mental model was replaced by the conscious mode of thought which, Jaynes argued, is grounded in the acquisition of metaphorical language learned by exposure to narrative practice.

According to Jaynes, ancient people in the bicameral state of mind would have experienced the world in a manner that has some similarities to that of a person with schizophrenia. Rather than making conscious evaluations in novel or unexpected situations, the person would hallucinate a voice or “god” giving admonitory advice or commands and obey without question: One would not be at all conscious of one’s own thought processes per se. Jaynes’s hypothesis is offered as a possible explanation of “command hallucinations” that often direct the behavior of those afflicted by first rank symptoms of schizophrenia, as well as other voice hearers.[2]

Jaynes’s evidenceEdit

Jaynes built a case for this hypothesis that human brains existed in a bicameral state until as recently as 3,000 years ago by citing evidence from many diverse sources including historical literature. He took an interdisciplinary approach, drawing data from many different fields.[3] Jaynes asserted that, until roughly the times written about in Homer‘s Iliad, humans did not generally have the self-awareness characteristic of consciousnessas most people experience it today. Rather, the bicameral individual was guided by mental commands believed to be issued by external “gods“—commands which were recorded in ancient myths, legends and historical accounts. This is exemplified not only in the commands given to characters in ancient epics but also the very muses of Greek mythologywhich “sang” the poems. According to Jaynes, the ancients literally heard muses as the direct source of their musicand poetry.

Jaynes asserts that in the Iliadand sections of the Old Testament no mention is made of any kind of cognitiveprocesses such as introspection, and there is no apparent indication that the writers were self-aware. Jaynes suggests, the older portions of the Old Testament (such as the Book of Amos) have few or none of the features of some later books of the Old Testament (such as Ecclesiastes) as well as later works such as Homer’s Odyssey, which show indications of a profoundly different kind of mentality—an early form of consciousness.[3]

In ancient times, Jaynes noted, gods were generally much more numerous and much more anthropomorphic than in modern times, and speculates that this was because each bicameral person had their own “god” who reflected their own desires and experiences.[4]

He also noted that in ancient societies the corpses of the dead were often treated as though still alive (being seated, dressed, and even fed) as a form of ancestor worship, and Jaynes argued that the dead bodies were presumed to be still living and the source of auditory hallucinations.[3] This adaptation to the village communities of 100 individuals or more formed the core of religion. Unlike today’s hallucinations, the voices of ancient times were structured by cultural norms to produce a seamlessly functioning society.

Jaynes inferred that these “voices” came from the right brain counterparts of the left brain language centres; specifically, the counterparts to Wernicke’s area and Broca’s area. These regions are somewhat dormant in the right brains of most modern humans, but Jaynes noted that some studies show that auditory hallucinations correspond to increased activity in these areas of the brain.[3]

Jaynes notes that even at the time of publication there is no consensus as to the cause or origins of schizophrenia. Jaynes argues that schizophrenia is a vestige of humanity’s earlier bicameral state.[3] Recent evidence shows that many schizophrenics do not just hear random voices but experience “command hallucinations” instructing their behavior or urging them to commit certain acts.[full citation needed]

As support for Jaynes’s argument, these command hallucinations are little different from the commands from gods which feature prominently in ancient stories.[3] Indirect evidence supporting Jaynes’s theory that hallucinations once played an important role in human mentality can be found in the recent book Muses, Madmen, and Prophets: Rethinking the History, Science, and Meaning of Auditory Hallucination by Daniel Smith.[5]

Breakdown of bicameralismEdit

Jaynes theorized that a shift from bicameralism marked the beginning of introspection and consciousness as we know it today. According to Jaynes, this bicameral mentality began malfunctioning or “breaking down” during the 2nd millennium BCE. He speculates that primitive ancient societies tended to collapse periodically: for example, Egypt’s Intermediate Periods, as well as the periodically vanishing cities of the Mayas, as changes in the environment strained the socio-cultural equilibria sustained by this bicameral mindset.

The Bronze age collapse of the 2nd millennium BCE led to mass migrations and created a rash of unexpected situations and stresses which required ancient minds to become more flexible and creative. Self-awareness, or consciousness, was the culturally evolved solution to this problem. This necessity of communicating commonly observed phenomena among individuals who shared no common language or cultural upbringing encouraged those communities to become self-aware to survive in a new environment. Thus consciousness, like bicamerality, emerged as a neurological adaptation to social complexity in a changing world.[citation needed]

Jaynes further argues that divination, prayer, and oraclesarose during this breakdown period, in an attempt to summon instructions from the “gods” whose voices could no longer be heard.[3] The consultation of special bicamerally operative individuals, or of divination by casting lots and so forth, was a response to this loss, a transitional era depicted, for example, in the book of 1 Samuel. It was also evidenced in children who could communicate with the gods, but as their neurology was set by language and society they gradually lost that ability. Those who continued prophesying, being bicameral according to Jaynes, could be killed.[6][7]Leftovers of the bicameral mind today, according to Jaynes, include mental illnesses such as schizophrenia and the hallucinations present in patients with split brain syndrome.

From:

https://en.m.wikipedia.org/wiki/Bicameralism_(psychology)

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 1 Comment

Experimentally Observed Cherenkov Light Generation in the Eye During Radiation Therapy- the flashes you see have been proven.

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 2 Comments

Using nanoparticals to stimulate the brain remotely.

Magnetoelectric ‘spin’ on stimulating the brain | Nanomedicine
— Read on www.futuremedicine.com/doi/10.2217/nnm.15.52

Aim: The in vivo study on imprinting control region mice aims to show that magnetoelectric nanoparticles may directly couple the intrinsic neural activity-induced electric fields with external magnetic fields. Methods: Approximately 10 µg of CoFe2O4–BaTiO3 30-nm nanoparticles have been intravenously administrated through a tail vein and forced to cross the blood–brain barrier via a d.c. field gradient of 3000 Oe/cm. A surgically attached two-channel electroencephalography headmount has directly measured the modulation of intrinsic electric waveforms by an external a.c. 100-Oe magnetic field in a frequency range of 0–20 Hz. Results: The modulated signal has reached the strength comparable to that due the regular neural activity. Conclusion: The study opens a pathway to use multifunctional nanoparticles to control intrinsic fields deep in the brain.

Keywords: 

New Scientist Default Image

What’s this mouse brain thinking?

(Image: UCL CABI/SPL)

Electricity is the brain’s language, and now we can speak to it without wires or implants. Nanoparticles can be used to stimulate regions of the brain electrically, opening up new ways to treat brain diseases. It may even one day allow the routine exchange of data between computers and the brain.

A material discovered in 2004 makes this possible. When “magnetoelectric” nanoparticles (MENs) are stimulated by an external magnetic field, they produce an electric field. If such nanoparticles are placed next to neurons, this electric field should allow them to communicate.

To find out, Sakhrat Khizroev of Florida International University in Miami and his team inserted 20 billion of these nanoparticles into the brains of mice. They then switched on a magnetic field, aiming it at the clump of nanoparticles to induce an electric field. An electroencephalogram showed that the region surrounded by nanoparticles lit up, stimulated by this electric field that had been generated.

“When MENs are exposed to even an extremely low frequency magnetic field, they generate their own local electric field at the same frequency,” says Khizroev. “In turn, the electric field can directly couple to the electric circuitry of the neural network.”

Khizroev’s goal is to build a system that can both image brain activity and precisely target medical treatments at the same time. Since the nanoparticles respond differently to different frequencies of magnetic field, they can be tuned to release drugs.

“When [they are] injected in the brain, we can ‘see’ the brain and if necessary, we can release a specific drug inside a specific neuron on demand,” says Khizroev. His team has already shown that the particles can be used to carry and release an anti-HIV drugs, as well as the cancer drug paclitaxel.

Mind meet machine

Although beyond the scope of current research, Khizroev’s nanoparticle system may offer a new way to interact with computers. He hasn’t tried it yet, but he says running it in reverse, so that the nanoparticles produce a measurable magnetic field in response to the brain’s own electrical fields, is possible. Our brain states would then become input parameters for computers, which would be able to directly stimulate specific regions of the brain in return.

For now, though, the promise is in understanding and treating our brains without the side effects of implants and optoelectronics. “There’s a possibility of interfacing with the nervous system in a way that’s wireless and minimally invasive,” says Polina Anikeeva at the Massachusetts Institute of Technology, who works on a different nanoparticle stimulation technique that relies on heat.

“All of a sudden we can have subjects that look entirely natural, no wires, no connectors no implants, and yet they will be equipped with the ability to receive a stimulus,” Anikeeva says. “We’re dealing with something very small, injectable, more like a drug than a device. I think it’s really exciting.”

Journal reference: Future Medicine, DOI: 10.2217/nnm.15.52

Read more: https://www.newscientist.com/article/dn27676-20-billion-nanoparticles-talk-to-the-brain-using-electricity/#ixzz6Afe1GCdO

Posted in nanotechnology meta materials quantum effects light electromagnetics genetics and you information to understand technology changing life as we knew it- forever!, THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Leave a comment

Biotechnology and nanotechnology

An interesting YouTube video on bio and nanotechnology

https://youtu.be/XZfUJuSmBAs

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Leave a comment

Thousands in China Exposed to ‘Mind Control’ Technology Seek Answers

Thousands in China Exposed to ‘Mind Control’ Technology Seek Answers
BY NICOLE HAO
September 18, 2019 Updated: September 18, 2019

The secretive technology is kept under wraps, but tens of thousands in China say they have suffered from its deleterious effects.

ADVERTISING

Through online forums, many have shared about how they suddenly experienced mind-altering symptoms, such as hearing voices or seeing images that others can’t. They believe they have been targeted by authorities as unwitting “mind control technology” test subjects.

The symptoms are similar to those reported by several U.S. diplomats working at the U.S. consulate in Guangzhou City, in China’s Guangdong Province. They said they heard “abnormal” sounds and felt sensations of air pressure. Afterward, they showed signs of “mild traumatic brain injury.”

Protect yourself against fake news. Get real news directly to your phone. Download The Epoch Times app.

Jinnie Lee, a spokeswoman for the U.S. Embassy in Beijing, told The Associated Press at the time that a U.S. government employee first reported a variety of physical symptoms between late 2017 and April 2018.

At the time, the U.S. State Department said it would investigate the incident, noting that it was similar to an incident in 2017, when about 40 diplomats at the U.S. Embassy in Havana, Cuba, also reported falling ill after hearing an unusual sound. That led to speculation that they were attacked by a sonic or electromagnetic weapon.

Brain scans of affected U.S. embassy staff in Cuba revealed abnormalities in their brain tissue, The Guardian reported in July.

Attacks

A China-based NGO, whose name translates to “Against Concealed Technical Control” in English, was established to assist victims of such attacks to file lawsuits against local authorities.

The Chinese-language Epoch Times interviewed several victims as well as the NGO’s representative, who recounted their experiences.

A man using the surname of Zhong—to protect himself from reprisals by the Chinese regime—has organized victims to file joint lawsuits against 24 provincial governments since 2016, as well as six national-level suits since 2017.

Zhong said that the victims come from different age, social, educational, and working backgrounds, and are from places all across China. That’s led him to believe that provincial governments are each involved in their own “mind control” testing.

Victims have reported experiencing similar symptoms since the 1980s. For decades, victims felt mental and physical distress, with some choosing to take their own lives as a result of the torment, but local courts have refused to hear the victims’ cases. Many are confined at psychiatric hospitals as a result.

Zhong said that in an attempt to silence him, authorities have also forced him into a psychiatric hospital.

Li Da, an engineer and former deputy general manager at the Shanghai Taidao Control Engineering Company, said he was a victim of “mind control technology.” He told the Chinese-language Epoch Times that beginning in 2015, many victims joined an online message board, called “Global Mind Control Forum,” to share their experiences.

By the time the forum was shut by censors in 2017, it had more than 70,000 members who registered with their real names, valid contact information, and their reported symptoms.

Symptoms

A man from Beijing surnamed Wang, a former director of the sports division at a large Chinese media group, told the Chinese-language Epoch Times that around 2016, he began hearing extraneous noises whenever he picked up his phone, including during phone calls with his mother in the United States.

“I kept hearing a third person talking to me [during phone calls],” Wang said.

At first, Wang thought his hearing was failing him. He went to see the doctor, who told him his hearing was fine.

Eventually, Wang began hearing voices. “Whatever I had on my mind, that voice was able to verbalize it. Moreover, only I could hear it, and others couldn’t.”

The situation became worse and worse.

“It follows you all the time, like your shadow. … the voice could get to know your private thoughts and memories, including your weaknesses, shortcomings, past wrongdoings. Then, he [the voice] would take advantage of this knowledge to humiliate, scorn, and berate you, and go to the extreme in verbal attacks.”

Wang tried to figure out the source.

“In one experiment, I stayed inside a room and used newspaper printing metal plates [which can block electromagnetic waves] to cover the walls, ceiling, and floor. In this closed room, I found that … the disturbing voice could not read my mind anymore.”

The voice also interfered with his daily living.

“I would inevitably fall asleep when driving for longer than 10 minutes. It was not a deep sleep, but a state of quasi-sleep, and I had absolutely no control over it,” Wang said. He was involved in four car crashes in less than a year.

That convinced Wang that the voice was controlled by someone conducting a “mind control” experiment.

Wang said that he sought out a friend who is a senior official within the Chinese Communist Party. This friend confirmed to him: “There is mind control technology, and our government treats it very seriously.”

He believes he’s been targeted by authorities because his sister is a technology expert in the United States; he had refused to submit to pressure from the government to convince his sister to supply trade secrets to Beijing, he said.

Others who sought help with the NGO recounted similar experiences.

Yao Duojie, a former manager at a five-star hotel in Shenzhen City, told the Chinese-language Epoch Times that since 2007, he had been disturbed by strange voices, as well as irritating and terrifying messages that would appear before his eyes.

“Whatever I think about, whatever I do, whatever I see, the voice will verbalize it. Some time later, there were also intimidating messages, saying that someone will kill me or arrest me. At a later stage, as soon as I closed my eyes, unpleasant images would appear [in my mind]. I lived in terror day in and day out. I felt that my situation was like that of a mental patient,” Yao said.

Beijing’s Words

Chinese authorities have admitted to the existence of such technology, but only to explain that other governments have conducted related experiments.

“Whether the secretly selected test subjects are in a private residence, public space, industrial setting, or on public and private transportation, they can be affected by the chemical and biological stimuli emitted by the mysterious weapon,” state broadcaster China Central Television reported in 2008. “After a long period of time, the test subjects will become socially isolated and their immunity will go down, leading to various diseases and even death.”

The Chinese Communist Party’s mouthpiece newspaper People’s Daily reported in May 2012: “Soldiers who were attacked by such weapons have altered behavior, and become like ‘zombies’ who can be easily controlled. They can be ordered to turn off the engine of a tank.”

The report added that “mind control” technology can cause soldiers to kill each other.

The Technology

There’s little scientific research into this type of technology. But satellite imagery confirms that the Chinese regime has developed electromagnetic pulse (EMP) weapons-testing facilities.

In January, a U.S. congressional study on “nuclear EMP” weapons developed by China, Russia, Iran, and North Korea was declassified and published, offering more insight into EMP weapons that can cripple infrastructure.

A Chinese NGO published a report in February about “mind control” technology, after affected individuals conducted their own research.

A military official based in Xuzhou City, Jiangsu Province, who was involved in developing “mind control” technology told the NGO in June that the Chinese regime has a machine “that can interfere or attack a person’s brain from thousands of kilometers [1 kilometer = about 0.62 mile] away. It can connect the person’s brain, monitor his or her intention, control his or her autonomic nervous system, and can even stop the beating of his or her heart,” the official said.

The NGO study concluded that the machine mentioned by the official likely had the ability to emit electromagnetic waves at the same frequencies as a human brain.

The device can emit an electromagnetic wave that mimics real human frequencies to the target person, creating a fake feeling or hallucination, or controlling the subject’s bodily functions, according to the study.

Yi Ru contributed to this report.
— Read on m.theepochtimes.com/in-china-thousands-exposed-to-mind-control-technology-seek-answers_3086015.html

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , , , , , , , | 4 Comments

Detecting patients’ pain levels via their brain signals | MIT News

Researchers from MIT and elsewhere have developed a system that measures a patient’s pain level by analyzing brain activity from a portable neuroimaging device. The system could help doctors diagnose and treat pain in unconscious and noncommunicative patients, which could reduce the risk of chronic pain that can occur after surgery.
Pain management is a surprisingly challenging, complex balancing act. Overtreating pain, for example, runs the risk of addicting patients to pain medication. Undertreating pain, on the other hand, may lead to long-term chronic pain and other complications. Today, doctors generally gauge pain levels according to their patients’ own reports of how they’re feeling. But what about patients who can’t communicate how they’re feeling effectively — or at all — such as children, elderly patients with dementia, or those undergoing surgery?
In a paper presented at the International Conference on Affective Computing and Intelligent Interaction, the researchers describe a method to quantify pain in patients. To do so, they leverage an emerging neuroimaging technique called functional near infrared spectroscopy (fNIRS), in which sensors placed around the head measure oxygenated hemoglobin concentrations that indicate neuron activity.
For their work, the researchers use only a few fNIRS sensors on a patient’s forehead to measure activity in the prefrontal cortex, which plays a major role in pain processing. Using the measured brain signals, the researchers developed personalized machine-learning models to detect patterns of oxygenated hemoglobin levels associated with pain responses. When the sensors are in place, the models can detect whether a patient is experiencing pain with around 87 percent accuracy.
“The way we measure pain hasn’t changed over the years,” says Daniel Lopez-Martinez, a PhD student in the Harvard-MIT Program in Health Sciences and Technology and a researcher at the MIT Media Lab. “If we don’t have metrics for how much pain someone experiences, treating pain and running clinical trials becomes challenging. The motivation is to quantify pain in an objective manner that doesn’t require the cooperation of the patient, such as when a patient is unconscious during surgery.”
Traditionally, surgery patients receive anesthesia and medication based on their age, weight, previous diseases, and other factors. If they don’t move and their heart rate remains stable, they’re considered fine. But the brain may still be processing pain signals while they’re unconscious, which can lead to increased postoperative pain and long-term chronic pain. The researchers’ system could provide surgeons with real-time information about an unconscious patient’s pain levels, so they can adjust anesthesia and medication dosages accordingly to stop those pain signals.
Joining Lopez-Martinez on the paper are: Ke Peng of Harvard Medical School, Boston Children’s Hospital, and the CHUM Research Centre in Montreal; Arielle Lee and David Borsook, both of Harvard Medical School, Boston Children’s Hospital, and Massachusetts General Hospital; and Rosalind Picard, a professor of media arts and sciences and director of affective computing research in the Media Lab.
Focusing on the forehead
In their work, the researchers adapted the fNIRS system and developed new machine-learning techniques to make the system more accurate and practical for clinical use.
To use fNIRS, sensors are traditionally placed all around a patient’s head. Different wavelengths of near-infrared light shine through the skull and into the brain. Oxygenated and deoxygenated hemoglobin absorb the wavelengths differently, altering their signals slightly. When the infrared signals reflect back to the sensors, signal-processing techniques use the altered signals to calculate how much of each hemoglobin type is present in different regions of the brain.
When a patient is hurt, regions of the brain associated with pain will see a sharp rise in oxygenated hemoglobin and decreases in deoxygenated hemoglobin, and these changes can be detected through fNIRS monitoring. But traditional fNIRS systems place sensors all around the patient’s head. This can take a long time to set up, and it can be difficult for patients who must lie down. It also isn’t really feasible for patients undergoing surgery.
Therefore, the researchers adapted the fNIRS system to specifically measure signals only from the prefrontal cortex. While pain processing involves outputs of information from multiple regions of the brain, studies have shown the prefrontal cortex integrates all that information. This means they need to place sensors only over the forehead.
Another problem with traditional fNIRS systems is they capture some signals from the skull and skin that contribute to noise. To fix that, the researchers installed additional sensors  to capture and filter out those signals.
Personalized pain modeling
On the machine-learning side, the researchers trained and tested a model on a labeled pain-processing dataset they collected from 43 male participants. (Next they plan to collect a lot more data from diverse patient populations, including female patients — both during surgery and while conscious, and at a range of pain intensities — in order to better evaluate the accuracy of the system.)
Each participant wore the researchers’ fNIRS device and was randomly exposed to an innocuous sensation and then about a dozen shocks to their thumb at two different pain intensities, measured on a scale of 1-10: a low level (about a 3/10) or high level (about 7/10). Those two intensities were determined with pretests: The participants self-reported the low level as being only strongly aware of the shock without pain, and the high level as the maximum pain they could tolerate.
In training, the model extracted dozens of features from the signals related to how much oxygenated and deoxygenated hemoglobin was present, as well as how quickly the oxygenated hemoglobin levels rose. Those two metrics — quantity and speed — give a clearer picture of a patient’s experience of pain at the different intensities.
Importantly, the model also automatically generates “personalized” submodels that extract high-resolution features from individual patient subpopulations. Traditionally, in machine learning, one model learns classifications — “pain” or “no pain” — based on average responses of the entire patient population. But that generalized approach can reduce accuracy, especially with diverse patient populations.
The researchers’ model instead trains on the entire population but simultaneously identifies shared characteristics among subpopulations within the larger dataset. For example, pain responses to the two intensities may differ between young and old patients, or depending on gender. This generates learned submodels that break off and learn, in parallel, patterns of their patient subpopulations. At the same time, however, they’re all still sharing information and learning patterns shared across the entire population. In short, they’re simultaneously leveraging fine-grained personalized information and population-level information to train better.
The personalized models and a traditional model were evaluated in classifying pain or no-pain in a random hold-out set of participant brain signals from the dataset, where the self-reported pain scores were known for each participant. The personalized models outperformed the traditional model by about 20 percent, reaching about 87 percent accuracy.
“Because we are able to detect pain with this high accuracy, using only a few sensors on the forehead, we have a solid basis for bringing this technology to a real-world clinical setting,” Lopez-Martinez says.
— Read on news.mit.edu/2019/detecting-pain-levels-brain-signals-0912

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , , | Leave a comment

Living sensors at your fingertips | MIT News

Living sensors at your fingertips
Cell-infused gloves and bandages light up when in contact with certain chemicals.
Jennifer Chu | MIT News Office
February 15, 2017
Press Inquiries
Engineers and biologists at MIT have teamed up to design a new “living material” — a tough, stretchy, biocompatible sheet of hydrogel injected with live cells that are genetically programmed to light up in the presence of certain chemicals.
In a paper published this week in the Proceedings of the National Academy of Sciences, the researchers demonstrate the new material’s potential for sensing chemicals, both in the environment and in the human body.
The team fabricated various wearable sensors from the cell-infused hydrogel, including a rubber glove with fingertips that glow after touching a chemically contaminated surface, and bandages that light up when pressed against chemicals on a person’s skin.
Xuanhe Zhao, the Robert N. Noyce Career Development associate professor of mechanical engineering at MIT, says the group’s living material design may be adapted to sense other chemicals and contaminants, for uses ranging from crime scene investigation and forensic science, to pollution monitoring and medical diagnostics.
“With this design, people can put different types of bacteria in these devices to indicate toxins in the environment, or disease on the skin,” says Timothy Lu, associate professor of biological engineering and of electrical engineering and computer science. “We’re demonstrating the potential for living materials and devices.”
The paper’s co-authors are graduate students Xinyue Liu, Tzu-Chieh Tang, Eleonore Tham, Hyunwoo Yuk, and Shaoting Lin.
Infusing life in materials
Lu and his colleagues in MIT’s Synthetic Biology Group specialize in creating biological circuits, genetically reprogramming the biological parts in living cells such as E. coli to work together in sequence, much like logic steps in an electrical circuit. In this way, scientists can reengineer living cells to carry out specific functions, including the ability to sense and signal the presence of viruses and toxins.
However, many of these newly programmed cells have only been demonstrated in situ, within Petri dishes, where scientists can carefully control the nutrient levels necessary to keep the cells alive and active — an environment that has proven extremely difficult to replicate in synthetic materials.
“The challenge to making living materials is how to maintain those living cells, to make them viable and functional in the device,” Lu says. “They require humidity, nutrients, and some require oxygen. The second challenge is how to prevent them from escaping from the material.”
To get around these roadblocks, others have used freeze-dried chemical extracts from genetically engineered cells, incorporating them into paper to create low-cost, virus-detecting diagnostic strips. But extracts, Lu says, are not the same as living cells, which can maintain their functionality over a longer period of time and may have higher sensitivity for detecting pathogens.
Other groups have seeded heart muscle cells onto thin rubber films to make soft, “living” actuators, or robots. When bent repeatedly, however, these films can crack, allowing the live cells to leak out.
A lively host
Zhao’s group in MIT’s Soft Active Materials Laboratory has developed a material that may be ideal for hosting living cells. For the past few years, his team has come up with various formulations of hydrogel — a tough, highly stretchable, biocompatible material made from a mix of polymer and water. Their latest designs have contained up to 95 percent water, providing an environment which Zhao and Lu recognized might be suitable for sustaining living cells. The material also resists cracking even when repeatedly stretched and pulled — a property that could help contain cells within the material.
The two groups teamed up to integrate Lu’s genetically programmed bacterial cells into Zhao’s sheets of hydrogel material. They first fabricated layers of hydrogel and patterned narrow channels within the layers using 3-D printing and micromolding techniques. They fused the hydrogel to a layer of elastomer, or rubber, that is porous enough to let in oxygen. They then injected E. coli cells into the hydrogel’s channels. The cells were programmed to fluoresce, or light up, when in contact with certain chemicals that pass through the hydrogel, in this case a natural compound known as DAPG.
The researchers then soaked the hydrogel/elastomer material in a bath of nutrients which infused throughout the hydrogel and helped to keep the bacterial cells alive and active for several days.
To demonstrate the material’s potential uses, the researchers first fabricated a sheet of the material with four separate, narrow channels, each containing a type of bacteria engineered to glow green in response to a different chemical compound. They found each channel reliably lit up when exposed to its respective chemical.
Next, the team fashioned the material into a bandage, or “living patch,” patterned with channels containing bacteria sensitive to rhamnose, a naturally occurring sugar. The researchers swabbed a volunteer’s wrist with a cotton ball soaked in rhamnose, then applied the hydrogel patch, which instantly lit up in response to the chemical.
Finally, the researchers fabricated a hydrogel/elastomer glove whose fingertips contained swirl-like channels, each of which they filled with different chemical-sensing bacterial cells. Each fingertip glowed in response to picking up a cotton ball soaked with a respective compound.
The group has also developed a theoretical model to help guide others in designing similar living materials and devices.
“The model helps us to design living devices more efficiently,” Zhao says. “It tells you things like the thickness of the hydrogel layer you should use, the distance between channels, how to pattern the channels, and how much bacteria to use.”
Ultimately, Zhao envisions products made from living materials, such as gloves and rubber soles lined with chemical-sensing hydrogel, or bandages, patches, and even clothing that may detect signs of infection or disease.   
This research was supported, in part, by the Office of Naval Research, the National Science Foundation, and the National Institutes of Health.
— Read on news.mit.edu/2017/living-sensors-your-fingertips-0215

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , | 1 Comment

Stretchy optical fibers for implanting in the body | MIT News

Stretchy optical fibers for implanting in the body
Biocompatible fibers could use light to stimulate cells or sense signs of disease.
Jennifer Chu | MIT News Office
October 17, 2016
Press Inquiries
Researchers from MIT and Harvard Medical School have developed a biocompatible and highly stretchable optical fiber made from hydrogel — an elastic, rubbery material composed mostly of water. The fiber, which is as bendable as a rope of licorice, may one day be implanted in the body to deliver therapeutic pulses of light or light up at the first sign of disease.
The researchers say the fiber may serve as a long-lasting implant that would bend and twist with the body without breaking down. The team has published its results online in the journal Advanced Materials.
Using light to activate cells, and particularly neurons in the brain, is a highly active field known as optogenetics, in which researchers deliver short pulses of light to targeted tissues using needle-like fibers, through which they shine light from an LED source.
“But the brain is like a bowl of Jell-O, whereas these fibers are like glass — very rigid, which can possibly damage brain tissues,” says Xuanhe Zhao, the Robert N. Noyce Career Development Associate Professor in MIT’s Department of Mechanical Engineering. “If these fibers could match the flexibility and softness of the brain, they could provide long-term more effective stimulation and therapy.”
Getting to the core of it
Zhao’s group at MIT, including graduate students Xinyue Liu and Hyunwoo Yuk, specializes in tuning the mechanical properties of hydrogels. The researchers have devised multiple recipes for making tough yet pliable hydrogels out of various biopolymers. The team has also come up with ways to bond hydrogels with various surfaces such as metallic sensors and LEDs, to create stretchable electronics.
The researchers only thought to explore hydrogel’s use in optical fibers after conversations with the bio-optics group at Harvard Medical School, led by Associate Professor Seok-Hyun (Andy) Yun. Yun’s group had previously fabricated an optical fiber from hydrogel material that successfully transmitted light through the fiber. However, the material broke apart when bent or slightly stretched. Zhao’s hydrogels, in contrast, could stretch and bend like taffy. The two groups joined efforts and looked for ways to incorporate Zhao’s hydrogel into Yun’s optical fiber design.
Yun’s design consists of a core material encased in an outer cladding. To transmit the maximum amount of light through the core of the fiber, the core and the cladding should be made of materials with very different refractive indices, or degrees to which they can bend light.
“If these two things are too similar, whatever light source flows through the fiber will just fade away,” Yuk explains. “In optical fibers, people want to have a much higher refractive index in the core, versus cladding, so that when light goes through the core, it bounces off the interface of the cladding and stays within the core.”
Happily, they found that Zhao’s hydrogel material was highly transparent and possessed a refractive index that was ideal as a core material. But when they tried to coat the hydrogel with a cladding polymer solution, the two materials tended to peel apart when the fiber was stretched or bent.
To bond the two materials together, the researchers added conjugation chemicals to the cladding solution, which, when coated over the hydrogel core, generated chemical links between the outer surfaces of both materials.
“It clicks together the carboxyl groups in the cladding, and the amine groups in the core material, like molecular-level glue,” Yuk says.
Sensing strain
The researchers tested the optical fibers’ ability to propagate light by shining a laser through fibers of various lengths. Each fiber transmitted light without significant  attenuation, or fading. They also found that fibers could be stretched over seven times their original length without breaking.
Now that they had developed a highly flexible and robust optical fiber, made from a hydrogel material that was also biocompatible, the researchers began to play with the fiber’s optical properties, to see if they could design a fiber that could sense when and where it was being stretched.
They first loaded a fiber with red, green, and blue organic dyes, placed at specific spots along the fiber’s length. Next, they shone a laser through the fiber and stretched, for instance, the red region. They measured the spectrum of light that made it all the way through the fiber, and noted the intensity of the red light. They reasoned that this intensity relates directly to the amount of light absorbed by the red dye, as a result of that region being stretched.
In other words, by measuring the amount of light at the far end of the fiber, the researchers can quantitatively determine where and by how much a fiber was stretched.  
“When you stretch a certain portion of the fiber, the dimensions of that part of the fiber changes, along with the amount of light that region absorbs and scatters, so in this way, the fiber can serve as a sensor of strain,” Liu explains.
“This is like a multistrain sensor through a single fiber,” Yuk adds. “So it can be an implantable or wearable strain gauge.”
The researchers imagine that such stretchable, strain-sensing optical fibers could be implanted or fitted along the length of a patient’s arm or leg, to monitor for signs of improving mobility.
Zhao envisions the fibers may also serve as sensors, lighting up in response to signs of disease.
“We may be able to use optical fibers for long-term diagnostics, to optically monitor tumors or inflammation,” he says. “The applications can be impactful.”
“Hydrogel fibers are very interesting and provide a compelling direction for embedding light within the human body,” says Fiorenzo Omenetto, a professor of biological engineering at Tufts University, who was not involved in the work.  “These efforts in optimizing and managing the physical and mechanical properties of fibers are necessary and important next steps that will enable practical applications of medical relevance.”
This research was supported, in part, by the National Institutes of Health, and the Department of Defense.
— Read on news.mit.edu/2016/stretchy-optical-fibers-implanting-body-1017

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , | 1 Comment

Engineers 3-D print a “living tattoo” | MIT News

MIT engineers can now 3-D print a “living tattoo, with a combination of hydrogel and genetically engineered bacterial cells.

— Read on news.mit.edu/2017/engineers-3-d-print-living-tattoo-1205

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , | Leave a comment

Robotic thread is designed to slip through the brain’s blood vessels | MIT News

Robotic thread is designed to slip through the brain’s blood vessels
Magnetically controlled device could deliver clot-reducing therapies in response to stroke or other brain blockages.
Watch Video
Jennifer Chu | MIT News Office
August 28, 2019
Press Inquiries
MIT engineers have developed a magnetically steerable, thread-like robot that can actively glide through narrow, winding pathways, such as the labrynthine vasculature of the brain.
In the future, this robotic thread may be paired with existing endovascular technologies, enabling doctors to remotely guide the robot through a patient’s brain vessels to quickly treat blockages and lesions, such as those that occur in aneurysms and stroke.
“Stroke is the number five cause of death and a leading cause of disability in the United States. If acute stroke can be treated within the first 90 minutes or so, patients’ survival rates could increase significantly,” says Xuanhe Zhao, associate professor of mechanical engineering and of civil and environmental engineering at MIT. “If we could design a device to reverse blood vessel blockage within this ‘golden hour,’ we could potentially avoid permanent brain damage. That’s our hope.”
Zhao and his team, including lead author Yoonho Kim, a graduate student in MIT’s Department of Mechanical Engineering, describe their soft robotic design today in the journal Science Robotics. The paper’s other co-authors are MIT graduate student German Alberto Parada and visiting student Shengduo Liu.
In a tight spot
To clear blood clots in the brain, doctors often perform an endovascular procedure, a minimally invasive surgery in which a surgeon inserts a thin wire through a patient’s main artery, usually in the leg or groin. Guided by a fluoroscope that simultaneously images the blood vessels using X-rays, the surgeon then manually rotates the wire up into the damaged brain vessel. A catheter can then be threaded up along the wire to deliver drugs or clot-retrieval devices to the affected region.
Kim says the procedure can be physically taxing, requiring surgeons, who must be specifically trained in the task, to endure repeated radiation exposure from fluoroscopy.
“It’s a demanding skill, and there are simply not enough surgeons for the patients, especially in suburban or rural areas,” Kim says.
The medical guidewires used in such procedures are passive, meaning they must be manipulated manually, and are typically made from a core of metallic alloys, coated in polymer, a material that Kim says could potentially generate friction and damage vessel linings if the wire were to get temporarily stuck in a particularly tight space.
The team realized that developments in their lab could help improve such endovascular procedures, both in the design of the guidewire and in reducing doctors’ exposure to any associated radiation.

Threading a needle
Over the past few years, the team has built up expertise in both hydrogels — biocompatible materials made mostly of water — and 3-D-printed magnetically-actuated materials that can be designed to crawl, jump, and even catch a ball, simply by following the direction of a magnet.
In this new paper, the researchers combined their work in hydrogels and in magnetic actuation, to produce a magnetically steerable, hydrogel-coated robotic thread, or guidewire, which they were able to make thin enough to magnetically guide through a life-size silicone replica of the brain’s blood vessels.
The core of the robotic thread is made from nickel-titanium alloy, or “nitinol,” a material that is both bendy and springy. Unlike a clothes hanger, which would retain its shape when bent, a nitinol wire would return to its original shape, giving it more flexibility in winding through tight, tortuous vessels. The team coated the wire’s core in a rubbery paste, or ink, which they embedded throughout with magnetic particles.
Finally, they used a chemical process they developed previously, to coat and bond the magnetic covering with hydrogel — a material that does not affect the responsiveness of the underlying magnetic particles and yet provides the wire with a smooth, friction-free, biocompatible surface.
They demonstrated the robotic thread’s precision and activation by using a large magnet, much like the strings of a marionette, to steer the thread through an obstacle course of small rings, reminiscent of a thread working its way through the eye of a needle.
The researchers also tested the thread in a life-size silicone replica of the brain’s major blood vessels, including clots and aneurysms, modeled after the CT scans of an actual patient’s brain. The team filled the silicone vessels with a liquid simulating the viscosity of blood, then manually manipulated a large magnet around the model to steer the robot through the vessels’ winding, narrow paths.
Kim says the robotic thread can be functionalized, meaning that features can be added — for example, to deliver clot-reducing drugs or break up blockages with laser light. To demonstrate the latter, the team replaced the thread’s nitinol core with an optical fiber and found that they could magnetically steer the robot and activate the laser once the robot reached a target region.
When the researchers ran comparisons between the robotic thread coated versus uncoated with hydrogel, they found that the hydrogel gave the thread a much-needed, slippery advantage, allowing it to glide through tighter spaces without getting stuck. In an endovascular surgery, this property would be key to preventing friction and injury to vessel linings as the thread works its way through.
“One of the challenges in surgery has been to be able to navigate through complicated blood vessels in the brain, which has a very small diameter, where commercial catheters can’t reach,” says Kyujin Cho, professor of mechanical engineering at Seoul National University. “This research has shown potential to overcome this challenge and enable surgical procedures in the brain without open surgery.”
And just how can this new robotic thread keep surgeons radiation-free? Kim says that a magnetically steerable guidewire does away with the necessity for surgeons to physically push a wire through a patient’s blood vessels. This means that doctors also wouldn’t have to be in close proximity to a patient, and more importantly, the radiation-generating fluoroscope.
In the near future, he envisions endovascular surgeries that incorporate existing magnetic technologies, such as pairs of large magnets, the directions of which doctors can manipulate from just outside the operating room, away from the fluoroscope imaging the patient’s brain, or even in an entirely different location.
“Existing platforms could apply magnetic field and do the fluoroscopy procedure at the same time to the patient, and the doctor could be in the other room, or even in a different city, controlling the magnetic field with a joystick,” Kim says. “Our hope is to leverage existing technologies to test our robotic thread in vivo in the next step.”
This research was funded, in part, by the Office of Naval Research, the MIT Institute for Soldier Nanotechnologies, and the National Science Foundation (NSF).
— Read on news.mit.edu/2019/robot-brain-blood-vessels-0828

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , , | Leave a comment

Synthetic biological organisms designed and created for industrial process using genetic engineering

Walk down Drydock Avenue in the old industrial waterfront of Boston and you’ll be reminded that the city remains a significant industrial port. Trucks rattle past the working dry dock. A FedEx shipping container terminal looms to the south while the Coastal Cement Corporation anchors the street. Inside building number 27, Ginkgo Bioworks CEO Jason Kelly and his four cofounders are working on a different industrial vision—one in which biology is at the core. This quintet of modern-day Frankensteins design, modify and manufacture organisms to make existing industrial processes cheaper and entirely new processes possible. 

It’s heady stuff. Fertilizing corn usually requires spraying acres of farmland with a stew of nasty chemicals. Ginkgo is working on bioengineered, environmentally friendly coatings for corn seeds that will fertilize themselves. Today, most biotech drugs are nonliving proteins. Ginkgo is working on creating living creatures, genetically programmed to seek and destroy disease, that would be ingested whole. Fake meat tastes gross. Ginkgo promises to make it taste better.

And that’s just the beginning. Recently Ginkgo re-created the scent of an extinct Hawaiian hibiscus, blurring the line between what’s living and what’s dead. Ultimately, Kelly believes his company will power a science-fiction future where trees naturally grow into the shape of tables, seaweed morphs into car seats and smartphones repair themselves with a few drops of sugar. That’s a long way off, but nearly 11 years after founding Ginkgo, “it’s a little easier to talk about this and not sound like a crazy person,” Kelly says.

These are exciting times for companies like Ginkgo (named after a dinosaur-era tree that’s a living fossil) that work in the emerging field of synthetic biology. Spurred on by technological and economic advances, particularly the plummeting cost of DNA sequencing and the development of a precision gene-editing tool called Crispr, entrepreneurs have been falling over themselves to start companies. Today, more than 600 companies work in the space, according to SynBioBeta, a Pleasant Hill, California-based firm that hosts the industry’s premier conference and maintains a database of synthetic biology startups. And that universe is growing at a rate of 5% to 10% each year, as money pours into these firms, including $3.8 billion last year alone, according to SynBioBeta founder John Cumbers. The promise of the field is not just a proliferation of new products, but also a reduction of the environmental harm that comes from our heavy reliance on petrochemicals.

A phalanx of Ph.Ds: From left, Ginkgo Bioworks cofounders Tom Knight, Reshma Shetty, Jason Kelly, Barry Canton and Austin Che. MICHAEL PRINCE
These startups run the gamut from sellers of the DNA molecules that are the building blocks of life to high-profile consumer companies. Plant-based-burger startup Beyond Meat went public in May and is now worth nearly $10 billion; its synthetic biology competitor Impossible Foods is a venture-backed unicorn that recently began selling Impossible Whoppers to fast-food giant Burger King. Bolt Threads, valued at $700 million, makes bio-based spider silk for use in textiles and skin care. At the other end of the spectrum, Twist Bioscience, the largest seller of synthetic DNA (which counts Ginkgo as its largest customer), went public last year and now has a market cap of nearly $1 billion.

Ginkgo is the leader in organism engineering. “Ginkgo is category defining,” says Cumbers, who first met Kelly when they were struggling Ph.D. students (Cumbers at Brown, Kelly at MIT). “They pretty much created the whole idea of the organism being a product.”

Founded by Kelly, former MIT professor Tom Knight and three other MIT Ph.D.s—Reshma Shetty, Barry Canton and Austin Che—Ginkgo today has gained a toehold in fragrances, agriculture, food, therapeutics and cannabis with some two dozen customers and 50 active engineering projects. Ginkgo doesn’t create any of these products, but by using data analytics and robotics to speed up the process of discovering and making new organisms, Ginkgo will be at their core. Revenue last year reached some $40 million, doubling the previous year’s; it’s expected to double again this year.

Ginkgo’s bigger bet is a portfolio approach—inspired, in part, by Kelly’s attendance last year at Warren Buffett’s annual Berkshire Hathaway shareholder meeting. Ginkgo now creates and invests in companies, including protein-alternative specialist Motif Ingredients, which Ginkgo recently spun off, and Joyn Bio, its agricultural joint venture with Bayer. “That’s how we are scaling the business,” Kelly says. “It’s a Berkshire for biotech.”

“Food, housing, materials, electronics—all will be disrupted by biology,” says Kelly.
A lot of smart money is betting on Ginkgo. An alum of Forbes’ Next Billion-Dollar Startups list, it has raised more than $400 million from investors that include Bill Gates’ Cascade Investments, Viking Global and General Atlantic. As of December 2017, it was valued at $1.4 billion. Over a decade after Ginkgo’s founding, Kelly and his cofounders all still work there and have retained stakes in the company that Forbes estimates at more than $100 million each. Kelly figures he’ll take Ginkgo public eventually—he’s in no rush. After all, synthetic biology is hot, and there’s lots of private capital available. “Biology is programmable, but it doesn’t process information—it builds stuff,” says Kelly, who carries a notebook with an “I (heart) GMOs” sticker on it. “Food, housing, materials, electronics—all will be disrupted by biology.”

Jason Kelly, 38, grew up in Jupiter, Florida, a small beach town near Jupiter Island, the ultra-wealthy barrier island famously home to Tiger Woods. A sleepy community when Kelly was growing up, Jupiter has since become infamous as the location of the Orchids of Asia massage parlor, where New England Patriots owner Robert Kraft allegedly solicited prostitution. Kelly’s parents, both pharmacists, moved to Jupiter in the 1970s to escape the cold farther north and because the area, with its aging population, offered more jobs. 

By high school, Kelly was excited about the potential of genetic engineering. “There must’ve been at least some seed planted by Jurassic Park,” he says now of the Steven Spielberg film about using fossil DNA to resurrect dinosaurs. He did a school project on Herceptin, a genetically engineered antibody used to treat breast cancer, and was wowed by the idea that you could program a cell like a computer. 

As an MIT undergrad, Kelly spent two summers in the lab, attempting to move a single gene into the bacteria E. coli, which is often used to make drugs. It was slow, frustrating work, and he failed at it. Then he met Drew Endy, a young professor and colleague of Knight’s in synthetic biology. Kelly was so drawn to the idea that the digital code of cells, with its As, Cs, Gs and Ts, could be read and written like a computer program that he joined Endy’s lab as an undergrad. In 2003, he started a Ph.D. in biological engineering at MIT.

The rest of Ginkgo’s student cofounders arrived on campus around the same time. Shetty, 38, had studied venomous cone snails, which use neurotoxins to paralyze their prey, as a teenager in Salt Lake City, but switched to computer science for her bachelor’s degree at University of Utah. Canton, 39, arrived from Ireland after studying mechanical engineering at University College Dublin and developing an interest in, as he puts it, “taming the complexity of biology via engineering know-how.” Che, 39, grew up near Apple’s headquarters, in Cupertino, California, learned to program at age 7 and finished a bachelor’s degree in computer science at Stanford before shifting gears.

Knight, 71, a computer expert, had made an unusual mid-career switch. In the 1990s, he’d begun to wonder when Moore’s Law—Intel cofounder Gordon Moore’s observation that the number of transistors on a microchip doubles every two years—would end. The problem, he explains, is that structures eventually become so small that you’re working with silicon at the atomic scale, and placing atoms in the right place with precision requires biochemistry.

In 1997, Knight set up his own microbiology lab in the computer science building. “Some of my colleagues thought I was going to kill them,” Knight says. After all, bioengineers work with bacteria like E. coli, which can cause sickness and even death. He didn’t care what others thought. “He unapologetically wanted to program biology, even though all the biologists were like, ‘It’s way too complicated, and all the things you are trying to do are bullshit,’ ” Kelly says.

MIT’s synthetic biology community was small and close-knit. Shetty and Che worked in Knight’s lab; Kelly and Canton worked in Endy’s. The two labs bonded over group lunches, contributing to OpenWetWare, a wiki for sharing biological knowledge, and the International Genetically Engineered Machine (or iGEM) student competition. Kelly and Canton shared a house in grad school. Canton and Shetty were dating and subsequently married. “Drew and Tom were like magnets, sucking in the bio-nerds,” Kelly says.

Kelly broached the idea of starting a company after the four finished their Ph.D.s in 2008. They all wanted to make bioengineering faster, cheaper and easier—which was important for industry, but wouldn’t get a new professor published and on the tenure track. “It’s not scientific discoveries that are needed. It’s process engineering,” says Kelly, whose graduate thesis was on how to standardize measurement in biology. 

With an initial investment of $100,000 from Knight (eventually growing to $140,000), the five started Ginkgo. Their timing was lousy. The financial crisis had pushed the economy into recession. Banks weren’t lending, and venture capitalists weren’t investing. And even if they were, Ginkgo wouldn’t have appealed then. “We don’t look like normal biotech founders,” Kelly says. “No one starts a biotech company out of school, we weren’t doing a therapeutic and we had no product in mind.” 

Instead, they applied for grants to cover living expenses and scrounged for equipment, buying it at auction when other startups failed. They rented a storage locker at U-Haul, dragging in liquid-handling robots and lab supplies. 

After a few years of trial and error, they had a brainstorm. At MIT all five had worked on an iGEM competition project that made stinky E. coli bacteria smell minty fresh by inserting new genetic material into it. Building off that, they broke into flavors and fragrances. They got their first major deal with French fragrance and botanicals company Robertet and developed a bio-based rose scent. The project was smart because it’s very expensive to distill smells from flowers, but most people don’t associate biotech with fragrances. The deal was a coup for Ginkgo. “There was a lot of skepticism about synthetic biology that Jason had to overcome,” says Bryan Johnson, founder of OS Fund and a Ginkgo investor. 

The dream of manufacturing stuff from biology goes back a long time. When biotech giant Amgen was founded nearly 40 years ago, its efforts to create a process for producing indigo dye in E. coli landed it on the cover of Science magazine. Other companies have attempted to grow spider silk in the lab for decades. In the early 2000s, a wave of synthetic biologists hoped to create fuel from bacteria and yeast, but while replacing hydrocarbons is a good idea for the environment, most biofuels startups failed when the price of oil fell.

“The idea of using biology for industrial purposes has long been a dream,” says Josh Hoffman, CEO of Emeryville, California-based Zymergen, Ginkgo’s closest competitor. “Unless you can get it to work at scale it’s a dream with wonderful appeal, but it’s unlikely to have impact.”

Over the past few years, big economic and technological trends have pushed that dream forward. The cost of DNA synthesis has plummeted from around $4 a base pair (the unit of two nucleobases that form the building blocks of the DNA double helix), when Kelly and his cofounders were students, to just 7 cents a base pair, with even lower prices for bulk orders. The development of Crispr, which allows for precise genome editing, opened up new possibilities. And artificial intelligence and machine learning help synthetic biologists iterate designs for new organisms more quickly. 

Against that backdrop, entrepreneurs founded companies with different approaches. Six-year-old Zymergen, for example, now has 750 employees and a partnership with Sumitomo Chemical, a major supplier to consumer-electronics manufacturers. One goal: To put living cells into next-generation display coatings for cellphones to make them scratchproof. CEO Hoffman won’t disclose revenue, but says that its partners will have sold $1 billion worth of products made with Zymergen’s bugs by the end of 2019.

 On a recent afternoon in Boston, Canton gives a tour of Ginkgo’s life factories. Inside Bioworks 3, a robot does pipetting, moving fragments of DNA suspended in liquid into a tray with eight rows and 12 columns at a speed beyond human capability. After the cells grow in plastic containers, another robot photographs them and uses that image to accurately pluck the irregularly shaped colonies from the surrounding jelly. The facility is quiet, with relatively few people. Largely, the machines do the work. 

The automation allows Ginkgo to test thousands, or even tens of thousands, of designs on each project, Canton says, compared with a traditional lab where a bench scientist might be able to do ten. “We were inspired by what Intel and others do in building their semiconductor facilities,” he says. This winter, Ginkgo opened Bioworks 4, which will work with mammalian cells.

Already, Ginkgo is the largest user of lab-printed DNA in the world—Kelly estimates it uses about 25% of the total, or about 50 million base pairs a month—and it recently purchased Gen9, a supplier that specializes in long strands of DNA. It also maintains a massive and growing “codebase” to track and analyze what it has learned from each project. “You can apply manufacturing theory to cells,” Kelly says. “The more cell programming you do on our platform, the cheaper and easier and faster you do it.”

Kelly believes that scale will allow it to succeed in a variety of unrelated industries. “We all do synthetic biology, but we are a craft brewer and they are Budweiser,” says John Garrett, co-CEO of Glycosyn, which Ginkgo has partnered with to more efficiently produce oligosaccharides, a healthy component of breast milk, in E. coli (a boon for mothers who can’t breastfeed but also potentially a treatment for maladies like Crohn’s disease).

The first major deal Kelly struck was with Bayer, the world’s largest seed company since its acquisition of Monsanto. In September 2017, the two created their Joyn Bio joint venture with a $100 million investment, to develop seed coatings that will enable farmers to use less chemical fertilizer. Soybean microbes have an enzyme that lets them take nitrogen out of the air, but corn microbes do not, so Ginkgo is taking genes from the soybean microbe and redesigning them to work in microbes that live on corn. It’s an early-stage big idea—worldwide, farmers spend more than $150 billion a year on fertilizer—that’s at least five years from market, even if all goes well. “The challenge for any big company is how do you realistically go after these moonshots,” says Joyn Bio CEO Mike Miille.

The promise of synthetic biology is not just a proliferation of new products, but also a reduction of the environmental harm that comes from our reliance on petrochemicals.
For Ginkgo, Bayer’s interest was a turning point. More deals followed. With Canadian cannabis company Cronos, for example, it is developing lab-grown rare cannabinoids that could be used for appetite suppression and anti-inflammatory creams. If Ginkgo can deliver the strands, it will get stock valued at more than $200 million today. With Cambridge, Massachusetts-based biotech Synlogic, it is working on living, gut-based treatments for liver problems and neurological disorders.

In February, Ginkgo spun out Motif Ingredients which is developing vegan-friendly proteins that can be added to food to replace animal products like meat and cheese, with $90 million in funding from Viking and others. And in May it acquired the genome-mining platform of Warp Drive Bio, a subsidiary of Revolution Medicines, and with it an agreement with pharmaceutical giant Roche to search for a new class of antibiotics, a deal that could be worth $160 million, plus additional royalties if Ginkgo succeeds.

Kelly believes he could easily add 50 or 100 more partnerships or investments without maxing out. “Nobody has cracked the puzzle at scale yet,” says Endy, now a professor at Stanford and not affiliated with the company. “Jason, with his business acumen, is testing an experiment with these joint ventures. I think that’s a good way to approach it, and I hope it works. But nobody has done that before.”

Back at Ginkgo’s headquarters, Kelly picks up a copy of Knight’s first cellular computing study, written for the Defense Advanced Research Projects Agency more than two decades ago, and thumbs through it. Stopping at page 14, where a graph shows zero sequenced genomes in 1995 rising to just 10 in 1997, he lets out a loud laugh. “We just acquired a database of 135,000 sequenced genomes.”

