a Division of the TAPS Foundation

HomeAbout UsNews or ReviewsSensitizingPartnersTactics
LitigationDEW DevicesFeatured VictimMethodsPunishmentSuspects
Self DefensePursuitTestimonyCounter-SurveillanceNSL'sArchives
RNMStasi-CitizensDarwin AwardsFederal FilingsHYPNO CRIMESPsy Ops
BlogMonarch