Today, he believes, synthetic biology is developing at a similar pace to computing in the mainframe era. As the field develops and creates products currently unimaginable, he argues, biology will help people live better lives, while moving away from chemical-based processes that lead to climate change and environmental degradation. “Eventually,” he says, “it should be a point of pride. You should want things made with GMOs because they’re made with biology.”
— Read on www.forbes.com/sites/amyfeldman/2019/08/05/the-life-factory-synthetic-organisms-from-startup-ginkgo-bioworks-unicorn-will-revolutionize-manufacturing/

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE, Uncategorized: However, still important enough to read anyway, regardless of categorization. | Tagged , , , , , , | 1 Comment

MIT engineers build advanced microprocessor out of carbon nanotubes | MIT News

MIT engineers build advanced microprocessor out of carbon nanotubes
New approach harnesses the same fabrication processes used for silicon chips, offers key advance toward next-generation computers.
Rob Matheson | MIT News Office
August 28, 2019
Press Inquiries
After years of tackling numerous design and manufacturing challenges, MIT researchers have built a modern microprocessor from carbon nanotube transistors, which are widely seen as a faster, greener alternative to their traditional silicon counterparts.
The microprocessor, described today in the journal Nature, can be built using traditional silicon-chip fabrication processes, representing a major step toward making carbon nanotube microprocessors more practical.
Silicon transistors — critical microprocessor components that switch between 1 and 0 bits to carry out computations — have carried the computer industry for decades. As predicted by Moore’s Law, industry has been able to shrink down and cram more transistors onto chips every couple of years to help carry out increasingly complex computations. But experts now foresee a time when silicon transistors will stop shrinking, and become increasingly inefficient.
Making carbon nanotube field-effect transistors (CNFET) has become a major goal for building next-generation computers. Research indicates CNFETs have properties that promise around 10 times the energy efficiency and far greater speeds compared to silicon. But when fabricated at scale, the transistors often come with many defects that affect performance, so they remain impractical.
The MIT researchers have invented new techniques to dramatically limit defects and enable full functional control in fabricating CNFETs, using processes in traditional silicon chip foundries. They demonstrated a 16-bit microprocessor with more than 14,000 CNFETs that performs the same tasks as commercial microprocessors. The Nature paper describes the microprocessor design and includes more than 70 pages detailing the manufacturing methodology.
The microprocessor is based on the RISC-V open-source chip architecture that has a set of instructions that a microprocessor can execute. The researchers’ microprocessor was able to execute the full set of instructions accurately. It also executed a modified version of the classic “Hello, World!” program, printing out, “Hello, World! I am RV16XNano, made from CNTs.”
“This is by far the most advanced chip made from any emerging nanotechnology that is promising for high-performance and energy-efficient computing,” says co-author Max M. Shulaker, the Emanuel E Landsman Career Development Assistant Professor of Electrical Engineering and Computer Science (EECS) and a member of the Microsystems Technology Laboratories. “There are limits to silicon. If we want to continue to have gains in computing, carbon nanotubes represent one of the most promising ways to overcome those limits. [The paper] completely re-invents how we build chips with carbon nanotubes.”
Joining Shulaker on the paper are: first author and postdoc Gage Hills, graduate students Christian Lau, Andrew Wright, Mindy D. Bishop, Tathagata Srimani, Pritpal Kanhaiya, Rebecca Ho, and Aya Amer, all of EECS; Arvind, the Johnson Professor of Computer Science and Engineering and a researcher in the Computer Science and Artificial Intelligence Laboratory; Anantha Chandrakasan, the dean of the School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science; and Samuel Fuller, Yosi Stein, and Denis Murphy, all of Analog Devices.
Fighting the “bane” of CNFETs
The microprocessor builds on a previous iteration designed by Shulaker and other researchers six years ago that had only 178 CNFETs and ran on a single bit of data. Since then, Shulaker and his MIT colleagues have tackled three specific challenges in producing the devices: material defects, manufacturing defects, and functional issues. Hills did the bulk of the microprocessor design, while Lau handled most of the manufacturing.
For years, the defects intrinsic to carbon nanotubes have been a “bane of the field,” Shulaker says. Ideally, CNFETs need semiconducting properties to switch their conductivity on an off, corresponding to the bits 1 and 0. But unavoidably, a small portion of carbon nanotubes will be metallic, and will slow or stop the transistor from switching. To be robust to those failures, advanced circuits will need carbon nanotubes at around 99.999999 percent purity, which is virtually impossible to produce today.  
The researchers came up with a technique called DREAM (an acronym for “designing resiliency against metallic CNTs”), which positions metallic CNFETs in a way that they won’t disrupt computing. In doing so, they relaxed that stringent purity requirement by around four orders of magnitude — or 10,000 times — meaning they only need carbon nanotubes at about 99.99 percent purity, which is currently possible.
Designing circuits basically requires a library of different logic gates attached to transistors that can be combined to, say, create adders and multipliers — like combining letters in the alphabet to create words. The researchers realized that the metallic carbon nanotubes impacted different pairings of these gates differently. A single metallic carbon nanotube in gate A, for instance, may break the connection between A and B. But several metallic carbon nanotubes in gates B may not impact any of its connections.
In chip design, there are many ways to implement code onto a circuit. The researchers ran simulations to find all the different gate combinations that would be robust and wouldn’t be robust to any metallic carbon nanotubes. They then customized a chip-design program to automatically learn the combinations least likely to be affected by metallic carbon nanotubes. When designing a new chip, the program will only utilize the robust combinations and ignore the vulnerable combinations.
“The ‘DREAM’ pun is very much intended, because it’s the dream solution,” Shulaker says. “This allows us to buy carbon nanotubes off the shelf, drop them onto a wafer, and just build our circuit like normal, without doing anything else special.”
Exfoliating and tuning
CNFET fabrication starts with depositing carbon nanotubes in a solution onto a wafer with predesigned transistor architectures. However, some carbon nanotubes inevitably stick randomly together to form big bundles — like strands of spaghetti formed into little balls — that form big particle contamination on the chip.  
To cleanse that contamination, the researchers created RINSE (for “removal of incubated nanotubes through selective exfoliation”). The wafer gets pretreated with an agent that promotes carbon nanotube adhesion. Then, the wafer is coated with a certain polymer and dipped in a special solvent. That washes away the polymer, which only carries away the big bundles, while the single carbon nanotubes remain stuck to the wafer. The technique leads to about a 250-times reduction in particle density on the chip compared to similar methods.
Lastly, the researchers tackled common functional issues with CNFETs. Binary computing requires two types of transistors: “N” types, which turn on with a 1 bit and off with a 0 bit, and “P” types, which do the opposite. Traditionally, making the two types out of carbon nanotubes has been challenging, often yielding transistors that vary in performance. For this solution, the researchers developed a technique called MIXED (for “metal interface engineering crossed with electrostatic doping”), which precisely tunes transistors for function and optimization.
In this technique, they attach certain metals to each transistor — platinum or titanium — which allows them to fix that transistor as P or N. Then, they coat the CNFETs in an oxide compound through atomic-layer deposition, which allows them to tune the transistors’ characteristics for specific applications. Servers, for instance, often require transistors that act very fast but use up energy and power. Wearables and medical implants, on the other hand, may use slower, low-power transistors.  
The main goal is to get the chips out into the real world. To that end, the researchers have now started implementing their manufacturing techniques into a silicon chip foundry through a program by Defense Advanced Research Projects Agency, which supported the research. Although no one can say when chips made entirely from carbon nanotubes will hit the shelves, Shulaker says it could be fewer than five years. “We think it’s no longer a question of if, but when,” he says.
The work was also supported by Analog Devices, the National Science Foundation, and the Air Force Research Laborato
— Read on news.mit.edu/2019/carbon-nanotubes-microprocessor-0828

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , | 1 Comment

Information about through the wall radar, and active radio wave effects on the human body, various surveillance technologies used against unsuspecting humans


Hi all,
I should have included this ACLU page, with map, in my email to everyone. ACLU is trying to organize against police surveillance methods. There is a map on their website and the upcoming scheduled ‘organized’ events. I think it is a great way to get together in groups and fight this atrocious, heinous crime.
Look at the map and see if ACLU is already organized near you, if not, then contact the ACLU to start a group yourself in your own city or community. They are already talking about quashing abuse of surveillance powers; you should be able to feel about, to see how to talk about our surveillance and torture.
Let me know how it goes. I’ll also keep you apprised.
Helena

~~~~~~~~~~~~~~~~~~~~~~~`

~~ Don’t let the bastards grind you down! ~~

~ Illegitimis nil carborundum ~

…………………………………………………………………………………………..


From: H Cs <hjcs1234@hotmail.com>
Sent: Wednesday, August 21, 2019 2:47 AM
Subject: ACLU aware law-enforcement is using INVASIVE SURVEILLANCE technologies

 
Hi all,

The ACLU is aware that law-enforcement is using invasive, surveillance technologies. When the power is increased for the Through-The-Wall-Sensors (TTWS), that is what can hurt, burn, vibrate, kill tissue, etc.

Click on this ACLU link and scroll down to the orange document.
I also cut and pasted a part of one of my letters, describing this through-wall RF technology bio-effects. 
Helena

……………………………………………………………………………………………..
………………. Part of the ACLU document ………………
COMMUNITY CONTROL OVER 
POLICE SURVEILLANCE:

TECHNOLOGY 101
ACLU
The proliferation in local police departments’ use of surveillance technology, which in most places has occurred without any community input or control, presents significant threats to civil rights and civil liberties that disproportionately impact communities of color and low-income communities. The nationwide “Community Control Over Police Surveillance” effort is looking to change that through legislation mandating that local communities are given a meaningful opportunity to review and participate in all decisions about if and how surveillance technologies are acquired and used locally. 
Here is a list of costly and invasive surveillance technologies that might be recording you, your family and your neighbors right now.
THROUGH-THE-WALL 
SENSORS/RADAR 
(TTWS) 
This technology uses RADAR or similar technology to peer through walls of a building. Currently, the technology is precise enough to ascertain how many people are in a particular room within a dwelling unit and, overtime, the clarity of the image produced may be able to determine the identities of a building’s occupants.  The Xaver 400, the latest version of the TTWS model sold by Camero-Tech, sells for $47,500 per unit. Operational costs are additional and significant. While this technology may have beneficial uses, no uses are appropriate without a warrant. As the technology advances, this tool may increasingly be deployed as an improper tool for looking into private homes without court oversight.
SURVEILLANCE ENABLED 
LIGHT BULBS
(SURVEILLANCE CAPABLE BULBS OR FIXTURES)
LED surveillance light bulbs, which are presented as energy efficient upgrades to existing incandescent light bulbs, can actually conceal tiny cameras and microphones that can stealthily monitor their surroundings and transmit their feeds back to a central monitoring station. If these bulbs are installed on municipal streetlamps and put into widespread use, privacy would become as antiquated an idea as the old-fashioned light bulbs the LEDs are replacing. Mass adoption of the technology would throw surveillance nets of almost unprecedented scope over entire communities or cities. Though marketed as an energy efficient light bulb with built-in monitoring technology, this technology is far more akin to a mass surveillance device being disguised as a light bulb. In truth, the product has a broad surveillance capabilities and far lesser comparative utility as a lighting device.
HACKING SOFTWARE AND 
HARDWARE
These tools allow law enforcement officials or other government actors to gain access to a person’s personal computing equipment (including laptops and cell phones) and password-protected websites or accounts (like cloud storage or social media accounts). They can enable hacking to be performed in person and remotely without the permission of the account holder or service operator. “Hacking” technology is surveillance because a government that hacks into a private computer or account intends to surveil the private contents of the hacked computer or account without the owner’s permission or knowledge. Using hacking software or hardware is like picking a lock to break into someone’s house — the act is an integral part of the unlawful entering. Most hacking tools depend on vulnerabilities in commonly used computer software and services. When our government and police use hacking tools, which exploit these vulnerabilities rather than addressing them, they not only leave the systems open to their own intrusions but also to intrusions by hackers, criminals and foreign governments.
STINGRAYS
Also known as cell-site simulators or international mobile subscriber identity (IMSI) catchers, the device mimics a cell phone communications tower, causing your cell phone to communicate with it. This communications link gives the Stingray the ability to track your location and intercept data from your phone, including voice and typed 
communications. These devices can disrupt your regular phone service, including making 911 calls.
The Hailstorm, the latest version of the Stingray, sells for $169,602 per unit. Operational costs are additional and significant. Whenever a Stingray is used to locate a phone, it also collects information about hundreds or thousands of other phones and their users. The technology is often used without a warrant, and judges are often kept in the dark about its capabilities and limitations. It is very difficult to detect when Stingrays are being used and to ensure they are not being deployed in a discriminatory manner.
BIOMETRIC SURVEILLANCE 
TECHNOLOGY
Biometric technologies allow a person to be identified using a physical trait. No longer limited to fingerprints and DNA, publicly known traits such as a person’s face or voicecan now be run against Department of Motor Vehicle, social network and other databases to secretly identify and track almost every American. Biometric surveillance technology includes facial, voice, iris and gait-recognition software and databases.
Used in combination with other surveillance technologies, like CCTV cameras, this tool can completely undermine the ability of person to travel in public or gather with friends anonymously. If video data is stored, this technology can reconstruct anyone’s travel history. Technological limitations and biased engineering practices have made facial recognition technology far less accurate in identifying faces of persons of color. This produces more false positives and increases the likelihood that a person of color will unjustifiably draw the attention of law enforcement.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~`

The TTWS (a.k.a. STTW (Sense-Through-The-Wall technology)) devices use pulsed microwave (MW) radiofrequency (RF) to detect any motion, no matter how tiny, through multiple walls. With filters, the TTWS MW RF RADAR device can eliminate any clutter and motion that is not of interest, reading the ‘bounce back’ echo of the MW RF, called ‘back-scatter’, that returns to the device, making it possible to ‘see’ into homes and into earthquake rubble and even underground, as ground penetrating RADAR (GPR).

These TTWS radiolocator and intentional radiator devices are motion sensors, very much like the speed RADAR that most people are accustomed, which measures motion in MPH. These ‘slightest of motion’ speed detectors measure the motion at a person’s wrist, to detect heartbeat; measure the breath rate by detecting the motion of a person’s chest heaving; pick up leg, hand and arm motion for gesture and gait recognition; picks up eye motion and has gaze tracking recognition and even detects the vibration of vocal cords, to discern speech – through multiple walls.

These TTWS radiolocators and intentional radiators can read what you ‘air write’ with your finger.

When pulsed at embassies, they are specifically used for ‘listening-in’ espionage devices. There is no need to do a ‘break and enter’ to place a hidden microphone; the eavesdropping can easily be accomplished by pulsing a MW RF signal into a building, through walls, with direct line of sight. The device can pick up many conversations and locate everyone in the building.


HPM RF, RADAR is also known as a TTWS (Through-The-Wall-Surveillance). The FCC officially calls these devices ‘radiolocators’ and ‘intentional radiators’. The devices are widely available to First Responders. These MW RF TTWS RADAR devices were designed to be used during catastrophic and exigent circumstances, like after an earthquake to find the tiniest, micro-motion of a barely alive person under a big rubble or during a mud or snow avalanche or during a SWAT or hostage situation, where law enforcement has to quickly determine a building layout and the number of people in the building, their location and where the weapons cache is, if any.  
But these devices are being misused and have been co-opted and re-purposed. When the device’s low frequency power is increased (because after all, they are computers that can be reprogrammed), you have a low frequency, but high-power microwave device (HPM) to use surreptitiously, for revenge and retaliation to settle grudges. This seems to have developed into a VIRTUAL REALITY belly laughpastime. It is ‘CRAZY-MAKING’.

The ACLU recognizes that TTWS surveillance devices are being used and abused by law enforcement:https://www.aclu.org/report/community-control-over-police-surveillance-technology-101

The definition of the acronym RADAR, is radio detection + radio direction and ranging, so the devices can locate a person and lock on to them and track them. The TTWS RADAR devices can precisely lock onto a certain body part of a person and ‘pulse’ and ‘vibrate’ that body part. 
If the MW RF power is increased and is pulsed, through walls at a target, the RADAR TTWS device delivers ‘shockwaves’ or ‘pressure waves’, that bashes the brain up against the inside of your hard skull-bone which causes concussions; the MW RF causes burns; incredible bone crunching pain; RF Ablation (necrosis or destruction of tissue); RF Anesthesia; causes auto-immune diseases and neurological deterioration, cataracts and cancer. All are well known biological effects of microwave. 
When the pulsed HPM is directed at a specific body part it can stimulate that body part. If the beam focused, MW RF is directed at your nostrils, you will sneeze uncontrollably; if a portion of your body is pulsed (stimulated) where the nerve endings are close to the surface of the skin, like your toes or feet, the nerve ending synapses will rapid fire, which will feel like electrocution; dial back the MW RF power and you will feel a phantom touch. Hit a nerve reflex point, you will experience restless leg or involuntary extremity movement. The burning and stinging is a well known affect of RADIO WAVE SICKNESS; it feels like thousands of pin-pricks or bee stings; pulsed vibrating stimulation directed at our lower intestine causes involuntary defecation; pulsed ‘stimulation’ directed at our bladder causes you to pee our pants; if the pulsed, stimulation is beamed at our genitals; it is rape. 
When the MW RF pulse is directed at your digestive tract, you will feel nauseous or will downright projectile vomit. If your gag reflex or esophagus is pulsed and stimulated, you will feel choked to near asphyxiation. If your heart and lungs are pulsed and vibrated, you will have a panic attack or pass out. 
This is a bullying andintimidation device tomodify behavior and to force compliance by terrorizing and hurting.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~“

If you want a copy of my entire letter, let me know and I will send it to you.
Helena
….

………………………………………………………….…..

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 3 Comments

Human hair as a nanoreactor in the synthesis of gold (and other) nanoparticles

pubs.acs.org/doi/suppl/10.1021/nl303107w/suppl_file/nl303107w_si_001.pdf

ACS News Service Weekly PressPac: January 02, 2013

First synthesis of gold nanoparticles inside human hair for dyeing and much more

In a discovery with applications ranging from hair dyeing to electronic sensors to development of materials with improved properties, scientists are reporting the first synthesis of gold nanoparticles inside human hairs. Their study appears in ACS’ journal Nano Letters.

Philippe Walter and colleagues explain that gold nanoparticles — 40,000-60,000 of which could fit across the width of a human hair — are a hot topic. Scientists are exploring uses, ranging from electronics and sensors to medical diagnostic tests and cancer treatments. Gold nanoparticles have been deposited on hair for use as electrodes, and gold nanoparticles had been used to dye wool. Walter’s team looked at a new use — dyeing hair, inspired by the ancient Greeks’ and Romans’ use of another metal, lead, to color their hair.

They describe the first synthesis of fluorescent gold nanoparticles inside human hair. It involved soaking white hairs in a solution of a gold compound. The hairs turned pale yellow and then darkened to a deep brown. Using an electron microscope, the scientists confirmed that the particles were forming inside the hairs’ central core cortex. The color remained even after repeated washings.

The authors acknowledge funding from the Agence Nationale de la Recherche.

Contact

Science Inquiries: Michael Woods, Editor, 202-872-6293
General Inquiries
: Michael Bernstein, 202-872-6042

empty
Gold nanoparticles darken hair after treatment
for one day, center, and 16 days, right
(untreated hairs, left).

Hair Fiber as a Nanoreactor in Controlled Synthesis of Fluorescent Gold Nanoparticles

View Author Information
Cite This:Nano Lett.201212126212-6217
Publication Date:November 2, 2012

https://doi.org/10.1021/nl303107w
Copyright © 2012 American Chemical Society
Supporting Info (1)»

Abstract

Abstract Image

The synthesis and detailed characterization of gold nanoparticles (AuNPs) inside human hair has been achieved by treatment of hair with HAuCl4 in alkaline medium. The AuNPs, which show a strong red fluorescence under blue light, are generated inside the fiber and are arranged in the cortex in a remarkably regular pattern of whorls based on concentric circles, like a fingerprint. It opens an area of genuine nanocomposites with novel properties due to AuNPs inside the hair shaft.

(Timothy’s note: I do not have credentials for access to the entire paper but only this abstract

This article is from 2012

8 years ago

one can only imagine the level of technology at present!)

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Leave a comment

Colour-changing artificial ‘chameleon skin’ powered by light-triggered nanoparticles

Colour-changing artificial ‘chameleon skin’ powered by light-triggered nanoparticles
(Nanowerk News) Researchers have developed artificial ‘chameleon skin’ that changes colour when exposed to light and could be used in applications such as active camouflage and large-scale dynamic displays.
The material, developed by researchers from the University of Cambridge, is made of tiny particles of gold coated in a polymer shell, and then squeezed into microdroplets of water in oil. When exposed to heat or light, the particles stick together, changing the colour of the material. The results are reported in the journal Advanced Optical Materials (“Motile Artificial Chromatophores: Light-Triggered Nanoparticles for Microdroplet Locomotion and Color Change”).

In nature, animals such as chameleons and cuttlefish are able to change colour thanks to chromatophores: skin cells with contractile fibres that move pigments around. The pigments are spread out to show their colour, or squeezed together to make the cell clear.
The artificial chromatophores developed by the Cambridge researchers are built on the same principle, but instead of contractile fibres, their colour-changing abilities rely on light-powered nano-mechanisms, and the ‘cells’ are microscopic drops of water.
When the material is heated above 32°C, the nanoparticles store large amounts of elastic energy in a fraction of a second, as the polymer coatings expel all the water and collapse. This has the effect of forcing the nanoparticles to bind together into tight clusters. When the material is cooled, the polymers take on water and expand, and the gold nanoparticles are strongly and quickly pushed apart, like a spring.
“Loading the nanoparticles into the microdroplets allows us to control the shape and size of the clusters, giving us dramatic colour changes,” said Dr Andrew Salmon from Cambridge’s Cavendish Laboratory, the study’s co-first author.
The geometry of the nanoparticles when they bind into clusters determines which colour they appear as: when the nanoparticles are spread apart they are red and when they cluster together they are dark blue. However, the droplets of water also compress the particle clusters, causing them to shadow each other and make the clustered state nearly transparent.
At the moment, the material developed by the Cambridge researchers is in a single layer, so is only able to change to a single colour. However, different nanoparticle materials and shapes could be used in extra layers to make a fully dynamic material, like real chameleon skin.
The researchers also observed that the artificial cells can ‘swim’ in simple ways, similar to the algae Volvox. Shining a light on one edge of the droplets causes the surface to peel towards the light, pushing it forward. Under stronger illumination, high pressure bubbles briefly form to push the droplets along a surface.
“This work is a big advance in using nanoscale technology to do biomimicry,” said co-author Sean Cormier. “We’re now working to replicate this on roll-to-roll films so that we can make metres of colour changing sheets. Using structured light we also plan to use the light-triggered swimming to ‘herd’ droplets. It will be really exciting to see what collective behaviours are generated.”
Source: University of Cambridge
Subscribe to a free copy of one of our daily
Nanowerk Newsletter Email Digests
with a compilation of all of the day’s news.
— Read on www.nanowerk.com/nanotechnology-news2/newsid=53439.php

Posted in nanotechnology meta materials quantum effects light electromagnetics genetics and you information to understand technology changing life as we knew it- forever!, THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , | Leave a comment

Detection of neuronal activity using microwave energy

http://adsabs.harvard.edu/abs/2004APS..MARW10006Z

Abstract

Electromagnetic interactions with neurons can be used to monitor and detect their activities. When neurons fire, voltage-dependent ion channels open, allowing a transient influx of sodium ions. After a brief delay, this is followed by a transient efflux of potassium ions. The opening of the ion channels result in a small change in the average conductivity of the neuronal cell membrane. To study the feasibility of using polarized 80 – 120 GHz electromagnetic waves to detect neuronal activity, we first estimated the effective conductivity changes. More specifically, we used the buccal ganglion of the marine mollusk Aplysia californica as a model system. The model assumed that neurons were 100 microns in diameter, that there was a 2 mm thick layer of sea water, and that the total interaction area (roughly the size of one hemi-ganglion) was 1 mm by 2 mm. The neurons were assumed to be three layers deep. The three layers of cells were treated as six lipid layers. We assumed the conductance of a lipid layer at rest was 2 millisiemens/cm2, and that the conductance increased to 30 millisiemens/cm2 upon excitation of the neuron. We estimated that the conductance due to activation of a single neuron, averaged over the entire area of interaction, would be 42 microsiemens. If all the neurons were inactive, the conductance would be 40 microsiemens. Using the above conductance change, the complex permittivity and impedance of the buccal ganglion was calculated. The real part of the impedance was close to that of free space ( 377 ohms) and did not change when a single neuron fired. The imaginary part of the impedance was 1 microOhm larger when a single neuron was active. Although this change is below the limit of what can be detected using a simple microwave transmission measurement ( 0.1 milliOhms), it can be readily detected using a microwave resonant cavity method or interferometry. We have performed preliminary experimental measurements passing microwaves through an active buccal ganglion, and recorded some data that suggest that it may be possible to detect a change in microwave transmission when many neurons fire simultaneously, which occurs during feeding-like motor programs, which can be readily induced in the isolated buccal ganglion. We plan additional experiments to verify that changes can be reliably detected during motor programs, and then improve the sensitivity of the system so that the activity of individual nerve cells can be detected and imaged.

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 2 Comments

A poem.

This is the chair

On the deck

Of the boat

Upon the sea

Where I sit

In the morning

As the sun

Begins its day.

There are times

When sitting

Is not so good

Pacing

Back and forth

Again and again

In some desperate

Attempt

At

Soothing.

In those moments,

Where the mind races

Assaulted

Somehow

With difficult

Negative

Frightening

Emotional content…

Sometimes, just ‘to be’ is the most difficult challenge of the moment…

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 2 Comments

History of Morgellons disease: from delusion to definition

History of Morgellons disease: from delusion to definition

Marianne J Middelveen, Melissa C Fesler, and Raphael B Stricker

Additional article information

Abstract

Morgellons disease (MD) is a skin condition characterized by the presence of multicolored filaments that lie under, are embedded in, or project from skin. Although the condition may have a longer history, disease matching the above description was first reported in the US in 2002. Since that time, the condition that we know as MD has become a polemic topic. Because individuals afflicted with the disease may have crawling or stinging sensations and sometimes believe they have an insect or parasite infestation, most medical practitioners consider MD a purely delusional disorder. Clinical studies supporting the hypothesis that MD is exclusively delusional in origin have considerable methodological flaws and often neglect the fact that mental disorders can result from underlying somatic illness. In contrast, rigorous experimental investigations show that this skin affliction results from a physiological response to the presence of an infectious agent. Recent studies from that point of view show an association between MD and spirochetal infection in humans, cattle, and dogs. These investigations have determined that the cutaneous filaments are not implanted textile fibers, but are composed of the cellular proteins keratin and collagen and result from overproduction of these filaments in response to spirochetal infection. Further studies of the genetics, pathogenesis, and treatment of MD are warranted.

Keywords: Morgellons disease, dermopathy, Lyme disease, Borrelia burgdorferi, spirochetes
Video abstract

Download video file.(58M, avi)

Introduction

Morgellons disease (MD) is a disfiguring and perplexing skin condition associated with spirochetal infection and tick-borne illness.1–7 This poorly understood condition has a worldwide distribution, with estimated self-reported cases numbering over 14,000 in 2009.5 Since that time, there has been an increasing number of individuals reported to be afflicted with this disorder (C Casey, Charles E Holman Morgellons Disease Foundation, personal communication, 2017). The distinguishing diagnostic feature of MD is spontaneously appearing ulcerative skin lesions that contain unusual filaments lying under, embedded in, or projecting from the skin. The characteristic filaments are microscopic, visually resembling textile fibers, and are white, black, or a more vibrant color, such as red or blue.1–7 In addition to fiber production, some patients may experience formication, described as stinging, biting, creeping and crawling sensations. The symptoms of MD are not limited to the skin. MD patients experience a variety of systemic manifestations, such as fatigue, joint pain, cardiac complications, cognitive difficulties, and neuropathy, all symptoms that are commonly reported by Lyme disease (LD) patients.1–7

History

The name “Morgellons” (pronounced with either a hard or soft “g”) comes from a letter written in 1674 by Sir Thomas Browne, an English physician. The letter contains a brief description of a skin disease in French children:

Hairs which have most amused me have not been in the face or head, but on the back, and not in men but children, as I long ago observed in that endemial distemper of little children in Languedock, called the Morgellons, wherein they critically break out with harsh hairs on their backs, which takes off the unquiet symptoms of the disease, and delivers them from coughs and convulsions.8

Browne’s description of “the Morgellons” and other historical accounts of similar maladies date from 1544–1884 and were found in Browne’s library in 1935 by Kellett, who then summarized and discussed them.8

The accounts by Browne and others were likely referring to a heterogeneous group of skin conditions that may have differed from the skin condition that we refer to as MD today. These early accounts describe primarily childhood illnesses, many of which were associated with convulsions. There is mention of hairs, worms (with black protruding heads), or comedones that protruded from the skin, primarily on the arms, legs, and back, and at that time there was much debate as to whether these objects were animate or inanimate.8 Ettmüller, for example, provided a drawing of infesting organisms that look like various arthropods, some resembling scabies mites, while the famous Dutch microscopist Leuvenhoeck concluded that such objects were inanimate.8 In 1894, Thibierge described patients who had erroneous and unshakeable beliefs of skin infestation by parasites, and proposed the name “acarophobia”.9,10 In 1946, Wilson and Miller suggested that “acarophobia” should be replaced by the name “delusions of parasitosis” (DOP).10,11

From 1902 to 1938, case studies describing “parasitophobias” or “dermatological hypochondriasis” that resulted in delusional interpretation of skin sensations were published sporadically.12–20 However, as early as 1935, an association between spirochetal infection and DOP was documented by the French physician Vié, who reported that six of eight of the subjects in his case studies had syphilis.18 In 1938, a pivotal narrative of DOP was published by Ekbom, a series of case studies describing patients who had sensations of movement and the belief that insects were crawling on or under skin. Ekbom felt that determining the underlying cause of the formication was important, stating that “it is the underlying illness that determines the overall presentation of the beliefs” and “it is perhaps too simple that the parasitophobias should be considered as mental illness and nothing more”.20 Interestingly, like Vié, Ekbom found that spirochetal infection was present in his patient cohort, and three of Ekbom’s seven patients had documented cases of syphilis. Despite the fact that syphilis was considered rare in Sweden, Ekbom did not believe that spirochetal infection was a contributing factor.20

Ekbom reported that the skin sensations consisted mostly of itching, but also that there was a feeling that something was crawling on or under the skin, and that stabbing and biting sensations could also occur. He mentioned that in such cases, “little animal” specimens were sometimes brought in by patients to show to physicians and that such collections consisted of “little hairs, little threads, grains of sand, and skin scales”. He noted that apart from delusional ideas of infestation, no consistent mental problems were present.20 Although Ekbom could not find any arthropods, parasites, or other microscopic animals, it is important to note that he found hairs, “little threads”, and “grains of sand” in patient specimens. His description is consistent with the findings of unusual hairs, fibers, and hardened comedo-like dermatological objects that we see in MD specimens.20 Such objects will be discussed in depth later in this report.

It is possible that patients in the case studies written by other physicians and mentioned by Ekbom had syphilis or other spirochetal infections. The causative agent of syphilis was first reported in 1905 by Fritz Schaudinn and Erich Hoffmann, who used dark-field microscopy and described spiral-shaped bacteria – Spirochaeta pallida – now called Treponema pallidum.21 The first test for syphilis was developed shortly afterward in 1906 by German physician and bacteriologist August von Wassermann. The Wassermann test was a complement-fixation test that detected antibodies reactive to the syphilis spirochete. The Wassermann tests performed in the 1920s and 1930s lacked accuracy,22,23 and cases of syphilis among patients with delusional parasitosis (DP) may have gone unacknowledged as a result.

Regardless of the test accuracy for syphilis, it is possible that some of the patients described in these historical case studies may have been infected with Borrelia spp., other treponemes or Leptospira spp. B. burgdorferi (Bb) is not a new organism: the earliest known case dates back 5,300 years in the mummy dubbed Ötzi,24 and Borrelia DNA was also detected in two museum specimens of the white-footed mouse, Peromyscus leucopus, collected in 1894.25 Spirochetes resembling Borrelia have also been found in amber-fossilized ticks from 15–20 million years ago.26 Therefore, spirochetal infections associated with MD may have occurred periodically hundreds or even thousands of years ago in human history, yet have gone unrecognized and unreported.

There is a brief mention of “the Morgellons” by Emslie-Smith in 1946, where he proposes that the condition was a form of myiasis caused by the larva of a Hypoderma species, although his account did not provide convincing evidence to support his theory.27 In a 1983 lecture, Lyell described a survey of several hundred dermatologists treating patients with DOP who reported that many of their patients exhibited specimens in matchboxes, baggies, scraps of paper, or photographs. Lyell labeled this practice the “matchbox sign”.28 The survey was reported in a short editorial in the Lancet,10 after which the “matchbox sign” was adopted by dermatologists as being proof of delusional mental illness.29–31 Likewise, the manipulation of skin to extract specimens for relief was also considered to be proof of having a delusional disorder, and this practice was labeled “the tweezer sign”.29

After Emslie-Smith’s mention of MD in 1946, there were no significant references to MD in medical literature until 2002. In 2001, biologist Mary Leitao noted nonhealing lesions on her young son, who complained that he had “bugs” under his skin. She removed a scab, and upon magnification she did not see arthropods or parasites, but she did see embedded blue and red filaments. Leitao searched the Internet looking for similar conditions, and Browne’s description bore a resemblance to her son’s condition, so she appropriated the name.1,2 Leitao subsequently founded the not-for-profit Morgellons Research Foundation (MRF). The MRF website included a database where those with the disorder could self-report their skin and systemic symptoms.5

Leitao did not get answers from the mainstream medical establishment. She had sought help from many doctors, including Fred Heldrich, a Johns Hopkins pediatrician, who arrived at the conclusion that Leitao should not use her son to “explore the problem” and that she could benefit from a psychiatric evaluation.32 Leitao gathered a group of patient advocates, medical practitioners, physicians, and nurses into a volunteer board of directors, which included Georgia-based pediatrician Greg Smith, Texas-based nurse practitioner Virginia Savely, patient advocates Charles E Holman and Cindy Casey-Holman, and former National Aeronautics and Space Administration (NASA) physician and researcher William Harvey32 (C Casey, Charles E Holman Morgellons Disease Foundation, personal communication 2017). Leitao also sought help from Randy Wymore, a pharmacology professor at Oklahoma State University.32

In 2006, Dan Rutz, a spokesman for the US Centers for Disease Control and Prevention (CDC) contacted Leitao and said that the CDC would form a task force to investigate MD, declaring that “these people deserve more than to be blown off”.32 The CDC published their study results in 2012, declaring that MD was “similar to more commonly recognized conditions, such as delusional infestation [DI]”.33 As of 2012, Leitao had withdrawn from the public eye and closed the MRF. The website run by the MRF is no longer active, and the domain name was taken over by others, now promoting fringe etiologic theories of MD.

Diagnosing MD

In light of previous studies of MD,1–7 a case definition for MD is proposed: a somatic LD-like illness associated with spontaneously appearing, slowly healing, filamentous, ulcerative skin lesions, with the key diagnostic criterion being colored, white, or black filaments protruding from or embedded in skin. Patients diagnosed with MD, either by self-diagnosis or by a health care practitioner, are not a homogeneous group, thus highlighting the need for a universally accepted case definition.

Filaments in MD lesions usually require magnification of 50× or more to be seen, and at that magnification they can be mistaken for textile fibers. Health care providers need to be objective when viewing these fibers: a patient must have unusual filaments visible under 50× magnification or higher (as opposed to the magnification of 10× normally used in dermatology) and embedded in or extruding from skin to be diagnosed with MD. The filaments are relatively easy to see with proper visualization tools, and detectable fibers should not be automatically dismissed as “self-implanted” or composed of synthetic substances without an appropriate evaluation. Mental health status is not a diagnostic factor in MD cases, as outlined herein.

Controversy

Unlike Ekbom, who was concerned about the underlying cause of DP,8 many modern-day practitioners and scientists have ignored the potential underlying causes responsible for formication and beliefs of infestation. It is easier to declare mental illness the exclusive etiologic cause, thus blaming the patient, when confronted with perplexing symptoms that the practitioner cannot explain. However, it is irresponsible to label a patient delusional without an appropriate psychiatric evaluation, and if mental illness is present a physician should bear in mind that an underlying infectious process can cause a pathological response resulting in mental illness.

A PubMed search using the keyword “Morgellons” yielded 58 articles, the earliest dating from 1946. From 2006 to present, medical literature is divided into two polarized points of view. One point of view is that MD is a form of delusional mental illness, and the other is that underlying spirochetal infection causes a filamentous dermopathy that is accompanied by an array of LD-like multisystem symptoms that may or may not include neuropsychiatric symptoms. There are approximately 40 papers in the medical literature proposing that MD is purely a delusional disorder, and only a quarter of that figure proposing that MD has an infectious etiology.

Diagnosing delusional disorder

The American Psychiatric Association’s Diagnostic and Statistical Manual of Mental Disorders (DSM)-V makes no mention of a diagnosis of DOP. The closest diagnosis is Delusional disorder 297.1 (F22), somatic type, which is defined thus:

presence of one or more delusions with a duration of one month or longer

criteria for schizophrenia have never been met (note hallucinations if present are not prominent and are related to the delusional theme eg, the sensation of being infected with insects is associated with delusions of infestation)

apart from the impact of the delusion(s) or its ramifications, functioning is not markedly impaired, and behavior is not obviously bizarre or odd

if manic or major depressive episodes have occurred, these have been brief relative to the duration of the delusional periods

the disturbance is not better explained by another mental disorder, such as obsessive compulsive disorder, and is not due to the physiological effects of a substance or medication or another medical condition.34

Somatic-type delusional disorders manifest with core beliefs concerning bodily functions or sensations. Manschreck stated that the diagnosis of delusional disorder should be a diagnosis of exclusion, and he outlined three steps for evaluating patients with delusions. The first step is to establish if pathology is present. This step requires clinical judgment to distinguish among a true observation, a firm belief, an overvalued idea, and a delusion.35 He states that a comment that at first appears delusional can prove to be factual, and some reports that seem believable may later be found to be delusional. Therefore, he recommended that rather than the truth or falseness of a belief, the extremeness or inappropriateness of a patient’s behavior may be the determining factor leading to a diagnosis of delusional disorder.35,36 In other words, one must first establish that a belief is delusional, and not the result of an underlying somatic illness.

The second step involves determining if characteristics associated with delusions, such as confusion, agitation, perceptual disturbances, physical symptoms, and mood abnormalities are present.35 The third step is performing a systematic differential diagnosis, including a thorough history, mental status examination, and laboratory/radiological evaluation to rule out other medical and psychiatric conditions that present with delusions.35 The status examination, including cognitive status, is usually normal, except for the delusional beliefs: memory and cognition are intact.37 Auditory or visual hallucinations are indicative of more severe psychotic disorders, such as schizophrenia, and suggest exclusion of a delusional disorder.37 The differential diagnosis should exclude medical conditions that can cause delusions, such as neurodegenerative or other central nervous system disorders, vascular diseases, vitamin deficiencies, medications, metabolic and endocrine disorders, toxins, and infectious diseases.37 Note that spirochetal infections such as syphilis and LD could cause symptoms that fall into this category.

Evidence supporting the hypothesis of DP

Among reports that promote a delusional etiology for MD, there are a number of review articles, opinion pieces, or editorial letters.29,30,38–53 These do not provide any new research or clinical evidence to support the claims that MD is a delusional disorder, but they do present common discussion themes that are frequently reiterated in case studies and research papers.54–76 Common discussion themes are:

MD is a delusional disorder29,30,38–76

MD is a variation of DOP, DP, or DI29,30,38–76

MD is defined as the fixed, unshakable belief, despite lack of medical evidence, of being infested with microscopic organisms or inanimate objects29,30,38–76

the presentation of specimens in or out of a container, whether it be a matchbox, small plastic bag, paper, pill container, or photographic image, etc, is diagnostic of DOP, DP, or DI29–31,52,55,59–62,64,66,70,71

patients with MD tend to have psychiatric comorbidities74,68

MD is a mass delusional mental illness afflicting primarily middle-aged Caucasian females68,69,74,76

delusions of infestation are spread from person to person and transmitted by the Internet30,39,41,51,52,54,58,60

antipsychotic drugs are the treatment of choice for MD29,30,38–62,64–76

electroconvulsive therapy is an acceptable treatment for MD30,52

establishing rapport to gain confidence and trust helps convince patients to take antipsychotic drugs30,39,41,49,54,58,60

using the word “Morgellons” in dialogue with patients can help establish rapport and trust30,39,41,54,58,60

it is acceptable for dermatologists to diagnose delusional disorder and prescribe antipsychotic medication51,56

use of deceptive dialogue and strategies aimed at convincing patients to take antipsychotic drugs is a justifiable practice41,50,54,60,65

if a patient’s friend(s) or family member(s) also observe a subject’s dermatological lesions and believe the evidence, then they too are considered to share the delusional belief, and the delusion is considered to have been transmitted from one individual to another;30,51,54,68 the belief shared by two people that there are organisms present in the skin is called folie à deux (madness of two); folie à trois, folie à quatre, or folie à cinq are shared beliefs by three, four, or five people, respectively; and shared belief in a family is folie à famille.30,51,54,68

A PubMed search using the keyword “Morgellons” identified 18 publications consisting of case studies of between one and six patients. Table 1 provides a summary of the case studies. Most of these patients clearly do not meet the case definition of MD. Case studies provide useful anecdotal evidence, but they have limitations. Of these case studies, the majority do not mention the observation of fibers being present in or projecting from the skin (the key defining criterion for MD), nor do they mention whether the attending health care professional looked for filaments in the skin at magnification of 50× or higher.54–56,59–68,70,73

Table 1
Case studies claiming delusional etiology of Morgellons disease
Some studies reported that patients presented specimens to the health care provider as evidence – fibers, lint, hair and skin scrapings, etc – and this was interpreted as being diagnostic of DI.55,59–62,64,66,70,71 In many of these case studies, there was no mention of any analysis of patient-supplied specimens to determine composition.54,59,60 In a few cases, the health care provider did nothing more than a gross visual identification of patient-provided specimens.55,62,66,70,71 Some studies did not mention fibers associated with their cases at all.55,58,60 Only seven of these studies indicated that the subjects had heard of MD.54,56,58,61–63,70

In some case studies, a patient was diagnosed with DP or DI on very little evidence. Bhandary et al diagnosed DP in patients who felt crawling sensations and thus thought they had bugs in their ears or nose.55 Such conditions as seborrheic dermatitis or eczema can cause formication and crawling sensations inside the ears and nose, and should be ruled out before diagnosing mental illness. Sandhu and Steele diagnosed a patient with DI because the patient felt as though she had fibers growing into her eye. The patient had ectropion, and perhaps this was a factor contributing to the uncomfortable sensations.73 In these cases, underlying causes for sensations were not thoroughly investigated before assuming the patient was having sensory hallucinations. Furthermore, given the sensations of formication, the beliefs in bugs in the first cases and of fibers in the second case are not unreasonable or inappropriate.

In cases where a health care professional did not look for filaments, it is unclear whether or not patients with MD were in these studies. Some studies did not mention if the patient had lesions.54 Some reports mentioned lesions or skin abnormalities, but did not describe examination with magnification of 50× or higher for fibers in or projecting from skin.56,58–60,62–67,70,73 Other studies mentioned that the skin was completely normal and that no skin abnormalities were present; therefore, it is very unlikely that patients in these studies actually had MD, as they did not have the diagnostic clinical finding.55,61,65,71,75

There are only three case studies that specifically mention the presence of fibers either projecting from or embedded in skin.57,72,75 Roncati et al72 reported “grayish spots” under skin, then used scanning electron microscopy (SEM) and energy-dispersive spectroscopy (EDS) to study the spots. SEM showed that the spots were associated with fibers described as “synthetic wire” consistent with samples from a washing machine, as well as keratin fibers consistent with hair from the patient’s dog. The EDS analysis detected carbon, sulfur, and oxygen peaks – elements for keratin – but EDS could not reveal what type of keratin it was. Therefore, the “synthetic wire” could have been keratin filaments from the patient. The authors concluded that the keratin hairs were of canine origin, based on morphological resemblance to the patient’s dog hair, yet they provided no further proof of this conclusion. As some MD fibers are small hairs, determining whether the hairs are human or canine in origin is important. SEM shows only the outer shape of a specimen, so the scaling pattern is the only morphological feature available for comparison, and the imbricate scaling of canine and human hair is quite similar (TA Evans, TRI Princeton, personal communication, September 13, 2017). EDS analysis can only tell the chemical composition of the specimen and again, human and canine hair would be similar.77

Ohn et al saw only one black fiber protruding from the skin, and then claimed that this single fiber was lost during processing for histological examination.75 Therefore, one cannot draw any conclusions about the composition or origin of this fiber. Dovigi provided convincing evidence that the fibers extracted from an oral lesion on the mucosal distal tuberosity of a tooth were synthetic carbon-based fibers, but there is no evidence that the fibers were self-implanted.57 Dental floss is composed of synthetic fibers, such as nylon.78 Fibers could have been introduced during flossing, especially if the floss had frayed and become lodged between teeth, eventually festering and causing a lesion. Belief that the fibers had originated in the tissue would be reasonable under those circumstances.

The case studies varied in terms of looking for pathogens, but on further examination all of the studies fall short in looking for spirochetal infection. Only two of the case studies looked for Borrelia infection, and neither of these performed a thorough laboratory analysis to search for spirochetes.72,75 The description of testing for Borrelia in these studies is not sufficiently detailed to know what was actually done. In science, reproducibility is important, and methodologies should provide enough details that others can repeat them. Roncati et al stated: “In adjunct, the patient had noticed an increase in the viscosity of mucus, saliva, and tears, as to produce four unexplainable corneal ulcers in the last two years, without a rise in the autoimmunity or Borrelia spp. serology”.72 There is no mention of whether or not the Borrelia spp. serology was interpreted as being positive or negative, what species or type of Borrelia antigens were used, what laboratory the serology was performed at, or what method was used to detect the antibodies. Furthermore, although the patient had a few gray spots containing fibers, there was no evidence they were self-implanted or related to a delusional belief. Therefore, the study cannot disprove an infectious etiology for MD.

The study by Ohn et al is no better in terms of providing methodology.75 In fact, the methodology in the abstract does not match the text. While the abstract states that polymerase chain reaction (PCR) testing for Bb was negative in serum, the text states that Bb serology was negative. It is thus unclear whether serology or PCR testing was used to diagnose Bb.75 There is mention that a Warthin–Starry stain was performed, and histological examination revealed only a mild lymphocytic infiltration. However, because Bb is pleomorphic, such stains can be difficult to interpret, and mild lymphocytic infiltration is precisely what one would expect in Bb skin lesions, such as erythema migrans (EM) rash sites.79 Studies that do mention the search for and identification of pathogens other than Borrelia spp. are sadly lacking. The methodology in the study by Altunay et al mentioned “laboratory investigations including routine biochemical analyses of the blood and urine, cutaneous biopsy, the microscobic [sic] analysis of so-called parasites or materials emerging from the skin”.66 DeBonis and Pierre described their microbiological methodology as “Evaluation by a primary care physician revealed no signs of infection”.61

Many studies included cases that did not meet the DSM-V criterion for delusional disorder. Some studies featured patients who were clearly delusional and had or likely had serious underlying psychiatric illnesses, such as schizophrenia.62,66 Some described conditions that clearly indicated the patient had disease affecting the central nervous system: Roncati et al indicated the patient in their case study had “myoclonies” [sic], which presumably means seizures or muscle twitches; one patient in the study by Fellner et al had senile dementia; and the patient in the report of Freudenreich et al had HIV infection.58,67,72 Some studies included cases where so-called delusional disorders could have had cultural influences.55,66 Some studies mentioned underlying medical conditions that may have caused psychiatric disturbance. In the study by Altunay et al, five patients had vitamin B12 deficiency and one had thyroid disease in addition to vitamin B12 deficiency.66 In the study by Reid and Lio, one patient had diabetes mellitus.60 Patients in other studies were using psychoactive drugs.56,61,62,67,70 The patient in the case study by Roncati et al had hepatitis C virus infection.72

A few case studies claimed that treatment with antipsychotic medication was curative.55,59,60,66 In contrast, many more case studies indicated that treatment with antipsychotic drugs reduced symptoms but was not curative55,58,61,66,70,71 or that antipsychotics were ineffective.62,63,65 In fact, Robles et al suggested that treatment with antibiotics was more successful than treatment with antipsychotics, although they too concluded that MD was delusional rather than infectious. They reported that treatment of two patients with doxycycline and no antipsychotics resulted in complete resolution of the condition, while one subject treated with antipsychotics and no antibiotics did not have disease resolution.65 Some studies indicated that antipsychotic drugs were prescribed, but failed to report if treatment was effective,54,55,64,75 and Roncati et al failed to report what (if any) treatment was prescribed.72 Some of the studies reporting cure or benefit with antipsychotic drugs used other treatment methods in addition to the antipsychotic medication, and without controls one cannot be sure which variable was responsible for the patient’s improvement.55,62,66,67,73

There were only five reports of studies involving larger cohorts of patients.33,68,69,74,76 Four of these were retrospective studies,68,69,74,76 and the remaining study selected its cohort by conducting a retrospective search through medical records.33 Retrospective studies are limited, because data may be incomplete and cases may lack laboratory analysis or proper documentation. The retrospective study by Mohandas et al74 included 35 patients and made no mention of the presence of fibers. The study reported female predominance, with a mean age of 54.6 years. Psychiatric comorbidities (anxiety and depression) were noted in 68.5%, and management of patients included treatment with psychotropic medications combined with topical and oral antibiotics. Improvement was reported in less than half of the cohort (40%), and all four patients who received low-dose oral antibiotic therapy noted improvement.74 The study by Hylwa et al from the Mayo Clinic was a retrospective study of psychiatric comorbidity in a cohort of 54 patients diagnosed with DI. Comorbidities were found in 74% of these patients, and there was no mention of fiber or pathogen detection in the retrospective report.69

Foster et al also conducted a retrospective study of DI at the Mayo Clinic.68 Medical records of 147 patients were reviewed to determine demographic information, historical and physical findings, and treatment. In this cohort, 81% had a history of one or more psychiatric illnesses (the most common diagnosis being depression), 11% had a history of drug use (methamphetamines, cocaine, heroin, marijuana, and other street drugs) that may have contributed to their symptoms, and only 20% of subjects reported having fibers in their skin, and thus the cohort was composed predominantly of non-MD subjects. The study lacked fiber analysis, and there was no mention that any skin-associated fibers had been visualized by the investigators, so it is possible that there were no subjects in the study meeting the key diagnostic MD criterion. Methodology for detecting any pathogens was lacking, and there was no mention of detection of Borrelia or other tick-borne pathogens at all. Nevertheless, the authors stated that they did not find evidence of infestation in patient-provided specimens, biopsies, or tests for ova and parasites.68

The CDC–Kaiser Permanente Northern California–Armed Forces Institute of Pathology collaborative study (CDC study) selected their cohort via a retrospective search through medical records.33 This study had significant flaws. The case definition did not require the presence of fibers embedded in or projecting from skin; therefore, selection was on the basis of self-reported cases, and resulted in a heterogeneous group of subjects. Eligibility to participate in the study was limited to those enrolled in a Kaiser Permanente plan. The number of participants diminished as the study progressed: whereas 467 subjects were identified by a search of Kaiser Permanente electronic records, cultures for pathogens were conducted on only 28 subjects, and fibers were collected from only 12 subjects.33 Fiber analysis was performed and cotton-textile fibers identified, but the authors admitted they did not find fibers that were embedded or projecting from skin, and they admitted that they may have introduced cotton fibers at the time of sampling. Two of the subjects identified in the electronic search died, and the cause of death was not disclosed.

Objective findings of illness that could have accounted for the symptoms were ignored: cognitive impairment, somatic complaints, neuropsychiatric symptoms, multiorgan symptoms, and the presence of inflammatory markers.33,80 Cases with these findings do not meet the DSM-V criteria for delusional disorder. Most importantly, although the authors acknowledged that the literature had suggested an association between MD and LD, they did not perform any specific detection methods, such as Borrelia culture or immunohistochemical staining, for any Borrelia spp., and the search for LD was limited to insensitive serologic testing. In conclusion, they used a flawed case definition, selected the wrong cohort, selected the wrong specimens, performed the wrong tests, and came to incorrect conclusions with respect to MD and the association with LD.33,80

Evidence of an infectious etiology

Early history

In modern times, spirochetal infection was implicated as an etiologic factor for MD as early as 2006, when William Harvey, a former medical director of a laboratory contracted to work for NASA, explained to a medical reporter, Chico Harlan with the Pittsburgh Post-Gazette, that he had been studying a group of 70 MD patients, all of whom were infected with Bb, the causative agent of LD.32 Savely et al in 2006 reported that the principal author, nurse practitioner Virginia Savely, had seen 80 patients in her practice who fit the criteria for MD, and all but one of these patients had tested positive for LD.2

A subsequent study by Harvey et al attempted to delineate MD characteristics in a cohort of 25 self-diagnosed MD patients.81 Although these patients apparently met the case definition for DP, the authors felt the cause and effect of the symptoms were reversed from those of DP, and they suggested that an infectious process was responsible for the development of symptoms. They reported that the male:female ratio was approximately equal, that 23 of 25 subjects had prior psychiatric diagnoses, around 50% had sensations of movement, 70% had excoriations or lesions, and that fibers were present in about a third of patients.81 Central nervous system symptoms, cardiac symptoms, endocrine dysfunction (hyperparathyroidism, adrenocortical hypofunction, Hashimoto’s thyroiditis, hypercalcemia, elevated fasting insulin levels, and parathyroid adenomas), a high rate of autoimmune disease, and low core body temperature were commonly encountered in their cohort. Laboratory evidence of abnormalities that were commonly encountered included anemia, leukopenia, high monocyte count, low natural-killer cells, elevated serum calcium, elevated globulin levels, and elevated inflammatory markers (CRP, TNFα, IFNγ). Skin abnormalities included excoriations, angiomas, and filament/granule production. The need for a credible MD case definition was emphasized.81

Savely and Stricker analyzed clinical findings in a cohort of 122 subjects with documented presence of unusual filaments projecting from or embedded in skin.4 The key objective of this study was to develop a credible case definition for MD, and because cutaneous fibers were the unique objective finding, the presence of such fibers was determined to be an obligatory part of the case definition. The link between MD and LD was explored, and the study reported that 96.8% of subjects had either positive LD tests by Western blot or clinical diagnoses of LD; many had positive tests for coinfecting tick-borne illnesses, and the demographics of the LD patients and MD patients in their practices proved to be similar. Other important findings in the cohort group were female predominance and hypothyroidism.4

Middelveen and Stricker provided evidence of spirochetal involvement in the evolution of MD.6 MD was compared to bovine digital dermatitis (BDD), a disease in cattle caused by various species of treponemes. Several similarities between MD and BDD were noted, including unusual filament formation, female predominance, rapid spread, exposure to unsanitary conditions or humid environments, and positive response to antibiotics. The fact that spirochetes caused unusual filament formation in cattle suggested that a similar mechanism might occur in MD patients. The fact that spirochetes were visible in BDD histological sections suggested that spirochetes might be present in MD tissue as well.6

Fiber analysis

Histological studies have shown that filaments in MD tissue are not textile fibers, but are biofilaments produced by human epithelial cells and stemming from deeper epidermal layers, upper dermal layers, and the root sheath of hair follicles (Figure 1).7,82,83 MD cutaneous filaments are predominantly composed of keratin and collagen, as determined by histological studies, and appear to be produced by activated keratinocytes and fibroblasts.82,83 The base of filament attachment to epithelial cells demonstrates nucleation that is continuous with that of surrounding epithelial cells, indicating that the filaments are of human cellular origin (Figure 2).83 Histochemical staining of skin sections containing embedded filaments with Congo red resulted in apple-green birefringence suggestive of an amyloid component, although this remains to be confirmed using more specific methodologies.7 Calcofluor-white staining of skin sections with embedded filaments was negative, and thus MD filaments do not have any cellulose content from plant fibers, such as cotton, or chitin from fungal cells or insect exoskeletons.7

Figure 1
Embedded cutaneous blue and white filaments.

Figure 2
Longitudinal sections of filaments originating in the basal layer of the epidermis adjacent to the dermis; magnification 400×.
Several independent studies have shown that blue MD fibers were human hairs or hairlike extrusions and that blue coloration resulted from melanin pigmentation (Figure 3). Blue textile fibers are colored by dyes, not by blue melanin pigmentation; therefore, it is not possible that blue MD fibers are textile in origin. MD filaments are hairlike extrusions, and some MD fibers are very fine human hairs.7,82,83 The coloration of blue fibers was shown to result from melanin pigmentation, which was demonstrated by positive histochemical staining with Fontana Masson. A confirmatory study performed at a laboratory specializing in biofibers and coloration established that embedded blue fibers in MD dermatological specimens were human hairs.

Figure 3
Filaments remaining embedded in deeper layers of skin after removal of a callus; magnification 100×.
SEM of blue MD fibers shows cuticular scaling consistent with human hairs, and transmission electron microscopy shows darkly stained, disorganized melanosomes consistent with human hairs.7,83 Microspectrophotometry reflectance of blue fibers is consistent with that of pigmented tissues, and Raman spectroscopy results in relevant peaks corresponding to carbamate compounds and melanin aromatic rings (MD Shawkey, University of Akron, personal communication, 2013).7 An investigation concluded that fibers were not self-implanted, due to the fact that they were deeply embedded in skin in a manner that a patient would not be able to achieve (MD Shawkey, University of Akron, personal communication, 2013).

Other MD findings

If MD specimens are examined, they demonstrate evidence of abnormal keratin and collagen expression. In addition to the formation of abnormal cutaneous fibers, many patients report changes to hair and fingernails.82 Deformed follicular bulbs, pili multigemini (formation of multiple hair shafts within individual follicles), filamentous projections from the follicular sheath surrounding hair bulbs, and the formation of thickened keratin projections are common findings.82,83 The authors of this paper have had the opportunity to examine many MD lesions and MD dermatological specimens (Fesler, Middelveen, and Stricker, unpublished data, 2017). We have noted that MD lesions can begin as folliculitis that evolves into ulcerative filamentous lesions, with further evidence of keratin and collagen abnormalities, such as formation of keratin projections, formation of hardened comedo-like masses, and deformities of hairs and hair follicles, as mentioned previously.

Keratin projections are thickened follicular casts. When sectioned and stained with Gömöri trichrome, these follicular casts are abnormal in that although the outer surface is composed of keratin-rich tissue, the interior can contain collagen-rich tissue. Comedo-like masses can emerge from pores spontaneously or when scratched, and are sometimes described by patients as being sand-like. Patients may misinterpret these objects as being seeds, eggs, cocoons, parasites, or even arthropods. These comedo-like masses can contain embedded keratin or collagen filaments and/or projecting filaments. When they form inside a pore or follicle, they may form a tight wad of fibers (Figure 4A). Hair and follicular bulb deformities include pili multigemini (mentioned previously) (Figure 4B), hairs or fibers growing downward deep into the dermis rather than in the opposite direction through the pore opening, and follicular sheaths with filamentous projections. These projections can completely cover the follicular sheath, and may be interpreted as caterpillars by patients.

Figure 4
(A) A filamentous follicular cast. White filaments originating on the outer follicular sheath are growing in a coiled manner. Magnification 50×. (B) Pili multigemini, a common finding in Morgellons disease patients, with multiple hairs forming …
Contaminating extraneous artifacts can complicate identification of legitimate dermatological findings in MD. We have found pollen, noninfesting arthropods, feathers, and mites in patient-supplied specimens. Some patients have described the production of “fuzzballs”. We performed histological sectioning and staining with Gömöri trichrome on such artifacts and determined the “fuzzballs” in patient-supplied samples that we studied were largely composed of textile fibers, but did have some keratin fibers or keratinized tissue present as well. We speculate that such artifacts may include keratin-containing material related to MD, but that textile fibers can attach to sticky exudate or can tangle into filamentous lesions. Other patients have described hexagonal crystals and “glitter” in MD skin. Spectroscopic analysis of the hexagonal crystals proved that they were contaminating man-made hexagonal objects (of the type used in cosmetics and greeting cards) with either cellulose or plastic centers and a metallic coating (V Loyd, Mount Allison University, personal communication, 2017). The “glitter” that we studied contained salts that were likely human bioproducts, and may have a role in MD (unpublished data). As extraneous artifacts can contaminate sticky lesions, it is important to collect only fibers deeply embedded in skin or clearly projecting in a hair-like manner for studies intended to determine fiber composition.

As mentioned earlier in the report, cattle with BDD form lesions that produce unusual keratin projections. Although visually different from the small slender filaments in MD lesions, we have also observed slender fibers in BDD specimens that strongly resemble the fibers in human MD (Figure 5) (unpublished observation).

Figure 5
(A) Thickened keratinized follicular casts in a Morgellons disease specimen that grew inward into the dermis. Note the clear inward-growing hair. Magnification 100×. (B) Specimen from a bovine digital dermatitis lesion with similarities to human …
Detection of pathogens

Early on in MD history, a link between MD and LD was reported.1–7 Savely and Stricker reported that 96.8% of their cohort of 122 MD patients had either positive LD serology or an LD diagnosis.4 A more recent study reported that 6% of LD patients in a cohort of Australian LD subjects had MD,84 and Borrelia spirochetes have repeatedly been detected in skin and bodily fluid specimens from MD subjects. Preliminary studies reported that Bb sensu stricto (Bbss) spirochetes were detected in dermatological tissue removed from MD lesions of four North American patients,83,85 and an ensuing study reported the detection of Borrelia garinii in MD samples from an Australian patient.86

A larger study was needed to verify the association between Borrelia infection and MD. Consequently, a study of 25 North American MD patients confirmed the presence of Borrelia spirochetes in MD-tissue and body-fluid specimens, both directly in dermatological specimens and in cultures obtained from MD patients using microscopic, histopathological, and molecular detection methods.87 This study provided evidence for the presence of Borrelia DNA in MD specimens by PCR followed by DNA sequencing performed by two independent laboratories. PCR technology amplified Borrelia DNA in 13 MD whole-callus specimens (nine sequenced), four cultures inoculated with dermatological tissue (one sequenced), eight blood cultures (two sequenced), two vaginal secretion cultures (both sequenced), and one intestinal specimen. The Borrelia spirochetes detected in these studies were identified primarily as Bbss, but B. garinii and B. miyamotoi were also reported.87

The fact that motile spirochetes identified as Borrelia spp. were detected in Barbour–Stoenner–Kelly H medium inoculated with MD dermatological tissue proves that spirochetes present in MD tissue are viable.85,87 Identification of Borrelia spirochetes in cultures is complicated by fastidious growth requirements and pleomorphism,88,89 but PCR amplification of cultured spirochetes in these studies provided confirmatory molecular identification of live Borrelia spirochetes in specimens from MD subjects.87 Four laboratories independently confirmed the presence of Borrelia DNA in MD specimens using PCR technology and confirmatory DNA sequencing.7 Recently, independent researchers from Canada using PCR technology and confirmatory DNA sequencing have detected Borrelia DNA in cultures inoculated with specimens from MD patients (J Lewis, V Lloyd, Mount Allison University, personal communication, 2017). Therefore, five laboratories using PCR technology have now provided confirmation of Borrelia DNA in MD specimens, including four species of Borrelia: Bbss, B. garinii, B. hermsii, and B. miyamotoi7,90,91(J Lewis, V Lloyd, Mount Allison University, personal communication, 2017). The detection of Borrelia spirochetes is reproducible, providing that correct methods of detection are employed (Figure 6).

Figure 6
Single spirochete from a Morgellons disease skin specimen immunostained for detection of Borrelia. Magnification 1,000×.
Borrelia spirochetes can invade and replicate inside fibroblasts and keratinocytes,92–94 and have been isolated in vitro from monolayers of keratinocytes and fibroblasts despite antibiotic treatment.92,93 Sequestration in these cells may be a contributing factor in the development of refractory infection in MD patients. In support of that hypothesis, Borrelia spirochetes were detected in MD skin specimens removed from patients treated with aggressive antibiotic therapy.87 Hypothetically, intracellular infection of keratinocytes and fibroblasts would be able to alter keratin and collagen gene expression, respectively, resulting in unusual filament formation.7 Some patients report that gel was secreted from their skin. We sectioned these dried-gel secretions, and immunostaining targeted to Borrelia was positive and demonstrated a copious quantity of well-formed spirochetes embedded in a clear matrix. This finding is consistent with biofilm formation (unpublished data). The spirochetal load in MD specimens is high and suggests biofilm formation in vivo.85,87 The formation of biofilms may also contribute to the severity of the dermopathy and antibiotic resistance.

The key etiologic factor contributing to the evolution of MD lesions seems to be infection with Borrelia spp., the pathogen most consistently detected in MD patients. However, we speculate that the etiology of MD is multifactorial. Factors such as genetic predisposition, endocrine influences, immune status, and the presence of other infections, particularly tick-borne coinfections, appear to play a role in the development of this phenomenon.1–7 Pathogens other than Borrelia spp. have been detected in MD tissue samples, including Helicobacter pylori, Treponema denticola, and Bartonella henselae.87,90,91,95 Preliminary genetic studies have demonstrated nine genes with significant sequence variation in MD patients (E Sapi, University of New Haven, unpublished observation, 2017). Examination of genetic factors that contribute to MD is currently in progress.

Recently, MD-like filamentous dermatitis was described in domestic dogs, and Bbss was detected by PCR amplification confirmed by DNA sequencing, thus providing evidence that MD-like filamentous dermatitis may be associated with LD in these dogs.96 Interestingly, many of these dogs were bulldogs or other breeds with color-dilution genes, thus suggesting that genetics may predispose certain breeds of dogs infected with Borrelia to develop this skin condition. Many of the owners of these pets had no prior knowledge of MD, and thus these were not cases of delusion by proxy.96 The fact that a condition analogous to MD in humans can occur in dogs and a similar animal model of spirochetal infection associated with filament formation – BDD – occurs in cattle provides supportive evidence that MD is an infectious process.

Antibiotic treatment of MD

Although there is anecdotal evidence that MD responds to antibiotics,1–7 controlled studies of MD treatment with antibiotics have not been conducted. Optimal treatment for MD remains undetermined. Two of the authors report success in treating LD/MD patients with antibiotics. In general, early treatment contributes to a better patient outcome. Treatment aimed at the underlying tick-borne disease is essential to resolve MD dermopathy, and treatment may require both prolonged combination-antibiotic therapy and the identification and treatment of any coinfecting tick-borne diseases or other exacerbating factors. Some patients benefit from antiparasitic therapy, although there appears to be no direct evidence of parasite infection in MD.

Clinical classification of MD

A clinical classification scheme has been proposed for MD:

early localized: lesions/fibers present for less than 3 months and localized to one area of the body (head, trunk, extremities)

early disseminated: lesions/fibers present for less than 3 months and involving more than one area of the body (head, trunk, extremities)

late localized: lesions/fibers present for more than 6 months and localized to one area of the body (head, trunk, extremities)

late disseminated: lesions/fibers present for more than 6 months and involving more than one area of the body (head, trunk, extremities).

This classification scheme centers on the duration and location of MD lesions with the intent to validate and standardize the diagnosis of MD.7,87

Discussion

The diagnosis of Delusional disorder 297.1 (F22), somatic type, as described in the DSM-V, requires clinical judgment, as the delusional belief should not be better explained by another mental disorder, be caused by the effects of a substance or medication, nor caused by other medical conditions, such as infection. Many of the case studies cited in this paper mentioning MD concern patients who have medical conditions such as diabetes, vitamin B12 deficiency, substance-abuse problems, and infections that could be implicated in the development of their symptoms, and diagnosing such patients with delusional disorder is contrary to DSM-V principles. The diagnosis of a delusional disorder is best made by a professional with mental health training, such as a psychiatrist. Single, isolated delusions are quite rare, and truly delusional patients have evidence of other delusions, not just DOP.

There is significant overlap in the array of symptoms that may accompany LD, MD, and mental illness, thus complicating the diagnosis. In theory, patients who do not have MD but who are delusional could think they have MD if they have had exposure to the topic through the Internet or other means.7,87 To complicate the diagnosis further, MD patients may exhibit neuropsychiatric symptoms, and many have psychiatric diagnoses, such as bipolar disorder, attention-deficit disorder, obsessive compulsive disorder, and schizophrenia.1,7,81 Therefore, many MD patients may have psychiatric comorbidities, and in some cases, patients have been misdiagnosed with a psychiatric illness that they do not have.7 Some MD patients may have false beliefs that are not delusional in origin. Lack of scientific knowledge can cause patients to misinterpret symptoms, such as the presence of filaments and sensations of formication as worms, arthropods, or other infestations. In addition, MD lesions are sticky and arthropods or artifacts can adhere to exudate, and patients may incorrectly believe these external factors are associated with the dermopathy.7,87

A patient who (because of symptom misinterpretation or lack of scientific knowledge) believes he or she has a parasitic infestation should not be diagnosed with delusional mental illness. It is logical for a patient to speculate that a complex of symptoms, including abnormal skin fibers coupled with formication, could be caused by a parasite. Furthermore, patients with MD are not always aware that they have filaments, because magnification is needed to visualize the filaments and many are diagnosed with other conditions, such as lichen sclerosus or prurigo nodularis, which lack filament formation.7,87 In addition, systemic LD is commonly associated with dermatological conditions and neurological symptoms, such as paresthesias.7,87,97,98 As such, multiorgan MD symptoms overlap with LD because MD is associated with LD, and this dermatological and neurological symptom overlap may partly explain the odd movement or stinging sensations that MD patients experience.

The DSM-V does not mention DOP, DI, or DP. In the case of Delusional disorder 297.1 (F22), delusions are not the beliefs themselves, but the way they are interpreted by patients. Delusions are profound, intensely held beliefs that seem barely swayed by evidence to the contrary, even to the point of believing in the bizarre.34–36 In contrast, the presence of human biofibers embedded in skin of MD patients is factual: the patients are not hallucinating imaginary fibers, and they are not implanting textile fibers or hallucinating an imaginary infestation. MD is not a case of fixed belief despite lack of medical evidence, because if fibers are present and they are visible under magnification, then there is medical evidence. MD fibers projecting from and embedded in skin may have elaborate configurations with branching, and the filaments may have tapered ends. Even skilled microsurgeons could not implant the fibers in that configuration.

The evidence is present in patients who have MD, but in order to be recognized, a physician must be willing to look. If patients meet the case definition for MD with visible skin fibers and do not believe they are infested, these patients do not meet the criteria for a diagnosis of Delusional disorder 297.1, somatic type, as described in the DSM-V. Creeping and crawling sensations unaccompanied by delusions of infestation are not enough to give a patient a diagnosis of delusional disorder. These sensations are consistent with the well-recognized symptom of formication that occurs with peripheral neuropathy and is associated with many medical conditions, such as diabetes, chronic infections, menopause, skin cancer, and multiple sclerosis, and exposure to various chemical substances, such as toxins, certain medications, alcohol, or recreational drugs. It is contrary to proper psychiatric diagnosis to label a patient as having a delusional mental illness based solely on a complaint of formication.

LD and associated tick-borne diseases may be accompanied by mental illness.99–101 Chronic progressive neurodegenerative diseases can be caused by infection and resulting prolonged inflammation.101,102 The spectrum of mental illnesses associated with LD varies in severity, and includes anxiety, depression, paranoia, schizophrenia, bipolar disorder, sensory hallucinations, and homicidal tendencies.101,103 Some of these neuropsychiatric conditions involve a delusional component. Delusions resulting from infectious processes do not meet the DSM-V criteria for delusional disorder. Furthermore, the presence of psychiatric comorbidities is not proof that a patient is delusional. Some patients have a component of posttraumatic stress disorder and are hypervigilant and overreactive to physical symptoms, rather than being delusional. If a health care provider cannot tell the difference between a hypervigilant patient and a delusional patient, the provider is not qualified to diagnose delusional disorder.

The presentation of specimens or pictorial evidence to a doctor is not an indication of delusional disorder or mental illness. This action was never included as an indication of delusional disorder in the DSM-V. Likewise, the fact that a patient with beliefs of infestation accompanied by movement sensation has psychiatric comorbidities69,74 is not proof of delusional disorder and is contrary to the recommended practices of the DSM-V.80 In most of the case studies that equate MD with DOP, DP, or DI, patient-supplied evidence was dismissed, evidence of disease (physical and laboratory) was dismissed, fibers were identified as being textile in origin based solely on visual examination, physicians were unwilling to examine skin at sufficient magnification to see microscopic fibers, and all too quickly patients were diagnosed as being delusional in a manner that is contrary to the DSM-V approach to psychiatric diagnosis.

The bar set for burden of proof is higher for those proposing an infectious etiology than for those proposing that MD is delusional. Many of the papers reviewed in this analysis relied solely on visual identification for “textile fibers”. Others did not select the correct patients to study (ie, patients with documented embedded or projecting cutaneous filaments) or did not collect the correct specimens, collecting instead superficial artifacts, including some that might have been introduced at the time of sampling. The analysis of MD fibers requires that the patient meets the case definition with the key diagnostic criterion of having colored, white, or black filaments protruding from or embedded in skin, and the correct specimens must be collected.

Fibers that are embedded in deeper layers of skin or that are firmly attached, originating underneath the stratum corneum and projecting either outward to the surface or inward into the dermis, are the only specimens that are suitable for fiber analysis. Most often, MD fibers are present as inclusions in callus material that resembles scabs. These can be removed for analysis by a health care practitioner, or in rare cases patient-supplied specimens of calluses can contain fibers suitable for analysis, provided that calluses composed of skin and fibers are embedded throughout the specimen. Histological sectioning and staining to detect keratin and collagen can visually and chemically determine the keratin and collagen nature of these fibers.7,83

When diagnosing mental illness, it is imperative first to determine if there is an underlying cause of the psychiatric symptom, such as an infection. None of the case studies reviewed in this paper or the research studies involving larger cohorts of MD patients looked adequately for infections, in particular LD. Science has to be reproducible, and there has to be enough detail provided in the methodology description for the study to be replicated. This was not the case for detecting LD in many of the case studies. Borrelia spirochetes are readily detectable in MD tissue, but sensitive and specific methods are required.7,87 Although sensitive and specific direct-detection methods, such as antigen detection, culture of Borrelia spirochetes, and PCR detection of Borrelia DNA, exist, these methods are not standardized, and vary in sensitivity and specificity.104,105 They are not recommended by the CDC, which only endorses two-tier serological LD testing.7,87,106 Unfortunately, two-tier serological testing for LD, although specific for Bbss, lacks sensitivity and is little better than a coin toss in detecting LD.107,108

False negatives can occur when using two-tier testing for a number of reasons, including the fact that some patients with known LD are seronegative.107,109 In addition, there is significant genetic diversity in Borrelia spp. capable of causing LD and LD-like illnesses, but commercial two-tier testing is based on the antigens of one laboratory strain, and testing may not detect other Borrelia species.110–112 The fact that the CDC does not consider any direct detection method, not even culture, as being diagnostic for LD as proof of infection is unjustifiable. It should be noted that culture is considered to be the gold standard for detection of organisms by the American Society for Microbiology.113 The reluctance of the CDC to accept more sensitive testing methods for LD makes the evidence showing the association between LD and MD controversial.7,87 Those who maintain that MD is a form of DOP or DI and rely on the two-tier test for Borrelia detection claim that studies supporting an infectious etiology and an association with LD are flawed,72,75 yet these critics have not used adequate methodologies, and by failing to do so have not proved that methods for detecting Borrelia spp. used in more sophisticated studies are unreproducible or false.

Patients diagnosed with DOP in case studies are frequently prescribed antipsychotic medication with potentially serious side effects.30 These patients are often talked into taking antipsychotic medication by health care providers using deceptive unethical dialogue, which can compromise patient autonomy.41,43,50,54,60,114 Many published articles mentioning MD make claims that antipsychotic drugs are effective treatment for MD, but careful review of the literature suggests otherwise. Two systematic reviews concerning the use of these medications to treat DI, DOP, or DP cases conclude that treatment efficacy was unproven.115,116 In many of the case studies reviewed in this paper, authors claimed that antipsychotics were used to treat MD cases, yet the patients received treatment in addition to antipsychotic drugs, including antibiotics, wound dressings, antiseptics, and antipruritic drugs.59,65,66 Therefore, it is not certain which treatments were providing benefit, as the studies were uncontrolled. In fact, one study reported complete remission using antibiotics and not with antipsychotics.65

Antipsychotic medications can have off-label effects, such as reduced growth of parasites and anti-pruritic properties.117 Evidence showing an association between antipsychotic treatment in DI, DOP, or DP patients and resolution of symptoms or benefit is very limited and is more limited in MD cases. There has been only one randomized, double-blind, placebo-controlled study that evaluated the effectiveness of the antipsychotic drug pimozide.118 This study of a small cohort of eleven DI patients reported that pimozide was better than placebo at controlling formication, but was not better at controlling delusions of vermin infestation or excoriation.118 One study of 14 DI/DOP/DP patients reported that although seven patients remained in remission 19–48 months after pimozide treatment, four patients had no response to this antipsychotic medication.119 The variation seen in reported effectiveness in this study and the various studies reviewed here may have arisen from the fact that patients diagnosed with DI are a heterogeneous group of individuals, some of whom are truly delusional and some of whom are not.

Recent studies using advanced brain magnetic resonance imaging (MRI) technology have found that patients diagnosed with DI have significant gray-matter changes that differ from findings in both patients with nonsomatic delusions and healthy controls.120–122 These MRI abnormalities involve altered cortical thickness and surface area in various parts of the brain, indicating that selective delusional symptoms in patients may be based on specific somatic brain alterations. It is tempting to speculate that these brain alterations are related to spirochetal infection in MD, either via direct brain invasion or an inflammatory response in genetically susceptible individuals.123,124 The intriguing link between spirochetal infection and brain pathology detected by advanced imaging methods merits further study.

Conclusion

The history of MD has taught us that scientific evidence must be carefully considered before a disease is written off as a purely psychiatric disorder. Delusional disorder is a diagnosis of exclusion that requires clinical judgment, and all underlying causes for delusional symptoms need to be ruled out before jumping to erroneous conclusions. Medical practitioners continue to consider MD a delusional disorder, although studies have shown that MD is strongly associated with spirochetal infection. According to the best-available scientific evidence, MD should be considered a dermopathy associated with tick-borne disease. Further study of the genetics, pathogenesis, and treatment of MD is warranted.

Acknowledgments

The authors thank Jesus Walker-Salas, Diana Canchola and Jeannie Ramos for technical assistance. This work was supported in part by a grant from the Lindorf Family Foundation, Newark, OH.

Footnotes

Disclosure

The authors report no conflicts of interest in this work.

Article information

Clin Cosmet Investig Dermatol. 2018; 11: 71–90.
Published online 2018 Feb 9. doi: 10.2147/CCID.S152343
PMCID: PMC5811176
PMID: 29467580
Marianne J Middelveen,1 Melissa C Fesler,2 and Raphael B Stricker2
1Atkins Veterinary Services, Calgary, AB, Canada
2Union Square Medical Associates, San Francisco, CA, USA
Corresponding author.
Correspondence: Raphael B Stricker, Union Square Medical Associates, 450 Sutter Street – suite 1504, San Francisco, CA 94108, USA, Tel +1 415 399 1035, Email moc.demamsu@rekcirtsr
Copyright © 2018 Middelveen et al. This work is published and licensed by Dove Medical Press Limited
The full terms of this license are available at https://www.dovepress.com/terms.php and incorporate the Creative Commons Attribution – Non Commercial (unported, v3.0) License (http://creativecommons.org/licenses/by-nc/3.0/). By accessing the work you hereby accept the Terms. Non-commercial uses of the work are permitted without any further permission from Dove Medical Press Limited, provided the work is properly attributed.
This article has been cited by other articles in PMC.
Articles from Clinical, Cosmetic and Investigational Dermatology are provided here courtesy of Dove Press
References

1. Savely G, Leitao MM. Skin lesions and crawling sensations: disease or delusion? Adv Nurse Pract. 2005;13(5):16–17. [PubMed] [Google Scholar]
2. Savely VR, Leitao MM, Stricker RB. The mystery of Morgellons disease: infection or delusion? Am J Clin Dermatol. 2006;7(1):1–5. [PubMed] [Google Scholar]
3. Savely VR, Stricker RB. Morgellons disease: the mystery unfolds. Expert Rev Dermatol. 2007;2(5):585–591. [Google Scholar]
4. Savely VR, Stricker RB. Morgellons disease: analysis of a population with clinically confirmed microscopic subcutaneous fibers of unknown etiology. Clin Cosmet Investig Dermatol. 2010;3:67–78. [PMC free article] [PubMed] [Google Scholar]
5. Leland DK. Touched by Lyme: threading your way through Morgellons disease. 2017. [Accessed September 9, 2017]. Available from: https://www.lymedisease.org/touched-lyme-threading-path-morgellons-disease.
6. Middelveen MJ, Stricker RB. Filament formation associated with spirochetal infection: a comparative approach to Morgellons disease. Clin Cosmet Investig Dermatol. 2011;4:167–177. [PMC free article] [PubMed] [Google Scholar]
7. Middelveen MJ, Stricker RB. Morgellons disease: a filamentous borrelial dermatitis. Int J Gen Med. 2016;9:349–354. [PMC free article] [PubMed] [Google Scholar]
8. Kellett CE. Sir Thomas Browne and the disease called Morgellons. Ann Med Hist. 1935;7:467–479. [Google Scholar]
9. Thibierge G. Les acaraphobes. J Prat Rev Gen Clin Ther. 1894;8:373–376. [Google Scholar]
10. Lee WR. The matchbox sign. Lancet. 1983;2(8347):457–458. [PubMed] [Google Scholar]
11. Wilson JW, Miller HE. Delusion of parasitosis (acarophobia) Arch Derm Syphilol. 1946;54:39–56. [PubMed] [Google Scholar]
12. Raecke J. Uber hypochondrie. Allg Z Psychiatr. 1902;59:319–410. [Google Scholar]
13. Grøn K. Les dermatophobies. Poster presented at: 6th meeting of the Nordic Dermatological Association; August 26–28, 1924; Helsinki, Finland. [Google Scholar]
14. MacNamara ED. Cutaneous and visual hallucinations. Lancet. 1928;214:807–808. [Google Scholar]
15. Eller JJ. Neurogenic and psychogenic disorders of the skin. Med J Rec. 1929;129:481–485. 554–559, 616–620, 675–679. [Google Scholar]
16. Schwarz H. Circumscripte hypochondrien. Monatsschr Psychiatr Neurol. 1929;72:150–164. [Google Scholar]
17. Mallet R, Male P. Délire cénesthesique. Ann Med Psychol (Paris) 1930;88:198–201. [Google Scholar]
18. Vié J. L’idée délirante d’anthropathie interne. Poster presented at: 39th Congress of Alienist Physicians and Neurologists of France; July 22–28, 1935; Brussels, Belgium. [Google Scholar]
19. Klauder JV. Psychogenic aspects of skin diseases. J Nerv Ment Dis. 1936;84(3):249–273. [Google Scholar]
20. Ekbom KA. Praeseniler dermat-zooenwahn. Acta Psychiatr Scand. 1938;13:227–259. [Google Scholar]
21. Kohl PK, Winzer I. The 100 years since discovery of Spirochaeta pallida. Hautarzt. 2005;56(2):112–115. [PubMed] [Google Scholar]
22. Bigger JW. The reliability of the Wassermann test as performed by different pathologists. J Hyg (Lond) 1921;20(4):383–389. [PMC free article] [PubMed] [Google Scholar]
23. Gilbert R. Standardization of the Wasserman test. Am J Public Health Nations Health. 1930;20(1):47–48. [PMC free article] [PubMed] [Google Scholar]
24. Kean WF, Toccio S, Kean M, Rainsford KD. The musculoskeletal abnormalities of the Similaun iceman (Ötzi): clues to chronic pain and possible treatments. Inflammopharmacology. 2013;21(1):11–20. [PMC free article] [PubMed] [Google Scholar]
25. Marshall WF, Telford SR, Rys PN, et al. Detection of Borrelia burgdorferi DNA in museum specimens of Peromyscus leucopus. J Infect Dis. 1994;170(4):1027–32. [PubMed] [Google Scholar]
26. Poinar G. Spirochete-like cells in a Dominican amber Amblyomma tick (Arachnida: Ixodidae) Hist Biol. 2015;27(5):565–570. [Google Scholar]
27. Emslie-Smith AH. Myiasis, fillan, and the morgellons. Br Med J. 1946;1:962. [PubMed] [Google Scholar]
28. Lyell A. Delusions of parasitosis. J Am Acad Dermatol. 1983;8(6):895–897. [PubMed] [Google Scholar]
29. Robles DT. Morgellons disease and the ‘tweezer sign’ Clin Exp Dermatol. 2008;33(6):793–794. [PubMed] [Google Scholar]
30. Freudenmann RW, Lepping P. Delusional infestation. Clin Microbiol Rev. 2009;22(4):690–732. [PMC free article] [PubMed] [Google Scholar]
31. Freudenmann RW, Kölle M, Schönfeldt-Lecuona C, Dieckmann S, Harth W, Lepping P. Delusional parasitosis and the matchbox sign revisited: the international perspective. Acta Derm Venereol. 2010;90(5):517–519. [PubMed] [Google Scholar]
32. Harlan C. Mom fights for answers on what’s wrong with her son. 2006. [Accessed August 4, 2017]. Available from: http://www.post-gazette.com/local/2006/07/23/Mom-fights-for-answers-on-what-s-wrong-with-her-son/stories/200607230221.
33. Pearson ML, Selby JV, Katz KA, et al. Clinical, epidemiologic, histopathologic and molecular features of an unexplained dermopathy. PLoS One. 2012;7(1):e29908. [PMC free article] [PubMed] [Google Scholar]
34. American Psychiatric Association . Diagnostic and Statistical Manual of Mental Disorders. 5th ed. St Louis: APA; 2016. [Google Scholar]
35. Manschreck TC. Delusional disorder: the recognition and management of paranoia. J Clin Psychiatry. 1996;57(Suppl 3):32–38. discussion 49. [PubMed] [Google Scholar]
36. Fennig S, Fochtmann LJ, Bromet EJ. Delusional and shared psychotic disorder. In: Sadock BJ, Sadock VA, editors. Kaplan and Sadock’s Comprehensive Textbook of Psychiatry. 8th ed. Philadelphia: LWW; 2005. pp. 1525–1533. [Google Scholar]
37. Bourgeois JA, Khan RA, Hilty DM. Delusional disorder. 2015. [Accessed September 4, 2017]. Available from: http://emedicine.medscape.com/article/292991-overview.
38. Koblenzer CS. Pimozide at least as safe and perhaps more effective than olanzapine for treatment of Morgellons disease. Arch Dermatol. 2006;142(10):1364. [PubMed] [Google Scholar]
39. Koblenzer CS. The challenge of Morgellons disease. J Am Acad Dermatol. 2006;55(5):920–922. [PubMed] [Google Scholar]
40. Waddell AG, Burke WA. Morgellons disease? J Am Acad Dermatol. 2006;55(5):914–915. [PubMed] [Google Scholar]
41. Accordino RE, Engler D, Ginsburg IH, Koo J. Morgellons disease? Dermatol Ther. 2008;21(1):8–12. [PubMed] [Google Scholar]
42. Molyneux J. AKA ‘Morgellons’ Am J Nurs. 2008;108(5):25–26. [PubMed] [Google Scholar]
43. Robles DT, Romm S, Combs H, Olson J, Kirby P. Delusional disorders in dermatology: a brief review. Dermatol Online J. 2008;14(6):2. [PubMed] [Google Scholar]
44. Lustig A, Mackay S, Strauss J. Morgellons disease as Internet meme. Psychosomatics. 2009;50(1):90. [PubMed] [Google Scholar]
45. Wildner M. Do they understand Morgellons disease? Gesundheitswesen. 2009;71(12):795–796. German. [PubMed] [Google Scholar]
46. Fair B. Morgellons: contested illness, diagnostic compromise and medicalisation. Sociol Health Illn. 2010;32(4):597–612. [PubMed] [Google Scholar]
47. Halvorson CR. An approach to the evaluation of delusional infestation. Cutis. 2012;90(4):E1–E4. [PubMed] [Google Scholar]
48. Schmidt E, Levitt J. Dermatologic infestations. Int J Dermatol. 2012;51(2):131–141. [PubMed] [Google Scholar]
49. Misery L. Morgellons syndrome: a disease transmitted via the media. Ann Dermatol Venereol. 2013;140(1):59–62. [PubMed] [Google Scholar]
50. Tey HL, Wallengren J, Yosipovitch G. Psychosomatic factors in pruritus. Clin Dermatol. 2013;31(1):31–40. [PMC free article] [PubMed] [Google Scholar]
51. Wong JW, Koo JY. Delusions of parasitosis. Indian J Dermatol. 2013;58(1):49–52. [PMC free article] [PubMed] [Google Scholar]
52. Vulink NC. Delusional infestation: state of the art. Acta Derm Venereol. 2016;96(217):58–63. [PubMed] [Google Scholar]
53. Ferreira BR, Roccia MG, Cardoso JC, et al. History of Morgellons disease: the same name for different psychodermatologic diseases? Wien Med Wochenschr. 2017;167(Suppl 1):49–51. [PubMed] [Google Scholar]
54. Murase JE, Wu JJ, Koo J. Morgellons disease: a rapport-enhancing term for delusions of parasitosis. J Am Acad Dermatol. 2006;55(5):913–4. [PubMed] [Google Scholar]
55. Bhandary SK, Peter R, Bhat S. Delusional parasitosis in ENT. Indian J Otolaryngol Head Neck Surg. 2008;60(4):387–9. [PMC free article] [PubMed] [Google Scholar]
56. Vila-Rodriguez F, Macewan BG. Delusional parasitosis facilitated by web-based dissemination. Am J Psychiatry. 2008;165(12):1612. [PubMed] [Google Scholar]
57. Dovigi AJ. Intraoral Morgellons disease or delusional parasitosis: a first case report. Am J Dermatopathol. 2010;32(6):603–605. [PubMed] [Google Scholar]
58. Freudenreich O, Kontos N, Tranulis C, Cather C. Morgellons disease, or antipsychotic-responsive delusional parasitosis, in an HIV patient: beliefs in the age of the Internet. Psychosomatics. 2010;51(6):453–457. [PubMed] [Google Scholar]
59. Harth W, Hermes B, Freudenmann RW. Morgellons in dermatology. J Dtsch Dermatol Ges. 2010;8(4):234–242. [PubMed] [Google Scholar]
60. Reid EE, Lio PA. Successful treatment of Morgellons disease with pimozide therapy. Arch Dermatol. 2010;146(10):1191–1193. [PubMed] [Google Scholar]
61. DeBonis K, Pierre JM. Psychosis, ivermectin toxicity, and “Morgellons disease” Psychosomatics. 2011;52(3):295–296. [PubMed] [Google Scholar]
62. Dewan P, Miller J, Musters C, Taylor RE, Bewley AP. Delusional infestation with unusual pathogens: a report of three cases. Clin Exp Dermatol. 2011;36(7):745–748. [PubMed] [Google Scholar]
63. Gartner AM, Dolan SL, Stanford MS, Elkins GR. Hypnosis in the treatment of Morgellons disease: a case study. Int J Clin Exp Hypn. 2011;59(2):242–249. [PMC free article] [PubMed] [Google Scholar]
64. Grosskopf C, Desai B, Stoopler ET. An oral ulceration associated with Morgellons disease: a case report. Oral Surg Oral Med Oral Pathol Oral Radiol Endod. 2011;112(2):e19–e23. [PubMed] [Google Scholar]
65. Robles DT, Olson JM, Combs H, Romm S, Kirby P. Morgellons disease and delusions of parasitosis. Am J Clin Dermatol. 2011;12(1):1–6. [PubMed] [Google Scholar]
66. Altunay IK, Ates B, Mercan S, Demirci GT, Kayaoglu S. Variable clinical presentations of secondary delusional infestation: an experience of six cases from a psychodermatology clinic. Int J Psychiatry Med. 2012;44(4):335–350. [PubMed] [Google Scholar]
67. Fellner MJ. New findings in delusions of parasitosis. Skinmed. 2012;10(2):72–74. [PubMed] [Google Scholar]
68. Foster AA, Hylwa SA, Bury JE, Davis MD, Pittelkow MR, Bostwick JM. Delusional infestation: clinical presentation in 147 patients seen at Mayo Clinic. J Am Acad Dermatol. 2012;67(4):673.e1–10. [PubMed] [Google Scholar]
69. Hylwa SA, Foster AA, Bury JE, Davis MD, Pittelkow MR, Bostwick JM. Delusional infestation is typically comorbid with other psychiatric diagnoses: review of 54 patients receiving psychiatric evaluation at Mayo Clinic. Psychosomatics. 2012;53(3):258–265. [PubMed] [Google Scholar]
70. Mortillaro G, Rodgman C, Kinzie E, Ryals S. A case report highlighting the growing trend of Internet-based self-diagnosis of “Morgellon’s disease” J La State Med Soc. 2013;165(6):334–336. [PubMed] [Google Scholar]
71. Ranka N, Godse K, Nadkarni N, Patil S, Agarwal S. Morgellons disease: a myth or reality? Indian Dermatol Online J. 2016;7(5):430–432. [PMC free article] [PubMed] [Google Scholar]
72. Roncati L, Gatti AM, Pusiol T, Piscioli F, Barbolini G, Maiorana A. The first investigative science-based evidence of Morgellons psychogenesis. Ultrastruct Pathol. 2016;40(5):249–253. [PubMed] [Google Scholar]
73. Sandhu RK, Steele EA. Morgellons disease presenting as an eyelid lesion. Ophthal Plast Reconstr Surg. 2016;32(4):e85–e87. [PubMed] [Google Scholar]
74. Mohandas P, Bewley A, Taylor R. Morgellons disease: experiences of an integrated multidisciplinary dermatology team to achieve positive outcomes. J Dermatolog Treat. 2017 Jul 14; Epub. [PubMed] [Google Scholar]
75. Ohn J, Park SY, Moon J, Choe YS, Kim KH. Morgellons disease. Ann Dermatol. 2017;29(2):223–225. [PMC free article] [PubMed] [Google Scholar]
76. Shah R, Taylor RE, Bewley A. Exploring the psychological profile of patients with delusional infestation. Acta Derm Venereol. 2017;97(1):98–101. [PubMed] [Google Scholar]
77. Cargnello JA, Powell JJ, Thompson RP, Crocker PR, Watt F. Elemental hair analysis using nuclear microscopy and X-ray energy dispersive spectroscopy. Analyst. 1995;120:783–787. [Google Scholar]
78. Kruszelnicki KS. Dental floss 1. 2001. [Accessed September 9, 2017]. Available from: http://www.abc.net.au/science/articles/2001/03/30/268342.htm.
79. Böer A, Bresch M, Dayrit J, Falk TM. Erythema migrans: a reassessment of diagnostic criteria for early cutaneous manifestations of borreliosis with particular emphasis on clonality investigations. Br J Dermatol. 2007;156(6):1263–1271. [PubMed] [Google Scholar]
80. Stricker RB, Middelveen MJ. Morgellons disease: more questions than answers. Psychosomatics. 2012;53(5):504–505. [PubMed] [Google Scholar]
81. Harvey WT, Bransfield RC, Mercer DE, Wright AJ, Ricchi RM, Leitao MM. Morgellons disease, illuminating an undefined illness: a case series. J Med Case Rep. 2009;3:8243. [PMC free article] [PubMed] [Google Scholar]
82. Middelveen MJ, Rasmussen EH, Kahn DG, Stricker RB. Morgellons disease: a chemical and light microscopic study. J Clin Exp Dermatol Res. 2012;3:140. [Google Scholar]
83. Middelveen MJ, Mayne PJ, Kahn DG, Stricker RB. Characterization and evolution of dermal filaments from patients with Morgellons disease. Clin Cosmet Investig Dermatol. 2013;6:1–21. [PMC free article] [PubMed] [Google Scholar]
84. Mayne PJ. Clinical determinants of Lyme borreliosis, babesiosis, bartonellosis, anaplasmosis, and ehrlichiosis in an Australian cohort. Int J Gen Med. 2015;8:15–26. [PMC free article] [PubMed] [Google Scholar]
85. Middelveen MJ, Burugu D, Poruri A, et al. Association of spirochetal infection with Morgellons disease. F1000Res. 2013;2:25. [PMC free article] [PubMed] [Google Scholar]
86. Mayne P, English JS, Kilbane EJ, Burke JM, Middelveen MJ, Stricker RB. Morgellons: a novel dermatological perspective as the multisystem infective disease borreliosis. F1000Res. 2013;2:118. [Google Scholar]
87. Middelveen MJ, Bandoski C, Burke J, et al. Exploring the association between Morgellons disease and Lyme disease: identification of Borrelia burgdorferi in Morgellons disease patients. BMC Dermatol. 2015;15:1. [PMC free article] [PubMed] [Google Scholar]
88. Mursic VP, Wanner G, Reinhardt S, Wilske B, Busch U, Marget W. Formation and cultivation of Borrelia burgdorferi spheroplast L-form variants. Infection. 1996;24(3):218–226. [PubMed] [Google Scholar]
89. Brorson O, Brorson SH. An in vitro study of the susceptibility of mobile and cystic forms of Borrelia burgdorferi to tinidazole. Int Microbiol. 2004;7(2):139–142. [PubMed] [Google Scholar]
90. Shah JS. Morgellons disease: chronic form of Borrelia infection?. Poster presented at: 9th Annual Medical Scientific Conference on Morgellons Disease; April 30–May 1, 2016; Austin, TX. [Google Scholar]
91. Allen L, Saylor-Hefley C. Morgellons under investigation: identification of associated microorganisms by molecular analysis of epithelial samples. Poster presented at: 7th Annual Medical Scientific Conference on Morgellons Disease; March 29–30, 2014; Austin, TX. [Google Scholar]
92. Georgilis K, Peacock M, Klempner MS. Fibroblasts protect the Lyme disease spirochete, Borrelia burgdorferi, from ceftriaxone in vitro. J Infect Dis. 1992;166(2):440–444. [PubMed] [Google Scholar]
93. Klempner MS, Noring R, Rogers RA. Invasion of human skin fibroblasts by the Lyme disease spirochete Borrelia burgdorferi. J Infect Dis. 1993;167(5):1074–1081. [PubMed] [Google Scholar]
94. Chmielewski T, Tylewska-Wierzbanowska S. Interactions between Borrelia burgdorferi and mouse fibroblasts. Pol J Microbiol. 2010;59(3):157–160. [PubMed] [Google Scholar]
95. Bandoski C. Evidence for the presence of human pathogens Borrelia and Helicobacter in Morgellons patients’ skin samples. Poster presented at: 7th Annual Medical Scientific Conference on Morgellons Disease; March 29–30, 2014; Austin, TX. [Google Scholar]
96. Middelveen MJ, Rotaru GM, McMurray JL, et al. Canine filamentous dermatitis associated with Borrelia infection. J Vet Sci Med Diagn. 2016;5(6):1000212. [Google Scholar]
97. Malane MS, Grant-Kels JM, Feder HM, Jr, Luger SW. Diagnosis of Lyme disease based on dermatologic manifestations. Ann Intern Med. 1991;114:490–498. [PubMed] [Google Scholar]
98. Vrethem M, Hellblom L, Widlund M, et al. Chronic symptoms are common in patients with neuroborreliosis: a questionnaire follow-up study. Acta Neurol Scand. 2002;106(4):205–208. [PubMed] [Google Scholar]
99. Fallon BA, Schwartzberg M, Bransfield R, et al. Late-stage neuropsychiatric Lyme borreliosis: differential diagnosis and treatment. Psychosomatics. 1995;36(3):295–300. [PubMed] [Google Scholar]
100. Gao HM, Hong JS. Why neurodegenerative diseases are progressive: uncontrolled inflammation drives disease progression. Trends Immunol. 2008;29(8):357–365. [PMC free article] [PubMed] [Google Scholar]
101. Bransfield RC. The psychoimmunology of Lyme/tick-borne diseases and its association with neuropsychiatric symptoms. Open Neurol J. 2012;6:88–93. [PMC free article] [PubMed] [Google Scholar]
102. Kristensson K. Microbes’ roadmap to neurons. Nat Rev Neurosci. 2011;12(6):345–357. [PubMed] [Google Scholar]
103. Mattingley DW, Koola MM. Association between Lyme disease and schizoaffective disorder, bipolar type: is it inflammation mediated? Indian J Psychol Med. 2015;37(2):243–246. [PMC free article] [PubMed] [Google Scholar]
104. Lange R, Seyyedi S. Evidence of a Lyme borreliosis infection from the viewpoint of laboratory medicine. Int J Med Microbiol. 2002;291(33):120–124. [PubMed] [Google Scholar]
105. Schmidt BL. PCR in laboratory diagnosis of human Borrelia burgdorferi infections. Clin Microbiol Rev. 1997;10(1):185–201. [PMC free article] [PubMed] [Google Scholar]
106. US Centers for Disease Control and Prevention Lyme disease: diagnosis and testing. 2015. [Accessed September 30, 2017]. Available from: https://www.cdc.gov/lyme/diagnosistesting/index.html.
107. Stricker RB, Johnson L. Serologic tests for Lyme disease: more smoke and mirrors. Clin Infect Dis. 2008;47(8):1111–1112. [PubMed] [Google Scholar]
108. Cook MJ, Puri BK. Commercial test kits for detection of Lyme borreliosis: a meta-analysis of test accuracy. Int J Gen Med. 2016;9:427–440. [PMC free article] [PubMed] [Google Scholar]
109. Dattwyler RJ, Volkman DJ, Luft BJ, Halperin JJ, Thomas J, Golightly MG. Seronegative Lyme disease. N Engl J Med. 1988;319(22):1441–1446. [PubMed] [Google Scholar]
110. Girard YA, Federova N, Lane RS. Genetic diversity of Borrelia burgdorferi and detection of B. bissettii-like DNA in serum of north coastal California residents. J Clin Microbiol. 2011;49(3):945–954. [PMC free article] [PubMed] [Google Scholar]
111. Ogden NH, Margos G, Aanensen DM, et al. Investigation of genotypes of Borrelia burgdorferi in Ixodes scapularis ticks collected during surveillance in Canada. Appl Environ Microbiol. 2011;77(10):3244–3254. [PMC free article] [PubMed] [Google Scholar]
112. Péter O, Bretz AG, Bee D. Occurrence of different genospecies of Borrelia burgdorferi sensu lato in Ixodid ticks of Valais, Switzerland. Eur J Epidemiol. 1995;11(4):463–467. [PubMed] [Google Scholar]
113. Wilson ML, Weinstein MP, Reller Barth. Laboratory detection of bacteremia and fungemia. In: Jorgenson JH, Pfaller MA, Carroll KC, et al., editors. Manual of Clinical Microbiology. 11th ed. Washington: ASM Press; 2015. pp. 15–29. [Google Scholar]
114. Söderfeldt Y, Gross D. Information, consent and treatment of patients with Morgellons disease: an ethical perspective. Am J Clin Dermatol. 2014;15(2):71–76. [PubMed] [Google Scholar]
115. Lepping P, Russell I, Freudenmann RW. Antipsychotic treatment of primary delusional parasitosis: systematic review. Br J Psychiatry. 2007;191:198–205. [PubMed] [Google Scholar]
116. Sultana A, McMonagle T. Pimozide for schizophrenia or related psychoses. Cochrane Database Syst Rev. 2000;(2):CD001949. [PubMed] [Google Scholar]
117. Webster JP, Lamberton PH, Donnelly CA, Torrey EF. Parasites as causative agents of human affective disorders? The impact of anti-psychotic, mood-stabilizer and anti-parasite medication on Toxoplasma gondii’s ability to alter host behaviour. Proc Biol Sci. 2006;273(1589):1023–1030. [PMC free article] [PubMed] [Google Scholar]
118. Hamann K, Avnstorp C. Delusions of infestation treated by pimozide: a double-blind crossover clinical study. Acta Derm Venereol. 1982;62(1):55–58. [PubMed] [Google Scholar]
119. Lindskov R, Baadsgaard O. Delusions of infestation treated with pimozide: a follow-up study. Acta Derm Venereol. 1985;65(3):267–270. [PubMed] [Google Scholar]
120. Eccles JA, Garfinkel SN, Harrison NA, et al. Sensations of skin infestation linked to abnormal frontolimbic brain reactivity and differences in self-representation. Neuropsychologia. 2015;77:90–6. [PubMed] [Google Scholar]
121. Hirjak D, Huber M, Kirchler E, et al. Cortical features of distinct developmental trajectories in patients with delusional infestation. Prog Neuropsychopharmacol Biol Psychiatry. 2017;76:72–79. [PubMed] [Google Scholar]
122. Huber M, Wolf RC, Lepping P, et al. Regional gray matter volume and structural network strength in somatic vs. non-somatic delusional disorders. Prog Neuropsychopharmacol Biol Psychiatry. 2017 Nov 24; Epub. [PubMed] [Google Scholar]
123. Livengood JA, Gilmore RD., Jr Invasion of human neuronal and glial cells by an infectious strain of Borrelia burgdorferi. Microbes Infect. 2006;8(14–15):2832–2840. [PubMed] [Google Scholar]
124. Fallon BA, Levin ES, Schweitzer PJ, Hardesty D. Inflammation and central nervous system Lyme disease. Neurobiol Dis. 2010;37(3):534–541.
— Read on www.ncbi.nlm.nih.gov/pmc/articles/PMC5811176/

Posted in morgellons, THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , , , , , , , , , | 1 Comment

spiritus et corporis in intersectione: things may not be what they appear-face appears in mans neck!
— Watch Video on youtu.be/ePE8NzVmHKM

Here is an interesting video I created in an effort to show others more of what my experiences are like in this world in the years following my being infected with something people are calling morgellons, something causing changes to my perception that I can show others is more an example perhaps of things we don’t see, or how we see what we believe and not always what is there?

Knowing as we do that our eyes, as designed by our creator, exclude most of the electromagnetic spectrum allowing as the do only waves with a length of between 400-750 nanometers, a tiny fragment of what’s actually there.

Is it possible my exposure to nanotechnology and biotechnology and God only knows what else have changed my ability to perceive what’s actually there?

Or is it just noise and miss information misjudged by a broken mind, a mind twisted around by huge does of ‘hallucinogenic’ like drugs?

But consider this: science has determined via functional mri imaging and it studies that taking lsd like drugs creates new neural pathways in the brain, pathways that may have never been able to develop if it were not for the ‘magic’ of the experience-and the magic if the experiences brought on by new pathways-new vibrations, new frequencies that the neuronal processor can now function at?

Adding meta materials to the blood, brain, and/or humors of the human eye would allow new non-linear photonics and energetic response in the modified sensory organs.

Have a look

Open your mind

And consider the ramifications

And possibilities…

Thank you for your time and consideration.

Blessings and peace

Posted in random views, THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | Tagged , , , , , , , , , , , , , , | Leave a comment

Limits of Human Perception

(Note: Timothytrespas did not write this! This is NOT my work! I am only sharing it as it is so well written and comes highly recommend!)

Figure 1 : The human eye has evolved to detect visible light in a very thin spectrum, and is functionally limited by density of photoreceptors and compression of visual data sent along the optic nerve.
Any discussion of psychedelic hallucination is a discussion of the spontaneous emergence of perceptual information within human consciousness. Human perception is limited by the capacity of sense organs (Fig. 1); the speed and architecture of the neural network; and the number of distinct perceptions the brain can analyze at any one time. Despite functional limitations human consciousness is seamless, meaning that each perception and behavior flows smoothly from one to the next. When consciousness is stable perception and behavior is seamlessly integrated; when consciousness destabilizes perception and behavior loose cohesion until we are no longer in control of our thoughts and actions. Destabilization of consciousness can happen all at once in the case of being knocked unconscious, but more often it happens incrementally as various aspects of conscious-ness enter into a low-power sub-conscious copies or unconsc- ous state, as in going to sleep.
Psychedelics are unique in that they can both enhance and degrade perceptual limitations by orders of degrees; psychede- lics can obscure and distort per- ceptual data or they can enhan- ve resolution and generate ex- panded states of consciousness.
These contrasting results may be dose dependent, but it is also possible that psychedelics si- multaneouslyu produce percep- tual degradation and enhance- ments. Psychedelic hallucinati- ons are often described as being beyond the limits of human imagination, a trait which is offe- red as de-facto evidence of ex- panded err consciousness or su- pernatural origin. Since the boundaries of the human imagi- nation can be modeled with some close degree of accuracy, any substantial discussion about the nature of psychedelic halluci- nations must therefore start with some basic assumptions about the limitations of human percep- tion, and thus the limitations of expanded consciousness.
The Visual Spectrum
Figure 2 : The EM spectrum ranges from gamma rays, which have a very short wavelength and very high energy, to radio waves, which have a very long wavelength and very low energy. Visible light makes up a very small portion of the spectrum.
The The The-human visual spectrum has evolved to work best in a small window of sunlight that penetra-tes the Earth’s atmosphere,com- prising the white-light band seen in a rainbow (Fig. 2); roughly the 400-790 THz (terahertz) energy range, energy which oscillates on the order of hundreds of trillions of cycles per second.
The smallest wavelength of visible light is violet, which is only 380 nm (nanometers) wide and travels with the highest frequency.
Red, by contrast, is 750 nm long on the other end of the visible spectrum, and at twice the length it travels at half the fre- quency.1
Unlike some organisms, the human eye does not see into ultraviolet or infrared ranges, nor does it see microwaves, radio waves, x-rays, gamma rays, or anything that falls outside of the visual spectrum. This applies to night vision and dark-adapted vi-sion. The dark-adapted eye utili-zes the rod cells as opposed to the cone cells of daylight vision; rod cells are more photosensitive and more numerous, but they lack the color sensitivity and de-tail resolution..2
Figure 3 : A comparison of light waves and their formal properties.
Subjects on psychedelics often report increased luminosity and saturation of colors, as well as halos or auras of light surrounding objects. In closed-eye or low-light environments subjects report vividly saturated geometric matrices, often rendered in swirling palettes of fluorescent purple and neon green.3All of these reports fall within the expected range of visible color spectrum, with the dark-adapted eye finding more sensitivity in the shorter-wavelength, higher-frequency, violet to green ranges (Fig. 3).
There is speculation that some aspects of psychedelic hallucination are the result of tuning the brain to receive radiation at a wider range than normal; bands associated with electromagnetic, metaphysical, morphogenetic, Akashic, or geomagnetic fields. The spectral argument posits that the human brain is like a radio receiver for consciousness, and psychedelics allow the user to tune the brain to new perceptual frequencies, possibly quantum or higher dimensional in nature. This metaphor may make intuitive sense, but no research exists to confirm any spectral advantage to psychedelics other than increased photosensitivity and some visual acuity at low doses.4,5,6 Subjective reports indicate that psychedelics may increase auditory or synesthetic sensitivity to background electromagnetic noise, and the perception of energy fields or auras emanating from living organisms is reported often enough to warrant further scientific scrutiny, but these claims have not been tested rigorously enough to be conclusive.7
Visual Frame Aliasing
Figure 4 : Comparison of EEG bands over one second of activity. Gamma (30-100Hz), Beta (12-30Hz), Alpha (8-12Hz), Theta (4-7Hz), and Delta (0-4Hz).
Seamless perception relies on rapid frame updating to render external changes in real time. Humans can render changes in reality at roughly 13-15 frames per second (fps, or Hz), which means that our perception of reality fully refreshes itself roughly once every 77 milliseconds (ms). Human frame perception is exploited by animation and film, which updates at 24 fps, and television, which updates near 30 fps. Computer monitors and high-definition televisions refresh at 60 Hz or higher, and at this rate human perception of motion is entirely seamless.8 The rate of human frame perception corresponds roughly to the alert Beta range of waking human consciousness (12-30 Hz) seen in EEG readings (Fig. 4).9 Any event which happens faster than 1/60th of a second (16.6 ms) falls between perceptual frames and is considered to be subliminal or imperceptible to human consciousness.10Seamless frame rendering is also called temporal aliasing, and can be subverted by a variety of common phenomena, incl. stroboscopic lights which break motions into jerky snapshots, and wagon-wheel illusions where rotating spokes appear to stop or spin backwards.11,12,13
Figure 5 : Video feedback stacked as few as 8 to 16 frames deep is isomorphic of fractal recursion, visual echo, and nonlinear frame destabilization associated with psychedelic hallucination. Click for video.
In addition to retaining visual information, perceptual frames hold the totality of multi-modal sensory rendering. Smooth frame aliasing preserves semantic state info from one moment to the next, and retains fidelity of the limited information we keep active in our working memory. There is evidence that the brain can track multiple object layers for each frame;14 possibly corresponding to the number of distinct items we can normally hold in working memory, which is about seven.15
Frame rendering is a distributed cortical task modulated by the aminergic system. High aminergic modulation of the frontal lobe is a good indicator of external frame alertness. Any drug which interrupts the precise timing of the aminergic modulatory system will also disrupt the seamless nature of temporal frame aliasing in the same way that a strobe light disrupts the motion of a spinning wheel. Temporal aliasing hallucinations include frame stacking, frame delay, frame freezing, frame reverse, frame echo, and infinite frame regression; all of which are considered to be uniquely psychedelic (Fig. 5).16 The sensation of hallucinogenic frame stacking indicates that psychedelics may create a temporary frame decay buffer that allows for simultaneous multi-frame analysis and increased complexity of visual comprehension. Subverting or enhancing the functional limits of visual frame aliasing may be an indication of expanded consciousness.
Visual Frame Resolution
Human visual resolution is limited by a number of factors. The first limitation is the density and distribution of retina in the eye; 130 million photoreceptors feeding into 1.2 million optic projections, with a spatial compression ratio of roughly 100 to 1. Photoreceptors in the eye are distributed in rings with color-sensitive cones clustering towards the center and contrast-sensitive rods filling the periphery.17 Despite the large number of photoreceptors the actual field of vision is incomplete. Including the blind spot where the retina attaches to the optic nerve, as much as 20% of peripheral vision contains gaps that must be filled with progressive rendering. Incoming rings of visual data are then smoothed into completed lines and shades in the visual cortex; the image is then passed forward in two divergent projections for spatial and object analysis; and finally the finished image reaches multi-modal convergence in the PFC.18,19 This is a fair bit of signal juggling for a seamless process to handle at 15 frames per second.
Figure 6 : The peripheral drift illusion (PDI) is easily seen when the figure is in the periphery. Research suggests the illusion is based on temporal differences in luminance processing producing a signal that tricks the peripheral motion system.
Even though human vision employs elaborate compression and reconstruction techniques, the human eye can detect visual detail at resolutions into the micrometer range. From a meter’s distance the human eye cannot detect detail under 100 micrometers in length, making print resolutions of 300 dots-per-inch (DPI) entirely seamless. Some estimates put the detail of human visual resolution at 14 million pixels per the entire visual field; others limit vision by bandwidth of nearly 9000 kilobits per second; or by the 3D topographical field-rendering limit of 10 billion triangles per second, or 760 million triangles per frame.8 Human detail resolution is only reliable near the center of vision; many optical illusions exploit perceptual filling functions of the periphery (Fig. 6).20,21,22 Given the mechanical shortcomings of peripheral rendering, these estimates should be taken as visual saturation points as opposed to functional capacities.
The rendering of visual information may be the most complex and energy-intensive task of the human brain. Seamless visual perception requires precise neural firing. When perception destabilizes the visual field falls apart; the most commonly reported form of visual destabilization is diplopia or double-vision. Since visual rendering is so rich and complex it is potentially the easiest part of the brain to destabilize and the most ripe for exploitation. In other words, visual rendering is so elaborate it can be easily fooled by hallucination and illusion.
Dreaming, Imagination, Psychosis, Hallucination
While the information resolution of imagination and dreams is difficult to measure, it is widely agreed that dream perception is somewhat less resolved in detail than waking perception. Dreams are often incomplete; contextual state data is not retained from frame to frame; and thus the durability of dream data falls apart under close scrutiny. Sometimes dreams can be vivid to the point of being indistinguishable from reality, containing people and places and narratives that retain state information over many different sequences, but more often dreams are fleeting and half remembered, and last for only a few seconds before fading.
Visual rendering of human thought is more durable than dreams but generally of very low detail. Humans can imagine objects, people, and places in their minds, but human memory and imagination are not typically photorealistic. Human memory is more semantic than eidetic, meaning that waking thoughts are mostly verbal, emotional, and only minimally visual. Most humans can imagine basic shapes, silhouettes, and sensual concepts; a smaller percentage can imagine topographical maps and rotate 3D objects in their mind. Visualizing a simple object like a cube or a pyramid is a cognitive task that requires full concentration; and even at peak visualization the internalized form rarely rises beyond a blurry silhouette. The exception to this limitation is dreaming or daydreaming, when eidetic or photographic snapshots bubble up into consciousness almost fully-formed. The emergence of dreamlike eidetic information into waking consciousness is usually a spontaneous reflex; few people have full control over photorealistic rendering of imagination and memory.23,24
Having fully-formed visions spontaneously erupting into consciousness is sometimes called overactive imagination, daydreaming, vivid memory recall, eidetic memory, photographic memory, emergent ideation, hallucination, or psychosis. Each of these modes of internal visualization is characterized by a different intensity and duration of imaginary detail; the more intense and durable the phantom detail the less it looks like imagination and the more it begins to look like psychosis. Mediating hard transitions between external alertness and internal visualization is a baseline for perceptual stability; confusing the two would be problematic. The function of internal visualization is activated by the medial temporal lobe and modulated by neurotransmitter acetylcholine; psychedelics presumably activate this function spontaneously by interrupting aminergic alertness of the forebrain.25 If psychedelic hallucinations capitalize on the brain’s capacity to produce vivid dreamlike images, we would expect the detail of a psychedelic frame to match the information profile of a dream frame; low information resolution, softer attack, elongated decay and sustain, low formal durability from frame to frame. This means that state information such as identity, purpose, and context would also elongate and transition quickly from frame to frame.
If the quality of a hallucinogenic frame matches the formal quality of a dream frame, one could expect psychedelic visions to be of lower resolution than normal vision; but subjective reports indicate that multiple layers of dreaming and waking consciousness can overlap in a single psychedelic frame, creating a complex overlay of both real and imagined perceptions. Being unable to separate imagination from reality is the clinical definition of psychosis, but it also implies an increase in potential frame information density; which implies an expanded state of consciousness.
The Limits of Expanded Consciousness
Figure 7 : Fractals generated by computer programs and nature are isoforms of nonlinear psychedelic hallucinations.
If the human imagination is infinite, and if psychedelics can expand the capacity of human imagination, then psychedelics can paradoxically make the infinite even more infinite. This makes sense if you accept that infinity is a linear concept which starts at zero and goes in one direction forever; but if infinity is bent into a series of repeating loops and spirals then it begins to look more like a fractal than a line, and thus more psychedelic (Fig. 7). Human perception is linear, but humans live in a nonlinear system. Psychedelics destabilize linear perceptions of space and time to produce fractal states of frame layering, bifurcation, and infinite frame recursion. This allows perception to exist in multiple states at once, much like a quantum computer that processes multiple simultaneous probabilities. If normal human imagination is bound within the limits of linear infinity, psychedelic perception is expanded to the limits of exponential or fractal infinity. Psychedelic perception presents a progressive nonlinear bifurcation of recursive self-similar information corresponding to both internal and external perceptual space. The psychedelic layering, bifurcating, and regression of internal and external perceptions creates a timeless, transpersonal perspective of what might be called a nonlinear, fractal, or holographic rendering of time and space.26
Figure 8 : Mandalas and calendars representing universal harmony and knowledge. Top row: a Kalachakra time-wheel mandala; and a Mayan calendar. Bottom row: a mandala of the enlightened Buddha; and a mandala of the Wheel of Life (Bhavacakra, or samsara).
The perception of seeing all time and space unfolding in a single moment is a theme that has been reproduced in Eastern mandalas and Mesoamerican calendars for thousands of years, where a central figure sits in the center of concentric interlocking rings of reality (Fig. 8). In Sanskrit this great wheel of time is called Kalachakra (time wheel), and Kalachakra yoga emphasizes the interlocking self-similarity of body cycles and celestial cycles.27 The description of Kalachakra overlaps with Mesoamerican cyclical calendars and spiritual themes, expressed by Maria Sabina, the Oaxacan healer who first shared the magic mushroom known as Teonanacatl with R. Gordon Wasson. Sabina said, “The more you go inside the world of Teonanacatl… you see our past and our future, which are there together as a thing already achieved, already happened… I knew and saw God: an immense clock that ticks, the spheres that go slowly around, and inside the stars, the earth, the entire universe, the day, the night… He who knows to the end the secret of Teonanacatl can even see that infinite clockwork.”28 This is undoubtedly a reference to Kalachakra, the great wheel of time.
Witnessing the timeless infinity of Kalachakra can be compared to Western models of Hermeticism (“As Above, So Below”) where the pinnacle of mystical achievement is channeling the infinite wisdom of the universal spirit;29 or early Deist notions of a God as a great Clockmaker who set the universe in motion and let it run without intervention.30 According to Maria Sabina’s report, the subjective experience of the infinite clockwork is an end secret of psychedelic vision; this is where you arrive if you follow the process of fractal information regression to the beginning and end of all time. The thought of experiencing Kalachakra as expressed by Maria Sabina stretches the boundaries of believability, but the subjective reports of a timeless, infinite psychedelic space where the size of the universe is revealed and everything in the past and the future has already occurred is common enough to conclude that this experience is not only possible, but that it might also be the final end-point of expanded human consciousness. 31

Posted in THE GREAT DECEPTION or HOW the WORLD BELIEVED the LIE | 4 Comments

evidence for the apparent existence of Invisible Terrestrial Entities of the first kind (ITE-1) & Invisible Terrestrial Entities of the second kind (ITE-2) or bright ITE

American Journal of Modern Physics 2016; 5(3): 45-53 http://www.sciencepublishinggroup.com/j/ajmp doi: 10.11648/j.ajmp.20160503.14 ISSN: 2326-8867 (Print); ISSN: 2326-8891 (Online) Apparent Detection via New Telescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities

(ITE) Ruggero Maria Santilli Thunder Energies Corporation, Florida, U. S. A. Email address: research@thunder-energies.com To cite this article: Ruggero Maria Santilli.

Apparent Detection via New T elescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE). American Journal of Modern Physics. Vol. 5, No. 3, 2016, pp. 45-53. doi: 10.11648/j.aj mp.20160503.14 Received: December 24, 2015; Accepted: December 25, 2015; Published: June 8, 2016

Abstract: By using telescopes with concave lenses, known as Santilli telescopes (trademark and patent pending by the U.S. publicly traded company Thunder Energies Corporation), we review preceding evidence for the apparent existence of antimatter galaxies, antimatter asteroids and antimatter cosmic rays.

Independently from these astrophysical detections, we present for the first time evidence for the apparent existence of entities in our terrestrial environment that are solely visible via telescopes with concave lenses, while being invisible to our eyes and to conventional Galileo telescopes with convex lenses, which entities leave dark images in the background of digital cameras attached to the santilli telescopes.

These entities are here called Invisible Terrestrial Entities of the first kind (ITE-1) or dark ITE.

We then present, also for the first time, evidence for the apparent existence in our terrestrial environment of additional entities that are also visible to telescopes with concave lenses while being invisible to our eyes and to conventional telescopes with convex lenses, which entities leave bright images in the background of digital cameras.

These additional entities are here called Invisible Terrestrial Entities of the second kind (ITE-2) or bright ITE .

It is pointed out that both types of entities generally move in the night sky over sensitive areas, and their behavior generally suggests unauthorized surveillance.

This paper has been motivated by the significance and diversification of the collected evidence, as well as available independent confirmations, that warrant systematic inspections of the sky over our sensitive civilian, industrial, and military installations via telescopes with concave lenses, so as t o detect possible unauthorized surveillance. Keywords: Antimatter, Santilli Telescope, Invisible Terrestrial Entities 1.

 

Introduction

As it is well established in particle physics laboratories, matter and antimatter particles “annihilate” at mutual contact by transforming their masses into light. One of the necessary conditions for a consistent, quantitative representation of this experimental evidence is that all characteristics of antimatter must be opposite to those of matter. It as also been established that the use of 20th century mathematics for the representation of both, matter and antimatter, leads to predictable catastrophic inconsistencies. Therefore, a consistent, quantitative representation of matter-antimatter annihilation requires the continued use of conventional mathematics for the representation of matter, while antimatter must be represented with a basically new mathematics characterized by a suitable conjugation of 20th century mathematics known as the isodual map (technically given by an anti-Hermitean map). In summer 1993, while visiting the Joint Institute for Nuclear Research in Dubna, Russia, the author initiated the construction of the new mathematics needed for anti matter, with the proposal of new numbers, today known as isodual numbers , whose basic unit has the negative value -1, thus assuring that all quantities measured with the new numbers are opposite those of matter [1]. By noting that the possible existence of antimatter galaxies must be studied at the macroscopic, and therefore classical level, thus preventing the use of quantum mechanics , and that galaxies must be assumed as being neutral, thus preventing the use of the charge for the conjugation from matter to antimatter, in the following paper [2] (also written in Dubna), the author presented the first, and, apparently, the only known classical representation of neutral antimatter based on the new isodual numbers and ensuing new mathematics.   46 Ruggero Maria Santilli: Apparent Detection via N ew Telescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE) In summer 1995, while conducting research at the Institute for Basic Research at the Castle Prince Pignatelli in Italy, the author conducted systematic studies on the novel isodual mathematics via a step-by-step isodual image of 20th century mathematics, thus including the isodual image of functional analysis, differential calculus, algebras, geometries, etc. [3]. In spring 1996, the author presented at the First International Workshop on Anti-matter in Sepino, Italy, the prediction of isodual mathematics that light emitted by antimatter-stars, here called “antimatter-light,” i s different than our ordinary matter-light in an experimentally verifiable way [4]. The above prediction was based on the fact that ordinary light has no charge. Therefore, the only known consistent way to conjugate light from matter to antimatter is the map under isoduality of all other physical characteristics of light. This lead to the prediction that antimatter light has negative energy , by therefore confirming the original 1928 conception of antimatter by P. A. M. Dirac as having negative energy, this time, with the resolution of its historical in consistencies permitted by the novel isodual mathematics. A systematic study of the ensuing isodual theory of antimatter was presented in monograph [5] in 2006, including the isoduality of Newtonian mechanics, Ga lileo relativity, Einstein special and general relativity , and quantum mechanics, with the first known classical representation of the gravitational field of antimatter bodies. In particular, Ref. [5] presented the proof that the isodual theory of antimatter verifies all known experimental data on antimatter at both the classical and particle level s. At the classical level, experimental data are verified by the interplay between the conventional Newton’s equation for particle and their isodual for antiparticles, while at the particle level experimental data on antimatter are verified because the isodual map is equivalent to charge conjugation. In Ref. [5], the author also presented the prediction at all levels of study, including the isodual Newtonian mechanics, isodual special and general relativity and isodual quantum mechanics, that matter and antimatter experience gravitational repulsion , thus including the prediction that antimatter-light is repelled by a matter gravitational field (Figure 1). Figure 1. A necessary condition for a consistent, quantitative representation of matter-antimatter annihilation into light at con tact is that “all” characteristics of antimatter are opposite those of matter. This basic requirement implies the prediction that light emitt ed by antimatter, viz., antimatter-light, is repelled by a matter gravitational field, and the consequential prediction that, when propagation wit hin a matter-medium such as water, antimatter-light has a “negative” in dex of refraction opposite to the conventional “positive” index of refraction of matter-light. In 2012, the author presented at the International Conference of Numerical Analysis and Applied Mathematics held in Kos, Greece, the prediction of the isodual theory of antimatter according to which, when traversing a transparent matter-medium, antimatter-light has a “negative” index of refraction (in the sense of being opposite to the conventional “positive” index of refraction of matter-light), thus requiring “concave” lenses for the focusing of it. Figure 2. The first view depicts the structure of all existing, refractive, Galileo telescopes whose primary lens must be “convex” due to the positive index of refraction of matter-light. The second vie w depicts the structure of the novel, refractive, Santilli telescopes whose primary lens must be “concave” under the prediction that antimatter-light has a negative index of refraction (See Figure 1). The main principle of detection of the Galileo and Santilli telescopes is the following. In the Galileo telescope, all antimatter- light is dispersed by the convex lens into the internal walls of the telescope, thus permitting images of matter-light to be focused in a camera without significant interferences by antimatter-light. By contrast, ordinary matter- light is dispersed by the convex lens of the Santilli telescope, thus permitting images of antimatter-light to be focused in a camera without major interferences from matter-light. The images shown in Figures 1 and 2 are referenced in [6]. Subsequently, the author constructed the first know n telescopes with concave lenses , today known as Santilli telescopes (trademark and patent pending by the U. S.   American Journal of Modern Physics 2016; 5(3): 45-5 3 47 publicly traded company Thunder Energies Corporation , http://www.thunder-energies.con). Since no conventional im age can be seen with concave lenses, Santilli telescope s were paired to conventional, refractive Galileo telescopes of the same size, with curvature of the primary lenses and focal distance conjugated into negative values (Figures 2 and 3). Experimental paper [7] of 2014 presented the first known evidence of the apparent existence in our universe of antimatter galaxies, antimatter asteroids and antimatter cos- mic rays via the use of a pair of 100 mm Galileo an d Santilli telescopes with attached digital camera Cannon 600D used at ISO 1600 under a 15 seconds exposure. These first detections were independently confirmed in Refs. [8, 9]. The detections consist of black streaks over a conventional background of a digital camera attached to the Santilli telescope, which black streaks are absent in the Galileo Figure 3. A view of the 50 mm, 70 mm, 100 mm, 150 mm and 200 mm pairs of Galileo and Santilli telescopes used for the detections presented in this paper, that are under production and subsequent sal e by the U. S. publicly traded company Thunder Energies Corporation (www.thunder- energies.com). Santilli telescopes cannot be effici ently used alone because the human eye has a convex cornea, thus being unabl e to focus images of antimatter-light. The efficient use Santilli telesc opes is that of pairing them with optically aligned, Galileo telescopes of the s ame size with exactly the same, yet opposite curvatures of the primary lenses and focal distances (Fig. 2). The Galileo telescope is then used for focusing images of matter-light. The related settings are then transferred to the Sa ntilli telescope. Images in the Santilli telescope are considered for analysis if and only if they do not appear in the Galileo telescope, are not caused by impurities in the lens and verify other conditions. Note that the pairs of telescopes depicted in this figure are equipped with two identical cameras, one per telescope, however, detections selected for publication are generally achieved via one single camera, first used in the Galileo telescope to verify focusing, and then transferred to the Santilli telescope. The very focusing of images via a telescope with concave lenses constitutes direct experimental evidence for the existence in nature of light with a negative index of refraction, while the black character of the streaks constitute s direct experimental evidence supporting the hypothesis of Ref.[4] according to which antimatter-light carries negative energy. In turn, both these features are considered as experimental evidence for the gravitational repulsion between matter and antimatter due to its need to achieve a negative index of refraction. A number of independent studies exist on isodual mathematics and on the isodual theory of antimatter among which we quote: Ref. [10] on the need to conduct sy stematic studies on the still unknown means to detect antimatter asteroids prior to their impact on Earth that have occurred in the past without advance detection; Ref. [11] on quantitative calculation of the trajectories and speed under whi ch antimatter asteroids can hit Earth despite the indicated gravitational repulsion from Earth; and Ref. [12] providing, a list of all known contributions in the field published in refereed journals as of early 2015, including the l ink to numerous PRWeb Releases on the ongoing search for antimatter galaxies in the universe. In a language accessible to the general audience, thus without any equation, in this paper we present for the first time the detection of entities existing in our terrestrial envi-ronment here defined as including our atmosphere, terrestri and lunar orbits and under the sea, which entities are not visible by our naked eye or via existing optical me ans, yet they are fully detected in cameras attached to the novel telescopes with concave lenses. To prevent a prohibitive length as well as unnecessary repetitions, a knowledge of papers [7-9] is essential for the understanding of this paper. 2. Detection of Invisible Terrestrial Entities of the First and Second Kind (ITE-1 and ITE-2) On September 5, 2015, at 9.30 pm the author aimed a pair of 100 mm Galileo and Santilli telescopes at the ni ght sky over Tampa Bay, Florida, as seen from the NE orient ation of the terrace of room 775 of the Vinoy Renaissance Ho tel in St. Petersburg. Both telescopes were equipped with a So ny camera model SLT-A58K set at ISO automatic and 15 seconds exposure, the two cameras being activated j ointly by remote shutters. The tests were merely intended for the search of an timatter galaxies and, consequently, the paired telescopes w ere aimed at the sky, but sudden clouds halted the tests and the author oriented the pair of telescopes horizontally over T ampa Bay. To his great surprise, unidentified yet clearly vis ible entities immediately appeared in the screen of the camera attached to the Santilli telescope, without any enl argement, without the same entities being visible to the nake d eyes, and without any corresponding image existing in the scr een of the camera attached to the Galileo telescope. This unexpected discovery triggered a novel systema tic use of the pair of Galileo and Santilli telescopes, this time, for the search of entities, here called Invisible Terrestrial En- tities , that are invisible to our eyes as well as to our op tical instruments with convex lenses, but are otherwise f ully visible via the Santilli telescope with concave len ses, and are located in our terrestrial environment , as defined in Section 1. Following systematic tests, the author has detected the existence of at least two different types of ITE, with the acknowledgement that additional types may be identi fied in the future. Thanks to independent confirmations on the existence of ITE, such as that by K. Brinkman [13] and others, the author first presented the discovery of ITE on   48 Ruggero Maria Santilli: Apparent Detection via N ew Telescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE) September 25, 2015, at an invited lecture delivered to the St. Petersburg Astronomy Club [14]. In Figures 4, 5, and 6, we report representative ex amples of rather numerous detections of Invisible Terrestr ial Entities of the first kind (ITE-1), here defined as entities that: 1) are not visible to the human eye or to conventional optical instruments with convex lenses, but are otherwise fully visible via Santilli telescopes wit h concave lenses; 2) exist in our terrestrial environment as defined in Section 1, rather than in deep astro-physical spaces; and 3) leave “ dark images ” in the background of digital cameras attached to Santilli telescopes. In Figures 7 to 11, the author presents representat ive examples of Invisible Terrestrial Entities of the s econd kind (ITE-2), here defined as entities that: 1) are not visible to the human eye or to conventional optical instruments wish convex lenses, but are otherwise fully visible via Santilli telescopes wit h concave lenses; 2) exist in our terrestrial environment as defined in Section 1, rather than in deep astro-physical spaces; and 3) leave “ bright images ” in the background of digital cameras attached to Santilli telescopes. A first significant aspect of the detections presen ted in Figures 4 to 11 is that they establish beyond “cred ible doubt” the capability of telescopes with concave lenses to focus images visible in the background of a digital camer a attached to Santilli telescopes. These images are at times, visible without enlargement, thus establishing the utilitie s of telescopes with concave lenses. A second salient aspect is that the focusing of ima ges via concave lenses is solely possible for light having a negative index of refraction in the sense of being opposite that of ordinary light (Section 1). A third salient aspect is that the emission of anti matter- light does not mean that the entity is made up of antimatter, because the existence of the entities within our at mosphere would imply a cataclysmic explosion due to matter- antimatter annihilation. Yet another salient aspect is that the emission of antimatter-light could well be evidence that their propulsion system is based on the extraction of antimatter fro m space intended as a universal substratum of the entire un iverse with an extremely high energy density (also known as zer o point energy) [15]. In short, it appears that ITE-1 consist of matter-e ntities in our terrestrial environment achieving locomotion vi a the acquisition of antimatter in their interior with co nsequential use of matter-antimatter propulsion, and achieve in visibility via the emission of antimatter-light as a sort of e xhaust. A Post Ph.D. mathematical study of the new type of lo comotion via the use of the new isodual Minkowskian geometry for antimatter is available in monograph [5]. A third salient aspect is that the creation of “dar k images” in the background of digital cameras for ITE-1 (Fig ures 4-6) establishes that the light originating from the ima ge has negative energy , since only a negative energy can annul the conventional positive energy existing in the pixels of the cameras. Consequently, the dark images of ITE-1 are caused by a type of light either equivalent or identical t o antimatter- light as presented in the preceding section. By contrast, ITE-2 (Figures 7 to 11) appear to be s tructures composed of matter which ordinary light (because of their bright character), yet possessing means to achieve in- visibility via the conversion of their index of ref raction from a positive to a negative value. It should be indicated that ITE-1 appear to be loca ted mostly in the areas of terrestrial or lunar orbits. By contrast, ITE-2 are generally located directly over sensitive civilian, industrial and military installations, and appear t o behave in a way strongly suggesting their unauthorized surveill ance. Figure 4. A view of an Invisible Terrestrial Entity of the f irst kind (ITE-1) detected in two different photos on September 5, 20 15, in the evening sky over Tampa Bay. Florida, via the pair of 100 mm Gal ileo and Santilli telescopes with Sony Camera SLT-A58K set at ISO aut omatic and 15 seconds exposure. The entity is classified as an IS E-1 because it is solely detected via the Santilli telescope (thus emitting light with negative index of refraction), and it leaves a black image in the bac kground of the digital camera (thus emitting light with negative energy). Since we are dealing with two different photos each taken with 15 seconds exp osure, the entity moves at a relative small speed. Note the ridges of ordin ary light surrounding the entity, which can only be explained quantitatively via the gravitational repulsion of ordinary light by the entity because, in the absence of such repulsion, ordinary light should merely experience diffraction. Note additionally that the entity “cannot” be composed o f antimatter because, being within our atmosphere, it would annihilate wi th a cataclysmic explosion. Therefore, the entity is predicted to be made up of ordinary matter, although emitting antimatter light. These c onditions support the hypothesis of locomotion based on the e xtraction   American Journal of Modern Physics 2016; 5(3): 45-5 3 49 of negative energy from space conceived as a univer sal substratum (also known as negative point energy). A ccording to this interpretation, the entity achieves invisib ility to our eyes as well as to all conventional refractive tele scopes by merely emitting antimatter-light as a kind of “exha ust” from its locomotion [15]. Figure 5. Views of another ITE-1 taken in three consecutive pictures by the digital camera of the Santilli telescope on Septemb er 5, 2015 in the night sky over Tampa Bay, Florida. Note that the entity not o nly moves slowly from photo to photo, but also rotates. This particular t ype of motion excludes impurities in the telescope lens or in the camera a s possible interpretations. Figure 6. Views of an ITE-1 independently taken by K. Brinkm an from the night sky of St. Petersburg, Florida, on September 20, 2015 via the use of the pair of 150 Galileo and Santilli telescopes, under a series of three burst (rapid) shots [13]. The entity is clearly an ITE-1 because it was in our terrestrial environment, it was only visible in the Santilli telescope, and it produced a dark image on the background of the digi tal camera. Note that this entity too, not only moves with respect to an image caused by an impurity in the telescope lens, but also rotates (s ee the original report [13] for more pictures and details). 3. Concluding Remarks In works [1-7], the author presented evidence on th e apparent existence of antimatter galaxies, antimatt er asteroids, and antimatter cosmic rays obtained via dark images in the background of a digital camera attached to a telesc ope with convex lenses, known as the Santilli telescope . The same astrophysical entities are completely invi sible to our naked eyes as well as to conventional Galileo t elescopes with convex lenses because matter-antimatter annihilation mandates that all characteristics of antimatter mus t be opposite those of matter. Consequently, light emitt ed by antimatter has an index of refraction opposite that of matter, thus requiring a concave lens for its focusing, and carries   50 Ruggero Maria Santilli: Apparent Detection via N ew Telescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE) negative energy as predicted in 1928 by P. A. M. Di rac, thus explaining the dark character of the images. Figure 7. A view in the top of an Invisible Terrestrial Enti ty of the second kind (ITE-2) taken on September 5, 2015, in the nig ht sky of the Tampa Bay, Florida, from room 775 of the Vinoy Hotel in St. Pe tersburg at 9.15 pm via the 100 mm Santilli telescope. We have an ITE-2 bec ause the entity is in our terrestrial environment; it is only visible in the Santilli telescope and it produces a bright image in the digital background, as established by the fact that ordinary light remains visible under strong co ntrast (bottom view) These data imply that the entity produces light wit h a negative index of refraction, but with positive energy, thus constitu ting discovery of a basically new form of light here presented apparent ly for the first time. In the author’s opinion, ITE-2 are indications of stru ctures composed by ordinary matter which emit ordinary light, but achi eve invisibility to the human eye as well as to conventional refractive tel escopes via the inversion of its index of refraction. This paper has been mot ivated by the need for our monitoring the possible presence of ITE-1 and/or IT E-2 over sensitive civilian, industrial and military installations sin ce they could be conducting unauthorized surveillance. 11 The historical inconsistencies of negative energies have been resolved for antimatter by the underlying new mathematics specifically constructed for antimatter , known as isodual mathematics , with ensuing, novel, isodual theory of antimatter [1-5]. The above results have been confirmed by a number o f independent contributions, such as those of Refs. [ 8-11]. Ref. [12] provides a comprehensive list of scientific pa pers published in refereed journals and links to PRWeb R eleases in antimatter up to early 2015. Figure 8. Another ITE-2 (top view) detected under the same c onditions as those of the preceding figure. The entity was also invisible to the naked eyes and to the Galileo telescope but fully detected via the Santilli telescope in the night sky of the Tampa Bay. Again, the entity w as releasing light with negative index of refraction, yet carrying positive energy as established by the bright residue following maximal contrast (bott om view). Note that this particular ITE-2 moves and, most importantly, cause s rings of ordinary light in its surroundings, which can only be quantitative ly explained via a gravitational repulsion of ordinary light by this p articular entity. On technical grounds, we should recall that the conven tional (positive) index of refraction, and the consequential reduction of the speed of light within transparent media, are due to the attraction of lig ht by matter via complex electromagnetic interactions at atomic distances. T he negative index of refraction of antimatter-light when passing through a matter-medium such as water, is then expected to be due to the repulsi on of antimatter-light by matter. Note finally that the reversal of the index of refraction implies that antimatter light travels in ordinary water at speed s faster than that of light in vacuum [15].   American Journal of Modern Physics 2016; 5(3): 45-5 3 51 Figure 9. Photos of a cloudy night sky over Tampa Bay, Flori da, taken from the third floor of the valet parking garage of the Westin Hotel on September 19, 2015, at 10.20 pm via two Sony cameras SLT-A58K set at ISO Automatic and 15 seconds exposure, attached at the proper foc al distance to the pair of 100 mm Galileo and Santilli telescopes. All photos were taken with simultaneous remote shutters. The photos were taken in the presence of the author, his wife Carla Santilli, and an independent witness. The first photo depicts the lights of the Gandy Bridge in the Tampa Bay as seen from the 100 mm Galileo telescope without any enlargement. T he second photo clearly depicts a bright ITE-2 taken with the 100 m m Santilli telescope also without any enlargement, which entity was completel y invisible in the Galileo telescope as well as to the eyes of the thr ee eyewitnesses. The third picture compares the first photo (top) to the secon d (below). In comparing the two photos, one should note: 1) The illuminatio n of the clouds in the first photo, and the absence of such an illumination in t he second photo; 2) The lights viewed with the Galileo telescope are statio nery (except for small fluctuations due to wind), while the lights viewed via the Santilli telescope are pulsating; and 3) Close inspection of the view from the Santilli telescope shows that we are dealing with one single light tha t, not only pulsates, but moves backward and forward with respect to the tele scope in a horizontal plane. This peculiar behavior clearly suggests that this ISE-2 was conducting unauthorized surveillance of the Tampa A rea solely visible with the Santilli telescope, thus confirming the need fo r systematic views of sensitive civilian, industrial and military install ations. Figure 10. We present here a photo taken on a cloudy night sk y of Tampa, Florida, taken from room 775 of the Vinoy Renaissan ce Hotel, St. Petersburg, on September 5, 2015, at 9:15 pm via tw o Sony cameras SLT- A58K set at ISO Automatic and 15 seconds exposure a nd connected at the proper focal distance to the pair of 100 mm Galileo and Santilli telescopes. All photos were also taken with simultaneous remote shutters. No view from the Galileo telescope is here reported due to lack of any meaningful image. The top view depicts a very unusual and bright ITE- 2 as seen from the Santilli telescope without any enlargement. The rem aining views depict the same photo under progressively increasing enlargeme nts. A first striking aspect is that this particular entity was not seen at all by the author with his naked eyes despite its size and brilliance. A secon d striking aspect is the complexity of the entity that, due to the 15 second s exposure, show some clear ongoing operation. The most striking aspect i n the view of the author (a theoretical physicist) is the sharpness of the l ight at its edges, as shown by the last view, since such a feature is against know n physical laws requiring light to experience diffraction at its edges with a short yet progressive decrease from full brightness to full darkness. Clo se inspection of the photo indicates that the entity is in the process of rele asing “seven” smaller equally bright ITE also of the second kind, that ar e reminiscent of the bright ITE-2 of the preceding figure. The unusual features of this particular ITE-2 confirm the need to conduct a systematic surveillan ce of our sensitive civilian, industrial and military installations, wh ich mandated the writing and release of this paper.   52 Ruggero Maria Santilli: Apparent Detection via N ew Telescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE) Figure 11. In the top view of this figure we present an enlar gement of a second ITE-2 depicted in the top right of the main photo of Figure 10, while the remaining views show progressively increasing e nlargements. As one can see, the entity consists of “three” lights of d ifferent colors that are pulsating and move synchronously in the cloudy nigh t sky over the Tampa Bay, according to a rather complex trajectory durin g the 15 seconds exposure, including a point in which motion apparen tly stopped for a few seconds, to resume thereafter. The synchronous moti on of the three separate trajectories strongly suggest that this particular entity consists of one single structure made up of matter that achieves invisibil ity to the human eyes and to our optical instruments via the creation of a ba sically new light with negative index of refraction but positive energy pr esented in this paper apparently for the first time. In the author’s opin ion, such a behavior suggests again the conduction of unauthorized surve illance of Tampa Bay that motivated the author to write and release this paper. Via the use of pairs of Galileo and Santilli telesc opes, in this paper we have presented for the first time exp erimental evidence on the apparent existence of two types of entities existing in our terrestrial environment (as defined in Section 1), here called Invisible Terrestrial Entities of the first and second kind (ITE 1 and ITE-2), that are also completely invisible to the naked eyes as well as to Galileo t elescopes, yet they are fully visible via Santilli telescopes. Consequently, both ITE-1 and ITE-2 have a negative index of refraction when propagating in a matter medium s uch as glass. Their main difference is that the former ent ities, also called dark ITE , carry negative energy, thus causing dark images in the background of a camera attached to Sa ntilli telescopes, while latter entities, also called bright ITE , carry positive energy, thus causing bright images despite their negative index of refraction. The detection of ITE-1 and ITE-2 has been independe ntly verified by colleagues [13], and was disclosed for the first time at an invited lecture delivered at the St. Petersburg Astronomy Club on September 25, 2015 [14]. We point out that ITE-1 and ITE-2 must be made up o f matter to prevent a cataclysmic explosion due to th eir immersion in our matter-atmosphere, but their locom otion appears to be based on the internal presence of ant imatter and the use of matter-antimatter repulsion, according t o a structure studied at the mathematical level in mono graph [5]. The above and other aspects imply that ITE-1 and IT E-2 are structures dramatically beyond 20th century kno wledge for a number of reasons, such as the complete inapp licability of 20th century knowledge to the classical treatmen t of neutral antimatter, the change of the index of refr action, the apparent new typo of locomotion, and other reasons [15]. We also point out that the above terrestrial entiti es achieve invisibility to our eyes and to Galileo telescopes either via the emission of antimatter light as a form of exhaust ( ITE-1), or via engineering means capable of inverting the inde x of refraction of ordinary light (ITE-2). The writing of this paper has been motivated by the fact that ITE-1 and ITE-2 behave in a manner strongly su ggesting the conduction of unauthorized surveillance of our sensitive, civilian, industrial and military installations, th us warranting their societal knowledge. On scientific grounds , the documentation presented in this paper establishes beyond credible doubt the existen ce of two new types of light that are totally outside any pos sibility of treatment via 20th century physical knowledge, but are fully treatable via the new methods [1-15] specifically d eveloped to treat neutral or charged antimatter at the class ical as well as particle levels. On industrial grounds , the findings presented in this paper establish, also beyond credible doubt, the utility of Santilli telescopes, not only for basically novel astrophysi cal advances, but also for issues pertaining to persona l, industrial and national security. The author would like to stress that, being a scien tist, his duty is only that of reporting the documentation on the existence of ITE-1 and ITE-2, with the understanding that their identification , or lack thereof, belongs to the U.S. Government. The original photos presented in this paper shall b e made available to qualified colleagues for supervised in spection. More importantly, pairs of Galileo and Santilli tel escopes are in production and subsequent sale in various sizes (Figure 3)   American Journal of Modern Physics 2016; 5(3): 45-5 3 53 at the U. S. publicly traded company Thunder Energies Corporation (www.thunder-energies.con), and they can be made available at no cost for supervised verificati ons anywhere in the U. S. A. References [1] R. M. Santilli, “Isonumbers and Genonumbers of Dimen sions 1, 2, 4, 8, their Isoduals and Pseudoduals, and; Hi dden Numbers; of Dimension 3, 5, 6, 7,” Algebras, Groups and Geometries Vol. 10, 273 (1993), http://www.santilli – foundation.org/docs/Santilli-34.pdf. [2] R. M. Santilli, “Representation of antiparticles via isodual numbers, spaces and geometries,” Comm. Theor. Phys. vol. 3, 1994, pp. 153-181, http://www.santillifoundation.org/docs/Santilli-112 .pdf. [3] R. M. Santilli, “Nonlocal-Integral Isotopies of Diff erential Calculus, Mechanics and Geometries,” in Isotopies of Contemporary Mathematical Structures,” P. Rendiconti Circolo Matematico Palermo, Suppl. Vol. 42, 7-82 (19 96), http://www.santilli-foundation.org/docs/Santilli-37 .pdf. [4] R. M. Santilli, “Does antimatter emit a new light?” Invited paper for the proceedings of the International Confe rence on Antimatter, held in Sepino, Italy, on May 1996, Hyp erfine Interactions vol. 109, 1997, pp. 63-81, http://www. santilli- foundation.org/docs/Santilli-28.pdf [5] R. M. Santilli, Isodual Theory of Antimatter with Ap plications to Antigravity, Grand Unifications and Cosmology, S pringer (2006), http://www.santilli-foundation.org/docs/san tilli-79.pdf. [6] R. M. Santilli, “The Mystery of Detecting Antimatter Asteroids, Stars and Galaxies,” The American Instit ute of Physics, in press, 2012, http://www.santilli- foundation.org/docs/antimatter-asteroids.pdf. [7] R. M. Santilli, “Apparent detection of antimatter ga laxies via a telescope with convex lenses,” Clifford Analysis, Cli fford Algebras and their Applications vol. 3, 2014, pages 1-26 (Cambridge,UK),http://www.santilli- foundation.org/docs/Antimatter-telescope-2013-final .pdf.

Source: 10.11648.j.ajmp.20160503.14 – ITE-paper-12-15-15.pdf

Antimatter-telescope-2013-final

CLIFFORD ANALYSIS, CLIFFORD ALGEBRAS AND THEIR APPLICATIONS
CACAA – http://www.cliordanalysis.com
Vol. 3, No. 1, pp. 1-26, 2014

c CSP – Cambridge, UK; I&S – Florida, USA, 2014
APPARENT DETECTION OF ANTIMATTER
GALAXIES VIA A REFRACTIVE TELESCOPE
WITH CONCAVE LENSES
Ruggero Maria Santilli 1
1 The Institute for Basic Research 150 Rainville Rd, Tarpon Springs, FL 34689, U.S.A.
? Corresponding Author. E-mail: basicresearch@i-b-r.org
Abstract. In preceding works, the author has: 1) developed an anti-Hermitean image of the
mathematics used for matter characterized by a map called isoduality and denoted with the
upper symbol d; 2) achieved the isodual classical representation of neutral antimatter via the
conjugation of all physical quantities and their units, thus resolving the inconsistencies of
negative energies; and 3) shown that the the isodual (antimatter) light has negative energy
Ed = 􀀀E, experiences a negative curvature tensor Rd = 􀀀R gravitational repulsion) when
in a matter gravitational eld, and possesses a negative index of refraction nd = 􀀀n when
propagating within a transparent matter medium. In this paper, we show, apparently for the
rst time, that the only possible detection of antimatter light with a negative index of refraction
is that via a telescope with concave lenses; we build the rst known antimatter telescope
verifying these conditions; and report the rst known detection of images apparently focused
by a telescope with concave lenses, which images appears as being of darkness, rather than
light, thus supporting the negative energy of their origination. In the event conrmed, these
unusual images may result in being the rst detection of antimatter galaxies, antimatter asteroids
and antimatter cosmic rays. The main result of this paper is an apparent conrmation
of Dirac’s [5] original 1928 conception of antiparticles as possessing negative energy because
necessary for consistency with the negative energy of light in the electron-positron annihilation
e+ + e􀀀 􀀀!
+
d, the consistency of negative energies being apparently assured by
their treatment via the isodual mathematics. The paper ends with the suggestion to test the
gravity of the photons in the electron-positron annihilation and conduct other truly basic
tests on antimatter.
2010 PACS: 03.65.Ta; 14.60.Cd; 29.30.-h
Keywords:antimatter, isodual light, antigravity
2 Ruggero Maria Santilli
1 HISTORICAL NOTES
As it is well known, Newtons mechanics [1], Galileos relativity [2] and Einsteins special [3] and
general [4] relativities were conceived before the discovery of antimatter and, consequently,
they have no provisions for the classical representation of neutral antimatter since their only
conjugation is the sign of the charge.
In fact, the rigorous prediction of antimatter via the negative energy solutions of wave
equations was done by P. A. M. Dirac [5] in 1928, and experimentally veried in 1933 by C.
D. Anderson [6]. However, Dirac noted that particles with negative energy violate causality
and other physical laws and was consequently forced to represent antiparticles solely at the
level of second quantization in his celebrated equation.
A number of hypotheses were considered to resolve the causality problem of negative
energy solutions, such as the old hypothesis that antimatter evolves according to a negative
time (moves backward in time) as apparently necessary to represent the annihilation of matter
and antimatter.
However, Dirac is reported stating that this hypothesis does not solve the causality problem
of negative energy solutions because the Minkowski line element is quadratic in time,
thus admitting both motions forward and backward in time.
As a result of the inability by the Newtonian, Galilean and Einsteinian theories to provide
a classical representation of neutral antimatter, and Diracs restriction of the treat- ment of
antimatter solely at the level of second quantization, it has been generally believed for about
a century that antimatter does not exist in the large scale structure of the universe, and solely
exists at the particle level when produced in our laboratories.
However, our planet has been devastated in the past by antimatter asteroids, such as the
1908 Tunguska explosion in Siberia that had the energy equivalent of one thousand Hiroshima
atomic bombs, yet it left no crater or residue in the ground (that could be explained via an ice
comet), and excited the entire Earth atmosphere for several days (that can only be explained
via the annihilation of an antimatter asteroid in our atmosphere [7]).
Similarly, astronauts and cosmonauts have routinely detected
ashes of light in the upper
dark side of Earths atmosphere that can be best explained via antimatter cosmic rays
annihilating at the rst contact with our atmosphere [8]. Finally, large
ashes of light in our
upper atmosphere are routinely detected in various parts of our planet (see the websites of
NASA, FERMILAB, CERN and other laboratories).
In summary, there is sucient evidence indicating the possible risk that our planet is hit
again by a large antimatter asteroid, with consequential devastations on the grounds as well
as the disruption of all civilian, industrial and military communications for days due to the
excitation of our atmosphere.
It is evident that the physics community cannot responsibly address these risks without
the conduction of systematic studies on antimatter primarily at the classical level evidently
because antimatter asteroids cannot possibly be treated in second quantization. In turn,
no such a study can be seriously conducted without surpassing Newtonian, Galilean and
Einsteins theories via formulations specically conceived and constructed for the classical
treatment of antimatter as a premise for the subsequent quantization.
APPARENT DETECTION OF ANTIMATTER GALAXIES 3
2 ISODUAL MATHEMATICS
The author has been interested since his graduate studies at the University of Turin, Italy, in
the mid-960s to ascertain whether a far away galaxy is made up of matter or of antimatter.
He soon learned that Newtonian, Galilean and Einsteinian theories had no value for the
indicated problem since far away galaxies must be assumed to be neutral, in which case said
theories had no distinction whatsoever between matter and antimatter.
For this reason, the author initiated a long journey that rst required the identication
of mathematical means for the consistent classical distinction between neutral matter and
antimatter prior to any possible physical application. In this way, after years of search- ing
for an existing mathematics, the author discovered that a mathematics for the consistent
classical treatment of neutral (or charged) antimatter did not exist and had to be built.
Following the study of a number of alternatives, the author gave priority to the search for
new numbers since all mathematics used in physics must be based on a numeric eld as a
condition for experimental verications. In any case, all aspects of applied mathematics can
be built on a given numeric eld via simple compatibility arguments.
In 1993, the author [9] nally identied the desired new numbers under the name of of
isodual real, isodual complex and isodual quaternionic numbers, which verify the condition of
being anti- isomorphic to the conventional real, complex and quaternionic numbers, respectively.
The word isodual was suggested to indicate a duality under the preservation of the
conventional abstract axioms of numeric elds.
The crucial condition of anti-isomorphism was achieved via the anti-Hermitean conjugation
called isoduality and indicated with the upper symbols d of all elements of a numeric
eld and all its operations. Given a conventional eld F(n; 1) with elements n, m, : : :,
conventional associative product n m = nm and trivial unit 1, , Santilli isodual elds,
are denoted Fd(nd;d; 1d), and are characterized by a negative basic unit 1d = 􀀀1y = 􀀀1,
isodual numbers nd = n1d and isodual product
nd d md = nd(1=1d)md = nm1d:
Following the identication of the desired numbers, the author passed to the systematic
construction of the isodual image of all main mathematics used for the study of matter, including
functional analysis, dierential calculus, metric spaces, Lie algebras, symmetries, Euclidean,
Minkowskian and Riemannian geometries, etc. These isodual formulations were rst
presented in the mathematical memoir [10] and rst treated systematically in monographs
[11]. The resulting mathematics is today known as Santilli isodual mathematics. Independent
mathematical reviews and advances can be found in Refs. [12-14].
It may be of some value to indicate that isoduality is a new transformation not reducible to
parity and/or other conventional transformations. We should also recall the new symmetry
identied by the isodual mathematics, called isoselfduality [10,11], namely, the invariance
under the isodual transformation, which is veried by the imaginary number i id as well
as by Dirac’s equation.
Contrary to a possible perceptions of mathematical complexities, the isodual mathe- matics
needed for applications can be constructed via the application of the simple anti- Hermitean
map
Q 􀀀! Qd = 􀀀Qy
4 Ruggero Maria Santilli
provided it is applied to the totality of quantities and to the totality of their operations used
for the treatment of matter. Readers should be alerted that, in the absence of even one isodual
map, there are inconsistencies that generally remain undetected to non-experts in the eld.
Before appraising the results of this paper, readers are suggested to meditate a moment on
the dierences between conventional and isodual mathematics. As an illustration, a checking
account in the isodual world with $ 1M in the bank is in red because $ 1M is counted with
respect to the basic unit $1d = 􀀀$1 which is negative. Similar conjugations occur at virtually
all levels of study.
3 ISODUAL THEORY OF ANTIMATTER
After achieving mathematical maturity, the author initiated systematic applications of isodual
mathematics to the study of antimatter at the classical and operator levels as well for neutral
or charged antimatter, resulting in the new theory today called isodual theory of antimatter
as one of the branches of the broader hadronic mechanics (for brevity, see Refs. [22,32]).
A main feature is that all quantities that are positive (negative) for the study of matter
become negative (positive) for the study of antimatter, with the clarication that, for matter,
all positive and negative quantities are referred to positive units of measurements, while for
antimatter all negative and positive quantities are referred to negative units.
In particular, antimatter is predicted to have negative energy Ed = 􀀀E (exactly as conceived
by Dirac [5]) and evolves along a negative time td = 􀀀t according to an old attempt
to understand annihilation of matter and antimatter. Causality and other physical problems
are resolved by the isodual mathematics, since negative quantities are measured in terms of
negative units. Hence, antimatter evolving backward in time with respect to negative units of
time is as causal as matter evolving forward in time with respect to positive units of time. The
same holds for negative energy referred to negative units, and of other negative quantities.
The image under isoduality of the entirety of the formulations for matter including the
isodual image of all quantities and all their operations, with no exclusion at all, is today
known as Santillis isodual theory of antimatter (see monographs [11,22] and independent
works [12-14,25-32].
Ref. [10] (written in 1993) presented the rst known formulation of Newton equation
for classical and neutral antiparticles thanks to the isodual dierential calculus discovered
by Santilli in Ref. [10] and currently developed by the mathematician S. Georgiev in great
details [38]. The resulting equations are today known the Newton-Santilli isodual equations
md d ddvd
ddtd = Fd(td; rd; vd; : : :);
verify all known experimental data on the classical behavior of antiparticles, and are at
the foundation of all subsequent classical and operator formulations.
Ref. [11] (rst edition in 1993 and second edition in 1995) provided a systematic presentation
of the isodualities of Euclidean, Minkowskian and Riemannian geometries, Lie theory,
rotational, Galilean, Lorentz and Poincare symmetries, Galilean and special relativities,
and other basic formulations. In particular, Refs. [11] presented the rst known consistent
representation of the gravitational eld of an antimatter body via the Riemann-Santilli isodual
geometry.
APPARENT DETECTION OF ANTIMATTER GALAXIES 5
Ref. [15] of 1993 proposed a new isoselfdual cosmology (a cosmology verifying the new
symmetry of isoselfduality) for equal amounts of matter and antimatter, in which case all total
quantities of the universe, such as total time, total mass, total energy, etc., are identically
null to avoid a discontinuity at creation and set up the basis for continuous creation.
Fig. 1 The prediction of rRepulsion of antimatter light by a matter gravitational eld
Ref. [16] of 1994 conrmed the expected verication of the isodual theory with all particle
data on antimatter since, at the operator level, isoduality is equivalent to charge conjugation
by conception and construction. The main dierence is that isoduality applies at all levels
of treatment, beginning by conception at the classical level, while charge conjugation solely
applies at the operator level. Another important dierence is that isoduality maps our spacetime
into the new isodual spacetime, while charge conjugation maps our spacetime into itself.
It then follows that, according to isoduality, antimatter exists in a new spacetime, which
is distinct yet coexisting with our own spacetime while, according to conventional views,
antimatter exists jointly with matter in our spacetime.
Ref. [17] of 1994 indicated the prediction of the isodual theory at all levels, including the
Newton-Santilli, Minkowski-Santilli and Riemann-Santilli isodual formulations, that matter
and antimatter experience gravitational repulsion (antigravity). Ref. [17] then proposed the
measure of the gravity of positrons in horizontal
ight in a supervacuum and supercooled
tube.
Ref. [18] of 1997 presented technical aspects of the isodual special relativity studied in
Refs. [11] with particular reference to the hidden verication of special relativity axioms
under isoduality (due to the quadratic character of the Minkowskian line element), with the
understanding that matter-antimatter interactions are structurally beyond the sole use of
special rel- ativity beginning at the classical level and then, expectedly, at the operator level,
because requiring the joint use of special relativity and its isodual.
Ref. [19] of 1997 applied all preceding knowledge to initiate the study of antimatter-light,
the light emitted by antimatter, also called isodual light, resulting in a prediction of main
character for this paper according to which antimatter light is physically dierent than matter
light in an experimentally veriable way. Since the photon has no charge, the only possible
conjugation is that for all other physical quantities.
6 Ruggero Maria Santilli
Fig. 2 The prediction of negative index of refraction of antimatter light within matter water.
As a result, antimatter-light is predicted to possess negative energy while all other characteristics
are opposite to those of matter light. In particular, antimatter light is predicted to be
repelled by matter gravity (see Fig. 1), thus permitting the conception of experiments, e.g. via
neutron interferometry, to verify whether one of the two photons emitted in electron-positron
annihilation experiences repulsion in our gravitational eld.
Ref. [20] of 1998 presented an isotopic unication of Minkowskian and Riemannian geometries
for matter (namely, their unication into a single geometry and their dierentiation
via the generalized unit). Ref. [20] then presented their isodualities for point-like antimatter
in vacuum (exterior dynamical conditions) as well as for extended antimatter bodies moving
within physical media (interior dynamical conditions).
Ref. [21] of 1999 conrmed that isodual mathematics does indeed permit a consistent
classical representation of antimatter at the Newtonian, Minkowskian and Riemannian levels
in a way compatible with all available classical experimental data on antimatter.
Ref. [23] of 2006 presented a comprehensive study of antimatter in irreversible conditions
achieved via the Lie-admissible covering of Lie formulations.
Monograph [22] of 2006 presented a comprehensive study of isodual mathematics and its
application to antimatter, including one of the only known grand unication of electroweak
and gravitational interactions with the inclusion of antimatter at the gravitational level in a
way parallel to the treatment of antimatter in electroweak interactions. Ref.[22] also indicated
the prediction of a causal spacetime machine and the need for isoduality to represent all four
directions of time existing in nature, namely, motion forward to future time t and forward
from past time 􀀀t, as well as motion backward in past time td and backward from future
time 􀀀td.
Ref. [24] of 2012 addressed the open problem of the detection of possible antimatter
asteroids and presented the rst known hypothesis that antimatter light possesses a negative
index of refraction nd = n when propagating within a transparent matter medium. Again,
the consistent characterization of neutral antimatter requires the conjugation of all quantities
APPARENT DETECTION OF ANTIMATTER GALAXIES 7
Fig. 3 The two identical Galileo telescopes and the camera on arrival.
with no exclusion to avoid catastrophic inconsistencies. This implies the necessary conjugation
of the index of refraction into a negative value referred to our positive units of measurements
since it is observed in our matter world (see Fig. 2).
An important implication of the isodual theory of antimatter is the clarication that the
conventional Dirac equation characterizes the tensorial product of one point-like particle with
spin 1=2 and its antiparticle without any need for second quantization (see Sect. 2.3.6 of Ref.
[22]). In essence, the author could not accept the conventional 20th century view that Dirac’s
equations represents only one particle with spin 1=2 because there exists no irreducible or
reducible representation of the SU(2)-spin symmetry with the structure of Dirac’s gamma
matrices. Therefore, the author re-inspected Dirac’s equation and showed that

k =

0 k
dk 0

; ^
4 =

I22 0
0 Id
22

;
thus yielding the indicated characterization of a spin 1=2 particle and its antiparticle.
In his genius, Dirac himself provided the true foundation of the isodual theory of antimatter
by characterizing antiparticles with the negative unit 􀀀I22. Dirac merely missed the
mathematics for the consistent physical treatment of negative energies. Note that there is no
contradiction for a representation of antiparticle at the quantum mechanical level because the
isodual theory of antiparticles applies at the classical level, let alone that of rst quantization.
The reader should be aware that a negative index of refraction implies that antimatter
light propagates within a transparent matter medium at superluminal speeds. A con- ceptual
interpretation of this prediction is that the ordinary (positive) index of refraction for matter
light propagating within a transparent matter medium is due to various, ultimately attractive
interactions that slow down the speed of matter light. By contrast, when antimatter light
propagates within a transparent matter medium, for consistency, all features of matter have
to be conjugated, resulting in new repulsive interactions between antimatter light and the
matter medium that, as such, accelerate antimatter light to superluminal speeds.
Numerous independent studies have been conducted on Santilli isodual theory of antimatter,
among which we indicate: the theoretician J. Dunning-Davies [25] who con- structed
the rst known thermodynamics of antimatter bodies; the experimentalists A. P. Mills [26]
and V. de Haan [27] who conrmed the feasibility and resolutory character of Santillis proposal
to test the gravity of positrons in horizontal
ight in a supervacuum and supercooled
8 Ruggero Maria Santilli
Fig. 4 The parallel mount of the Galileo and antimatter telescopes with related nder scopes.
tube (see monograph [22] for details); the mathematician B. Davvaz et al [28] who identied,
apparently for the rst time, the multi-valued, four dimensional hyperstructural character
of the universe suggested by two dierent yet coexisting spacetimes; the thermodynamicist
A. Bhalekar who studied in Ref. [30] Santillis representation of the four directions of time
[2] and in Ref. [31] the rst known study of antimatter in irreversible conditions via the
Lie-admissible formulations of ref. [23]; R. Anderson et al [31] who presented a review of
the isodual theory of antimatter which is an excellent introduction to this paper; and the
physicists I. Gandzha and J. V. Kadeisvili [32] who wrote a systematic outline of the various
studies here referred to for matter and antimatter.
4 THE ANTIMATTER TELESCOPE
In this section, we report the initiation of experimental verications or denial of the prediction
of the isodual theory of antimatter according to which a consistent conjugation from
matter to antimatter requires that antimatter light has a negative energy Ed = 􀀀E with
ensuing repulsion by a matter gravitational eld (Fig. 1 and Ref. [19]) and a negative index
of refraction (Fig. 2 and Ref. [24]).
To conduct the tests, we here introduce apparently for the rst time that, under these
premises, antimatter light from distant sources can only be focused via a new refracting telescope
with concave lenses, because a conventional telescope with convex lenses will disperse
light with a negative index of refraction.
It should be indicated from the outset that the above predictions imply that the human
eye cannot distinctly see far antimatter light sources since our iris has been designed by
nature to be convex in order to see matter light. As such, our eye will disperse throughout
the retina antimatter light with a negative index of refraction.
Consequently, all tests here reported have been conducted under the condition that possible
views of distant antimatter light have to be recorded with a suitable camera, and then
the pictures, their analyses and their enlargements can be seen by the human eye.
APPARENT DETECTION OF ANTIMATTER GALAXIES 9
Fig. 5 A close up view of the mounting of the camera directly in the telescope in place of the eyepieces.
We should also indicate from the outset that we expected no antimatter star in our galaxy.
Hence, the main hope of our tests has been to see whether there exist detectable far distant
antimatter galaxies, since a central open problem of contemporary astrophysics and cosmology
is to ascertain whether the universe is solely composed of matter galaxies or antimatter
galaxies also exist and, if so, what is their distribution.
Following the above clarications, we should indicate the expected existence in our galaxy
as well as in our planetary environment of possible antimatter asteroids [7] and antimatter
cosmic rays [8].
It should be noted that collisions between matter and antimatter bodies appear to be
minimized by nature in the event their gravitational repulsion [22] is conrmed. Similar
gravitational de
ections are expected for weak antimatter gamma and antiparticle radiations.
Only antimatter bodies and radiations with a threshold energy and a special trajectory can
eventually hit Earth according to the isodual theory of antimatter.
Regrettably, we had to exclude from our search the detection of possible antimatter asteroids
due to our lack of any knowledge at this writing on the optics of antimatter light, such
as the behavior of matter light from our Sun, when hitting an antimatter asteroid.
Therefore, our search was restricted to the detection of possible far away antimatter galaxies
and possible antimatter radiations annihilating in our upper atmosphere without unrealistic
expectations of nal resolutions in these rst tests, and the mere hope of results suciently
unresolved one way or the other to justify additional investments and more accurate tests.
After verifying the current lack of availability of a refracting telescope with concave lenses,
the author had no other alternative than that of securing from specialized opticians and their
companies the design and construction of the needed refracting telescope with concave lenses,
hereon refereed to as the antimatter telescope.
For these objectives: 1) we secured the design and fabrication of two identical Galileo
refracting telescopes (of course, both with convex lenses) and both without the star diagonal
viewer to avoid any unnecessary re
ection of antimatter light; 2) we had one of the two telescopes
converted to a concave version with identical but conjugated foci; 3) we secured one
single suitably selected camera to obtain pictures from both the Galileo and the antimat10
Ruggero Maria Santilli
Fig. 6 Main characteristics of the Galileo and antimatter primary lenses (courtesy of Jianmin Guo from
China).
Fig. 7 Schematic view of the telescopes with convex and concave lense (courtesy of Jianmin Guo from
China)
APPARENT DETECTION OF ANTIMATTER GALAXIES 11
ter telescopes; 4) we secured a tripod with mount suitable for the parallel housing of the
two telescopes; 5) we optically aligned the two telescopes on the tripod by keeping in mind
the evident impossibility of doing visual alignments with the antimatter telescope; 6) we
conducted a number of day views with the so mounted and aligned pair of Galileo and
antimatter telescopes to verify that astronomical objects visible in the former are not visible
in the latter; 7) we conducted a number of night views of the same region of the sky via
the so mounted and aligned Galileo and the antimatter telescopes; 8) we obtained a number
of pictures from both telescopes via the selected camera; and 9) we nally conducted a
comparative inspection of the pictures from both telescopes under a variety of enlargements
and contrasts to see whether the pictures from the antimatter telescope contained focused
images absent in the pictures from the Galileo telescope under the same enlargement and
contrast.
Fig. 8 Enlarged view of one of the streaks of matter light representing a far away matter star or galaxy
identied in the main picture of the Epsilon Alpha and Beta region of the night sky near Vega obtained on
November 7, 2013, via the Galileo telescope [34].
Along the above nine steps, we requested the astronomer Nilesh Vayada from India to
design for us two identical straight refracting Galileo telescopes with 100 mm eective primary
lenses, 900 mm focal length and with ratio 8.82, each having the nder scope, where
straight means without the star diameter viewer to avoid unnecessary de
ections of antimatter
light. Following acceptance of the drawings, the two telescopes were fabricated for us by
Galileo Telescope Makers, 503A, Prem Kunj, Navroji Lane, Ghatkopar (W) Mumbai 400 086,
12 Ruggero Maria Santilli
India (website http://www.galileotelescope.com). Fig. 3 shows the two identical Galileo refracting
telescopes on arrival to our laboratory at the Institute for Basic Research, 150 Rainville Rd,
Tarpon Springs, FL 34689, U.S.A. It should be indicated that the telescopes were ordered
under the assurance by the manufacturer that they could see galaxies.
Fig. 9 The rst focused streak of light detected in the antimatter telescope in the Epsilon Alpha and Beta
region of the night sky on November 7, 2013, expectedly originated by a far away antimatter galaxy [35].
Galileo Telescope Makers also supplied the selected camera by Cannon, model EOS 600D
with image sensor of type CMOS, and Bayer Filter. Light from the telescope primary lenses
passes through a Low-Pass lter, then through an IR and a UV Filter, then through a Pixel
Micro-Lens, and nally through a Pixel Color Filter after which light hits the pixel silicon
photo diode where there is the conversion of light into electric signals. The conversion from
analogue to digital allows the storage of raw data or their con- version into visible images
in the LCD screen, as well as for storage in said visible format. A re
ex mirror in front of
the camera sensor used for the viewnder is automatically retracted at the time an image
is captured. In all tests the camera was directly attached to the two telescopes via a T ring
adaptor and housed in lieu of the eyepieces. A picture of the camera is available in Figs. 4
and 5).
We then purchased an Orion Sky View Pro Equatorial Telescope Tripod model number
09829 equipped with an Orion Narrow Side-by-Side Plate model number 07956 for the housing
of the two telescopes in a parallel fashion (see also Figs. 4 and 5). The tripod is equipped
with three manually operated means for positioning the direction of the telescopes, one for
the altitude, one for for right ascention, and one for declination.
APPARENT DETECTION OF ANTIMATTER GALAXIES 13
Fig. 10 The second streak of light detected in the picture of the Epsilon Alpha and Beta region with the
antimatter telescope also expectedly due to another antimatter galaxy [35].
We then contacted the optician Jianmin Guo from China who designed the conversion
of the two lenses per our specications (Figs. 6 and 7). Following their approval
by us, we shipped one of the two telescopes to Guos company, Zhengzhou Union Optics
Co. LTD, No.10 ChenXu Road, Jinshui District, Zhengzhou City, China 450011 (web site
http://www.unionoptics.com) to perform the transformation of the telescope from the Galileo
form with 100 mm eective convex primary lenses, to our antimatter telescope with features
identical to those the Galileo one but conjugated as described above. Since the camera is
directly attached to the telescope without the eyepiece, this conversion essentially consisted
in the fabrication and assembly of concave lenses as per the data of Fig. 6. Fig. 7 provides a
comparative view of the Galileo and the antimatter telescope.
Following reception in late October 2013 from China of the telescope modied for antimatter,
we assembled the two telescopes in the above described tripod with parallel dual mount
and conducted their alignment during the daytime as follows: we rst aligned the nder scope
to the Galileo telescope via the view of a far object (a transformer in a far electric pole);
then we aligned the nder scope of the antimatter telescope to the same view of the Galileo
telescope; and nally aligned optically the antimatter telescope to the Galileo one. It should
be indicated that extreme accuracy in alignment of the two telescopes was of no relevance
for our initial tests. Our primary objective was to see whether or not antimatter galaxies can
be detected with our concave lens telescope, since the identication of their precise location
was quite unrealistic for these initial tests due to our current complete lack of knowledge of
the optics of antimatter light.
14 Ruggero Maria Santilli
Fig. 11 The third streak of light detected in the picture of the Epsilon Alpha and Beta region with the
antimatter telescope also expectedly due to a third antimatter galaxy [35].
Following the availability of the so mounted and aligned pair of telescopes, we initiated
night views by rst conrming that, as expected, any celestial object visibly focused by the
Galileo telescope was not focused at all with the antimatter telescope. In particular, the view
of details of our Moon, which were very nicely focused by the Galileo telescope, resulted in
a diuse light when seen from the antimatter telescope without any possible identication.
The same occurred for planets and nearby matter stars.
Following the above preparatory steps, we nally initiated preliminary views of the sky at
night with said pair of telescopes. Among a variety of tests not indicated here for brevity, we
report the tests conducted between 10 and 11 pm of November 7, 2013, at the Gulf Anclote
Park, Holiday, Florida, GPS Coordinates: Latitude = 28.193 , Longitude = -82.786.
The camera was set at the exposure of 15 seconds for the specic intent of having streaks
of light from far away matter stars caused by Earth rotation, since streaks can be better
identied with the limited capabilities of the available telescopes compared to individual dots
of light in the pictures. Additionally, streaks from matter stars have a clear orientation as well
as length that are important for the identication of possible streaks from antimatter light.
Following various tests, we selected the setting of the camera at ISO 1600 because various
tests with smaller and bigger ISO resulted inconclusive and ambiguous for various reasons.
Detailed values of the various additional settings of the camera are available from Ref. [33].
All pictures were analyzed by the expert photographer Scott Randall of Night Fox Productions,
P. O. Box 252, Dunedin, Florida 34697,U.S.A.(websitewww.NightFoxProductions.com)
who conducted extensive analyses with particular reference to the identication of the background
as well as impurities in the camera sensors that are evidently present in both pictures
from the Galileo and the antimatter telescope.
APPARENT DETECTION OF ANTIMATTER GALAXIES 15
Fig. 12 The rst streak of darkness identied in the picture of the Epsilon Alpha ane Beta region of the
night sky taken on November 7, 2013, with the antimatter telescope [35] providing possible evidence of a far
away antimatter star or galaxy as an alternative for the streaks of light.
Fig. 13 Another representative streak of darkness present in the antimatter telescope [35] but absent in the
Galileo telescope that may constitute an alternative to the streak of light.
16 Ruggero Maria Santilli
The camera was rst focused in the Galileo telescope via the rack and pinion of the
telescope terminal and via the sharpness of the view in the camera optical view nder. The
position of the rack and pinion was marked. When the camera was used in the antimatter
telescope, the only possible focus was to assure that the position of the rack and pinion was
the same as that of the Galileo telescope due to the identity of the foci (Figs. 6 and 7).
Following these preliminaries, we oriented the telescopes at the indicated location and
time toward the star Vega, and then specialized the orientation for the pair of matter stars
Epsilon Alpha and Epsilon Beta near Vega. In order to properly interpret expected anomalies
Fig. 14 Seemingly connected streaks of darkness identied in a picture of the Vega region of the night
sky on November 7, 2013, with the antimatter telescope that could be due to the annihilation of a shower of
small antimatter asteroids in our atmosphere, in a way much similar but the conjugate of the frequent view
in the night sky of the streaks of light caused by the annihilation of a shower of small matter asteroids in our
atmosphere.
in the pictures, we should recall the following properties of the isodual theory of antimatter
[22].
As indicated in Sect. 3, isodual mathematics predicts that antimatter possesses negative
energy according to Dirac’s original conception [5], although referred to a negative units of
energy when considered in the antimatter world.
When antimatter is considered in the matter world represented with a conventional Hilbert
state j >, a rst line of current thinking is that the energy of antimatter is positive. This view
can be represented via the isodual eigenvalue equation
Hd d j >= E j >; E > 0;
where d is the product in the antimatter world. In this case, antimatter light hitting the
pixels of the camera should produce the same voltage and, therefore, the same image as those
of matter light. Hence, we rst looked for ordinary streaks of light that are present in the
APPARENT DETECTION OF ANTIMATTER GALAXIES 17
pictures from the antimatter telescope but absent in the Galileo telescope. In particular, we
used a camera exposure causing a streak of light (due to Earth’s rotation) suciently long
to be clearly distinguishable from the background.
Fig. 15 The rst of numerous circular traces identied in a picture of Vega regions of the night sky on Nov
ember 7, 2013, with the antimatter telescope that could be due to the annihilation of an antimatter cosmic
ray.
However, our current knowledge of antimatter is extremely limited. Therefore, we have
to consider for completeness the possibility that antimatter light is received by the camera
pixels as having a negative energy from the alternative eigenvalue equation
Hd j >= 􀀀E j >; E > 0;
where “” is now the product in our matter world as requested by isodual mathematics. In
this second case, antimatter light hitting the pixels of the camera are expected to produce
a voltage opposite that of matter light, thus causing a streak of darkness, rather than light.
This suggested the additional search for streaks of darkness that are present in the pictures
from the antimatter telescope but absent in those from the Galileo telescope.
In regard to the alternative of streaks due to positive or negative energies, we should
recall that the invariance under isoselfduality (veried by Diracs equation [22]) requires that
matter-antimatter annihilation jointly produces matter and antimatter liht. This can be seen
from the conventional particle reaction
e+ + e􀀀 􀀀!
+

which isoselfduality is veried in the left but not in the right side. The verication of isoselfduality
for both sides then requires the revised formulation
18 Ruggero Maria Santilli
e+ + e􀀀 􀀀!
+
d
resulting in the indicated production of two lights (see Ref. [24] for apparent insuciencies of
Feynman’s diagrams for particle-antiparticle annihilation due to violation of the isoselfdual
invariance, impossibility of representing annihilation via the notion of particle exchange, and
other shortcomings).
Consequently, any conrmation that antimatter light has a negative energy, either via the
pictures of this paper or via the possible experimental detection of gravitational repulsion for
antimatter light in a matter eld, would conrm Dirac’s original conception of antiparticles
as having negative energy [5[ while isomathematics would resolve known inconsistencies.
Following the above clarications for a tentative interpretation of expected anomalies, we
provide in Ref. [34] the main picture of the indicated Epsilon Alpha and Beta region of the
sky from the Galileo telescope in both compiled and raw forms, where one can easily identify
the Epsilon Alpha and Epsilon Beta pair of matter stars near Vega.
Fig. 8 provides the typical view of a far away matter star or galaxy in the indicated region
of the sky which view can be easily identied in the main picture of Ref. [34] under suitable
magnication. One should note the length and orientation of the streak of light of Fig. 8
due to Earths rotation during the 15 second exposure, as well as its weakness due to the
fact that the sky was inspected in an essentially urban area with consequential unavoidable
diuse luminescence. An additional reason for the weakness of the streak is that the tests
were conducted at the Gulf Anclote Park which is at the edge of the Gulf of Mexico, thus
implying signicant humidity of the air, with ensuing additional weakness of the streaks of
light due to water absorption of light. The reader should keep in mind these limitations so
as to avoid the expectation of the detection of brilliant streaks of light in the antimatter
telescope.
Ref. [35] provides the compiled and raw forms of the corresponding pictures of the same
region of the sky from the antimatter telescope.
As indicated above, in our analysis of the latter picture we rst identied streaks of light
reported in Figs. 9 to 11 that are present in the antimatter telescope but can arguably be
conceived as being absent in the Galileo telescope. The magnication has been obtained via
the Gimp 2.8 software. The position of the anomalous streaks of light of Figs. 9 to 11 is
indicated with squares in the main picture visible under no magnications. The anomalous
streaks of light will then appear under suitable magnication.
It should be noted that streaks of light are of dicult identication, particularly for their
corresponding absence in the Galileo telescope, thus being unsettled at this writing, since the
background is also made up of light. We have indicated them in representation of the current
rst line of thinking that antimatter light, and therefore antiparticles, have positive energy.
It should also be noted that the focal position of the camera was accurately marked in the
transition from the Galileo to the antimatter telescope, but not its angular orientation due to
the primitive character of the available equipment, thus implying possible small dierences
in orientation of the streaks in the Galileo and antimatter telescopes. Hence, expectations of
extreme accuracy in the orientation of the matter and antimatter streaks would be unrealistic
for these rst tests.
As indicated above, we additionally conducted a search for streaks of darkness in the main
pictures of the indicated Epsilon Alpha and Beta region of the night sky from the antimatter
telescope under the conditions that: 1) said streaks are present in the antimatter telescope
APPARENT DETECTION OF ANTIMATTER GALAXIES 19
Fig. 16 View of a circular trace identied in a picture of Deneb regions of the night sky with the antimatter
telescope.
but not in the Galileo telescope; 2) the streaks have approximately the same orientation and
length of the streak of matter light of Fig. 8; and 3) the streaks are clearly distinguished from
the background. Note that, since the background is predominantly that of light, streaks of
darkness are more distinguishable than those of light, thus being less controversial.
Two representative streaks of darkness verifying these requirements are reported in Figs.
12 and 13. Note the apparent clear organization of dark pixels over illuminated ones with
a low statistical probability if occurring at random. The streaks of Figs. 12 and 13 are
here tentatively presented as providing possible evidence, following due verications, that
antimatter light may cause fpcused images of darkness when hitting the pixels of the selected
camera (that was evidently produced to detect matter light).
In Fig. 14 we present seemingly correlated streaks of darkness of unknown origin, but
which could be arguably due to a shower of small antimatter asteroids annihilating in or
passing through our upper atmosphere. This is due to the fact that their orientation is not
compatible with that caused by the fteen second exposure of the camera as set by the streak
of Fig. 8, thus solely allowing for interpretation an essentially instantaneous event.
It should be noted that the author could locate no additional, clearly identied streaks
of light or darkness in pictures of various regions of the sky obtained with the antimatter
telescope besides the streaks reported in Figs. 9 to 14, although the search was at random
and denitely not systematic. Arguably, the absence of additional streaks besides those of
the Epsilon Alpha and Beta region could be due to the fact that possible antimatter galaxies
are too much far away for the very limited possibilities of the used 10 cm telescopes, thus
suggesting the construction of a bigger pair of Galileo and antimatter telescope for their
possible dection.
20 Ruggero Maria Santilli
Besides said linear streaks, the author has identied numerous, completely unexpected
circular traces in pictures of the Epsilon Alpha and Beta region as well as in other regions
of the night sky, which traces are present in the antimatter but not in the Galileo telescope.
Representative examples of these circular traces are reproduced in Figs. 15 to 19. As one can
see, these circular traces all have approximately the same diameter for a given magnication;
and are clearly distinct from the background.
Fig. 17 View of a circular trace identied in a picture of Altair regions of the night sky with the antimatter
telescope.
After due analysis, it is possible that these circular traces might be due to the annihilation
of antimatter cosmic rays in the upper region of our atmosphere, thus yielding approximately
the same diameter of the trace at sea level due to the same travel in air. This interpretation
is also suggested by the fact that the circles show no motion during the fteen seconds of
exposure, thus implying extremely fast events. An additional aspect supporting the indicated
interpretation is the variety of the circular traces identied by the author in numerous regions
of the sky.
It can be argued that, during the annihilation, of possible antimatter cosmic rays in our
atmosphere matter light may quickly dissipate in the atmosphere, while antimatter light may
continue its path along the original direction. The detected circles might then characterize,
in reality, a cone of antimatter light.
In the event conrmed, these circular traces would be the rst detection at sea level of the

ashes of light seen by astronauts and cosmonauts in the upper dark side of our atmosphere.
Note that, again in case of verications, the
ashes seen by astronauts and cosmonauts would
only be originated by matter light due to the convex character of our iris, while our view at
sea level would be due to antimatter light seen via concave lenses.
APPARENT DETECTION OF ANTIMATTER GALAXIES 21
Note that the circular traces could also be due to antimatter gamma rays, their arrival
at sea level in the forms of cones being possibly due to eects inherent in the yet unknown
optics of antimatter light.
As one can see, the circular traces appear to be predominantly, but not denitely due to
circles of darkness, rather than light. Consequently, the circular traces of darkness of Figs.
15 to 19 support the hypothesis that antimatter light causes images of darkness, rather than
light, in a camera built for matter light.
A resolution of the alternative between images of light or darkness suggests the of a
special camera with inverted sign of the pixel voltage, or other means under which matter
light is detected as darkness in order to see whether antimatter light produces visible images.
Needless to say, the construction of such a special camera should be complemented with the
construction of bigger and more accurate pair of Galileo and antimatter telescopes.
There is no doubt that, besides the above proposed special camera and bigger telescopes,
a considerable amount of additional mathematical, theoretical and experimental research is
needed for the resolution of the background central issues: whether matter-antimatter annihilation
veries the symmetry of isoselfduality; whether annihilation jointly produces distinct
matter and antimatter light; and whether antimatter and/or light experiences gravitational
repulsion in a matter eld.
Among the needed research, we indicate: the great need to develop the antimatter optics,
also called by the author isodual optics [24]; the measurement of the gravity of the positron
in horizontal
ight in a supervacuum and supercooled tube [22,26,27]; and the experimental
resolution whether the two photons emitted in the electron positron annihilation
e+ + e􀀀 􀀀!
+
d
both experience gravitational attraction, or one experience attraction and the other repulsion.
Until all this basic knowledge is achieved, any resolution of the origin of the anomalous
streaks and circles reported in this paper, whether in favor or against, will be purely illusory.
It should be noted that the cap[ability by a telescope with concave lenses to focus images
appears to be an experimental verication of the novel isodual dierential calculus [10,38[.
Additional information in the above measurements can be found in Ref. [39[.
5 CONCLUDING REMARKS
Following a rather long scientic journey for the construction of the isodual theory of neutral
or charged antimatter applicable at all levels of treatment, from classical mechanics to second
quantization, the author has presented in this paper apparently for the rst time pictures
of the Epsilon Alpha and Beta region of the night sky via a telescope with concave primary
lenses as suggested by isodual mathematics.
These pictures show anomalous streaks and circles that are absent in pictures of the same
region of the sky from a Galileo telescope, thus suggesting antimatter as their origination,
and their main common feature is that of being streaks and circles of darkness, rather than
light, as it should be after all expected under matter-antimatter conjugation, by therefore
supporting the negative energy of light predicted by the isodual theory of antimatter.
In the event conrmed, the anomalous traces presented in this paper may emerge as being
the rst experimental detection of antimatter galaxy, antimatter asteroids and antimatter
cosmic rays.
22 Ruggero Maria Santilli
Fig. 18 View of a circular trace identied in a picture of Sadr regions of the night sky with the antimatter
telescope.
The main result of this paper is an apparent conrmation of Dirac’s [5] original 1928
conception of antiparticles as possessing negative energy because necessary for consistency
with negative energy of light in the electron-positron annihilation, the inconsistencies of
negative energies being apparently assured by their treatment via the isodual mathematics.
The author would like to close this paper with a call of the physics community to balance
experiments at very high energies with complementary experiments at very low energies,
because the former do not appear to have new objectives worth the use of large public funds,
while only the latter can yield fundamental new advances in virtually all scientic elds.
In particular, we recommend the measurement of the gravity of the positron in horizontal

ight [22,26,27] (with caution in the use of antiprotons expressed in Appendix A due their
possible confusion with the pseudoproton and other reasons), as well as the complementary
measurement of the gravity of the photons produced in electron-positron annihilation [24].
Only these tests can yield the necessary scientic knowledge to prevent that Earth is
devasted again by a large antimatter asteroid without the physics community being able to
provide any advance detection.
6 APPENDIX A: Antiprotons or pseudoprotons?
A few words of caution should be voiced in regard to other proposed measurements of the
gravity of antimatter in a matter eld via current production of antiprotons [36]. This is
due to the fact that, in the event the isodual theory of antimatter is conrmed, true matterantimatter
annihilations solely produce light without any residual particles or antiparticles,
as it was the case for the 1908 Tunguska explosion in Siberia (since the production of particles
would have destroyed all trees in the ground).
APPARENT DETECTION OF ANTIMATTER GALAXIES 23
Fig. 19 View of a circular trace identied in a picture of Gienah Cyngi regions of the night sky with the
antimatter telescope.
But the currently claimed proton-antiprotons annihilations, such as that of the Bose-
Einstein correlation, produce a large number of particles, as well known (see Ref. [32] for
a review and quotations), thus casting shadows as to whether the particles currently called
“antiprotons” are truly characterized by antimatter or they are at least in part the “pseudoprotons”
predicted by hadronic mechanics[37].
In essence, at the time a proton beam hits a matter target as it is the case for the currently
production of apparent antiprotons, we have all the necessary energy for the synthesis of the
neutron from a proton and an electron
p+ + e􀀀 􀀀! n + ;
as occurring in the core of a star. This synthesis is quantitatively represented solely by
hadronic mechanics due to 0.782 excess rest energy of the neutron over the sum of the rest
energies of the proton and the electron that would require, for the use of quantum mechanics,
a “positive binding energy” under which the Schrodinger’s equation becomes inconsistent in
favor of its non-unitary covering equation of hadronic mechanics (for brevity the review and
quotations, see also Chapter 6 of Ref. [32]).
Following the quantitative representation of the neutron synthesis, hadronic mechanics
quite easily predicts the “pseudoproton” which is characterized by the synthesis of the proton
and an electron pair in singlet coupling (as normally existing in atomic orbitals of the target),
p+ + (e􀀀
” ; e􀀀
# )J=0 􀀀! ~p
(without any need to emit the hypothetical neutrino), yielding a fully “matter” particle
without any antiparticle content, with a negative elementary charge, a meanlife similar to
24 Ruggero Maria Santilli
that of the isolated neutron (about fteen minutes) and a mass close to that of the proton
due to the apparent balance between the negative energy of the strongly attractive Coulomb
interactions at very short distances with the positive energy due to the isorenormalization of
rest energies under deep wave overlapping as necessary for the synthesis of the neutron (see
Ref. [37] for here inessential calculations mostly similar to those for the neutron synthesis).
It is evident that the pseudoproton can quickly capture a positron to form a kind of
“hybrid Hydrogen atom” composed by a matter nucleus and an orbiting antimatter particle,
thus being predominantly constituted by matter. Consequently,experiments via the use of the
currently produced “antiprotons” and related “anti-Hydrogen atoms” are predicted by hadronic
mechanics to yield a full gravitational attraction, thus being potentially insidious for basic
advances in antimatter, unless the claimed antiprotons are truly proved to be as such via
consistent annihilation processes and not via the sole measurement of the charge and mass.
In view of these and other ambiguities, the author has stressed in Ref. [22] the need that
the rst test of the gravity of antimatter be done with positrons in our matter eld, since
positrons are the only certain antiparticle known at this writing.
7 ACKNOWLEDGMENTS
The author has no words to thank Alex Nas of Thunder Fusion Corporation and Scott Randall
of Night Fox Computer Services for invaluable technical assistance without which this
paper would not have been completed within a reasonable period of time. Additional thanks
are due for penetrating criticisms and comments to all participants of the following meetings
where the isodual theory of antimatter was discussed in detail: the International Conference
on Antimatter held in Sepino, Italy. in June 1996; the Third International Conference on the
Lie-admissible Treatment of Irreversible Systems of Matter and Antimatter held on January
2011 in Nepal; the International Conference on Antimatter Astrophysics held at the Republic
of San Marino in September 2011; the International Workshop on Hadronic Mechanics
for Matter and Antimatter held in September 2012 in Kos. Greece, as part of 2012 ICNAAM;
the Workshop on Santillis New Mathematics for 21st Century Sciences held in April
2013 in India; the International Conference on Iso-, Geno- Hyper- and Isodual Mathematics
held in Rhodes, Greece, in September 2013 as part of 2013 ICNAAM: and the International
Workshop on Hadronic Chemistry, Mathematics and Physics held in October 2013 India.
Prior to this paper, the author solely presented the antimatter telescope at the above indicated
2013 meeting in Rhodes via power point available from the link http://www.santillifoundation.
org/docs/antimatter-telescope-2013.pptx The author would like to thank the audience
for not so frequent grace and interest shown in being exposed to such an unusually
dierent telescope, which are a sign of serious commitment to research intended as the pursuit
of new knowledge. Additional thanks are due to the referees of this paper for its in depth
critical analysis, and to Dorte Zuckerman for its editorial control, although the author is
solely responsible for the content due to various subsequent nalizations.
References
[1] Newton, J. Philosophia Naturalis Principia Mathematica (1687), translated by Cambridge University
Press 91934).
APPARENT DETECTION OF ANTIMATTER GALAXIES 25
[2] Galileo, G. Dialogus de Systemate Mundi, 1638, Reprinted by MacMillan, New York,1917.
[3] Einstein, A. Ann. Phys. (Leipzig) 1905, 17, 891.
[4] Einstein, A. Sitzungsberichte der Preussischen Akademie der Wissenschaften zu Berlin 1915, 844847.
[5] Dirac, P. A. M. Proceedings of the Royal Society 1928,,117, 610624.
[6] Anderson, C. D. Phys.Rev. 1933, 43, 491.
[7] Dermer ,C. D. Gamma-Ray Bursts from Comet-Antimatter Comet Collisions in the Oort Cloud. In C.
Kouveliotou, M. S. Briggs, and G. J. Fishman. 384. The Third Huntsville Symposium on Gamma-Ray
Bursts, Huntsville AL, USA, October 1995, 2527, Woodbury: American Institute of Physics. pp. 744748.
[8] Rojansky, V. Cosmic Rays and Comets, Phys. Rev. 58, 1010 – 1010 (1940).
[9] Santilli, R. M. Isonumber and genonumbers of dimension 1, 2, 4, 8, their isoduals and pseudodu-
als, and hidden numbers of dimension 3, 5, 6, 7, Algebras, Groups and Geometries 1993, 10, 273-321

Click to access Santilli-34.pdf

[10] Santilli, R. M. Nonlocal-Integral Isotopies of Dierential Calculus, Mechanics and Geometries, in Isotopies
of Contemporary Mathematical Structures, Rendiconti Cir- colo Matematico Palermo, Suppl. 1996, 42,
7-82 http://www.santilli-foundation.org/docs/Santilli-37.pdf
[11] Santilli, R. M. Elements of Hadronic Mechanics,Volumes I and II Ukraine Academy
of Sciences, Kiev, 1995, http://www.santilli-foundation.org/docs/Santilli-300.pdf

Click to access Santilli-301.pdf

[12] Kadeisvili, J. V. Foundations of the Lie-Santilli isotheory and its isodual, Rendiconti Circolo Matematico
Palermo, Suppl. 1996, 42, 83-185 http://www.santilli-foundation.org/docs/Santilli-37.pdf
[13] Corda, C. Introduction to Santillis IsoNumbers, AIP Conf. Proceed.2012, 1479, 1013 http://www.santilli-
foundation.org/docs/Corda-2012.pdf
[14] Muktibodh, P. S. Introduction to Isodual Mathematics and its Application to Special Relativity, American
Institute of Physics Proceedings 2013 http://www.santilli- foundation.org/docs/P-Muktibodh.pdf
[15] Santilli, R. M. A new cosmological conception of the universe based on the isominkowskian geometry and
its isodual, Part I pages 539-612 and Part II pages Contributed paper in Analysis, Geometry and Groups,
A Riemann Legacy Volume, Volume II, H.M. Srivastava, Editor, pp. 539-612 (1993)
[16] Santilli, R. M. Representation of antiparticles via isodual numbers, spaces and geometries, Comm. Theor.
Phys. 1994 3, 153-181 http://www.santilli-foundation.org/docs/Santilli-112.pdfAntigravity
[17] Santilli, R. M. Antigravity, Hadronic J. 1994 17, 257-284 http://www.santilli-
foundation.org/docs/Santilli-113.pdfAntigravity
[18] Santilli, R. M. Isotopic relativity for matter and its isodual for antimatter,Gravitation 1997, 3, 2.
[19] Santilli, R. M. Does antimatter emit a new light? Invited paper for the proceedings of the International
Conference on Antimatter, held in Sepino, Italy, on May 1996, published in Hyperne Interactions 1997,
109, 63-81 http://www.santilli-foundation.org/docs/Santilli-28.pdf
[20] Santilli, R. M. Isominkowskian Geometry for the Gravitational Treatment of Matter and its Isodual for
Antimatter, Intern. J. Modern Phys. 1998, D 7, 351 http://www.santilli-foundation.org/docs/Santilli-
35.pdfR.
[21] Santilli, R. M. Classical isodual theory of antimatter and its prediction of antigrav-ity, Intern. J. Modern
Phys. 1999, A 14, 2205-2238 http://www.santilli-foundation.org/docs/Santilli-09.pdf
[22] Santilli, R. M. Isodual Theory of Antimatter with Applications to Antigravity, Grand Unication and
Cosmology, Springer (2006).
[23] Santilli, R. M. Lie-admissible invariant representation of irreversibility for matter and antimatter
at the classical and operator levels, Nuovo Cimento B, Vol. 121, 443 (2006) http://www.santilli-
foundation.org/docs/Lie-admiss-NCB-I.pd
[24] Santilli, R. M. The Mystery of Detecting Antimatter Asteroids, Stars and Galaxies, American Institute
of Physics, Proceed. 2012, 1479, 1028-1032 (2012) http://www.santilli-foundation.org/docs/antimatter-
asteroids.pdf
[25] Dunning-Davies, J. Thermodynamics of antimatter via Santillis isodualities. Found. Phys. 1999,Vol. 12,
page 593 (1999) http://www.santilli-foundation.org/docs/Isodual-therm.pdf
[26] Mills, A. P. Possibilities of measuring the gravitational mass of electrons and positrons in free hor-
izontal
ight, contributed paper for the Proceedings of the International Conference on Antimatter,
held in Sepino, Italy, May 1996, published in the Hadronic J. 1996 19, 77-96 http://www.santilli-
foundation.org/docs/Santilli-11.pdf
26 Ruggero Maria Santilli
[27] de Haan, V. Proposal for the realization of Santilli comparative test on the gravity of electrons and
positrons via a horizontal supercooled vacuum tube, Proceedings of the Third International Conference
on the Lie-Admissible Treatment of Irreversible Processes, C. Corda, Editor, Kathmandu University,
2011, pages 57-67 http://www.santilli-foundation.org/docs/deHaan-Arxiv.pdf
[28] Davvaz, B. Santilli, R. M. and Vougiouklis T. Studies of Multi-Valued Hyperstruc- tures for the Char-
acterization of Matter-Antimatter Systems and their Extension, in Proceedings of the 2011 International
Conference on Lie-admissible Formulations for Irreversible Processes, C. Corda, editor, Kathmandu Uni-
versity, Nepal, 2011, http://www.santilli-foundation.org/Hyperstructures.pdf
[29] Bhalekar, A. Studies of Santillis isotopic, genotopic and isodual four directions of time, American In-
stitute of Physics proceedings, 1558, 697-701 (2013 http://www.santilli-foundation.org/docs/Bhalekar-
2013-I.pdf.
[30] Bhalekar A. Santillis Lie-Admissible Mechanics. The Only Option Commensurate with Irreversibility and
Nonequilibrium Thermodynamics, American Institute of Physics proceedings, 2013 http://www.santilli-
foundation.org/docs/ANIL BHALEKAR-Rhodes-I.pdf
[31] Anderson, R. Bhalekar, A. A. Davvaz, B. Muktibodh, P. Tangde, V. M. and T. Vou- giouklis, T. An intro-
duction to Santilli isodual theory of antimatter and the ensuing problem of detecting antimatter asteroids,
Numta Bulletin 2012-2013, 6, 1-33 http://www.santilli-foundation.org/docs/Antimatter-2013.pdf
[32] Gandzha, I. and Kadeisvili, J. V. New Sciences for a New Era: Mathematical, Physical and Chem-
ical Discoveries of Ruggero Maria Santilli, Sankata Printing Press, Nepal, 2011 http://www.santilli-
foundation.org/docs/RMS.pdf
[33] Santilli, R. M. Camera settings, http://www.santilli-foundation.org/docs/ Camera-Settings.pdf
[34] Santilli, R. M. Representative pictures from the Galileo telescope (72.4 MB), http://www.santilli-
foundation.org/docs/Galileo-Vega-system-2013.zip
[35] Santilli, R. M. Representative pictures from the Antimatter telescope (284 MB), http://www.santilli-
foundation.org/docs/Antimatter-Vega-system-2013.zip
[36] Chamberlain, O., Segr, E., Wiegand, C. E. and Ypsilantis, T. Phy O.s. Rev.,100 (1995) 947.
[37] Santilli, R. M., Antiprotons or pseudoprotons? IBR preprint TH339 􀀀 13, to appear (2014).
[38] Georgiev S., Foundations of the IsoDuerential Calculus, Vol.l. I, to appear. Preliminary version available
frfom the link http://www.santilli-foundation.org/docs/isohandbook.pdf
[39] Fleming P., Apparent detection of antimatter galaxies via Santilli telescope with concave lenses, PRWeb
Release. http://www.prweb.com/releases/2014/02/prweb11589410.htm

DETECTION OF ANTIMATTER GALAXIES,
ASTEROIDS AND COSMIC RAYS

1. Foreword

Dr. R. M. Santilli, Chief Scientist of Thunder Energies Corporation (see his Curriculum , Prizes and Nominations , Publications in antimatter , and the General Archives ) has conducted three decades of mathematical, theoretical and experimental studies on antimatter initiated in the early1980s when he was at at Harvard University under DOE support.

This extended research has produced basically new telescopes, today known as Santilli telescopes, which have been conceived, designed, constructed, tested and produced to detect antimatter galaxies, antimatter cosmic rays and antimatter asteroids (international patent pending irrevocably owned by TEC without royalty payments).

Since matter and antimatter annihilate at contact into light, as a condition for its existence at the classical macroscopic level, antimatter must have all characteristics opposite to those of matter. For instance, matter-light has a positive index of refraction while, as a condition for its existence, antimatter-light must have a negative index of refraction (Figure 1).

Consequently, the focusing of images of matter-light require convex lenses as occurring in the Galileo telescopes, while the focusing of images of antimatter-light requires concave lenses, as occurring in Santilli telescopes (Figure 2).

The above features imply that none of the refractive Galileo-type telescopes existing on Earth or in space can detect antimatter-light because they are all based on convex lenses.

Similarly, we will never see images of antimatter-light with our naked eyes because our cornea is convex, and as such, it disperses images of antimatter-light all over our retina. The sole possibility to detect images of antimatter-light is via images on a digital or film camera.

2. Detection of antimatter galaxies

The Santilli telescopes should always be used in pair with optically aligned conventional Galileo telescopes, both telescopes having the same diameter of the primary lenses. the same curvature of the primary lenses and the same focal distances, with the understanding that curvature and focal distances become negative for the Santilli telescopes (Figure 3).

Under these conditions, the detection of antimatter galaxies with a pair of the Galileo and the Santilli telescopes can be made according to the following rules (consult TEC for more technical information):

1) All alignments in the night sky are done with the Galileo telescope which is generally equipped with an eyepiece;

2) All images are taken from equal digital or film cameras in both the Galileo and the Santilli telescopes as shown in Figure 3;

3) Whether digital or film, the images from the two telescopes are subjected to the same magnification, until faint images become detectable over the background;

4) Digital cameras are sufficient for initial scans of the night sky, although much more detailed views can be obtained via a film camera; and

5) Images focused by the Santilli telescope are considered valid, if and only if, they do not exist in the images from the Galileo telescope under the same magnification.

Since antimatter galaxies cannot exist in our galactic environment and can only exist far away, their images are faint. Consequently, the detection of their images are suggested to be done with long camera exposures, such as exposures for 15 seconds.

This long exposure generates streaks in the digital cameras that, as such, can be clearly distinguished from the background as well as from impurities or imperfections of the cameras since said impurities and imperfections remain stationary.

The tracking of antimatter galaxies with the Santilli telescope is discouraged at the moment. This is due to the fact that, in case of tracking, antimatter galaxies will produce small stationary dots in the camera that, as such, cannot be distinguished with certainty from camera impurities or anomalies.

Matter-Antimatter annihilation also requires that antimatter-light must have energy opposite that of matter-light, as predicted by P. A. M. Dirac in 1932 and verified by R. M. Santilli in his decades of research on antimatter (see the the theoretical confirmation and the experimental confirmation).

Under 15 second exposure, the Galileo telescope creates an image of matter galaxies consisting of streaks of light over the conventional background (Figure 4) while, by contrast, the detection of antimatter galaxies with the Santilli telescope creates streaks of darkness (Figure 5) over the conventional background.

This is essentially due to the fact that the negative energy of antimatter-light annihilates in the camera pixel the positive energy due to matter-light of the background, resulting in this way in streaks of darkness.

It then follows that a conventional matter-light background is necessary (under our current knowledge) for the detection of antimatter galaxies because, in its absence, no image of far away antimatter galaxies could be visible in the camera due to darkness of the background.

This is the reason all detections of the night sky with the Santilli telescope have been done to date at sea level where the conventional matter-light background is sufficient to distinguish streaks of darkness.

3. Detection of antimatter asteroids

The detection of antimatter asteroids follows rules different than those for antimatter galaxies. Since matter and antimatter repel each other gravitationally (antigravity), antimatter asteroids are repelled by Earth’s gravitation and can impact Earth only when they have certain value of kinetic energy computed by Dr. S. Beghella-Bartoli in the scientific work

Therefore, antimatter asteroids hitting Earth must have said minimal impact kinetic energy or more; they annihilate at contact with our matter atmosphere; and they produce instantaneous streaks of darkness (under 15 second exposure) in the digital or film camera generally in the downward direction of penetration in our atmosphere. Streaks of darkness over the matter-light background in the Santilli telescope under 15 second exposure are candidates for the detection of antimatter asteroids when they have a direction different than those of the streaks of matter and antimatter galaxies (Figure 6).

It should be indicated that, at this stage of our knowledge, we do not know how to detect antimatter asteroids in space prior to their impact on Earth, because our matter-light (whether from our Sun or from our lasers) could be absorbed without reflection when hitting antimatter asteroids that generally are at absolute zero degree temperature.

One of the reasons Thunder Energies Corporation is involved in the study of antimatter light is precisely due to the need to develop new technologies for the advance detection of antimatter asteroids because, in the event we are hit by a small antimatter asteroid the size of a football, all our military, industrial and civilian communications will be disrupted for days due to the extreme excitation of our atmosphere from the radiations emitted by the matter-antimatter annihilation, as suggested by Dr. R. Anderson et al. in the scientific work

4. Detection of antimatter cosmic rays

The detection of antimatter cosmic rays follows rules different than those for the detection of antimatter galaxies and antimatter asteroids. As it is the case for conventional cosmic rays of matter, antimatter cosmic rays are the result of primordial explosions in the universe.

Consequently, antimatter cosmic rays reach our atmosphere at very high speeds; they annihilate in the upper layer of our atmosphere; and their sole detection is that via the antimatter-light produced by their annihilation that reaches us at the ground level.

The detection of antimatter cosmic rays via the Santilli telescope is then provided by dots of darkness over the matter-light background despite the 15 seconds exposure, which feature confirm the virtually instantaneous propagation in our atmosphere of antimatter-light originated by the antimatter cosmic rays (Figure 7).

It should be clarified that the instantaneous dots of darkness created by antimatter cosmic rays by the Santilli telescope are not caused by ordinary light since the same dots are absent in the Galileo telescope. Also, antimatter-light is physically different than ordinary matter-light (see Figure 1 for the different refraction).

5. Expected new technologies

Due to the democracy between matter and antimatter requested by physical laws (such as the PCT theorem), the above advances predict the possible future development of a basically new digital camera with pixels detecting photons with negative energy, as a complement of current pixels that solely detect photons with positive energy. In the eventuality, the indicated new camera is developed, the matter-light background is not needed for the detection of antimatter images.

REFERENCES ON ANTIMATTER GALAXIES, ASTEROIDS, & COSMIC RAYS

General treatise on antimatter

R.M. Santilli, Isodual Theory of Antimatter with Application to Antigravity, Grand Unification and the Spacetime Machine, Springer (2006)

Experimental references suggested for technical details

R. M. Santilli, “Apparent detection of antimatter galaxies via a telescope with convex lenses,” Clifford Analysis, Clifford Algebras and their Applications vol. 3, 2014, pages 1-26 (Cambridge, UK),
http://www.santilli-foundation.org/docs/Antimatter-telescope-2013-final.pdf

P. Bhujbal, J. V. Kadeisvili, A. Nas, S Randall, and T. R. Shelke Preliminary confirmation of the detection of antimatter galaxies via Santilli telescope with concave lenses, Clifford Analysis, Clifford Algebras and their Applications Vol. 3, pages 27-39, 2014 (Cambridge, UK) http://www.santilli-foundation.org/docs/Con-Ant-Tel-2013.pdf

S. Beghella-Bartoli, Prashant M. Bhujbal, Alex Nas, Confirmation of antimatter detection via Santilli telescope with concave lenses, American Journal of Modern Physics Vol. 4, pages 34-41 (2015)
http://www.santilli-foundation.org/docs/antimatter-detect-2014.pdf

General Review

P. M. Bhujbal, Santilli’s Isodual Mathematics and Physics for Antimatter, International Journal of Modern Physics, in press (2015),
http://www.santilli-foundation.org/docs/Santilli-Isodual-Theories.pdf

 


 

DETECTION OF INVISIBLE TERRESTRIAL ENTITIES (ITE)
OF THE FIRST AND SECOND KIND

While it’s deep space capabilities are well documented in scientific journals, it was only by chance that our telescope detected invisible terrestrial entities within the earth’s atmosphere. Scientifically, this should be impossible because when ordinary matter and anti-matter come into contact, the annihilate one another.

So, what are these invisible terrestrial entities (ITE) that have been observed and photographed? These entities defy our current scientific knowledge. Some appear to move at highly erratic speeds while others appear to be almost stationary. Some ITE appear as dark entities (Figure 8) while others give off a luminous glow (Figure 9). To say anything beyond this would be speculation. What I can say is that these entities are invisible to the human eye and to conventional telescopes and binoculars; they can only be observed with our telescope.

Dr. Santilli has developed his telescope with concave lenses also for the study of other forms of light besides antimatter light. Thunder Energies Corporation is supporting research for the possible conversion of matter-light, from its conventional form with positive index of refraction, into a form with negative index of refraction without its necessary origination from antimatter (TEC international patent pending).

 

REFERENCES ON ITE

BTV original release
Business Television Announces Thunder Energies’ Discovery via the Revolutionary Telescope with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE)
www.prweb.com/releases/2016/01/prweb13168382.htm

BTV YouTube Video
https://www.youtube.com/watch?v=eHj3MN9Sf2A

Scientific paper
R. M. Santilli, “Apparent Detection via New Telescopes with Concave Lenses of Otherwise Invisible Terrestrial Entities (ITE)” American Journal of Modern Physics Vol. 5, issue 3, pages 45-53, 2016
http://www.thunder-energies.com/docs/ITE-paper-12-15-15.pdf

Independent confirmation
K. Brinkman, “Santilli Refractors,” power point from a lecture delivered at the St. Petersburg Astronomy Club on September 25, 2015
http://www.thunder-energies.com/docs/Santilli-Refractor.pdf

Additional detection of bright ITE
Thunder Energies report on the bright ITE detected on 01-15-16
http://www.thunder-energies.com/docs/TEC-report-ITE-II-01-15-16.pdf

Scientific Archive
http://www.santilli-foundation.org/news.html

Additional ITE detections and independent confirmations
Forthcoming

 

Posted in stories of secret torture, tracking and murder, in and by the U.S.A. intelligence community | 6 Comments

Parallel universes are no longer a figment of our imagination

Taming the Multiverse

Parallel universes are no longer a figment of our imagination. They’re so real that we can reach out and touch them, and even use them to change our world, says Marcus Chown.

Are you having extraordinary experiences that your left brain can’t fathom, but your inner knowing can? Is this an insane vision?

Not according to David Deutsch of the University of Oxford. Deutsch believes that our Universe is part of the multiverse, a domain of parallel universes that comprises ultimate reality.

Until now, the multiverse was a hazy, ill-defined concept-little more than a philosophical trick. But in a paper yet to be published, Deutsch has worked out the structure of the multiverse. With it, he claims, he has answered the last criticism of the skeptics. “For 70 years physicists have been hiding from it, but they can hide no longer.” If he’s right, the multiverse is no trick. It is real. So real that we can mold the fate of the universes and exploit them.

Why believe in something so extraordinary? Because it can explain one of the greatest mysteries of modern science: why the world of atoms behaves so very differently from the everyday world of trees and tables.

The theory that describes atoms and their constituents is quantum mechanics. It is hugely successful. It has led to computers, lasers and nuclear reactors, and it tells us why the Sun shines and why the ground beneath our feet is solid. But quantum theory also tells us something very disturbing about atoms and their like: they can be in many places at once. This isn’t just a crazy theory-it has observable consequences (see “Interfering with the multiverse”).

But how is it that atoms can be in many places at once whereas big things made out of atoms-tables, trees and pencils-apparently cannot? Reconciling the difference between the microscopic and the macroscopic is the central problem in quantum theory. The many worlds interpretation is one way to do it. This idea was proposed by Princeton graduate student Hugh Everett III in 1957. According to many worlds, quantum theory doesn’t just apply to atoms, says Deutsch. “The world of tables is exactly the same as the world of atoms.”

But surely this means tables can be in many places at once. Right. But nobody has ever seen such a schizophrenic table. So what gives?

The idea is that if you observe a table that is in two places at once, there are also two versions of you-one that sees the table in one place and one that sees it in another place.

The consequences are remarkable. A universe must exist for every physical possibility. There are Earths where the Nazis prevailed in the Second World War, where Marilyn Monroe married Einstein, and where the dinosaurs survived and evolved into intelligent beings who read New Scientist.

However, many worlds is not the only interpretation of quantum theory. Physicists can choose between half a dozen interpretations, all of which predict identical outcomes for all conceivable experiments.

Deutsch dismisses them all. “Some are gibberish, like the Copenhagen interpretation,” he says-and the rest are just variations on the many worlds theme.

For example, according to the Copenhagen interpretation, the act of observing is crucial. Observation forces an atom to make up its mind, and plump for being in only one place out of all the possible places it could be. But the Copenhagen interpretation is itself open to interpretation. What constitutes an observation? For some people, this only requires a large-scale object such as a particle detector. For others it means an interaction with some kind of conscious being.

Worse still, says Deutsch, is that in this type of interpretation you have to abandon the idea of reality. Before observation, the atom doesn’t have a real position. To Deutsch, the whole thing is mysticism-throwing up our hands and saying there are some things we are not allowed to ask.

Some interpretations do try to give the microscopic world reality, but they are all disguised versions of the many worlds idea, says Deutsch. “Their proponents have fallen over backwards to talk about the many worlds in a way that makes it appear as if they are not.”

In this category, Deutsch includes David Bohm’s “pilot-wave” interpretation. Bohm’s idea is that a quantum wave guides particles along their trajectories. Then the strange shape of the pilot wave can be used to explain all the odd quantum behaviors, such as interference patterns. In effect, says Deutsch, Bohm’s single universe occupies one groove in an immensely complicated multi-dimensional wave function.

“The question that pilot-wave theorists must address is: what are the unoccupied grooves?” says Deutsch. “It is no good saying they are merely theoretical and do not exist physically, for they continually jostle each other and the occupied groove, affecting its trajectory. What’s really being talked about here is parallel universes. Pilot-wave theories are parallel-universe theories in a state of chronic denial.”

Back and forth

Another disguised many worlds theory, says Deutsch, is John Cramer’s “transactional” interpretation in which information passes backwards and forwards through time. When you measure the position of an atom, it sends a message back to its earlier self to change its trajectory accordingly.

But as the system gets more complicated, the number of messages explodes. Soon, says Deutsch, it becomes vastly greater than the number of particles in the Universe. The full quantum evolution of a system as big as the Universe consists of an exponentially large number of classical processes, each of which contains the information to describe a whole universe. So Cramer’s idea forces the multiverse on you, says Deutsch.

So do other interpretations, according to Deutsch. “Quantum theory leaves no doubt that other universes exist in exactly the same sense that the single Universe that we see exists,” he says. “This is not a matter of interpretation. It is a logical consequence of quantum theory.”

Yet many physicists still refuse to accept the multiverse. “People say the many worlds is simply too crazy, too wasteful, too mind-blowing,” says Deutsch. “But this is an emotional not a scientific reaction. We have to take what nature gives us.”

A much more legitimate objection is that many worlds is vague and has no firm mathematical basis. Proponents talk of a multiverse that is like a stack of parallel universes. The critics point out that it cannot be that simple-quantum phenomena occur precisely because the universes interact. “What is needed is a precise mathematical model of the multiverse,” says Deutsch. And now he’s made one.

The key to Deutsch’s model sounds peculiar. He treats the multiverse as if it were a quantum computer. Quantum computers exploit the strangeness of quantum systems-their ability to be in many states at once-to do certain kinds of calculation at ludicrously high speed. For example, they could quickly search huge databases that would take an ordinary computer the lifetime of the Universe. Although the hardware is still at a very basic stage, the theory of how quantum computers process information is well advanced.

In 1985, Deutsch proved that such a machine can simulate any conceivable quantum system, and that includes the Universe itself. So to work out the basic structure of the multiverse, all you need to do is analyze a general quantum calculation. “The set of all programs that can be run on a quantum computer includes programs that would simulate the multiverse,” says Deutsch. “So we don’t have to include any details of stars and galaxies in the real Universe, we can just analyze quantum computers and look at how information flows inside them.”

If information could flow freely from one part of the multiverse to another, we’d live in a chaotic world where all possibilities would overlap. We really would see two tables at once, and worse, everything imaginable would be happening everywhere at the same time.

Deutsch found that, almost all the time, information flows only within small pieces of the quantum calculation, and not in between those pieces. These pieces, he says, are separate universes. They feel separate and autonomous because all the information we receive through our senses has come from within one universe. As Oxford philosopher Michael Lockwood put it, “We cannot look sideways, through the multiverse, any more than we can look into the future.”

Sometimes universes in Deutsch’s model peel apart only locally and fleetingly, and then slap back together again. This is the cause of quantum interference, which is at the root of everything from the two-slit experiment to the basic structure of atoms.

Other physicists are still digesting what Deutsch has to say. Anton Zeilinger of the University of Vienna remains unconvinced. “The multiverse interpretation is not the only possible one, and it is not even the simplest,” he says. Zeilinger instead uses information theory to come to very different conclusions. He thinks that quantum theory comes from limits on the information we get out of measurements (New Scientist, 17 February, p 26). As in the Copenhagen interpretation, there is no reality to what goes on before the measurement.

But Deutsch insists that his picture is more profound than Zeilinger’s. “I hope he’ll come round, and realise that the many worlds theory explains where the information in his measurements comes from.”

Why are physicists reluctant to accept many worlds? Deutsch blames logical positivism, the idea that science should concern itself only with objects that can be observed. In the early 20th century, some logical positivists even denied the existence of atoms-until the evidence became overwhelming. The evidence for the multiverse, according to Deutsch, is equally overwhelming. “Admittedly, it’s indirect,” he says. “But then, we can detect pterodactyls and quarks only indirectly too. The evidence that other universes exist is at least as strong as the evidence for pterodactyls or quarks.”

Perhaps the skeptics will be convinced by a practical demonstration of the multiverse. And Deutsch thinks he knows how. By building a quantum computer, he says, we can reach out and mold the multiverse.

“One day, a quantum computer will be built which does more simultaneous calculations than there are particles in the Universe,” says Deutsch. “Since the Universe as we see it lacks the computational resources to do the calculations, where are they being done?” It can only be in other universes, he says. “Quantum computers share information with huge numbers of versions of themselves throughout the multiverse.”

Imagine that you have a quantum PC and you set it a problem. What happens is that a huge number of versions of your PC split off from this Universe into their own separate, local universes, and work on parallel strands of the problem. A split second later, the pocket universes recombine into one, and those strands are pulled together to provide the answer that pops up on your screen. “Quantum computers are the first machines humans have ever built to exploit the multiverse directly,” says Deutsch.

At the moment, even the biggest quantum computers can only work their magic on about 6 bits of information, which in Deutsch’s view means they exploit copies of themselves in 26 universes-that’s just 64 of them. Because the computational feats of such computers are puny, people can choose to ignore the multiverse. “But something will happen when the number of parallel calculations becomes very large,” says Deutsch. “If the number is 64, people can shut their eyes but if it’s 1064, they will no longer be able to pretend.”

What would it mean for you and me to know there are inconceivably many yous and mes living out all possible histories? Surely, there is no point in making any choices for the better if all possible outcomes happen? We might as well stay in bed or commit suicide.

Deutsch does not agree. In fact, he thinks it could make real choice possible. In classical physics, he says, there is no such thing as “if”; the future is determined absolutely by the past. So there can be no free will. In the multiverse, however, there are alternatives; the quantum possibilities really happen. Free will might have a sensible definition, Deutsch thinks, because the alternatives don’t have to occur within equally large slices of the multiverse. “By making good choices, doing the right thing, we thicken the stack of universes in which versions of us live reasonable lives,” he says. “When you succeed, all the copies of you who made the same decision succeed too. What you do for the better increases the portion of the multiverse where good things happen.” Let’s hope that deciding to read this article was the right choice.

Multiverse

Interfering with the multiverse, you can see the shadow of other universes using little more than a light source and two metal plates. This is the famous double-slit experiment, the touchstone of quantum weirdness. Particles from the atomic realm such as photons, electrons or atoms are fired at the first plate, which has two vertical slits in it. The particles that go through hit the second plate on the far side. Imagine the places that are hit show up black and that the places that are not hit show up white. After the experiment has been running for a while, and many particles have passed through the slits, the plate will be covered in vertical stripes alternating black and white. That is an interference pattern. To make it, particles that passed through one slit have to interfere with particles that passed through the other slit. The pattern simply does not form if you shut one slit.

The strange thing is that the interference pattern forms even if particles come one at a time, with long periods in between.

So what is affecting these single particles?

According to the many worlds interpretation, each particle interferes with another particle going through the other slit. What other particle? “Another particle in a neighbouring universe,” says David Deutsch. He believes this is a case where two universes split apart briefly, within the experiment, then come back together again. “In my opinion, the argument for the many worlds was won with the double-slit experiment. It reveals interference between neighbouring universes, the root of all quantum phenomena.”

The Cycle of Remembrance

The idea of sharing in your own conditions, and methodologies, is the idea that you are willing to express yourselves, the idea that you are willing to come together for a singular purpose and the overall idea of whether or not you may find many individuated purposes within this overall idea. It is a singular purpose in that you are willing to give of yourselves, that you are willing to explore the beings that you are, and you are willing to understand on a very deep level all of the ideas that have remained hidden from your conscious mind for many thousands of years. This includes a willingness to wake up to the understanding that this exploratory age in which you now live is a prime example of the changes that are going on within the consciousness’ you are, within the reality you have created to experience yourselves within.

The very concept of physiological reality is now changing. The idea that you are beginning to be aware of yourselves as consciousness, rather than simply the product of physiological circumstances, is, in itself, an indication of an expansion of awareness that will create many changes upon your planet – experiential, physiological changes.

Because of your willingness to explore what it is that makes you what you are, you will begin to see in your physiological reality changes that you have always seen occur, but in a much more connected way to the changes that go on within you. You will begin to realize that all the changes you are seeing in your physiological reality, all the differences that are now appearing in your culture, are the result of not only what you are as a social being, but what you actually are as a being of consciousness. And that you have always been primarily responsible for the structures that do exist in your society, not just on a physiological level. For the very concepts of these structures to exist and for the ability of even physical structures to exist, all these ideas have come from the wellspring of the consciousness that you are.

Even in your own literature you have said you are made in the image of the Creator. What that means is that you are also an infinite creator – a multi-dimensional creator. And the attributes that you possess as a multidimensional creator are so automatic, so second-nature, that you create the reality around you so spontaneously that you have even been able to create the scenario that you have forgotten that you are creating it, so easily does it come to you.

You have the ability to create the state you call “forgetfulness.” You have the ability to create this scenario, this illusion in your reality, because your ability to create physical reality is so smoothly operational. You do not have to pay attention to it, it is quite automatic.

But now! Now you are at the end of the cycle of limitation! You are at the end of the cycle of forgetfulness. You have played out all the probable scenarios that can be played out within this particular linear reality that involved the original idea that you projected yourselves into – into this material existence. The original way in which you chose to manifest the belief in forgetfulness has now culminated.

This is the end of the cycle of forgetfulness and the beginning of the cycle of remembrance, the beginning of the awakening.

You are now awakening to the fact that you have been living a particular dream for many thousands – many tens, many hundreds of thousands of years. And now you are awakening into a new understanding that you are the creators of that dream. That you are not simply caught up in the machinations of some objectified universe that is existent outside of you, that goes on with you, or without you.

You are beginning to recognize that what you have called the universe, is in fact, the product of your imagination! The product of your perspective. The product of your perceptions. The product of your beliefs. The product of your feelings. AND, the product of your thoughts.

Even your own scientists are now beginning to realize that all of these ideas come from YOU. They are not truly independent of you. The material universe is but a reflection, perhaps a collective reflection on one level, and an individual reflection on another, but a reflection none the less of the ideas at any given moment which you most stongly believe.

Therefore, as you begin to awaken into the understanding that the universe is your projection, then all the changes that you now make within your consciousness, all the changes that you now allow to occur within the consciousness that YOU ARE, are within the idea that you are,and will be able to be seen by you to manifest that much more obviously, that much more transparently, and that much more quickly in your physiological reality.

Thus you can begin to see the connection between your thoughts and the physical reality you experience. Whereas before you created yourselves a world of time (time being your illusion as well), you created a very large time lag – a thickening of the atmosphere that prevented you from understanding that what you thought, is what created the ideas you are experiencing in your life. This time lag gave you the opportunity to think that your thoughts and your feelings were formed after you created the experiences! But now that you are living more in the moment and not needing to experience the idea of linear time so much, you are beginning to realize that it is your thoughts and your beliefs that actually create your experiences.

Thus you are beginning to reverse all the scenarios that you have been previously taught in your society for how creation is what you experience. You have been taught previously the idea that “seeing is believing”. But now you are beginning to understand that “believing is seeing”. And even though you may not be aware of that fact, you now are awakening to the understanding that when you have a situation occur in your life, in the physical reality, that that is not what creates your beliefs. It is the product of your beliefs!

Now these scenarios may reinforce the beliefs that you have, and may then allow you to experience feelings that you feel are the result of that experience. But understand, a belief exists within you first, and then you have the feeling. There is no such thing as a feeling, a reaction, out of the blue. Energy follows thought, not the other way around.

No situation in any way, shape, or form, can ever prompt any particular built-in feeling from you if you do not already have a built-in belief about what that situation means.

When you attract a situation into your life and then find the reaction within you, it is that reaction and that situation that lets you know beyond a shadow of a doubt, what the belief was that was imbedded and ingrained within your consciousness that allowed for the existence of that situation to begin with.

These situations are not here to show you that you are stuck with these ideas in life. No. They are there to show you that you have the belief that has attracted this situation. And now that you are aware of what this belief is, you can now alter that definition with your imagination. For once again you will begin to realize that your “physiological reality” is only – and can only be – a shadow of the soul, a reflection of the idea at any given moment that you are.

Source: Taming the Multiverse: Parallel universes are no longer a figment of our imagination

Posted in stories of secret torture, tracking and murder, in and by the U.S.A. intelligence community | Tagged , , , , , , , , , , , , , , , , , , , | 1 Comment

toxoplasmosis changes behavior of host

http://c.brightcove.com/services/viewer/federated_f9?isVid=1&isUI=1

toxoplasmosis changes behavior of host

Posted in stories of secret torture, tracking and murder, in and by the U.S.A. intelligence community | 1 Comment

Optogenetics Resource Center

OPTOGENETIC HARDWARE SETUP

DIY laser diode box
[ Zip folder ]

Arthur English’s group at Emory has developed a custom device that they have used for stimulating peripheral nerves optically in anesthetized mice using a standard optical fiber. The device is compact, rechargeable battery-operated, and controlled either manually or by computer using an analog input. Essentially, laser LED illumination is coupled to an optical fiber by a collimator and can be attached to a standard optical fiber patch cable with an FC/PC Connector (e.g.ThorLabs #M82L01). The device is considered a class 3B laser, so appropriate safety precautions must be taken. As described, the device outputs blue light suitable for activation of channelrhodopsin (473nM), but could be adapted to produce light of different wavelengths.

The zip file linked above includes

  • Assembly
    • Laser diode driver construction notes – detailed instructions for building the device
    • Laser diode box wiring – instructions for internal wiring of the enclosure
    • Laser diode driver V2A BOM – bill of materials (parts list)
  • Eagle PCB files
    • Board – top side – PDF view of top of board
    • Schematic – PDF of electrical schematic
    • Laser_diode_driver.sch – CadSoft Eagle schematic
    • Laser_diode_driver.brd – CadSoft Eagle board layout
  • Luminance graph
    • Laser LED power output graph – A graph of the typical power output vs. voltage input
  • Photos
    • Complete set of phots to aid in construction

Optogenetics in Neural Systems: Neuron Primer
[ PDF ]

Yizhar O, Fenno LE, Davidson TJ, Mogri M, Deisseroth K.
Neuron. 2011 July;72:9-34.

Here we provide a primer on the application of optogenetics in neuroscience, focusing on the single-component tools and highlighting important problems, challenges, and technical considerations.

Optetrode: a multichannel readout for optogenetic control in freely moving mice.
[ PDF ]

Anikeeva P, Andalman AS, Witten I, Warden M, Goshen I, Grosenick L, Gunaydin LA, Frank LM, Deisseroth K.
Nature Neuroscience. 2011 Dec 4;15(1):163-70.

We designed and validated the optetrode, a device that allows for colocalized multi-tetrode electrophysiological recording and optical stimulation in freely moving mice. Optetrode manufacture employs a unique optical fiber-centric coaxial design approach that yields a lightweight (2 g), compact and robust device that is suitable for behaving mice. This low-cost device is easy to construct (2.5 h to build without specialized equipment). We found that the drive design produced stable high-quality recordings and continued to do so for at least 6 weeks following implantation.

Integrated device for combined optical neuromodulation and electrical recording for chronic in vivo applications.
[ PDF ]

Wang J, Wagner F, Borton DA, Zhang J, Ozden I, Burwell RD, Nurmikko AV, van Wagenen R, Diester I, Deisseroth K.
J Neural Eng. 2012 9:016001.

We previously demonstrated, in vitro, the dual capability (optical delivery and electrical recording) while testing a novel hybrid device (optrode-MEA), which incorporates a tapered coaxial optical electrode (optrode) and a 100 element microelectrode array (MEA). Here we report a fully chronic implant of a new version of this device in ChR2-expressing rats, and demonstrate its use in freely moving animals over periods up to 8 months.

Integrated device for optical stimulation and spatiotemporal electrical recording of neural activity in light-sensitized brain tissue.
[ PDF ]

Zhang J, Laiwalla F, Kim JA, Urabe H, Van Wagenen R, Song YK, Connors BW, Zhang F, Deisseroth K, Nurmikko AV.
J. Neural Eng. 2009 Oct;6(5):055007.

We report here a novel dual-modality hybrid device, which consists of a tapered coaxial optical waveguide (?optrode?) integrated into a 100 element intra-cortical multi-electrode recording array. We first demonstrate the dual optical delivery and electrical recording capability of the single optrode in in vitro preparations of mouse retina, photo-stimulating the native retinal photoreceptors while recording light-responsive activities from ganglion cells. The dual-modality array device was then used in ChR2 transfected mouse brain slices. Specifically, epileptiform events were reliably optically triggered by the optrode and their spatiotemporal patterns were simultaneously recorded by the multi-electrode array.

Optogenetic interrogation of neural circuits: technology for probing mammalian brain structures.
[ PDF ]

Zhang F, Gradinaru V, Adamantidis AR, Durand R, Airan RD, de Lecea L, Deisseroth K.
Nat Protoc. 2010;5(3):439-56.

Interrogation of even deep neural circuits can be conducted by directly probing the necessity and sufficiency of defined circuit elements with millisecond-scale, cell type-specific optical perturbations, coupled with suitable readouts such as electrophysiology, optical circuit dynamics measures and freely moving behavior in mammals. Here we collect in detail our strategies for delivering microbial opsin genes to deep mammalian brain structures in vivo, along with protocols for integrating the resulting optical control with compatible readouts (electrophysiological, optical and behavioral).

An optical neural interface: in vivo control of rodent motor cortex with integrated fiberoptic and optogenetic technology.
[ PDF ]

Aravanis AM, Wang LP, Zhang F, Meltzer LA, Mogri MZ, Schneider MB, Deisseroth K.
J. Neural Eng. 2007;4:S143-S156.

We describe here a novel optical neural interface technology that will allow neuroengineers to optically address specific cell types in vivo with millisecond temporal precision. Channelrhodopsin-2 (ChR2), an algal light-activated ion channel we developed for use in mammals, can give rise to safe, light-driven stimulation of CNS neurons on a timescale of milliseconds. Because ChR2 is genetically targetable, specific populations of neurons even sparsely embedded within intact circuitry can be stimulated with high temporal precision. Here we report the first in vivo behavioral demonstration of a functional optical neural interface (ONI) in intact animals, involving integrated fiberoptic and optogenetic technology.

Posted in stories of secret torture, tracking and murder, in and by the U.S.A. intelligence community | 1 Comment

Magic mushrooms’ psychedelic ingredient could help treat people with severe depression

Magic mushrooms’ psychedelic ingredient could help treat people with severe depression

Trials of psilocybin blocked by drugs law red tape, says Professor David Nutt of Imperial College London

psilocybin had a profound effect on making volunteers feel happier weeks after they had taken the drug

 

David Nutt
Prof David Nutt says that because magic mushrooms are rated as a class-A drug, their active chemical ingredient cannot be manufactured unless a special license is granted. Photograph: Christian Sinibaldi for the Guardian

Drugs derived from magic mushrooms could help treat people with severe depression. Scientists believe the chemical psilocybin, the psychedelic ingredient in magic mushrooms, can turn down parts of the brain that are overactive in severely depressive patients. The drug appears to stop patients dwelling on themselves and their own perceived inadequacies.

However, a bid by British scientists to carry out trials of psilocybin on patients in order to assess its full medical potential has been blocked by red tape relating to Britain’s strict drugs laws. Professor David Nutt, professor of neuropsychopharmacology at Imperial College London, will tell a conference today that because magic mushrooms are rated as a class-A drug, their active chemical ingredient cannot be manufactured unless a special licence is granted.

“We haven’t started the study because finding companies that could manufacture the drug and who are prepared to go through the regulatory hoops to get the license is proving very difficult,” said Nutt. “The whole field is so bedeviled by primitive old-fashioned attitudes. Even if you have a good idea, you may never get it into the clinic, it seems.”

Research by Nutt has found that psilocybin switches off part of the brain called the anterior cingulate cortex.]

It was known that this area is overactive in individuals suffering from depression.

In his tests on healthy individuals, it was found that psilocybin had a profound effect on making these volunteers feel happier weeks after they had taken the drug, said Nutt

– who was sacked as the chairman of the Advisory Council on the Misuse of Drugs in 2009 after repeatedly clashing with government ministers about the dangers and classification of illicit drugs.

Nutt’s team also discovered that another section of the brain known as the default mode network was also influenced by psilocybin.

“People with depression have overactive default mode networks and so ruminate on themselves, on their inadequacies, on their badness, that they are worthless, that they have failed – to an extent that is sometimes delusional.

Again psilo-cybin appears to block that activity and stops this obsessive rumination.”

To determine if psilocybin could be used as a treatment to help patients, Nutt and his team were given £550,000 by the Medical Research Council to begin a three-year project to test the drug on people with depression. Patients who had failed to respond to two previous treatments would be selected. The aim was to test 30 with the drug and 30 with a placebo.

However, the group has found its path blocked by bureaucracy. So difficult has the government and the EU made it for companies to manufacture the active ingredients of Class A drugs that price tags of around £100,000 were given by chemical companies.

“We only need a relatively small amount of the drug, an order worth only a few hundred pounds,” said Nutt, who is set to describe his work with psilocybin at the UK Festival of Neuroscience conference in London today. “If we have to pay £100,000 we simply cannot afford to carry out the rest of the study. We have not given up but it is proving very difficult,” he said.

“Depression is now the largest cause of disability in Europe. There are many effective treatments but only about a third of individuals respond fully. At least 10% fail to respond to three different treatments. We badly need more types of treatment but we cannot pursue these because the government is denying scientists access to powerful tools that could help people in need. The regulations that govern researchers access to Class A drugs are totally inappropriate and harmful.”

Posted in and the solutions to problems GOVT will not allow fixed | Tagged , , , , , , , , , , | 1 Comment

Researchers identify gatekeeper neurons that control pain and itch | Science | The Guardian

Researchers identify gatekeeper neurons that control pain and itch

New research provides direct evidence for an influential model of pain first proposed in 1965.

Spinal cord
Diagram of a transverse section of the spinal cord, showing primary sensory neurons entering the dorsal horn (top) and motor neurons exiting the ventral horn (bottom). Wilhelm von Waldeyer-Hartz, 1891. Illustration: Wellcome Images.

During the 1960s, neuroscientists Ronald Melzack and Patrick Wall proposed an influential new theory of pain. At the time, researchers were struggling to explain the phenomenon. Some believed that specific nerve fibers carry pain signals up into the brain, while others argued that the pain signals are transmitted by intense firing of non-specific fibres.

Neither idea was entirely satisfactory, because they could not explain why spinal surgery often fails to abolish pain, why gentle touch and other innocuous stimuli can sometimes cause excruciating pain, or why intensely painful stimuli are not always experienced as such.

Melzack and Wall’s Gate Control Theory stated that inhibitory neurons in the spinal cord control the relay of pain signals into the brain. Despite having some holes in it, the theory provided a revolutionary new framework for understanding the neural basis of pain, and ushered in the modern era of pain research. Now, almost exactly 50 years after the publication of Melzack and Wall’s theory, European researchers provide direct evidence of gatekeeper cells that control the flow of pain and itch signals from the spinal cord to the brain.

The experience that we call “pain” is an extremely complex one that often involves emotional aspects. Researchers therefore distinguish it from nociception, the process by which the nervous system detects noxious stimuli. Nociception is mediated by primary sensory neurons, whose cell bodies are clumped together in the dorsal root ganglia that run alongside the spinal cord. Each has a single fibre that splits in two not far from the cell body, sending one branch out to the skin surface and the other into the spinal cord.

Nociceptive neurons have specialised receptors that are sensitive to hot or cold temperatures, painful mechanical stimuli, chemicals that are released from damaged cells, or some combination of these. Noxious stimuli like these trigger nociceptors to fire impulses into the spinal cord. Nociceptor fibres enter the dorsal horn of the spinal cord, where they form synaptic connections with second order sensory neurons that relay the signals to the brain’s pain centres, and with inhibitory interneurons, which form localised circuits that regulate the flow of the signals.

These interneurons constitute about one-third of all the cells in the dorsal horn, and synthesize the inhibitory neurotransmitters gamma-aminobutyric acid (GABA), glycine, or both. Earlier work had shown that blocking the activity of these cells causes exaggerated pain responses in mice, making them good candidates as the gatekeepers of pain. Yet, the circuits they form in the spinal cord are complex and poorly understood, and until recently there were no appropriate tools for examining them in detail.

Edmund Foster of the University of Zurich and his colleagues exploited recent advances in molecular biology to create a strain of mice carrying specially-designed genetic constructs in their glycine-expressing dorsal horn neurons. When shuttled into the cells by modified viruses, these constructs enabled the researchers to trace the connections of the cells, switch the cells on or off, monitor their activity or kill them off altogether.

The tracing experiments showed that the cells are mostly located in the deeper layers of the dorsal horn, and that they receive most of their inputs from primary sensory neurons that have a low stimulation threshold – that is, from cells that carry signals related to non-painful touch stimuli.

Foster and his colleagues then killed the glycine-producing cells to see what effect this would have on the animals’ behaviour. One of the constructs they created contained a fragment of the diphtheria toxin, so when some of the animals were injected with a virus carrying the rest of the toxin, the cells synthesize the complete diphtheria protein, which is lethal to them.

Experiments on slices of spinal cord tissue from these animals revealed that killing the cells significantly reduced inhibitory signalling in the dorsal horn. As a result, the mice became hypersensitive to mechanical, hot and cold stimuli, and to the itching induced by the injection of histamine or chloroquine, as measured by the amount of time they spent licking and biting the affected area of skin.

Another set of experiments confirmed these findings. Temporary silencing of the same cells in another group of mice produced the same pain- and itch-associated behaviours, but their re-activation one week later alleviated their hypersensitivity.

This strongly suggests that glycine-producing interneurons are a key component of a spinal gate that controls the relay of pain and itch signals. The story is probably more complicated, though. These cells are likely involved in other functions, such as the control of gait and posture, and a study published 2013 showed that excitatory spinal interneurons also contribute to the control of pain and itch. The new genetic tools developed by Foster and his colleagues should help researchers to get a better handle on how the different types of spinal interneurons co-operate to control pain and itch, and to learn more about the other functions of these cells.

References: Melzack, P. & Wall, P. D. (1965). Pain Mechanisms: A New Theory. Science, 150: 971-979 [PDF].

Foster, E., et al. (2015). Targeted Ablation, Silencing, and Activation Establish Glycinergic Dorsal Horn Neurons as Key Components of a Spinal Gate for Pain and Itch. Neuron, 85: 1289-1304 [PDF].

Posted in science of pain | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Bumblebee’s electric field sensor identified | Science | The Guardian

Bumblebee’s electric field sensor identified

Mechanosensory hairs covering bumblebees’ bodies detect the small electrical fields emitted by flowers

Close-up of a bumblebee showing the antennae and mechanosensory hairs covering its body. Photograph: Gregory Sutton/ Dom Clarke/ Erica Morley/ Daniel Robert
Close-up of a bumblebee showing antennae and mechanosensory hairs. Photograph: Gregory Sutton/ Dom Clarke/ Erica Morley/ Daniel Robert

“We were excited to discover that bees’ tiny hairs dance in response to electric fields, like when humans hold a balloon to their hair,” says lead author Gregory Sutton. “A lot of insects have similar body hairs, which leads to the possibility that many members the insect world may be equally sensitive to small electric fields.”

Bumblebees use the fine hairs covering their bodies to detect electrical fields produced by the flowers they feed on and pollinate, according to a new study by researchers at the University of Bristol. The findings, just published in Proceedings of the National Academy of Sciences, may help to solve the mystery of how insects and other terrestrial creatures detect and respond to electric fields.

It’s well known that bumblebees use their sense of smell, as well as visual cues such as the colour, shape, and patterning of flowers, to find nectar, and in 2013, biologist Daniel Robert and his colleagues reported the surprising finding that they can also detect floral electric fields.

The ability to detect electric fields was first discovered in sharks and rays, whose electrosensory organs consist of small tubular cavities filled with a conductive jelly that stays in equilibrium with the water; electrical changes in the jelly trigger impulses in the attached sensory nerve endings. Some land animals, such as the platypus, also use electroreception, but rely on organs that have to be submerged in water in order for them to do so. Air does not conduct electricity, however, so we still know very little about how the electric sense might work in insects and other land animals.

When flitting between flowers to forage for food, bumblebees accumulate a positively charged electric field around their bodies. Flowers, on the other hand, produce weak, negatively charged electrical fields. Robert’s team showed that these floral electric fields distort the bees’ own fields as the insects approach them, and that variations in the shape and size of flowers’ electric fields enable the bees not only to tell flowers apart from one another, but also to learn which ones are the best sources of food.

Now, Robert and his colleagues believe they have identified the honeybee’s electric sensor. They knew that spiders use mechanosensory hairs covering their bodies to detect fluid flow and the speed of sound particles, and that honeybee antennae move in response to the electrical fields produced by nestmates performing a waggle dance nearby, and so reasoned that one of these structures might also be involved in the electric sense of the bumblebee.

 

Mechanosensory hairs covering the bumblebee’s body move in response to an applied electric field. From Sutton, et al. (2016).

To test this, they mounted dead bees on pins and used lasers to measure the movements of antennae and mechanosensory body hairs in response to weak electric fields comparable to those produced by flowers in the wild. They found that both the antennae and the body hairs moved in response to the applied electric fieldsthe hairs, however, being shorter and more rigid than the antennae, moved more than ten times faster, and also deflected further, when the fields were applied.

Further experiments revealed that the mechanosensory hairs were significantly more sensitive to electric fields than the antennae. In response to the applied electric fields, the tips of the hairs deflected almost half a millimetre, movements that are large enough to be visible under the microscope (see video above).

The researchers then anesthetized bumblebees, mounted them on a small clay post, and inserted micro-electrodes into the nerve cells located at the base of the hairs and antennae, to determine how they respond to the applied electric fields. This revealed that the neurons associate with the mechanosensory hairs increased their firing rate in response to the electric fields, whereas those associated with the antennae increased their firing rates only in response to puffs of air or olfactory stimuli such a lavender oil.

These findings hint at the mechanism by which bumblebees detect electric fields. As a bee approaches a flower, the floral electric field distorts the field around the bee’s body, and these distortions deflect the mechanosensory hairs, causing in them a lever-like movement which triggers the nerve cells at their base to fire off signals to the brain.

“We were excited to discover that bees’ tiny hairs dance in response to electric fields, like when humans hold a balloon to their hair,” says lead author Gregory Sutton. “A lot of insects have similar body hairs, which leads to the possibility that many members the insect world may be equally sensitive to small electric fields.”

Reference

Sutton, G. P., et al. (2016). Mechanosensory hairs in bumblebees (Bombus terrestris) detect weak electric fields. PNAS, DOI: 10.1073/pnas.1601624113

 

 

Source: Bumblebee’s electric field sensor identified | Science | The Guardian

Posted in GODS TECHNOLOGY REVERSE ENGINERED BY MAN- NANOTECHNOLOGY OR MAN-O-TECHNOLOGY? | Tagged , , , , , , , , , , | 1 Comment

Presidential Commission: Directed Energy Weapons Used On American Citizens in Tests

Presidential Commission: Directed Energy Weapons Used On American Citizens in Tests

Source: The Intel Hub
Shepard Ambellas & Joe Joseph

In the dawn of 2012, many Americans, still left in the dark and unawakened to the fact that their omnipotent government and floundering leaders in Washington would have anything less than the peoples best interest at heart, will now face one of their biggest fears.

Factions within the U.S. Government’s Military Industrial Complex have been, and indeed are testing Directed Energy Weapons, along with chemical, nuclear and biological agents on the civilian populace.

In fact, U.S. law, approved by Congress, allows chemical and biological testing on the populace. (see PUBLIC LAW 105–85—NOV. 18, 1997 111 STAT. 1915)


Official White House Photo

The Presidential Commission for the Study of Bioethical Issues is composed of 13 members and was established in November of 2009 by way of Executive Order 13521 which was issued by President Barrack H. Obama.

According to the PCSBI official government website;

The Presidential Commission for the Study of Bioethical Issues (PCSBI) advises the President on bioethical issues that may emerge from advances in biomedicine and related areas of science and technology.

The Commission works with the goal of identifying and promoting policies and practices that ensure scientific research, health care delivery, and technological innovation are conducted in an ethically responsible manner.”

The documentation provided on the PCBSI website concludes that the commission has engaged in various studies over time, one of which was the Dec 15, 2011 study entitled — Moral Science: Protecting Participants in Human Subjects Research.

The opening statement in Moral Science: Protecting Participants in Human Subjects Research reads like a mad scientists diary stating;

The Presidential Commission for the Study of Bioethical Issues today issued its report concerning federally-sponsored research involving human volunteers, concluding that current rules and regulations provide adequate safeguards to mitigate risk.

In its report, “Moral Science: Protecting Participants in Human Subjects Research,” the Commission also recommended 14 changes to current practices to better protect research subjects, and called on the federal government to improve its tracking of research programs supported with taxpayer dollars.

The statement goes on to openly admit that the U.S. Government spread bio-agents (STD’s) to Guatemalans in the mid 40′s stating;

President Obama requested that the Commission undertake an assessment of research standards following the October 2010 revelation that the U.S. Public Health Service supported unethical research in Guatemala from 1946 to 1948 that involved intentionally exposing thousands of Guatemalans to sexually transmitted diseases without their consent.

The President gave the Bioethics Commission two assignments: to oversee a thorough fact-finding investigation into the specifics of the studies (released September 13, 2011); and to assure that current rules for research participants protect people from harm or unethical treatment, domestically as well as internationally.

The statement goes on to highlight the Key Findings:

In the report’s central finding, the Commission found that the “U.S. system provides substantial protections for the health, rights, and welfare of research subjects.” 

Evidence has now been brought to light that over 55,000 human testing projects (with numerous people per project) took place during the year 2010;

In assessing the current regulations that protect human subjects, the Commission learned that there is no central source with information about the overall size, scope, and cost of the government’s research involving human subjects.

The Commission requested information from 18 individual agencies that conduct most federal human subjects research, but discovered that many federal offices could not provide basic data about the research they support.

The Pentagon, for example, required more than seven months to prepare information on specific studies supported by the Department of Defense.

In its report, the Commission found that the federal government supported more than 55,000 projects involving human subjects around the globe in Fiscal Year 2010, mostly in health-related research, but also in other fields such as education, engineering and social science.

The PCSBI sounds great to the average person nearly skimming the surface pages of the government website.

However, a closer look reveals that the commission has possibly been put in place to aid in a massive cover-up of what is really taking place right in front of our  eyes on a daily basis, congress has approved it, and apparently it’s legal.

The Best in uncensored news, information, and analysis

Source: Presidential Commission: Directed Energy Weapons Used On American Citizens in Tests

Posted in stories of secret torture, tracking and murder, in and by the U.S.A. intelligence community | 2 Comments

A Note on Timothy Trespas, Gang Stalking and the Gospel, by Bridget Howe.   From:FaithWriters.com-Christian Encouragement –

Authors note: This touched my heart clearly just what I needed to hear. Thank you Bridget Howe for your clear insight and expression of these truths. This is a compelling, touching message, I want to share with others.

As always, I find myself quietly amazed when our Lord GOD answers even me! Calling me to continue seeking God’s truth and love.)

Source: FaithWriters.com-Christian Encouragement – A Note on Timothy Trespass, Gang Stalking and the Gospel

A Note on Timothy Trespass, Gang Stalking and the Gospel
by Bridget Howe
05/09/14
Free to Share

  Mail
 


A Note on Timothy Trespas, Gang-stalking and the Gospel

“I have sinned terribly against God.”  Timothy Trespas

To some who were confident of their own righteousness and looked down on everyone else, Jesus told this parable:

Two men went up to the temple to pray, one a Pharisee and the other a tax collector. The Pharisee stood by himself and prayed: ‘God, I thank you that I am not like other people—robbers, evildoers, adulterers—or even like this tax collector. I fast twice a week and give a tenth of all I get.’ “But the tax collector stood at a distance. He would not even look up to heaven, but beat his breast and said, ‘God, have mercy on me, a sinner.’ “I tell you that this man, rather than the other, went home justified before God. For all those who exalt themselves will be humbled, and those who humble themselves will be exalted.Luke 18:9-14

There is nothing pleasant or positive about being a “targeted individual”.  When you first learn that you are being targeted and you understand the implications, it is like being diagnosed with a terminal disease.  You process through all the stages of grief coming to terms with the criminal act being perpetrated against you. In addition to that you have to cope with the fact there there is no one who is willing to listen or do any thing to help, because the reality and  the horror of gang-stalking is hidden from the minds of non targeted individuals.  Most Americans feel way too safe here and most of the time are completely unaware of the danger looming over our heads.  Stuff like gang-stalking isn’t supposed to happen here.

In fact it isn’t supposed to happen at all.

  • Human beings are supposed to be civil.
  •  They are supposed to respect other people’s rights.
  •  Lawyers are supposed to defend victims.  
  • Law Enforcement is supposed to protect us from criminals.
  • Judges are supposed to be fair.  
  • Doctors have a sworn oath to ” do no harm”.  
  • Preachers are supposed to preach the truth and not deny it, and
  • the church is supposed to take a stand against corruption.  

We have a constitution, the Bill of Rights and the law.

There is something inside of all if us that cries for justice.

We have an inborn sense that there is something called “right” and it’s opposite “wrong”.

The “inalienable rights” spoken of in our Constitution alludes to the idea that there is an unwritten moral code that pre- existed any written code and in fact supersedes any written code.  Those “inalienable  rights” are based on the unchanging character of our very Holy God.  When you become a gang-stalking victim you know that something has gone terribly wrong.

When I became aware that I was being targeted, I was researching. I wanted to understand and I did a lot of reading.  I was shocked and appalled by what I learned.  I am a Christian and there was a whole load of ramifications to this because of my faith.  I was at first shocked, angry, terrified and confused.  I of course asked myself and God what on earth I could have done that could be so terrible as to deserve such abuse.  I never saw myself as a perfect shining example of  Christianity.  I did however give it everything I had.  The entire focus of my life was on being truly Christian.  I was charitable, concerned about and prayed constantly for others.  I was consistently involved in my church.  There were in fact sins I needed to overcome.  There was no excusing myself when I sinned.  I consistently sought God’s forgiveness and I was repentant.  There was nothing I was hiding from God, and there was no sin in my life that I was ignoring.  There was however a war going on inside me that I could never understand.  I hungered for God.  I longed to be a part of his ministry.  However, I always felt like I was on the outside looking in.  I felt shunned, ignored and excluded most of the time.  Though I participated, volunteered and gave a tithe and offerings, it never changed. It wasn’t until I learned that I was being targeted that I began to understand why.

In researching my problem I learned that the power structure in this nation is absolutely corrupted, and the church is a part of that power structure and also a part of the corruption.

It goes deep, very deep, and it encompasses the political structure of your home town all the way to the office of the President of the United States.

The church is snared in the web because of two things; a) The Christian faith emphasizes a godly respect for authority, and b) corrupted authority has capitalized on that and deliberately deceived the church.  Ergo it has become possible for the church to become ensnared in cooperating with an ugly crime.

The crime begins with isolating the victim, and targets in the church can very quickly become isolated and alone and even ostracized. One woman I spoke to was ostracized from her church because gang-stalkers told members of her congregation that she was lesbian.  It wasn’t true, but it served to isolate her from anyone who might have, and should have, provided support.  In fact I have spoken with very many targeted individuals and only one has ever said they found support and encouragement in the church.

So here I am with God.

And I am standing here wondering if God is judging me for something.  I know the scripture.

I have been a believer since I was 15 years old, and I am 55.

Of course I quickly became aware that my stalkers were full of malice and one of their goals was to destroy my faith.  To that end they disrupted my relationship with my church and targeted my mind and emotions with directed energy weapons. Their attack was designed to make me believe that God had abandoned me and I was not his child anymore.

They don’t believe that God exists.  Problem is, he does and he is not silent.  They lie.  He speaks the truth.  He says, “My love is not quenched.”  They can’t contend with the Holy Spirit living inside of me.  They can’t deceive him nor manipulate him into cooperating with their destructive game.

Well the questions arise, “If I am a child of God why am I suffering like this?  Why am I being raped with microwave weapons?  Why are my finances being attacked? Why is my workplace a battleground?  Why did my family and friends not understand when I told them what was happening?  Why does the church fail to respond?  Is God disciplining me for something?

Does God hate me or love me?

In the first place, when we sign up with God we are signing up for the cross.  

Our redeemer was crucified.  All of his disciples bar one fled the cross when this happened.

Jesus said to his disciples, “If any man would come after me, let him deny himself, and take up his cross, and follow me.Matt. 16:24, NIV.

In the Hebrew, the word for cross is literally translated torture stake.  Torture is one of the greatest evils of fallen, sinful human beings.  It turns the human personality upside down.  It is the ultimate violation of the image of God stamped into our very being.

However, Jesus does not call us to resist the cross, but to embrace it.   The writer of Hebrews says,  “For the joy set before him he endured the cross, scorning its shame, and sat down at the right hand of the throne of God. Consider him who endured such opposition from sinners, so that you will not grow weary and lose heart.” –Hebrews 12:2 NIV.

Indeed, consider him.

And what does it mean, “scorning its shame”?

People were crucified because they had allegedly committed a crime.  However, as can be clearly seen in the scripture, the process of convicting the criminal was in fact corrupted.  Jesus was probably not the only man convicted on trumped up charges.  Nevertheless the convicted hung on the cross for all the world to see, having been like Jesus beaten and scourged.

But here is the irony of the thing.  Jesus was in fact sinless.

Those that accused him, lied.

Those who beat him were senselessly cruel and in fact were guilty of murder.

Pilate knew Jesus was innocent but for political reasons allowed an innocent man to die.  But, even when those being crucified are in fact guilty of some crime, they are all of them sentenced, beaten, and crucified by people who all deserve death ( Romans 3:23…for all have sinned and fall short of the glory of God.; Romans 6:23 For the wages of sin is death, but the gift of God is eternal life in Christ Jesus our Lord, NIV).

They are not any less guilty then those who are hanging on the cross.  Jesus knows this.

Perhaps that is what he despises.  They who pass judgment on the crucified, are all worthy of death.  The punisher is no less guilty then the punished.  The punished endures the shame, while the punisher gets off scott free.

Another likely reason Jesus scorned the “shame” of the cross was that it was a symbol of brutal tyranny.

The Jews of Judea lived in the shadow of the cross.  They traveled on foot or by donkey and as they passed the roads the crosses of the crucified bodies of the convicted lined the roadway and adorned the tops of the hills.  The gruesome macabre sight of the tortured bodies, some of them still alive and writhing in excruciating pain, were reminders to passers bye of the consequences of resisting Roman rule or breaking Roman law.  The intent was to intimidate.  It worked. In addition, the religious leaders of the day, instead of defending their people against the tyrannical abuse of the Roman government, curried the favor of the political elite by engaging in tyrannical rule of their own people.  They had thus become corrupt. This was likely the reason Jesus denounced them publicly (Matt 23:13-38).

Jesus went to the cross to say, “Look, you want to crucify someone, take me.  Go ahead drive the spikes into my hands and the spear into my side.  I will take the blame for all of you, and overcome it.”  And he did.  Indeed, consider him.

Several years ago, before I began my research quest, I had a dream.  In my dream there was a war going on.  I was grabbing people and dragging them into the church thinking we would find shelter there.  I had them go down to the floor between wooden pews in defensive posture with their hands covering their heads.  I was saying, ” It’s okay, we will be safe in here.”  No sooner had those words left my mouth, then the entire side wall in the sanctuary was blown out.  On the other side of that wall were Roman Soldiers on horseback, and they were dragging people out of the church and conscripting then into labor.  I remembered the dream because it was so vivid, but I really did not understand the meaning of the dream.

It wasn’t until years later when I learned that I was being targeted and I began digging for information that I understood the dream.  For one of the things I learned was that the occult has heavily infiltrated the church.  Former Grand Druid, John Todd, from the Illuminati Collins family, testified before a church congregation that the Illuminati, the inner core of the Freemason cult, spend billions of dollar yearly training their people to act like evangelical Christians so they can infiltrate and manipulate the church (John Todd, The Illuminati and Witchcraft, 1978 http://www.kt70.com.).  Another Illuminati defector, Svali Walthrop whose interview with Greg Szymanski can be heard at a WordPress web page (http://svalispeaks@wordpress.com), also testified that she grew up in the church but her family was occult.  She was one of their top mind control programmers. When she finally realized everything she had been taught was a lie, and she left the cult.  However, as a cult member, she taught at a Christian school.

In addition there are a load of pastors out there who are Freemasons.  That doesn’t necessarily mean they are not Christian, but Freemasonry is designed to systematically destroy the faith of a believer.

Many Christians who are members of the Freemason cult do not realize that the cult is Luciferian, not Christian.

Both John Todd and Svali Walthrop converted to Christianity, and they have blown the whistle on cult activity in the church.

Cathy O’Brien, who travels with her husband Mark Phillips speaking out against the occult infiltration of the US Government, also reveals that in her catholic School, a CIA occult operative disguised as a priest forced her to perform oral sex on him while she was in the confessional (Cathy O’Brien, Mark Phillips; Trance Formation of America (Frankston, Texas;Reality Marketing Inc., 1995, p 300). The priest/CIA operative was in charge of the now infamous MONARCH mind control operation.  I recommend reading Cathy’s book with great caution.  It is the true life story of a woman who grew up in a 3rd generation occult family.  It is full of sexually explicit material.  I only read the book in patches. There was material in that book I was not willing to read because it was so graphic and contaminating.

What many in America don’t realize, especially in the church, is that we are seeing the prophesied resurgence of Roman tyranny on the political scene worldwide. This is evidenced in America by the blatant violation of human rights and complete disregard of the Constitution or of the rule of “we the people”.  Thus we have American people gang-stalking their fellow Americans and torturing them with directed energy weapons while the US Government, the Department of Justice, local governments, the American BAR association, the American Medical and Psychiatric Associations and Law Enforcement turn a blind eye.

While the cries of 3,000,000 Americans go unheard, and millions more worldwide, stalkers, with the consent of the US Government and governments worldwide are free to tag anyone they wish, torture them covertly with directed energy weapons causing them to hear voices, endure terrible even suicidal depressions, migraine headaches, painful muscle cramps, even ritual rape, loss of sleep, vomiting and diarrhea etc.  Targeted individuals also endure terrible isolation because stalkers trained in cover assault tactics have persuaded family, friends and other associates to cooperate with their scheme through deception, bribery or even blackmail leaving the targeted person without anyone to talk to, defend them or provide emotional support.   They have literally been forsaken at the cross.

God sent his own son to the cross to bear our shame and endure death on our behalf so he could rescue us from an eternity in Hell. Though God disciplines the son or daughter he loves, he does not rape, torture or otherwise abuse them.

However, we are living in a broken and corrupted world.  God asks us sometimes to endure patiently for the sake of others who are also suffering as a witness to the cross.

Suffering is also ordained by God to bring about change in us.  I would be the first to say that I need to change.  I want to be more like Jesus.  God wants to being that about for me.   I want a heart that is pure, free of malice, resentment or spiritual pride.  I want no sexual impurity in me at all.  I want no worldly desires to get in the way of my obedience to Christ.

That does not mean to say that God approves of those who are torturing me or my fellow targeted individuals.  He certainly does not. But God has something to say to them too.  In suffering we are humbled and, before God, we wait patiently for deliverance.

While those who torture us go on torturing with impunity, we are  bearing witness of the truth of the Gospel. I am dismayed by those who insist that if we had been obedient to God, these things wouldn’t have happened to us. I was upset because some woman said something like that to my targeted brother, Timothy Trespass ( https://timothytrespas.wordpress.com/2014/04/01/881-timothytrespas-thank-the-lord-lost-and-suffering-honestly-struggling/).  The implication is that if we targeted individuals were more like her, then we would not be suffering so.

In fact we do stumble and we do experience the consequences of our own actions.  In my own confusion, I wondered if I had done something terrible enough for God to give up on me.  As I was pondering over this, God brought to my mind King David.  God called him a man after his own heart.  King David we know was guilty of murder and adultery.  He was  severely disciplined by God, but God did not forsake him, and King David humbled himself under the Lord’s hand and endured patiently.  He put his faith in God’s unfailing love and refused to budge.

Sometimes our suffering makes no sense at all.

Job was robbed by a gang of ruthless criminals, and Job’s friends were convinced he must have done something terrible.  Job probably struggled with the same “why?” questions that gang-stalking victims struggle with.  Job wrestled because he believed in the goodness of God and could not imagine God being willing to devastate his life in such a way for anything he had done.  He hadn’t in fact done anything worthy of such punishment.  God himself finally had to step in to settle the question.

Honestly, God’s answer to Job never made any sense to me.  What did make sense to me was Job’s resolution, “I know that my redeemer lives, and that in the end he will stand on the earth. And after my skin has been destroyed, yet in my flesh I will see God; I myself will see him with my own eyes—I, and not another. How my heart yearns within me!”  (Job 19:25-27 NIV).

Whether or not you think you have done something horrible for which God would discipline you, putting your faith in God’s unfailing love and refusing to budge will keep you from destructive despair which is where your stalkers will drive you if they can.

The truth is that the methodology and philosophy behind gang-stalking is amoral.  The gang-stalking community operates with a worldview that does not allow for an understanding of a moral or ethical code.  Though many gang-stalkers believe that they are executing some kind of justice, they that lead them have no sense of right or wrong.  The leaders of these gangs are pretty expert at manipulating people to do their bidding.  They are likely connected to the intelligence community and they have an agenda with no regard for the Constitution, Bill of a Rights or common decency.    Deception is the name of their game. The stalkers have a strong sense of justice which is manipulated by their leaders to persuade them to do the things they do.

Though gang-stalkers come from all walks of life, some seem to me to be people who have been underprivileged and have learned to resent people who have more.   The operators who lead them capitalize on this and exploit it.  I have heard a gang-stalker say, “I just think everybody should have the same amount.”  One day I came home and found a book cover from a children’s book that had been obviously and deliberately dropped inside my fenced in patio.  The book cover was new, not worn or torn.    It was clean with not a speck of dirt on it.  It hadn’t been blown there by wind.  The title and the caption of the book was about a woman who was basically a rich snob.  I wondered if the stalkers were told that’s what I was in order to gain their cooperation in targeting me.  The leaders of these groups seem to  have cultivated a socialist/communist mindset in their members.    It is also a concern among targeted individuals that gang stalkers work as reducing the target’s economic viability.  Most targeted individuals become either unemployed or under employed.   This echo’s historically the Bolshevik revolution. Gang-stalking is also used as a revenge service and frequently used to silence whistleblowers.  Large cooperations  hire them to get rid of someone they don’t want to pay the cost of firing.

Gang-stalking victims are also possibly being punished for believing in a moral  code and believing in God. It is possible that the stalker and/or their cult leaders believe that people who adhere to an ethical code are actually mentally unhealthy.  Members of the occult refer to people who believe in a right or wrong as “moralists”.

Satanists and Luciferians do not  believe in love and they work at destroying a person’s ability to form and maintain loving relationships and this is a common element with satanic ritual abuse, trauma based mind control and gang-stalking. Therefore a targets relationships are also targeted.  There is indication that the Freemason cult is at the root at the gang-stalkers mission.

A stalker who confessed explained that the Supreme Council is the power behind gang-stalking.  The Supreme council is the 33rd level of the Freemason cult (http://gangstalkingsurfers.wordpress.com/confessions-of-a-gang-stalker-aka-life-in-the-syndicate/).

Another targeted individual links secret courts run by Freemasons to gang-stalking (If you Discover You Are a  Victim’ ; Hearing Voices is Voice to Skull: Implant Victims, Gang-stalking Wiki<http://www.hearingvoices-is-voicetoskull.com/WhatNext.htm.) The US intelligence community for years has funded research into trauma based mind control.  This was the subject of the Senate investigations in the 70s (United States Senate, Ninety-Fourth Congress Hearings Before the Senate Select Committee to a Study Governmental Operations With Respect to  Intelligence Activities [online] // – AARC Public Digital Library, 1976. – August 16, 2009.  http://www.aarclibrary.org).  Cults including the Freemason cult, Satanists and the like are employing the fruits of that research to force believers to recant their faith, though it is all done covertly in secret and deceptively using directed energy technology, electronic surveillance and satellites. They are also using deception to encourage family members, friends  etc to participate in the game of isolating the victim.  Those that participate may actually believe they are doing something good, when in fact they are participating in the murder of a soul.

If you are a target then I encourage you to put your faith in God’s unfailing love and hang on.  They can’t deceive God and they can’t manipulate him. As the scripture admonishes “Let us hold fast the profession of our faith without wavering; ( for he is faithful that promised;) Hebrews; 10:23 KJV).”

Timothy Trespass has a very humble and repentant spirit.  He was weeping over the remark the woman made to him.  He is truly broken hearted over his own sin, and he is the perfect example of the repentant sinner in the parable Jesus told in Luke 18 which I have quoted above.  I share his grief.  I too have sinned terribly against God.  God be merciful to me, a sinner.

PLEASE ENCOURAGE AUTHOR, LEAVE COMMENT ON ARTICLE AS A MEMBER OR ANONYMOUSLY

Read more articles by Bridget Howe or search for other articles by topic below.

Posted in Christian Encouragement | Tagged , , , , , | 4 Comments

SURVIVAL, EVASION, RESISTANCE AND ESCAPE MULTI-SERVICE TACTICS, TECHNIQUES AND PROCEDURES

SURVIVAL, EVASION, RESISTANCE AND ESCAPE MULTI-SERVICE TACTICS, TECHNIQUES AND PROCEDURES

https://www.eseeknives.com/SERE.Manual.pdf

Fleet Aviation Specialized Operational Training Group, Atlantic Fleet, Naval Air-Station, Brunswick, Brunswick ME 04011-5000

STUDENT HANDBOOK D/E-2D-0039

I TABLE OF CONTENTS

SURVIVOR CHECKLIST………………………………………………….1

CHAPTER I…………………..CODE OF CONDUCT…………………….3

CHAPTER II…………………GENEVA CONVENTION…………………7

CHAPTER III……………….WATER PROCUREMENT…………………21

CHAPTER IV

…………………FOOD PROCUREMENT………..

………..26

CHAPTER V

………………..PERSONAL PROTECTION

……………….35

CHAPTER VI

……………….RECOVERY OPERATIONS..

…………….44

CHAPTER VII…

.RADIO COMMUNICATIONS AND SIGNALING…..47

CHAPTER VIII

…….

………………NAVIGATION……..

………………51

CHAPTER IX

………………………..EVASION……..

………………….65

CHAPTER X

…………………………MEDICAL…….. ..

……………….72

CHAPTER XI

………………INDUCED CONDITIONS …………………84

THE WILL TO SURVIVE

…………………………………………………90

PERSONAL SURVIVAL KIT AND RECOMMENDED READING

…….91

Note:

This UNCLASSIFIED handbook is designed to provide SERE students with information to review during the basic SERE course and as an aid for retention. SERE graduates are encouraged to periodical review this information and continue your SERE education from the recommended reading list

I 1SURVIVAL, EVASION, RESISTANCE AND ESCAPE

QUICK REFERENCE CHECKLIST

DECIDE TO SURVIVE!

S – Size up the situation.

Physical condition

Adequate water intake

Injuries, Illness

Food

Surroundings

Equipment

U – Use all your senses, slow down and think.

R – Remember where you are.

V – Vanquish fear and panic.

I – Improvise and improve.

V – Value living.

A – Act like the natives.

L – Live by your training and experience

1.IMMEDIATE ACTIONS

a.Assess immediate situation…

THINK BEFORE YOU ACT!

b.Take action to protect yourself from Nuclear, Biological or Chemical hazards. (See Chapter XI)

c.Seek concealment.

d.Assess medical condition; treat as necessary. (See Chapter X)

e.Sanitize uniform of potentially compromising information.

f.Sanitize area, hide equipment you are leaving.

g.Apply camouflage.

h.Move away from initial site; zigzag pattern recommended.

i.Use terrain to advantage; communication and concealment.

j.Find hold-up site.

2.HOLD-UP SITE (See ChapterIX)

a.Reassess, treat injuries, inventory equipment.

b.Review plan of action; establish priorities (See Chapter VI)

c.Determine your current location.

d.Improve camouflage.

e.Execute plan of action…

f. Focus thoughts on task(s) at hand.

2STAY FLEXIBLE!

 

3.CONCEALMENT (See Chapter IX)

a.Select a place of cover and concealment providing:

(1)Adequate cover; ground and air.

(2)Safe distance from enemy positions and lines of communication.(LOCs)

(3)Listening and observation point.

(4)Multiple avenues of escape.

(5)Protection from the environment.

(6)Possible communication/signaling opportunities.

b.Stay alert, maintain security.

c.Drink water.

4.MOVEMENT (See Chapter IX)

a.Travel slowly and deliberately.

b.Do not leave evidence of travel, use noise and light discipline.

c.Stay away from LOC’s.

d.Stop, Look, Listen, and Smell; take appropriate action.

e.Move from one concealed area to another.

f.Use evasion movement techniques

5.COMMUNICATION AND SIGNALING (See Chapter VII)

a.Communicate per theater communication procedures, particularly when considering transmitting in the “blind”.

b.Be prepared to use devices on short notice.

c.Communication/signaling devices may compromise position.

6.RECOVERY OPERATIONS (See Chapter VI)

a.Select site(s) IAW criteria in theater recovery plans.

b.Ensure site is free of hazards; secure personal gear.

c.Select best area for communications and signaling devices.

d.Observe site for proximity to enemy activity and LOCs.

e.Follow recovery force instructions.

3 CHAPTER I  CODE OF CONDUCT

The Code of Conduct represents a formal expression of the standards of military conduct understood and accepted by most countries for centuries. It serves as a guideline to be followed by all members of the armed forces, particularly when in a captured or detained status. It is professional and inspirational rather than a penal code. Failure to live up to the full extent of its obligations is not a criminal offense.

Adequate authority exists under the Uniform Code of Military Justice for that malfeasance’s which can be properlytermed criminal acts. Should a service member engage in actions punishable under the UCMJ, they maybe prosecuted under that statute, but not under the Code of Conduct.

It is recognized that inhuman treatment and the application of psychological techniques have succeeded in individual cases in forcing involuntary departures from the standards set forth by the Code and can be expected to do so in the future. Notwithstanding these past and possible future departures, it would be unwise to officially advocate voluntary departures for any reason. The individual must be expected to adhere to both the spirit and the intent of the Code of Conduct to the full extent of their physical, mental, and moral resources. The wisdom of the Code of Conduct has been confirmed by former captives who found it a source of strength in situations of severe duress.

ARTICLE I

I am an American, fighting in the forces which guard my country and our way of life. I am prepared to give my life in their defense.

Article I of the Code of Conduct apply to all service members at all times.

A member of the armed forces has a duty to support the interests and oppose the enemies of the United States regardless of the circumstances, whether in active participation in combat or captivity.

Past experience of captured Americans reveal that honorable survival of captivity requires that a member possess a high degree of dedication and motivation. Maintaining these qualities requires knowledge of and a strong belief in its institutions and concepts. Possessing the dedication and motivation fostered by such beliefs and trust will enable prisoners to survive long, stressful periods of captivity and return to country and family honorably and with their self-esteem intact.

ARTICLE II

I will never surrender of my on free will.

If in command I will never surrender the members of my command while they still have the means to resist

.

Members of the Armed Forces may never voluntarily surrender. Even when isolated and no longer able to inflict casualties on the enemy or otherwise defend themselves, it is their duty to evade capture and rejoin the nearest friendly force. When cut off, shot down or otherwise isolated in enemy controlled territory, they must make every effort to avoid capture. The courses of action available include concealment until recovered by friendly rescue forces, evasive travel to a friendly or neutral territory, and evasive travel to other pre-briefed areas.

4 The responsibility and authority of a commander never exceeds to the surrender of command, even if isolated, cut off or surrounded, while the unit still has the power to resist, break out, or evade to join friendly forces. Only when evasion by members is impossible and further fighting would lead only to their death with no significant loss to the enemy, might the means to resist or evade be considered exhausted.

Capture does not constitute a dishonorable act if all reasonable means of avoiding it have been exhausted and the only alternative is certain death.

ARTICLE III

If I am captured, I will continue to resist by all means available. I will make every effort to escape and aid others to escape. I will accept neither parole nor special favors from the enemy.

The duty of a member of the Armed Forces to continue resistance to enemy exploitation by all means available is not lessened by the misfortune of capture. Contrary to the 1949 Geneva Conventions, enemies which U.S. forces have engaged since 1949 have regarded the PW compound as an extension of the battlefield. The Prisoner of War (PW) must be prepared for this fact.

In disregarding provisions of the Geneva Conventions, the enemy has used a variety of tactics to exploit PW’s for propaganda purposes or to obtain military information. Resistance to captor exploitation efforts is required by the Code of Conduct.

Physical and mental harassment, general mistreatment and torture, medical neglect and political indoctrination have all been used against PW’s in the past.

Under the guidance and supervision of the senior military person and PW organization, PWs must be prepared to take advantage of escape opportunities whenever they arise. In communal detention, the welfare of the PWs who will remain behind must be considered. A PW must “think escape,” must try to escape if able to do so and must assist others to escape. The enemy has tried to tempt PWs to accept special favors or privileges not given to other PWs in return for statements or information desired by the enemy or for a pledge by the PW not to try to escape. A PW must not seek special privileges or accept special favors at the expense of his fellow PWs.  Parole agreements and promises given the captor by a prisoner of war to fulfill stated conditions, such as not to bear arms or not to escape, in consideration of special privileges, such as release from captivity or lessened restraint. The United States does not authorize any service member to sign or enter into any such parole agreement

ARTICLE IV

If I become a prisoner of war, I will keep faith with my fellow prisoners. I will give no information

or take or take part in any action which might be harmful to my comrades. If I am senior, I will

take command. If not, I will obey the lawful orders of those appointed over me and will back them

up in every way.

Officers and non-commissioned officers will continue to carry out their responsibilities and to exercise

their authority in captivity. Informing or any other action detrimental to a fellow PW, is despicable and is

expressly forbidden. Prisoners of war must especially avoid helping the enemy to identify fellow PWs

who may have knowledge of value to the enemy and who may therefore, be made to suffer coercive

interrogation.

Wherever located,

PWs, for their own benefit, should organize in a military manner under the senior

person eligible for command. The senior person (whether officer or enlisted) within the PW camp or with

6
Experience has shown that even when coerced beyond name, rank, service number, date of birth and
claims of inabilities, it is possible to thwart an interrogator’s efforts to obtain useful information by the
use of certain additional ruses and stratagems, provided there is a will to resist.
If a PW finds that, under intense coercion, unauthorized information was unwillingly or accidentally
disclosed, then the member should attempt to recover and resist with a fresh line of mental defense.
ARTICLE VI
I will never forget that I am an American, fighting for freedom, responsible for my actions and
dedicated to the principles which make my country free. I will trust in my God and in the United
States of America.
A member of the Armed Forces remains responsible for personal actions at all times. This Article is
designed to assist members of the Armed Forces to fulfill their responsibilities and to survive captivity
with honor. The Code of Conduct does not conflict with the UCMJ and the latter continues to apply to
each military service member during captivity (or in other hostile detention). A member of the Armed
Forces who is captured has a continuing obligation to resist all attempts to indoctrination and to remain
loyal to country, service and unit. Every member of the Armed Forces of the United States should
understand that members can be held legally accountable for personal actions while detained.
Upon repatriation, PW’s can expect their actions to be subject to review, both as to circumstances of
capture and as to conduct during detention. The purpose of each interview is to recognize misconduct.
The reviews will be conducted with due regard for the rights of the individual and consideration for the
conditions of captivity.
Every member of the Armed Forces of the United States should understand the importance of ensuring
that their personal affairs and family matters (pay, powers of attorney, will, car payments and children’s
schooling) are kept current through discussion, counseling or filing of documents prior to being exposed
to risk of capture. That failure to accomplish these has resulted in an almost overwhelming sense of guilt
on the part of the
PWs, and has placed unnecessary hardship on family members.
The national policy expressed by the President of the United States in promulgating the Code of
Conduct:
“No American prisoner of war will be forgotten by the United States. Every available means will
be employed by our government to establish contact with, to support and to obtain the release of
all our prisoners of war. Furthermore, the laws of the United States provide for the support and
care of dependents of the Armed Forces including those who become prisoners of war. I assure
dependents of such prisoners that these laws will continue to provide their welfare.”
7
CHAPTER II
GENEVA CONVENTIONS
RELATIVE TO THE TREATMENT
OF PRISONERS OF WAR
1949
EXTRACT OF PERTINENT ARTICLES
NOTE:
The complete Article is quoted, unless otherwise stated.
LEGAL STATUS
ARTICLE 1.
The High Contracting Parties undertake to respect and to ensure respect for the present
Convention in all circumstances.
STUDENT NOTE:
Your knowledge of these Articles is what makes the Geneva Conventions
work. Your persistence in demanding your rights under these Articles coupled with the very
powerful influence of world opinion could very well force captors who are signatories, and not
adhering to Article 1, to comply. If your persistence fails, the information gathered upon
repatriation, could be damaging to that country in the form of legal sanctions. Any one of you
could be duty bound by the Code of Conduct to represent others in obtaining the legal rights
listed herein.
ARTICLE 2
In addition to the
provisions which shall be implemented in peacetime, the present
Convention shall apply to all cases of declared war or of any other armed
conflict which may arise
between two or more of the High Contracting Parties, even if the state of war is not recognized by
one of them.
The Convention shall also apply to all cases of partial or total occupation of the
territory of the
High Contracting
Party, even if the said occupation meets with no armed resistance.
Although one of the Powers in conflict may not be a party to the present Convention, the Powers
who are parties thereto shall remain bound by it in their mutual relations. They shall futhermore be
bound by the Convention in relation to the said Power, if the latter accepts and applies the provisions
thereof.
ARTICLE 4
.
A. Prisoners of war, in the sense of the present Convention, are persons belonging to one of the
following categories, who have fallen into the power of the enemy:
(1) Members of the armed forces of a Party to the conflict, as well as members of militias or
volunteer corps forming part of such armed forces.
(2) Members of other mili
tias and members of other volunteer corps, including those of
organized resistance movements, belonging to a Party to the conflict and operating in or outside their
own territory, even if this territory is occupied, provided that such militias or volunteer corps, including
such organized resistance movements, fulfills the following conditions:
8
(a)
that of being commanded by a person responsible for his subordinates;
(b)
that of having a fixed distinctive sign recognizable at a distance;
(c)
that of carrying arms openly;
(d)
that of conducting their operations in accordance with the laws and customs of war.
(3) Members of regular armed forces who profess allegiance to a government or an authority not
recognized by the Detaining Power.
(4) Persons
who accompany the armed forces without actually being members thereof, such as
civilian members of military aircraft crews, war correspondents, supply contractors,
members of labor units or of services responsible for the welfare of the armed forces,
provided that they have received authorization from the armed forces which they
accompany, who shall provide them for that purpose with an identity card similar to the
annexed model.
(5) Members of crews, including masters, pilots and apprentices, of the
merchant marine and the
crews of civil aircraft of the Parties to the conflict, who do not benefit by more favorable
treatment under any other provisions of international law.
(6) Inhabitants of a non-occupied territory, who on the approach of the enemy
spontaneously
take up arms to resist the invading forces, without having had time to form themselves into
regular armed units provided they carry arms openly and respect the laws and customs of
war.
B.
The following shall likewise be treated as prisoners of war under the present convention:
(1) Persons belonging, or having belonged to the armed forces of the occupied country, if the
occupying Power considers it necessary by reason of such allegiance to intern them, even
though it has originally liberated them while hostilities were going on outside the territory it
occupies, in particular where such persons have made an unsuccessful attempt to rejoin the
armed forces to which they belong and which are engaged in combat, or where they fail to
comply with a summons made to them with a view to internment.
(2) The persons belonging to one of the categories enumerated in the present Article, who
have
been received by neutral or non-belligerent Powers on their territory and whom these
Powers are required to intern international law, without prejudice to any more favorable
treatment which these Powers may choose to give and with the exception of Articles 8, 10,
15, 30, fifth paragraph 58-67, 92, 126 and, where diplomatic relations exist between the
Parties to the conflict and the neutral or non-belligerent Power concerned, those Articles
concerning the Protecting Power. Where such diplomatic relations exist, the Parties to a
conflict on whom these persons depend shall be allowed to perform towards them the
functions of a Protecting Power as provided in the present Convention, without prejudice to
the functions which these Parties normally exercise in conformity with diplomatic and
consular usage and treaties.
C. This Article shall in no way affect the status of medical personnel and chaplains as provided for in
Article 33 of the present Convention.
ARTICLE 7.
Prisoners of war may under no circumstances renounce in
part or in entirety the rights
secured to them by the present Convention and by the special agreements referred to in the
foregoing Article, if such there were.
9
ARTICLE 12
. Prisoners of war are in the hands of the enemy Power, but not of the individuals or
military units who have captured them. Irrespective of the individual responsibilities that may exist,
the Detaining Power is responsible for the treatment given them. Prisoners of war may only be transferred
by the Detaining Power to a Power which is a party to the Convention and after the Detaining Power has
satisfied itself of the willingness and ability of such transferee Power to apply the Convention. When
prisoners of war are transferred under such circumstances, responsibility for the application of the
Convention rests on the Power accepting them while they are in its custody. Nevertheless, if that Power
fails to carry out the provisions of the Convention in any important respect, the Power by whom the
prisoners of war were transferred shall, upon being notified by
the Protecting Power, take effective
measures to correct the situation or shall request the return of the prisoners of war. Such requests must
be complied with.
ARTICLE 13
. Prisoners of war must at all times be humanely treated. Any unlawful act or omission
by the Detaining Power causing death or seriously endangering the health of a prisoner in its
custody is prohibited and will be regarded as a serious breach of the present Convention. In
particular, no prisoner may be subjected to physical mutilation or to medical or scientific
experiments of any kind which are not justified by the medical, dental or hospital treatment of the
prisoner concerned and carried out in his interest. Likewise, prisoners of war must at all times be
protected, particularly against acts of violence or intimidation and against insults and public
curiosity. Measures of reprisal against prisoners of war are prohibited.
INTERROGATION
ARTICLE 17
. Every prisoner of war, when questioned on the subject, is bound to give only his
surname, first name and rank, date of birth and army, regimental, personal or serial number or
failing this, equivalent information. If he willfully infringes this rule, he may render himself liable to a
restriction of privileges accorded to his rank or status. Each Party to a conflict is required to furnish the
persons under its jurisdiction who are liable to become prisoners of war with an identity card showing the
owner’s surname, first names, rank, army, regimental, personal or serial number or equivalent information
and date of birth. The identity card may bear as well, any other information the party to the conflict may
wish to add concerning persons belonging to its armed forces. As far as possible the card shall measure
6.5 x 10 cm. and shall be issued in duplicate. The identity card shall be shown by the prisoner of war upon
demand, but may in no case be taken from him. No physical or mental torture, nor any other form of
coercion, may be inflicted on prisoners of war to secure from them information of any kind whatever.
Prisoners of war who refuse to answer may not be threatened, insulted or exposed to unpleasant or
disadvantageous treatment of any kind to prisoners of war who, owing to their physical or mental
condition, are unable to state their identity, shall be handed over to the medical service. The identity of
such prisoners shall be established by all possible means, subject to the provisions of the preceding
paragraph. The questioning of prisoners of war shall be carried out in a language which they understand.
10
ARTICLE 25 (Extract).
Prisoners of war shall be quartered under conditions as favorable as those
for the forces of the Detaining Power who are billeted in the same area. The said conditions shall
make allowance for the habits and customs of the prisoners and shall in no case be prejudicial to
their health. The foregoing provisions shall apply in particular to the dormitories of prisoners of war in
regards
to both total surface and minimum cubic space and the general installations, bedding and
blankets. The premises provided for the use of prisoners of war individually or collectively, shall be
entirely protected from dampness and adequately heated and lighted, in particular, between dusk and
lights out. All precautions must be taken against danger of fire.
FOOD
ARTICLE 26
. The basic daily rations shall be sufficient in quantity, quality and variety to keep prisoners
of war in good health and to prevent loss of weight or the development of nutritional deficiencies.
Account shall also be taken of the habitual diet of the prisoners. The Detaining Power shall supply
prisoners of war
who work with such additional rations as may be necessary for the labor on which they
are employed. Sufficient drinking water shall be supplied to prisoners of war. The use of tobacco shall be
permitted. Prisoners of war shall, so far as possible, be associated with the preparation of their meals;
they may be employed for that purpose in the kitchens. Furthermore, they shall be given the means of
preparing, themselves, the additional food in their possession. Adequate premises shall be provided for
messing. Collective disciplinary measures affecting food are prohibited.
CLOTHING
ARTICLE 27 (Extract).
Clothing, underwear and footwear shall be supplied to prisoners of war in
sufficient quantities by the Detaining Power, which shall make allowance for the climate of the region
where prisoners are detained.
MEDICAL
ARTICLE 29.
The Detaining Power shall be bound to take all sanitary measures necessary to ensure
the cleanliness and healthfulness of camps and to prevent epidemics.
Prisoners of war shall have for their
use, day and night, conveniences, which conform to the rules of hygiene and are maintained in a constant
state of cleanliness. In any camps in which women
prisoners of war are accommodated, separate
conveniences shall be provided for them. Also, apart from the baths and showers with which the camps
shall be furnished, prisoners of war shall be provided with sufficient water and soap for their personal
toilet and for washing their personal laundry; the necessary installations, facilities and time shall be
granted them for that purpose.
11
ARTICLE 30
. Every camp shall have an adequate infirmary where prisoners of war may have the
attention they require, as well as appropriate diet. Isolation wards shall, if necessary, be set aside for cases
of contagious or mental disease. Prisoners of war suffering from serious disease or whose condition
necessitates special treatment, a surgical operation or hospital
care, must be admitted to any military or
civilian medical unit where such treatment can be given, even if their repatriation is contemplated in the
near future. Special facilities shall be afforded for the care to be given to the disabled, in particular to the
blind and for their rehabilitation, pending repatriation. Prisoners of war shall have the attention, preferably
of medical personnel of the Power on which they depend and, if possible, of their nationality. Prisoners of
war may not be prevented from presenting themselves to medical authorities for examination.
ARTICLE
31
. Medical inspections of prisoners of war shall be held at least once a month. They shall
include the checking and the recording of the weight of each prisoner of war. Their purpose shall be, in
particular, to supervise the general state of health, nutrition and cleanliness of prisoners and to detect
contagious diseases, especially tuberculosis, malaria and venereal disease. For this purpose the most
efficient methods available shall be employed, e.g., periodic mass miniature radiography for the early
detection of tuberculosis.
ARTICLE 32
. Prisoners of war who, though not attached to the medical service of their armed
forces, are physicians, surgeons, dentists, nurses or medical orderlies, may be required by the
Detaining Power to exercise their medical function in the interests of prisoners of war dependent of
the same Power. In that case they shall continue to be prisoners of war, but shall receive the same
treatment as corresponding medicinal personnel retained by the Detaining Power. They shall be
exempted from any other work under Article 49.
RELIGION
ARTICLE 33
. Members of the medical personnel and chaplains while retained by the detaining power
with a view to assisting prisoners of war shall not be considered prisoners of war. They shall, however,
receive as a minimum the benefits and protection of the present convention.
ARTICLE 34.
Prisoners of war shall enjoy complete latitude in the exercise of their religious duties,
including attendance at the service of their faith, on condition that they comply with the disciplinary
routine prescribed by the military authorities. Adequate premises shall be provided where religious
services may be held.
12
EDUCATION
ARTICLE 38
. While respecting the individual preferences of every prisoner, the Detaining Power
shall encourage the practice of intellectual, educational and recreational pursuits, sports and games
amongst prisoners and shall take the measures necessary to ensure the exercise thereof by providing them
with adequate premises and necessary equipment.
MILITARY COURTESY
ARTICLE 39
. Every prisoner of war shall be put under the immediate authority of a responsible
commissioned officer belonging to the regular armed forces of the Detaining Power. Such officer
shall have in his possession a copy of the present Convention; he shall ensure that its provisions are
known to the camp staff and the guards shall be responsible, under the direction of his government,
for its application. Prisoners of war, with the exception of officers, must salute and show to all
officers of the Detaining Power the external marks of respect provided for by the regulations
applying to their own forces officer prisoners of war are bound to salute only officers of a higher rank of
the Detaining Power; they must, however, salute the camp commander regardless of his rank.
ARTICLE 40
. The wearing of badges of rank and nationality, as well as of decorations, shall be
permitted.
ARTICLES POSTED
ARTICLE 41.
In every camp, the text of the present Convention and its Annexes and the contents of
any special agreement provided for in Article 6 shall be posted, in the prisoners’ own language, in
places where all may read them. Copies shall be supplied, on request, to the prisoners who cannot
have access to the copy which has been posted. Regulations, orders, notices and publications of every
kind relating to the conduct of prisoners of war shall be issued to them in a
language which they
understand. Such regulations, orders and publications shall be posted in the manner described above and
copies shall be handed to the prisoners’ representative. Every order and command addressed to prisoners
of war individually must likewise be given in a
language which they understand.
LABOR
ARTICLE 49
. The Detaining Power may utilize the labor of prisoners of war
who are physically fit,
taking into account their age, sex, rank and physical aptitude and with a view particularly to
maintaining them in a good state of physical and mental health. Noncommissioned officers who are
prisoners of war shall only be required to do supervisory work. Those not so required may ask for
other suitable work which shall, so far as possible, be found for them. If officers or persons of equivalent
status ask for suitable work, it shall be found for them, so far as possible, but they may under no
circumstances be compelled to work.
13
ARTICLE 50
. Besides work connected with camp administration, installation or maintenance,
prisoners of war may be compelled to do only, such work as is included in the following classes:
(a)
agriculture;
(b)
industries connected with the production or the extraction of raw material and manufacturing
industries, with the exception of metallurgical, machinery and chemical industries; public works and
building operations which have no military character or purpose;
(c)
transport and handling of stores which are not military in character or purpose;
(d
)commercial business, and arts and crafts;
(e
)domestic service;
(f
)public utility services having no military character or purpose.
Should the above provisions be infringed, prisoners of war shall be allowed to exercise their right of
complaint, in conformity with Article 78.
DANGEROUS WORK
ARTICLE 52
. Unless he
be a volunteer, no prisoner of war may be employed on labor which is of an
unhealthy or dangerous nature. No prisoners of war shall be assigned to labor, which would be
looked upon as humiliating for a member of the Detaining Power’s own forces.
The removal of mines or similar devices shall be considered as dangerous labor.
CAPTURE CARDS
ARTICLE 70
. Immediately upon capture, or not more than one week after arrival at a camp, even if
it is a transit camp, likewise in case of sickness or transfer to hospital or to another camp, every
prisoners of war shall be enabled to write direct to his family, on the one hand and to the Central
Prisoners of War Agency provided for in Article 123, on the other hand, a card similar, if possible,
to the model annexed to the present Convention, informing his relatives of his capture, address and
state of health. The said cards shall be forwarded as rapidly as possible and may not be delayed in
any manner.
MAIL
ARTICLE 71 (Extract).
Prisoners of war shall be allowed to send and receive letters and cards. If
the Detaining Power deems it necessary to limit the number of letters and cards sent by each
prisoner of war, the said number shall not be less than two letters and four cards monthly, exclusive
of capture cards provided for in Article 70 and conforming as closely as possible to the models
annexed to the present Convention. Further limitations may be imposed only if the Protecting Power
is satisfied that it would be in the interests of the prisoners of war concerned to do so owing to
difficulties of translation caused by the Detaining Power’s inability to find sufficient qualified
linguists to carry out the necessary censorship. If limitations must be placed on the correspondence
addressed to prisoners of war, they may be ordered only by the Power on which the prisoner
depends, possibly at the request of the Detaining Power. Such letters and cards must be conveyed by
the most rapid method at the disposal of the Detaining Power; they may not be delayed or retained
for disciplinary reasons.
PACKAGES
ARTICLE 72
(Extract).
Prisoners of war shall be allowed to receive by post or by any other means
individual parcels or collective shipments containing, in particular, food-stuffs, clothing, medical
supplies and articles of religious, educational or recreational character which may meet their needs,
including books, devotional articles, scientific equipment, examination papers, musical instruments,
sports outfits and material allowing prisoners of war to pursue their studies or their cultural
activities.
ARTICLE 76
. The censoring of correspondence addressed to prisoners of war or dispatched by them
shall be done as quickly as possible. Mail shall be censored only by the dispatching State and the
receiving State, and once only by each. The examination of consignments intended for prisoners of war
shall not be carried out under conditions that will expose the goods printed or matter, it shall be done in
the presence of
the addressee, or of a fellow-prisoner duly delegated by him. The delivery to prisoners of
individual or collective consignments shall not be delayed under the pretext of difficulties of censorship
,
Any prohibition of correspondence ordered by Parties to the conflict, either for military or political
reason, shall be only temporary and its duration shall be as short as possible.
PRISONER REPRESENTATIVES
ARTICLE
78
. Prisoners of war shall have the right to make known to the military authorities in
whose power they are, their requests regarding the conditions of captivity to which they are
subjected. They shall also have the unrestricted right to apply to the representatives of the Protecting
Powers either through their prisoners representative or, if they consider it necessary, direct, in order to
draw their attention to any points on which they may have complaints to make regarding their conditions
of captivity. These requests and complaints shall not be limited nor considered to be a part of the
correspondence quota referred to in Article 71. They must be transmitted immediately. Even if they are
recognized to be unfounded, they may not give rise to any punishment.
Prisoners’ representatives may send periodic reports on the situation in the camps and the needs of
the prisoners of war to the representatives of the Protecting Powers.
ARTICLE 79
. In all places where there are prisoners of war, except in those where there are officers the
prisoners shall freely elect by secret ballot, every six months and also in cases of vacancies, prisoners
represented entrusted with representing them before the military authorities, the protecting powers the
international committee of the red cross and any other organization which may assist them. The
prisoner’s representative shall be eligible for reelection. (
NOTE
: this conflicts with the Article IV of
Code of Conduct, which states the senior soldier will take charge)
In camps for officers and persons of equivalent status or in mixed camps, the senior officer among the
prisoners of war shall be recognized as the camp prisoner representative. In camps for officers one shall
15
assist him or more advisors chosen by the officers
; in mixed camps, his assistants shall be chosen from
among those prisoners of war who are not officers. Every representative must be approved by the
detaining power before he has the right to commence his duties. Where the detaining power refuses to
approve a prisoner of war elected by his fellow prisoners of war, it must inform the protecting power of
the reason for refusal. In all cases the prisoner representative must have the same nationality, and
language and customs as the prisoners of war for which he represents. Thus prisoners of war distributed
in different sections of the camp according to their nationality language and customs shall have for their
section their own prisoner representative, in accordance with the fore going paragraphs.
ARTICLE 81
. Prisoners’ representatives shall not be required to perform any other work, if the
accomplishment of their duties is thereby made more difficult. Prisoners’ representatives may appoint
from amongst the prisoners such assistants as they may require. All material facilities shall be granted
them, particularly a certain freedom of movement necessary for the accomplishment of their duties
(inspection of labor detachments, receipt
of supplies, etc.) Prisoner representatives shall be permitted to
visit premises where prisoners of war are detained, and every prisoner of war shall have the right to
consult freely his prisoners’ representative.
All facilities shall likewise be accorded to the prisoners’
representatives for communication by post and telegraph with the detaining authorities, the Protecting
Powers, the International Committee of the Red Cross and their delegates, the Mixed Medical
Commissions and representatives of labor detachments shall enjoy the same facilities for communication
with the prisoners’ representatives of the principal camp. Such communications shall not be restricted, nor
considered as forming a part of the quota mentioned in Article 71. Prisoners’ representatives who are
transferred shall be allowed a reasonable time to acquaint their successors with current affairs. In case of
dismissal, the reasons therefore shall be communicated to the Protecting Power.
LAWS OF DETAINING POWER
ARTICLE 82
.
A prisoner of war shall be subject to the laws, regulations and orders in force in the
armed forces of the Detaining Power; the Detaining Power shall be justified in taking judicial or
disciplinary measures in respect of any offense committed by a prisoner of war against such laws,
regulations or orders. However, no proceedings or punishments contrary to the provisions of this
Chapter shall be allowed. If any law, regulation or order of the Detaining Power shall declare acts
committed by a prisoner of war to be punishable, whereas the same acts would not be punishable if
committed by a member of the forces of the Detaining Power, such acts shall entail disciplinary
punishment only.
ARTICLE 85
. Prisoners of war prosecuted under the laws of the Detaining Power for acts committed
prior to capture shall retain,
EVEN IF CONVICTED
, the benefits of the present Convention.
NOTE:
Certain nations have important reservations of this article. These countries insist any prisoner
of war convicted of an
ALLEGED
war crime under the laws of the restraining power loses the
16
protection afforded of the G C. This means
ANY
admission by a PW is subject to interpretation by a
capturing power. If it suits the purpose, the country making the reservation can interpret the normal
combat duties of a soldier as war crimes. Even if the charged PW is given a trial, the results and sentence
are predetermined, as
THE
ONLY EVIDENCE CONSIDERED IS THE PRISONER’S ADMISSION
.
DISCIPLINARY SANCTIONS
ARTICLE 89
. The disciplinary punishments applicable to prisoners of war are the following:
(1) A fine which shall not exceed 50 percent of the advances of pay and working pay which the
prisoner of war would otherwise receive under the provisions of Article 60 and 62 during a
period of not more than 30 days.
(2) Discontinuance of privileges
granted over and above treatment provided for by the present
Convention.
(3) Fatigue duties not exceeding two hours daily.
(4) Confinement The punishment referred to under (3) shall not be applied to officers.
In no case shall disciplinary punishments be inhuman, brutal or dangerous to the health of
prisoners of war.
ARTICLE 90
. The duration of any single (disciplinary) punishment shall in no case exceed 30 days.
Any period of confinement awaiting the hearing of a disciplinary offense or the award of
disciplinary punishment shall be deducted from an award pronounced against a prisoner of war.
The maximum of 30 days provided above may not be exceeded, even if the prisoner of war is
answerable for several acts at the same time when he is awarded punishment, whether such acts are
related or not. The period between the pronouncing of an award of disciplinary punishment and its
execution shall not exceed one month. When a prisoner of war is awarded a further disciplinary
punishment, a period of at least three days shall elapse-between the execution of any two of the
punishments, if the duration of one
of these are ten days or more.
ESCAPE
ARTICLE 91
. The escape of a prisoner of war shall be deemed to have succeeded when:
(1) He has joined the armed forces of the Power on which he depends or those of an ally of the said
Power.
(2) He has left the territory under the control of the Detaining Power on which he depends or those
of an ally of said Power.
(3)He has joined a ship flying the flag of the Power on which he depends or of an allied Power, in the
territorial waters of the Detaining Power, the said ship not being under the control of the last named
Power. Prisoners of war who have made attempts to escape in the sense of this Article and who are
recaptured, shall not be liable to any punishment in respect of their previous escape.
17
ARTICLE 92
.
A prisoner of war who attempts to escape and is recaptured before having made good
his escape in the sense of Article 91 shall be liable only to a disciplinary punishment in respect of this act,
even if it is a repeated offense. A prisoner of war
who is recaptured shall be handed over without delay to
the competent military authority. Article 88
, fourth paragraph, notwithstanding, prisoners of war
punished as a result of an unsuccessful escape shall be subjected to special surveillance. Such surveillance
shall not affect the state of their health, must be undergone in a prisoner of war camp and must not entail
the suppression of any of the safeguards granted them by the present Convention.
NOTE
: Offenses committed by PWs with the sole intention of facilitating their escape and which do not
entail any violence against life or limb, such as offenses against public property, theft without intention of
self-enrichment, the drawing up of false papers or the wearing of civilian clothing shall occasion
disciplinary punishment only. The use of weapons against PWs, especially those attempting to escape,
shall constitute an extreme by warnings. Killing during an escape can be punished by death.
If an escape is successful and the successful escapee is later recaptured, he may be subject to judicial
action for those offenses entailing violence to life or limb or not otherwise within Article 93, GPW.
It should be noted that a soldier successfully effecting an escape is again a combatant (his legal status)
and subject to the law of war. Killing of civilians or other breaches of the Conventions, to effect his
escape subject him to prosecution under the Uniform Code of Military Justice. (Articles 42, 91, 93 GPW)
ARTICLE 93
. Escape or attempt to escape, even if it is a repeated offense, shall not be deemed an
aggravating circumstance if the prisoner of war is subjected to trial by judicial proceedings in respect of
an offense committed during his escape or attempt to escape.
In conformity with the principle stated in
Article 83, offenses committed by prisoners of war with the sole intention of facilitating their escape and
which do not entail any violence against life or limb, such as offenses against public property, theft
without intention of self-enrichment, the drawing up of false papers or the wearing of civilian clothing,
shall occasion disciplinary punishment only.
ARTICLE 97
. Prisoners of war shall not in any case be transferred to penitentiary establishments
(
prisons, penitentiaries, convict prisons, etc.)
to undergo disciplinary punishment therein. All premises in
which disciplinary punishments are undergone shall conform to the sanitary requirements set forth in
Article 25. A prisoner of war undergoing punishment shall be enabled to keep himself in a state of
cleanliness, in conformity with Article 29. Officers and persons of equivalent status shall not be lodged in
the same quarters as non- commissioned officers or men. Women prisoners of war undergoing
disciplinary punishment shall be confined in separate quarters from male prisoners of war and shall be
under the immediate supervision of women.
ARTICLE 126
. Representatives or delegates of the Protecting Powers shall have permission to go to
all places where prisoners of war may be, particularly to places of interment, imprisonment and
labor, and shall have access to all premises occupied by prisoners of war; they shall also be allowed
to go to the places of departure, passage and arrival of prisoners who are being transferred. They
shall be able to interview the prisoners, and in particular the prisoners’ representatives, without
18
witnesses, either personally or through an interpreter. Representatives and delegates of the Protecting
Powers shall have full liberty to select the places they wish to visit. The duration and frequency of these
visits shall not be restricted. Visits may not be prohibited except for reasons of imperative military
necessity, and then only as an exceptional and temporary measure. The Detaining Power and the Power
on which the said prisoners of war depend may agree, if necessary, that compatriots of these prisoners of
war be permitted to participate in the visits. The delegates of the International Committee of the Red
Cross shall enjoy the same prerogatives. The appointment of such delegates shall be submitted to the
approval of the Power detaining the prisoners of war to be visited.
TABLE OF UCMJ PUNITIVE ARTICLES
OF SPECIFIC APPLICABILITY TO
CODE OF CONDUCT TYPE SITUATIONS
ARTICLE NO.
DESCRIPTION
Article 85
Desertion by any member of the Armed Forces.
Article88
Use of contemptuous words by an officer against the President, Vice-President
or other government official specifically identified.
Article 89
Disrespect by any member of the Armed Forces of his superior commissioned
officer.
Article 90
Disobedience by any member of the Armed Forces of his superior commissioned
officer.
Article 91
Insubordinate conduct by any warrant officer or enlisted member of the Armed
Forces toward a warrant officer, non-commissioned officer or petty off
icer while
that officer is in the execution of their office.
Article 92
(a) Failure of any member of the Armed Forces to obey a lawful General Order or
other lawful order which does not qualify as a General Order.
(b) Dereliction of duty by
any member of the Armed Forces.
Article 94
Mutiny or sedition by any member of the Armed Forces.
Article 99
Misbehavior before the enemy by any member of the Armed Forces. (This article
includes such acts of misbehavior as shamefully surrendering
a command, casting
away arms or ammunition and willful failure to do one’s utmost to engage the
enemy.)
Article 100
Compelling the surrender of command, without proper authority, by any member
19
of the Armed Forces. (This article includes c
ommunicating or holding any
intercourse with the enemy without proper authority to do so.)
Article 104
Aiding the enemy by any member of the Armed Forces. (This article includes
communicating or holding any intercourse with the enemy without pr
oper
authority to do so.)
Article 105
Misconduct by any member of the Armed Forces while held as a prisoner of war.
(This article includes engaging in any act as a POW for the purpose of securing
more favorable treatment from the enemy, if
that act is also detrimental to fellow
POW’s.)
Article 133
The general article concerning conduct unbecoming an officer.
Article 134
The general article applicable to all members of the Armed Forces which concerns
conduct prejudicial to the
good order and discipline in the Armed Forces and
conduct of a nature likely to bring discredit upon the Armed Forces of the United
States
20
Chapter III
Water
1.
Water Requirements
a.
Drink as much water as possible (min 2 quarts per day) to maintain fluid level.
b.
Exertion, heat, injury or illnesses requires a greater need for water intake.
Note:
Pale yellow urine indicates adequate hydration.
2.
Water Procurement
a.
Water sources:
(1)
Surface water (streams, lakes and springs).
(2)
Precipitation (rain, snow, dew, sleet) (see FigureVII-1)
22
c.
Open seas:
(1)
Precipitation:
(a)
Drink as much as possible.
(b)
Catch rain in spray shields and life raft covers.
(c)
Collect dew off raft.
(2)
Use issued sources.
(3)
Old sea ice or iceberg (See Figure VII-4).
(4)
Do not drink:
(a)
Urine.
(b)
Fish juices.
(c)
Blood.
(d)
Sea water.
(e)
Alcohol.
d.
Tropical areas:
(1)
All open sources previously mentioned.
(2)
Vegetation:
(a)
Plants with hollow sections can collect moisture.
(b)
Leaning tree. Cloth absorbs rain running down tree and drips into container (see Figure
VII-5).
Figure VII-5. Leaning Tree
(c)
Banana plants.
(d)
Water trees (avoid milky sap):
Tap before dark. Let sap stop running and harden during the daytime.
Produce most water at night.
For evasion situations, bore into the roots and collect water.
(e)
Vines (see Figure VII-6A):
Cut bark – do not use
milky sap.
If juice is clear and water like, cut as large a piece of vine as possible, cutting the top
first.
Pour into hand to check smell, color, and taste to determine if drinkable.
Do not touch vine to lips.
When water flow stops, cut off 6 inches of opposite end, water will flow again.
23
(f)
Old bamboo:
Shake and listen for water.
Bore hole at bottom of section to obtain the water.
Cut out entire section to carry with you.
Filter and purify.
(g)
Green bamboo (see Figure VII-6B).
Figure VII-6 A & B. Water Vines and Green Bamboo
(h)
Along the coast, obtain water by:
Digging a beach well (see Figure VII-7).
Liquid contained in green coconuts (ripe coconuts may cause diarrhea).
Figure VII-7. Beach Well
e.
Dry areas:
(1)
Solar still (see Figure VII-8).
(2)
Foliage bag (see Figure VII-9).
Note:
Do not use poisonous/toxic plants in any still or bag
24
Figure VII-8. Solar Still
Figure VII-9. Vegetation Bag
(3)
Transpiration bag (see Figure VII-10):
(a)
Water bag must be clear.
(b)
Water will taste like the plant smells.
Figure VII-10. Transpiration Bag
25
3.
Water Preparation and Storage
a.
Filtration:
(1)
Seepage basin (see Figure VII-11).
(2)
Filter through porous material (sand/charcoal).
Figure VII-11. Seepage Basin
b.
Purification:
(1)
Water from live plants requires no further treatment.
(2)
Purify all other water:
(a)
Boil at least one minute.
(b)
To improve taste, pour from one container to another to aerate.
(c)
Water purification tablets. Follow instructions.
c.
Potable Water:
(1)
If water cannot be purified, obtain water from a clear, cold, clean, and fast running source (if
possible).
(2)
Put in clear container and expose to the sun’s ultraviolet rays to kill bacteria.
d.
Storage. To prevent contamination, use a clean, covered or sealed container:
(1)
Trash bag.
(2)
Prophylactic.
(3)
Section of bamboo.
(4)
Flotation gear.
26
Chapter IV
FOOD
1.
Food Procurement
a.
Locating:
(1)
Mammals:
(a)
Trails lead to watering, feeding, and bedding areas.
(b)
Look for fresh droppings or tracks.
(2)
Birds:
(a)
Observing the direction of flight in the early morning and late afternoon may lead to
feeding, watering, and roosting areas.
(b)
The noise of birds may indicate nesting areas.
(3)
Fish and other marine life:
(a)
Streams and rivers (see Figure VIII-1).
(b)
Lakes, ponds and oceans.
(c)
Along shores.
Figure VIII-1. Fishing Locations
(4)
Reptiles and amphibians are found almost worldwide.
(5)
Insects may be found:
(a)
In dead logs and stumps.
(b)
Ant and termite mounds.
(c)
On ponds, lakes, and slow moving streams.
b.
Procurement techniques:
(1)
Snares:
(a)
Work while unattended.
(b)
Location of snares:
Trails leading to water, feeding, and bedding areas.
The mouth of
dens (see Figure VIII-2).
27
Figure VIII-2. Snare Placement
(c)
Construction of simple loop snare:
Use materials that will not break under the strain of holding an animal.
Use a figure eight (locking loop) if wire is used, (see Figure VIII-3).
Figure VIII-3. Locking Loop
Once tightened, the wire locks in place, preventing reopening, and the animal’s escape.
To construct a squirrel pole (see Figure VIII-4) use simple loop snares.
Figure VIII-4. Squirrel Pole
Make noose opening slightly larger than the animal’s head, three-finger width for
squirrels, fist-sized for rabbits.
(d)
Placement of snares:
28
Avoid disturbing the area.
Use funneling (natural or improvised) (see Figure VIII-5).
Set as many snares as possible.
(2)
A noose stick is easier and safer to use than the hands.
Figure VIII-5. Funneling
(3)
Twist stick (see Figure VIII-6):
(a)
Insert forked stick into a den until something soft is met.
(b)
Twist the stick, binding the animal’s hide in the fork.
(c)
Remove the animal from the den.
(d)
Be ready to kill the animal, it may be dangerous.
Figure VIII-6. Procurement Devices
(4)
Hunting and fishing devices:
(a)
Club or rock.
(b)
Spear.
(c)
Slingshot.
(d)
Pole, line, and hook.
(e)
Net.
(f)
Trap.
(5)
Fishing traps and devices (see Figure VIII-7).
29
Figure VIII-7. Procurement Methods
(6)
Precautions:
(a)
Wear shoes to protect the feet when wading in water.
(b)
Avoid reaching into dark holes.
(c)
Animals in distress may attract the enemy.
(d)
Kill animals prior to handling.
(e)
Do not secure fishing lines to yourself or the raft.
(f)
Kill fish before bringing them into the raft.
(g)
Do not eat fish with:
Spines.
Unpleasant odor.
Pale, slimy gills.
Sunken eyes.
Flabby skin.
Flesh that remains dented when pressed.
(h)
Do not eat fish eggs or liver (entrails).
(i)
Avoid all crustaceans above the high tide mark.
(j)
Avoid cone-shaped shells. (See figure VIII-8)
30
Figure VIII-8. Cone-shaped shells
(k)
Avoid hairy insects, the hairs could cause irritation or infection.
(l)
Avoid poisonous insects, for example:
Centipedes.
Scorpions.
Poisonous spiders.
(m)
Avoid disease carrying insects, such as:
Flies.
Mosquitoes.
Ticks.
c.
Plant Foods (Before using the following guide use your evasion chart to identify edible plants):
Note
: If you cannot positively identify an edible plant and must use an unknown plant, these guidelines
may help you determine edibility.
(1)
Selection Criteria:
(a)
Before testing for edibility, ensure there are enough plants to make testing worth your time
and effort. Each part of a plant (roots, leaves, stems, bark, etc.) requires more than 24
hours to test. Do not waste time testing a plant that is not abundant.
(b)
Test only one part of one plant at a time.
(c)
Remember that eating large portions of plant food on an empty stomach may cause
diarrhea, nausea, or cramps. Two good examples of this are such familiar foods as green
apples and wild onions. Even after testing food and finding it safe, eat in moderation.
31
(2)
Avoid plants with the following characteristics:
Note:
Using these guidelines in selecting plants for food may eliminate some edible plants; however,
these guidelines will help prevent choosing potentially toxic plants.
(a)
Milky sap (Dandelion has milky sap but is safe to eat and easily recognizable).
(b)
Spines, fine hairs and thorns (skin irritants/contact dermatitis), (Prickly pear and thistles are
exceptions. Bracken fern
fiddleheads also violate this guideline).
(c)
Mushrooms and fungus.
(d)
Umbrella shaped flowers (Hemlock is eliminated).
(e)
Bulbs (Onions are the only thing that smell like onions).
(f)
Grain heads with pink, purplish or black spurs.
(g)
Beans bulbs or seeds inside pods.
(h)
Old or wilted leaves.
(i)
Plants with shiny leaves.
(j)
White and yellow berries (Aggregate berries such as black and dewberries are always
edible, test all others before eating).
(k)
Almond scent in woody parts and leaves.
d.
Test Procedures:
Note:
Test all parts of the plant for edibility. Some plants have both edible and inedible parts. Never
assume a part that proved edible when cooked is edible raw, test the part raw before eating. The same
part or plant may produce varying reactions in different individuals.
(1)
Test only one part of a plant at a time.
(2)
Separate the plant into its basic components (Stems roots buds and flowers).
(3)
Smell the food for strong acid odors. Remember smell alone does not indicate a plant is edible
or inedible.
(4)
Do not eat 8 hours prior to the test and drink only purified water.
(5)
During the 8 hours you abstain from eating test for contact poisoning by placing a piece of the
plant on the inside of your elbow or wrist. The sap or juice should contact the skin. Usually
15 minutes is enough time to allow for a reaction.
(6)
During testing take nothing by mouth except purified water and the plant you are testing.
(7)
Select a small portion of a single part and prepare it the way you plan to eat it.
(8)
Before placing the prepared plant in your mouth, touch a small portion (a pinch) to the outer
surface of you lip to test for burning or itching.
(9)
If after 3 minutes there is no reaction on your lip, place the plant on your tongue, and hold it
for 15 minutes.
(10)
If there is no reaction, thoroughly chew a pinch and hold it in your mouth for 15 minutes.
DO NOT SWALLOW
. If any ill effects occur rinse out your mouth with water.
(11)
If nothing abnormal occurs swallow the food and wait 8 hours. If any ill effects occur during
32
this period, induce vomiting and drink a water and charcoal mixture.
(12)
If no ill effects occur, eat ¼ cup of the same plant prepared the same way. Wait another 8
hours. If no ill effects occur, the plant part as prepared is safe for eating.
Notes:
1.
Ripe tropical fruits should be peeled and eaten raw. If the fruit is soft, color does not always indicate
ripeness. Cook unripe fruits and discard seeds and skin.
2.
Cook underground portions if possible to reduce possible bacterial contamination and ease digestion
of their generally high starch content.
3.
During evasion you may not be able to cook. Concentrate your efforts on leafy green plants, ripe
fruits and above ground ripe vegetables not requiring significant preparation.
2.
Food Preparation
a.
Animal food gives the greatest food value per pound.
b.
Butchering and skinning:
(1)
Mammals:
(a)
Remove the skin and use for improvising.
(b)
Glove skinning.
(c)
One cut skinning of small game (see Figure VIII-9):
Figure VIII-9. Small Game Skinning
Open the abdominal cavity,
Avoid rupturing the intestines.
Remove the intestines.
Save inner organs (heart, liver, and kidneys) and all meaty parts of the skull, brain, tongue
and eyes.
(d)
Wash when ready to use.
(e)
If preserving the meat, remove it from the bones.
(2)
Frogs and snakes:
(a)
Skin.
(b)
Discard skin, head w/2 inches of body, and internal organs.
(3)
Fish:
(a)
Scale (if necessary) and gut fish soon after procur
34
(b)
Frozen food will not decompose.
(c)
Freeze in meal-size portions.
(2)
Short term:
(a)
Food wrapped in waterproof material and placed in a stream remains cool in summer
months.
(b)
Earth below the surface, particularly in shady areas or along streams, is cooler than the
surface.
(c)
Wrap food in absorbent material such as cotton and re- wet as the water evaporates.
c.
Drying and smoking removes moisture and preserves food:
(1)
Use salt, to improve flavor and promote drying.
(2)
Cut or pound meat into thin strips.
(3)
Remove fat.
(4)
Do not use pitch woods such as fir or pine, they produce soot giving the meat an undesirable
taste.
d.
Protecting meat from animals and insects:
(1)
Wrap food:
(a)
Use clean material.
(b)
Wrap pieces individually.
(c)
Assure all corners of the wrapping are insect proof.
(2)
Hanging meat:
(a)
Cover during daylight hours to protect from insects.
(b)
Hang meat in the shade.
(3)
Packing meat on the trail:
(a)
Wrap before flies appear in the morning.
(b)
Place meat in fabric or clothing for insulation.
(c)
Place meat inside the pack for carrying. Soft material acts as insulation helping keep the
meat cool.
(d)
Carry shellfish, crabs, and shrimp in wet seaweed.
e.
Wrap soft fruits and berries in leaves or moss.
f.
Do not store food in the shelter, it attracts unwanted animals.
35
Chapter V
PERSONAL PROTECTION
1.
Priorities
a.
Evaluate available resources and situation; accomplish individual tasks accordingly.
b.
First 24 hours in order of situational needs:
(1)
Construct survival shelter according to selection criteria.
(2)
Procure water.
(3)
Establish multiple survival signals.
(4)
Fire.
c.
Second 24 hours:
(1)
Construct necessary tools and weapons.
(2)
Procure food.
2.
Care and Use of Clothing
a.
Never discard clothing.
b.
Wear loose and layered clothing:
(1)
Tight clothing restricts blood flow regulating body temperature.
(2)
Layers create more dead air space.
(3)
In hot areas keep entire body covered to prevent sunburn and dehydration
.
c.
Avoid overheating:
(1)
Remove layers of clothing before strenuous activities.
(2)
When fully clothed, the majority of
body heat escapes through the head and neck areas.
(3)
Use a hat to regulate body heat.
(4)
In hot environments, wear a hat when in direct sunlight.
d.
On the ocean in hot weather, dampen clothing:
(1)
Use salt water, not drinking water.
(2)
Dry clothing before dark to prevent hypothermia.
e.
Keep clothing dry to maintain its insulation qualities, dry damp clothing in the sun or by a fire.
f.
If you fall into the water in the winter:
(1)
Build fire.
(2)
Remove wet clothing and
rewarm by fire.
(3)
Finish drying clothing by fire.
g.
If no fire is available:
(1)
Remove clothing and get into sleeping bag (if available).
(2)
Allow wet clothes to freeze.
(3)
Break ice out of clothing.
h.
Keep clothing clean, dirt reduces its insulation qualities:
(1)
Do not sit or lie directly on the ground.
(2)
Wash clothing whenever possible.
i.
Examine clothing frequently for damage, and repair when necessary using:
(1)
Needle and thread.
(2)
Safety pins.
(3)
Tape.
j.
Improvised foot protection (see Figure VI-1):
36
Figure VI-1 Improvised Foot Wear
(1)
Cut two to four layers of cloth into a 30-inch square.
(2)
Fold into a triangle.
(3)
Center foot on triangle with toes toward corner.
(4)
Fold front over the toes.
(5)
Fold side corners, one at a time, over the instep.
(6)
Secure by rope, vines, tape etc, or tuck into other layers of material.
2. Other Protective Equipment
k.
Sleeping bag:
(1)
Fluff before use especially at foot of bag.
(2)
Air and dry daily to remove body moisture.
(3)
May be improvised with available material, dry grass, leaves, dry moss, etc.
l.
Sun and snow goggles (see Figure VI-2):
Figure VI-2. Sun and Snow Goggles
(1)
Wear in bright sun or snow conditions.
(2)
Improvise by cutting small horizontal slits in webbing
or bark, or similar materials.
m.
Gaiters
(see Figure VI-3):
37
Figure VI-3. Gaiters
(1)
Used to protect from sand,
snow, insects, and scratches.
(2)
Wrap material around lower leg and top of boots.
3.
Shelters
a.
Evasion considerations apply.
b.
Site selection:
(1)
Near signal and recovery site.
(2)
Food and water available.
(3)
Avoid natural hazards:
(a)
Dead standing trees.
(b)
Drainage and
dry river beds except in combat areas.
(c)
Avalanche areas.
(4)
Location large and level enough to lie down in.
c.
Types of shelters:
(1)
Find shelter requiring minimal improvements (see Figure VI-4).
Figure VI-4. Immediate Shelters
38
(a) In temperate climates, protection from wind and rain is sufficient.
(2)
Cold climates (see Figures VI-5, 6, & 7):
Figure VI-5. Thermal A Frame
Figure VI-6. Snow Trench
39
Figure VI-7. Snow Cave
(a)
An enclosed, insulated shelter may be required.
(b)
Snow is the most abundant insulating material.
(c)
An air vent is required to prevent carbon monoxide poisoning when using an open flame
inside enclosed shelters.
(d)
As a general rule, unless you can see your breath – your snow shelter is too warm and
should be cooled down to preclude melting and dripping.
(3)
Hot climates (see Figure VI-8):
(a)
A shade shelter is required to protect from UV rays.
(b)
The shelter floor should be elevated or dug down (approximately 18 inches) to reduce the
surface temperature.
(c)
For thermal protection, a minimum of two layers of material suspended 12-18 inches
above the head is required.
(d)
White is the best color to reflect heat (inner most layer should be of darker material).
Figure VI-8. Poncho / Parachute Shade Shelter
(4)
Tropical/wet climate (see Figure VI-9 & 10). An enclosed, elevated shelter is needed for
protection from dampness and. insects.
d.
Shelter construction:
(1)
Entrance 45-90
0
from prevailing wind.
(2)
Cover with available material.
(3)
If natural materials are used, arrange them in layers starting at the bottom with each layer
overlapping the previous one.
(4)
If using porous material, like a, parachute, blankets, etc.:
(a)
Stretch as tight as possible.
(b)
Use a 40
0
–60
0
slope.
(c)
Use additional layers in heavy rains.
e.
Shelter construction materials:
(1)
Raft and raft parts.
(2)
Vehicle or aircraft parts.
(3)
Blankets, poncho, or parachute material.
(4)
Sheet of plastic or plastic bag.
(5)
Bark peeled off dead trees.
(6)
Boughs and broad leaves.
(7)
Grass and sod.
40
(8)
Snow.
(9)
Sand and rocks.
f.
Construct a bed to protect from cold, damp ground using:
(1)
Raft or foam rubber from vehicle seats.
(2)
Boughs, leaves, or dry moss.
Figure VI-9. Raised Platform Shelter
Figure VI-10. Shingle Method
4.
Fire
Note
: Weigh hazards and risks of detection against the need for a fire.
a.
Evasion considerations:
(1)
Use trees or other source to dissipate smoke.
(2)
Use fires at dusk, dawn or during inclement weather.
(3)
Use fires at times when the local populace is cooking.
b.
Fire building:
(1)
The three essential elements for starting a fire are heat, fuel, and oxygen:
(2)
Some heat sources to start fire are:
(a)
Matches or lighter.
41
(b)
Flint and steel (experiment with various rocks and metals until a good spark is produced).
(c)
Sparks from batteries.
(d)
Concentrated sunlight, use magnifying glass or flashlight reflectors.
(e)
Pyrotechnics, such as flares (last resort), etc.
(f)
Friction method (see Figure VI-11).
Figure VI-11. Friction Method
Note
: If possible, carry a
fire starting device with you.
c.
Fuel is divided into three stages; tinder, kindling, and fuel:
(1)
Gather large amounts of each stage before igniting the fire.
(2)
Examples of tinder, the first stage, include:
(a)
Cotton.
(b)
Candle (shred the wick, not the wax).
(c)
Plastic
spoon, fork, or knife.
(d)
Foam rubber.
(e)
Dry bark.
(f)
Dry grasses.
(g)
Gun powder.
(h)
Pitch.
(i)
Petroleum products.
(3)
Tinder must be very finely shaved, or shredded, to provide a low combustion point and fluffed
to allow oxygen to flow through. (To get tinder to burn hotter and longer, saturate
ith
Vaseline,
Chapstick, insect repellant, aircraft fuel, etc.)
(4)
Kindling, the second stage, must be small enough to ignite from the small flame of the tinder.
Gradually add larger kindling until arriving at the size of fuel to burn.
(5)
Examples of fuel, the third stage, include:
(a)
Dry hardwood—removing bark reduces smoke.
(b)
Bamboo—open chambers to prevent explosion
45
(7)
Use a thumbs up, vigorous cable shake, or radio call to
signal you are ready.
(8)
Drag feet on the ground to decrease oscillation.
(9)
Do not assist during hoist or when pulled into the rescue
vehicle. Follow crewmember instructions.
e.
For non-hoist recovery (rope or unfamiliar equipment):
(1)
Create a “fixed loop” big enough to place under armpits
(See Figure IV-3).
(2)
Follow the procedures in “d” above.
Figure IV–1. Rescue Strap
46
Figure IV-2. Forest Penetrator
Figure IV–3. Fixed Loop
47
Chapter VII
RADIO COMMUNICATIONS AND SIGNALING
Note:
Inventory and review the operating instructions of all communications and signaling equipment.
1.
Radio communications (voice and data)
a.
If you have a locator beacon, find it and turn it off – take it with you to supplement radio
communications.
b.
Make initial contact ASAP or IAW theater communications plan (TCP).
c.
If no immediate contact, then follow TCP.
d.
Locate spare radio and batteries–keep warm and dry.
e.
Transmissions:
(1)
Use concealment sites that optimize line of sight.
(2)
Face recovery asset.
(3)
Keep antenna perpendicular to intended receiver (see Figure III-1).
(4)
Do not ground antenna (i.e. finger on antenna or attaching bolt, space blanket, vegetation etc).
(5)
Keep transmissions short (3-5 seconds maximum). Use data burst if available.
(6)
Move after each transmission if possible.
(7)
If transmitting in the blind, ensure a clear line of sight towards the equator.
f.
Listening—use published reception times in the TCP, or as directed by recovery forces.
2.
Signaling
a.
Pyrotechnic signals:
(1)
Prepare early (weather permitting).
(2)
Use IAW TCP or as directed by recovery forces.
(3)
Extend over raft’s edge prior to activating.
b.
Signal mirror (see Figure III-2):
(1)
Use as directed by recovery forces.
(2)
If no radio, use only with confirmed friendly forces.
(3)
Cover when not in use.
Note:
Make a mirror from any shiny metal or glass.
48
Figure III-1. Radio Transmission Characteristics
c.
Strobe light:
(1)
Prepare filters and shield early.
(2)
Use IAW TCP or as directed by recovery forces.
(3)
Conserve battery life.
Note:
Produces one residual flash when turned off.
49
Figure III-2. Sighting Techniques
d.
Pattern signals–use published TCP signals:
(1)
Materials:
(a)
Manmade (space blanket, signal paulin, parachute).
(b)
Natural. Use materials that contrast the color and/or texture of the signaling area. (rocks,
brush, branches, stomped grass).Location
:
(c)
Maximize visibility from above.
(d)
Site should offer concealment from ground observation.
(2)
Size (large as possible) and ratio (see Figure III-3).
(3)
Shape—maintain straight lines and sharp corners.
(4)
Contrast—use color and shadows.
(5)
Pattern signals (see Figure III-4).
e.
Sea dye marker:
(1)
Do not waste in rough seas or fast moving water.
(2)
Conserve unused dye by re-wrapping.
(3)
May be used to color snow.
f.
Non-tactical considerations:
(1)
Use a fire at night.
(2)
Use smoke for day, (tires or petroleum products for dark smoke and green vegetation for light
smoke, see Figure III- 5).
(3)
Use signal mirror to sweep horizon.
(4)
Audio signals (i.e., voice, whistle, and weapons fire).
Note:
Any of the above signals used in a series of three, evenly spaced, is recognized as
an international distress symbol
Figure III-3. Size and ratio
50
Figure III-4. Signal Key
Figure III-5. Smoke Generator
51
Chapter VIII
NAVIGATION
Note:
Assess the threat and apply appropriate evasion principles.
1.
Stay or Move
a.
Stay with the vehicle/aircraft in a permissive environment.
b.
Leave only when:
(1)
Dictated by the threat.
(2)
Certain of location, have a known destination, and the ability to get there.
(3)
Water, food, shelter, and (or) help can be reached.
(4)
Convinced rescue is not coming.
c.
If you decide to travel, consider the following:
(1)
Follow briefed evasion plan.
(2)
Which direction to travel and why.
(3)
What equipment to take, cache, or destroy.
d.
Leave information at your start point (only in permissive environment):
(1)
Destination.
(2)
Route of travel.
(3)
Personal condition.
(4)
Supplies available.
e.
Evasion considerations:
(1)
Do not write on the map.
(2)
Do not soil the map by touching the destination.
(3)
Do not fold in a manner providing travel information.
2.
Navigation and Position Determination
a.
Determine your general location:
(1)
Develop a working knowledge of operational area:
(a)
Natural geographic checkpoints.
(b)
Manmade checkpoints.
(c)
Use the “Rate x Time = Distance” formula.
(2)
Use previous knowledge of operational area.
(3)
Use information provided in the map legend.
(4)
Use prominent landmarks.
(5)
Visualize map to determine position.
b.
Determine cardinal directions (north, south, east, and west):
(1)
Use compass.
Note:
Margin of error increases the closer you are to the Equator for the following methods.
(2)
Stick and shadow method determines a true north-south line (see Figure II-1).
52
Figure II-1. Stick and Shadow Method
(3)
Sunrise/moonrise in the east, sun/moonset in the west.
(4)
Use a wristwatch to determine cardinal direction (see Figure II-2): (Use this method for
general direction only.)
(a)
Digital watches may be used, visualize a clock face on the watch.
(b)
Northern Hemisphere, Point hour hand at the sun. South is half way between the hour hand
and 12 o’clock position.
(c)
Southern Hemisphere, Point the 12 o’clock position on your watch at the sun. North is
half way between the 12 o’clock position and the hour hand.
(5)
Pocket Navigator (see Figure II-3):
(a)
Gather necessary materials:
Paper or other flat writing material (e.g. MRE box).
1-2” shadow tip device (e.g. twig, nail, match).
Pen or pencil.
54
Figure II-3 Pocket Navigator
Figure II-4. Stars
c.
Orient the map:
(1)
Orienting a map using a true north-south line (see Figure II- 5):
(a)
Unfold map and place on a firm, flat, level non-metallic surface.
(b)
Align the compass on a true north-south line.
(c)
Rotate map and compass until stationary index line aligns with the magnetic variation
indicated in marginal information:
Easterly, subtract variation from 360
0
.
Westerly, add variation to 360
0
.
55
Figure II-5. Orienting a Map Using a True North-South Line
(2)
Orienting map with a compass rose (see Figure II-6):
(a)
Place edge of the lensatic compass on magnetic north line of the compass rose closest to
your location.
(b)
Rotate map and compass until compass reads 360
o
.
56
Figure II-6. Map Orientation with Compass Rose
(3)
No compass; orient map using cardinal direction obtained by the stick and shadow method, or
the celestial aids (stars) method.
d.
Determine specific location:
(1)
Global Positioning System (GPS):
(a)
Do not use GPS for primary navigation.
(b)
Use GPS only to confirm your position.
(c)
Select area providing maximum satellite reception.
(d)
Conserve GPS battery life.
(2)
Triangulation (resection) with a compass (see Figure II-7):
57
Figure II-7. Triangulation
(a)
Try to use three or more azimuths.
(b)
Positively identify a major land feature and determine a line of position (LOP) (see figure
II-7a).
(c)
Each time compass is used, check map orientation.
(d)
Plot the LOP using a thin stick, blade of grass or pencil (non-tactical).
(e)
Repeat steps b through d for other LOPs.
e.
Use the compass for night navigation:
(1)
Set up compass for night navigation (see Figure II-8).
(2)
Align north-seeking arrow with luminous line and follow front of compass.
(3)
Use point to point navigation.
f.
Route selection techniques:
(1)
Circumnavigation:
(a)
Find a prominent landmark on the opposite side of the obstacle.
(b)
Contour around obstacle to landmark.
(c)
Resume your route of travel.
58
Figure II-8. Compass Night Navigation Setup
(2)
Dogleg and 90 degree offset. (See Figure II-9).
(3)
Straight-line heading:
(a)
Maintain heading until reaching destination.
(b)
Open terrain, 1200 paces per mile (average) or 600 per kilometer (60 per 100 meters).
(c)
Rough terrain, 1800 paces per mile (average) or 900 per kilometer (90 per 100 meters).
(d)
One pace is every time the same foot touches ground.
59
Figure II-9. Dogleg and 90 degree offset
(4)
Deliberate offset:
(a)
Used when finding a point on a linear feature (i.e. road or river).
(b)
Intentionally navigate to left or right of target so you know which way to turn at the linear
feature.
(5)
Point-to-point:
(a)
Same as straight line.
(b)
Pick out landmarks on the heading and walk the trail of least resistance to a point.
(c)
On reaching a point, establish another landmark and continue.
3.
Travel
a.
Pick the easiest and safest route (unless evading).
b.
Maintain a realistic pace. Take rest stops when needed.
c.
Avoid overdressing and overheating.
d.
Consider food and water requirements.
e.
Take special care of feet.
f.
Pack equipment to prevent loss, damage, pack imbalance, and personal safety.
g.
Go around obstacles, not over or through them.
h.
Travel on trails whenever possible (non-tactical).
i.
Travel in forested areas if possible.
j.
Avoid creek bottoms and ravines with no escape in case of heavy rains.
k.
Swamps, lakes and unfordable rivers:
(1)
Swamps, lakes, and bogs may have to be circumnavigated.
(2)
Travel downstream to find people and slower water.
60
(3)
Travel upstream to find narrower and shallow water.
4.
River Travel
a.
River travel may be faster and save energy when hypothermia is not a factor. May be a primary
mode of travel and LOC in a tropical environment, use with caution if evading.
b.
In shallow water, use a pole to move the raft.
c.
In deep water, use an oar.
d.
Stay near inside edge of river bends (current speed is less).
e.
Keep near shore.
f.
Watch for
dangers
:
(1)
Snags.
(2)
Sweepers (overhanging limbs and trees).
(3)
Rapids.
(4)
Waterfalls.
g.
Do not attempt to shoot the rapids.
h.
When crossing a river or large/deep stream, use a raft.
i.
Consider water depth before crossing without a flotation device.
5.
Ice and Snow
a.
Travel should be limited to areas free of hazards.
b.
Do not travel in:
(1)
Blizzards.
(2)
Bitterly cold winds.
(3)
Poor visibility.
c.
Obstacles to winter travel:
(1)
Be aware of reduced daylight hours.
(2)
Deep soft snow; if movement is necessary, make snowshoes (see Figure II-10).
Figure II-10. Improvised Snowshoes
61
(3)
Travel is easier in early morning or late afternoon near dusk when snow is frozen or crusted.
(4)
Avoid avalanche prone areas:
(a)
Slopes 30-45 degrees or greater.
(b)
Trees devoid of uphill branches (identifies prior avalanches).
(c)
Heavy snow loading on ridge tops.
(5)
If caught in an avalanche:
(a)
Backstroke to decrease burial depth.
(b)
As snow slows down move hands around face to create air pocket.
(6)
Frozen water crossings:
(a)
Weak ice should be expected where:
Rivers are straight.
Objects protrude through ice.
Snow banks extend over the ice.
Rivers or streams come together.
Rising water vapor indicates open or warm areas.
(b)
Air pockets form when a frozen river loses volume.
d.
When crossing, distribute your weight by laying flat, belly crawling, or using snowshoes.
e.
Glacier travel is hazardous and should be avoided.
6.
Mountainous Hazards
a.
Avoid ridge tops during storms (lightning hazard).
b.
Rock avalanches and mudslides.
c.
Avoid low areas (flash flood hazard).
7.
Summer Harzards
(1)
Dense brush:
(a)
Travel on trails when possible (non-tactical).
(b)
Travel in forested areas if possible.
(c)
Avoid creek bottoms and ravines with no escape in case of heavy rains.
(2)
Swamps, lakes and unfordable rivers:
(a)
Swamps, lakes, and bogs may have to be circumnavigated.
(b)
Travel downstream to find people and slower water.
(c)
Travel upstream to find narrower and shallow water.
8.
Dry Climates
a.
Do not travel unless certain of reaching the destination using the water supply available.
b.
When the days are hot, travel at dawn or dusk.
c.
Follow the easiest trail possible (non-tactical), avoiding:
(1)
Deep sandy dune areas.
(2)
Rough terrain.
d.
If a sandstorm occurs:
(1)
Mark your direction of travel.
(2)
Sit or lie down in direction of travel.
(3)
Try to get to the downwind side of natural shelter
63
(3)
Sit up in raft so body catches the wind.
(4)
Construct a shade cover/sail (see Figure II-12).
(5)
Sail aids in making landfall.
c.
Making landfall:
(1)
Indications of land:
(a)
Fixed cumulus clouds in a clear sky or in a cloudy sky where all other clouds are moving.
(b)
In the tropics, a greenish tint in the sky.
(c)
In the arctic, a lighter colored reflection on clouds (open water causes dark gray
reflections).
(d)
Lighter colored water indicates shallow water.
(e)
Land may be detected by odors and sounds:
Odors from swamps and smoke.
Roar of surf / bird cries coming from one direction.
(f)
Directions from which birds fly at dawn and to which they fly at dusk.
Figure II-12. Shade/ Sail Construction
d.
Swimming ashore:
(1)
Consider physical condition.
(2)
Use a flotation aid.
(3)
Secure all gear to body before beginning landfall.
(4)
Remain in raft as long as possible.
(5)
Try to make landfall during the lull between the sets of waves (waves are generally in sets of 7,
from smallest to largest).
(6)
Wear footgear and at least one layer of clothing.
(7)
If thrown from raft, the sidestroke or breaststroke conserves strength.
(8)
Moderate surf:
(a)
Swim forward on the back of a wave.
64
(b)
Make a shallow dive just before the wave breaks to end the ride.
(9)
High surf:
(a)
Swim shoreward in the trough between waves.
(b)
When the seaward wave approaches, face it and submerge.
(c)
After it passes, work shoreward in the next trough.
(10)
If caught in the undertow of a large wave:
(a)
Remain calm and swim to the surface.
(b)
Lie as close to the surface as possible.
(c)
Parallel shoreline and attempt landfall at a point further down shore.
e.
Selecting a landing point:
(1)
Avoid places where waves explode upon rocks.
(2)
If you land on rocky shores, find a place where waves rush up onto the rocks.
f.
After selecting a landing site:
(1)
Face shoreward.
(2)
Assume a sitting position with feet two or three feet lower than head to absorb the shock of
hitting submerged objects.
g.
Rafting ashore:
(1)
Select landing point carefully.
(2)
Use caution landing when the sun is low and straight in front of you causing poor visibility.
(3)
If possible, land on the lee (downwind) side of islands or point of land.
(4)
Head for gaps in the surf line.
(5)
When going through surf:
(a)
Take down most shade/sails.
(b)
Use paddles to maintain control.
(c)
Deploy a sea anchor for stability.
Caution:
Do not deploy a sea anchor if traveling through coral.
h.
Make sea ice landings on large stable ice flows.
i.
Icebergs, small flows, and disintegrating flows are dangerous:
(1)
Ice can cut a raft.
(2)
Use paddles to avoid sharp edges.
(3)
Store raft away from the ice edge.
65
Chapter IX
EVASION
1.
Planning
a.
Review/Perform Quick Reference Checklist on inside cover.
b.
Evasion is a duty of all Service members. Guidelines for successful evasion include:
(1)
A positive attitude.
(2)
Use established procedures.
(3)
Follow your evasion plan of action.
(4)
Be patient and flexible. Flexibility is one of the most important keys to successful evasion. The
evader is primarily interested in avoiding detection. Remember that people catch people. If the
evader avoids detection, success is almost assured.
(5)
Drink water. Do not eat food without water.
(6)
Conserve strength for critical periods.
(7)
Rest and sleep as much as possible.
(8)
Stay out of sight.
c.
The following odors stand out and may give an evader away:
(1)
Scented soaps and shampoos.
(2)
Shaving cream, after-shave lotion, or other cosmetics.
(3)
Insect repellent — camouflage stick is least scented.
(4)
Gum and candy — have strong or sweet smell.
(5)
Tobacco—the odor is unmistakable.
d.
Where to go? Initiate evasion plan of action:
(1)
Near a suitable area for recovery.
(2)
Selected area for evasion (SAFE).
(3)
To a neutral or friendly country or area.
(4)
Designated area for recovery (DAR).
2.
Camouflage
a.
Basic principles:
(1)
Disturb the area as little as possible.
(2)
Avoid activity that reveals movement to the enemy.
(3)
Apply personal camouflage.
b.
Use camouflage patterns (see Figure I-1):
(1)
Blotch pattern:
(a)
Temperate deciduous (leaf shedding) areas.
(b)
Desert areas (barren).
(c)
Barren snow.
(2)
Slash pattern:
(a)
Coniferous (evergreen) areas—broad slashes.
(b)
Jungle areas—broad slashes.
(c)
Grass—narrow slashes.
(3)
May use a combination of both.
66
Figure I-1. Camouflage Patterns
c.
Camouflage application:
(1)
Face. Use dark colors on high spots and light colors on the remaining exposed areas (mask,
netting, or hat help).
(2)
Ears. The insides and the backs should have two colors to break up outlines.
(3)
Head, neck (do not forget), and under chin. Use scarf, collar, vegetation, netting, or coloration
methods.
(4)
Give special attention to conceal light colored hair with a scarf or mosquito head net.
(5)
Do not overlook hands, ears, neck, and body.
(6)
Avoid unnecessary movement.
(7)
Take advantage of natural concealment:
(a)
Remember, foliage fades and wilts, change regularly.
(b)
Change camouflage depending on the surroundings.
(c)
Do not select all items from same source.
(d)
Use stains from grasses, berries, dirt, and charcoal.
(8)
Do not
over
camouflage.
(9)
Remember when using shadows, they shift with the sun.
(10)
Never expose shiny objects (i.e., watch, glasses, pens).
(11)
Ensure watch alarms and hourly chimes are turned off.
(12)
Remove unit patches, name tags, rank etc.
(13)
Break up the outline of the body; “V” of crotch / armpits.
(14)
When observing an area, do it from a prone and concealed position.
67
3.
Shelters
a.
Use camouflage and concealment.
b.
Locate carefully:
(1)
Easy to remember acronym:
BLISS.
B – B
lend
L – L
ow silhouette
I – I
rregular shape
S – S
mall
S – S
ecluded location
(2)
Choose area:
(a)
Least likely to be searched (drainage’s, rough terrain, military crest, etc.) and blends with
the environment.
(b)
With escape routes.
(c)
With observable approaches – do not corner yourself.
(3)
Be wary of flash floods in ravines and canyons.
(4)
Concealment with minimal to no preparation.
(5)
Select natural concealment area.
(6)
Consider direction finding (DF) when transmitting from shelter.
(7)
Locate entrances / exits in brush and along ridges, ditches, and rocks to keep from forming
paths to site.
(8)
Ensure overhead concealment.
4.
Movement
a.
A moving object is easy to spot. If travel is necessary:
(1)
Mask with natural cover (see Figure I-2).
(2)
Use the military crest.
(3)
Restrict to periods of low light, bad weather, wind, or reduced enemy activity.
68
Figure I-2. Ground Movement
(4)
Avoid silhouetting (see Figure I-3).
(5)
Sporadic—every five to ten paces:
(a)
STOP
at a point of concealment.
(b)
LOOK
for signs of human or animal activity; (smoke, tracks, roads, troops, vehicles,
aircraft, wire, buildings, etc). Watch for trip wires or booby traps and avoid leaving
evidence of travel. Peripheral vision is more effective for recognizing movement at night
and twilight.
69
Figure I-3. Avoid Silhouetting
(c)
LISTEN
for vehicles, troops, aircraft, weapons, animals, etc.
(d)
SMELL
for vehicles, troops, animals, etc.
(6)
Employ noise discipline, consider clothing and equipment.
b.
An important factor is breaking up the human shape or lines that are recognizable at a distance.
c.
Route selection requires detailed planning and special techniques (irregular route / zigzag) to
camouflage evidence of travel.
d.
Some techniques for concealing evidence of travel are:
(1)
Avoid disturbing the vegetation above knee level.
(2)
Do not break branches, leaves, or grass.
(3)
Use a walking stick to part vegetation and push it back to its original position.
(4)
Do not grab small trees or brush. This may scuff the bark, and create movement that is easily
spotted. In snow country, this creates a path of snowless vegetation revealing your route.
(5)
Pick firm footing, carefully place the foot lightly, but squarely on the surface avoiding:
(a)
Overturning ground cover, rocks, and sticks.
(b)
Scuffing bark on logs and sticks.
(c)
Making noise by breaking sticks (cloth wrapped around feet helps muffle this).
(d)
Slipping.
(e)
Mangling of low grass and bushes that would normally spring back.
(6)
When tracks are unavoidable in soft footing, mask by:
(a)
Placing track in the shadows of vegetation, downed logs, and snowdrifts.
(b)
Moving before and during precipitation allows tracks to fill in.
(c)
Traveling during windy periods.
(d)
Taking advantage of solid surfaces (logs, rocks, etc.) leaving less evidence of travel.
(e)
Brushing or patting out tracks lightly to speed their breakdown or make them look old.
70

73
(i)
With open airway, give mouth to mouth breathing:
One breathe every 5 seconds.
Check for chest rise each time.
(4)
If victim is unconscious, but breathing:
(a)
Keep head and neck aligned with body.
(b)
Roll victim on side (drains the mouth and prevents the tongue from blocking airway).
CAUTION:
Do not remove an impaled object unless it interferes with the airway. You may cause more
tissue damage and increase bleeding. For travel, you may shorten and secure the object.
b.
Control bleeding:
(1)
Apply a pressure dressing (see Figure V-2).
(2)
If still bleeding:
(a)
Use direct pressure over the wound.
(b)
Elevate the wounded area above the heart.
(3)
If
still
bleeding:
(a)
Use a pressure point between the injury and the heart (see Figure V-3).
(b)
Maintain pressure for 6 to 10 minutes before checking to see if bleeding has stopped.
(4)
If a limb wound is STILL bleeding:
CAUTION:
Use of a tourniquet is a LAST RESORT measure. Use only when severe, uncontrolled
bleeding will cause loss of life. Recognize that long-term use of a tourniquet may cause loss of limb.
(a)
Apply tourniquet just above bleeding site on limb (see Figure V-4).
(b)
A band at least 3 inches (7.5 cm) wide is best.
(c)
Wrap band twice around the limb.
(d)
Tighten with a stick at least 6 inches (15 cm) long.
(e)
Tighten only enough to stop bleeding.
(f)
Note the time of application.
(g)
Do not cover the tourniquet.
(h)
Mark a “TK” on the forehead.
NOTE:
The following directions apply
ONLY
in survival situations where rescue is unlikely and no
medical aid is available.
(i)
If no rescue or medical aid is likely for over 2 hours, an attempt to
SLOWLY
loosen the
tourniquet may be made 20 minutes after it is applied:
Ensure pressure dressing is in place.
Ensure bleeding has stopped
Loosen tourniquet SLOWLY to restore circulation.
Leave loosened tourniquet in position in case bleeding resumes.
c.
Treat chest injuries:
(1)
Sucking chest wound:
(a)
Occurs when chest wall is penetrated.
74
(b)
May cause victim to gasp for breath.
(c)
May cause sucking sounds.
(d)
May create bloody froth as air escapes the chest.
(2)
Immediately seal wound with hand or airtight material.
(3)
Tape airtight material (if available) over wound on three sides only:
(a)
This dressing should create a one-way valve and allow air to escape from the wound but
not to enter (see Figure V-5).
Figure V-2. Application of a Pressure Dressing
Figure V-3. Pressure Points
75
Figure V-4. Application of a Tourniquet
Figure V-5. Sucking Chest Wound Dressing
(b)
Monitor the dressing and
breathing
.If breathing becomes more difficult, occasionally lift the
untapped side of the dressing to allow trapped air to escape.
76
(4)
Flail Chest:
(a)
Results from blunt trauma when three or more ribs are broken in two or more places. This
section of broken ribs is referred to as a flail segment. When breathing in, the chest moves
out while the flail segment moves in. When breathing out, the chest moves in while the flail
segment moves out.
(b)
Immediately immobilize flail segment (place hand over area to prevent further motion).
(c)
Use tape (if available) to immobilize the flail segment.
(d)
Tape from breastbone to backbone on the injured side.
(e)
Do not surround the chest with tape.
(f)
If no tape, keep segment still with hand pressure or roll victim onto injured side to keep the
segment still.
(5)
Fractured ribs:
(a)
Encourage deep breathing (painful, but necessary to prevent the possible development of
pneumonia).
(b)
Do not constrict breathing with tape.
d.
Shock:
(1)
May be present with or without visible injury.
(2)
Treat the injury.
(3)
Maintain normal body temperature:
(a)
Remove wet clothing.
(b)
Give warm fluids.
(c)
Insulate from ground.
(d)
Shelter from the elements.
(4)
Elevate the legs six to eight inches unless there is a severe head or abdominal injury.
(5)
If very weak or unconscious:
(a)
Place victim on side to drain the mouth and prevent tongue from blocking airway.
(b)
Do not give oral fluids to an unconscious victim.
e.
Treat fractures, sprains and dislocations:
(1)
Remove watches, jewelry, constricting clothing.
(2)
Dress wounds over fractures that penetrate the skin:
(a)
Clean wound if possible.
(b)
Apply dressings.
(3)
Place limb in as normal a position as possible.
(4)
Improvise splint with available materials:
(a)
Sticks; straight, stiff materials from equipment.
(b)
Secure to body parts; e.g., opposite leg or arm to chest.
(5)
Splint in position found if unable to move to a normal position.
NOTE:
Fingers should be splinted in a slightly flexed position, NOT in straight position. Hand should
look like it is grasping an apple.
(6)
For limb fractures, keep the fractured bones from moving by immobilizing the joints on both
sides of the fracture.
(7)
For joint injuries, immobilize the bones on both sides of the joint.
(8)
Apply cold during first 24 hours after injury.
77
(9)
Apply heat after the first 24 hours of injury.
(10)
Use 15 to 20 minute periods of cold or heat application.
(11)
Do not use continuous cold or heat therapy.
(12)
Check periodically for a pulse beyond the injury.
2.
Common Injuries and Illnesses
a.
Burns:
(1)
Cool as rapidly as possible in water.
(2)
Remove watches, jewelry, constricting clothing.
(3)
Do not remove embedded, charred material that will cause burned areas to bleed.
(4)
Cover with sterile dressings.
(5)
DO NOT use lotion or grease.
(6)
Avoid motion or rubbing of the burned part.
(7)
Drink water:
(a)
Burns increase fluid loss.
(b)
If possible, mix each quart with 1/4 teaspoon of salt.
(8)
Change dressings when soaked or dirty.
b.
Eye Injuries:
(1)
Sun/snow blindness (gritty, burning sensation and possible reduction in vision caused by sun
exposure):
(a)
Close both eyes and cover lightly with light excluding dressings for 18 hours.
(b)
Wear eye protection or improvised sunglasses.
(2)
Foreign body in eye:
(a)
Irrigate with clean water from the inside to the outside corner of the eye.
(b)
If foreign body is not removed by irrigation, improvise a small swab. Moisten and wipe
gently over the affected area.
(c)
If foreign body STILL not removed, patch eye for 24 hours, and then reattempt removal
using steps (a) and (b) above.
c.
Heat Injury:
(1)
Heat Cramps (cramps in legs or abdomen):
(a)
Rest.
(b)
Drink water. If available, add 1/4 teaspoonful of salt per quart.
(2)
Heat exhaustion (pale; sweating; moist, cool skin):
(a)
Rest in shade.
(b)
Drink water.
(c)
Protect from further heat exposure.
(3)
Heat stroke (skin hot and flushed; sweating may or may not occur; fast pulse):
CAUTION
: Handle heat stroke victim gently. Shock, seizures and cardiac arrest can occur.
(a)
Cool as rapidly as possible (saturate clothing with water and fan the victim).
(b)
Avoid overcooling.
(c)
Maintain airway, breathing and circulation.
d.
Cold injuries:
(1)
Frostnip and frostbite:
(a)
This is a progressive injury:
78
Ears, nose, fingers and toes are affected first.
Areas will feel cold and may tingle leading to . . .
Numbness which progresses to…
Waxy appearance with skin stiff and unable to glide freely over a joint.
(b)
Frostnipped areas will rewarm with body heat.
NOTE:
Areas that cannot be rewarmed by body heat within 15 to 20 minutes of continuous skin to skin
contact are classified as frostbite.
(c)
Frostbitten areas are deeply frozen and require medical treatment.
(d)
Do not rub frozen tissue.
(e)
Do not thaw frozen tissue.
CAUTION:
In frostbite, repeated freezing and thawing causes severe pain and increases damage to the
tissue.
(2)
Hypothermia (lowering of body temperature to or below 95 degrees F or 35 degrees C):
CAUTION
: Handle hypothermia victim gently. Cardiac arrest can occur.
(a)
This is a progressive injury:
Intense shivering with impaired ability to perform complex tasks goes to…
Violent shivering, difficulty speaking, sluggish thinking goes to…
Muscular rigidity with blue, puffy skin; jerky movements goes to…
Coma, respiratory and cardiac failure.
(b)
Hypothermia treatment:
Warm as rapidly as possible.
Insulate against further heat loss; cover top of head.
Pre-warm sleeping bag with two volunteers.
Place casualty between two volunteers.
Transfer body heat via skin to skin contact.
Do not give fluids if consciousness is altered.
(c)
Put on dry clothing, if available.
e.
Skin tissue damage:
(1)
Immersion injuries:
(a)
Skin becomes wrinkled as in “dishpan hands”.
(b)
Avoid walking on affected feet.
(c)
Pat dry; don’t rub. Skin tissue will be sensitive.
(d)
Dry socks and shoes. Keep feet protected.
(e)
Loosen boots, cuffs, etc. to improve circulation.
(f)
Do not apply creams or ointments.
(g)
Keep area dry, warm, and open to air.
(2)
Saltwater sores:
(a)
Change body positions frequently.
(b)
Keep sores dry.
(c)
Do not open or squeeze sores.
79
(d)
Use antiseptic, if available.
f.
Snakebites:
NOTE:
This snakebite treatment recommendation is for situations where medical aid and specialized
equipment are not available.
(1)
Non-poisonous snakebite. Clean and bandage wound.
(2)
Poisonous snakebite:
(a)
Remove constricting items.
(b)
Minimize activity.
(c)
Do not cut the bite site; do not use your mouth to create suction.
(d)
Clean bite with soap and water, cover with a dressing.
(e)
Overwrap the bite site with a tight (elastic) bandage. (See Figure V-6). The intent is to
slow capillary and venous blood flow, but not arterial flow. Check for pulse below the
overwrap.
(f)
Splint bitten extremity to prevent motion.
(g)
Treat for shock.
(h)
Position extremity below level of heart.
(i)
If necessary construct shelter; let the victim rest.
(j)
For conscious victims, force fluids.
g.
Marine life:
(1)
Stings:
(a)
Flush wound with salt water (fresh water stimulates toxin release).
(b)
Remove jewelry/watches.
(c)
Remove tentacles and gently scrape or shave skin.
(d)
Do not rub area with sand.
(e)
Apply a steroid cream, if available.
(f)
Treat for shock, artificial respiration may be required.
Note
: Do not use urine to flush or treat wounds.
(2)
Punctures:
(a)
Immerse affected part in hot water or apply hot compresses for 30-60 minutes (as hot as
victim can tolerate).
(b)
Cover with clean dressing.
(c)
Treat for shock as needed.
80
Figure V-6. Compression Bandage for Snake Bite
h.
Skin irritants:
(1)
Include poison oak, poison ivy.
(2)
Wash with large amounts of water. Use soap, if available.
(3)
Keep covered to prevent scratching.
i.
Infection:
(1)
Keep wound clean.
(2)
Use iodine tablet solution or diluted betadine to treat/prevent infection.
(3)
Change bandages as needed.
j.
Cold, flu, etc, drink water, eat, rest, keep warm and dry.
k.
Dysentery, diarrhea:
(1)
Drink water, liquid diet.
(2)
Consuming charcoal, made into paste may aid symptoms by absorbing toxins.
l.
Constipation:
(1)
Normal.
(2)
Do not take laxatives
Posted in stories of secret torture, tracking and murder, in and by the U.S.A. intelligence community | Tagged , , , | Leave a comment

TARGETING, GANGSTALKING, MORGELLONS, REMOTE-NEURAL-MONITORING,VOICE-2-SKULL, COVERT DRUGGING, ENERGY BASED WEAPONS, ATTACKS WITH FLEAS, MITES, VIRUS, BACTERIA, NEMATODE, NANOBOTS, SYNTHETIC BIOLOGY, NANOTECHNOLOGY, MICROWAVE WEAPONS, TRASHING THE VICTIM,COVERT DRUGGING, FUNGUS, MOLD, ERGOT, LSD,DMT, MIND-FUKING THE VICTIM, ETC, ETC ,

This gallery contains 2 photos.

TARGETING, GANG-STALKING, MORGELLONS, REMOTE-NEURAL-MONITORING,VOICE-2-SKULL, COVERT DRUGGING, ENERGY BASED WEAPONS, ATTACKS WITH FLEAS, MITES, VIRUS, BACTERIA, NEMATODE, NANOBOTS, SYNTHETIC BIOLOGY, NANOTECHNOLOGY, MICROWAVE WEAPONS, TRASHING THE VICTIM,COVERT DRUGGING, FUNGUS, MOLD, ERGOT, LSD,DMT, MIND-FUCING THE VICTIM, ETC, ETC… at first you notice things … Continue reading

More Galleries | Tagged , , , , , , , , , , , , , , , , , , , , , , , | 18 Comments

In sickness and in… Timothy Trespas suffers from targeting and torture.

  •  My name is timothytrespas: I am a TARGETED INDIVIDUAL…

 ‘timothytrespas: I am a TARGETED INDIVIDUAL PART-1 Government Morgellons Insect infestation safe house torture’ is a video I am creating to shed some light on the targeting/drugging/torture of myself and Petra Schiller. photos of the MORGELLONS genetically modified insects we were exposed to as well as photos of what effect this torture has had on us(look into our eyes…). we were cooked with microwave weapons, connected via remote neural connectivity to an artificial intelligence, drugged out of our minds with hypnotic trance inducing LSD like drugs every day for years. exposed to various poisons, gasses, toxins, molds, insects, creatures, radiation, smart-dust, nano-technology and an insane above top-secret program of torture and mind control.
The New World Order or whatever they wish to call it,  is Falling into place.
These statements are facts, as every other TARGET knows.
It is TIME FOR THE GENERAL PUBLIC TO KNOW THE TRUTH ABOUT MIND CONTROL-
IT IS REAL and THEY ARE PERFECTING IT FOR USE ON EVERYONE as you watch this.So, if there is no false flag alien innovation (BLUE BEAM), the creek don’t rise, and there ‘ain’t no meltdown, WAKE UP WORLD because FREEDOM of THOUGHT is nothing but a fond memory (until they discover how to remove even that memory from your brain, then what?) Remote neural connectivity with an artificial intelligence used for brain mapping and mind control, covert drugging , 330 west 51st street is a government safe house and some tenants are being used for non-consensual human experimentation. Highest levels of government, military, academia, scientific, medical, law enforcement, and intelligence communities are working to END FREEDOM. YOU will be the next enemy, the next insurgent, the next TERRORIST!Authors note: It is 3 years later and I am quite sick with what may be Lyme’s disease like symptoms possible infection with spirochetes or other organisms. as well as mogellons or whatever they did to us. I suffer greatly in pain.
I understand the difficulty many have in understanding how this could be happening. I, too, had difficulty believing what was happening, even as it was happening to me. eventually, you reach a stage where it is so incredibly insane you simply can not deny the reality that there are a group of people targeting you and doing strange things and attacking you in ways that are difficult if not impossible to prove without expensive technology and experts. Then there are the cover stories, the other reasons that the people and doctors refuse top believe you.
Many statements I make are my opinion based on assumptions based on observations based on projected reality. some may be fantasy. some correct, some wrong. Those who have experienced this reality understand.
Others perhaps not. u keeping an open mind for possibility is better than a closed mind full of half truths and misconceptions.
IMHO, This would have to be a huge well funded and complicated but well planned and executed operation.
what the goal is, I can not say. there may be many. does it even matter?
I thought human beings have a god given right not to be used, enslaved, made sick, murdered, programmed, brainwashed, etc.
But who will enforce these rights?
If not our GOD, then us?
how do we reconcile reality with the matrix like fantasy built up around us.
compartmentalized so that so one on the lower end of the pyramid sees the entire plot.
Thank you for reading watching and please, pray for each other and for me and petra and all victims. everyone. Blessings and peace
Thank you.
Timothy trespas
I have turned my life over to Yeshua, the Christ, as best as I am able.
I pray not only for myself, for the other victims of these crimes, others who suffer and for the people who choose to do evil rather than follow the will and law of our creator.
This is the real crime and I pray humanity will survive log enough to awaken to its own promise of compassion and togetherness.
Together we may thrive.
If we stop believing in lies and always look for truth.
If we can trust in each other and our creator.
that would be a world I wish I could live to see.

  • Timothytrespas: Targeted Individual: SICK! After 3 days of vomiting I look closer to death

 I am a targeted individual. I am being used as a non-consensual subject in terminal human experimentation into mind control and microwave coercive technologies.
After 3 days vomiting, headache and high frequency microwave radiation, parasites, and who knows what else, I look and am closer to death,.
we have been attacked nonstop for years and this secret torture is killing us both. There may be thousand of people around the world being murdered like us. Many do not yet even realize they are being targeted yet. Mind control technology is REAL and they are testing it on us! Depopulation agenda is going as planned.

 

  • Timothytrespas: Magnet-head! MIGRAINE HEADACHE Microwave attack attempted mitigation: 2x 20lb magnets on my head!

IMHO, As I am being murdered and vomiting and migraine and pain and sickness of death and fever and everything cause by morgellons sickness, nanotechnology, lyme’s disease like infectious agents, and/or  microwave energy weapons used to torture! It feels as though some sort of  No-touch electromagnetic torture is being tested on me 24/7/365. varying degrees of death and pain. my attempt at stopping the energy based weapons by diverting or disrupting the signal with large heavy duty speaker magnets from 14″ woofers. they are so strong if the magnet together they are hard to break apart. however, although it works to mitigate attacks at LOW LEVELS at HIGH LEVELS it does little to help!
It goes away for a second or a few. Then it feels as though the magnetic field that momentarily reduced the pain and ringing is somehow compensated for and the ringing gets louder in ,y head and the pain keeps going. One day it will be my time to go meet my creator. i PRAY he may forgive me for my sins and confusion and fear and insecurity and selfishness and pride and anger and greed and hate and fear and all the rest.
Blessings and peace to those being murdered by the New world order evil technology you are in my prayers. Please pray for me, Petra,my love and friend and partner, for all the victims everywhere and all humans and animals and plants who suffer and die because of the secret takeover of humanity.
May Yeashua come back to help us all. at this point if this lovely world ended., It would not shock me at all!
 

  • Timothytrespas:Sick nausea shaking sweating freezing headache LOUD frequency attack incapacitates. Morgellons? Lyme’s? Microwaves?

     IMHO, Watch a TARGETED INDIVIDUAL (myself) suffer from sickness caused by MORGELLONS, electromagnetic mind control attacks, and “we-will-murder-you-remotely-over-time-so-you-suffer-a-lot” attack
I was sick all night and in the morning vomiting, defecating, sweating, shaking freezing, headache, pain everywhere, and the LOUDEST high frequency I have EVER heard in my Left ear.
I thought my head would explode.
I took my medicine for sleep, and some medicinal natureopathic plant medicine, and my narcotic-replacement-therapy medicine, and my anti-anxiety medicine, and suffered until I fell (mercifully, Thank you lord) asleep.
I awoke somewhat better but still weak and sickly.
I pray for everyone who is suffering from sickness, disease, and pain.
I pray for all who suffer that they may find relief from their pain.
HEALTH is an issue that many ignore until they are dying or sick.
Health is a BLESSING!
I wish to THANK EVERYONE who PRAYED for ME!
PLEASE Please pray for one another.
It does help, even if the person has no idea.
I am a victim of New World Order secret mind control program, the newest MK-ULTRA.
I am suffering from morgellons syndrome which I believe to part of the mind control agenda by building nano machine radio parts inside of us, and messing with our DNA. DEPOPULATION comes to mind.
Global mind control. Or a pandemic of infected human beings. Lyme’s? Morgelons? Nanotechnology? What are they doing to us all?
Hey, to those who have not yet suffered and do not believe the facts, WAKE UP!
this is the 21st century and lots of the stuff from past science fiction may NOW BE SCIENCE FACT!

 

Posted in sickness videos targeting morgellons lyme's | Tagged , , , , , , , , , , , , , , ,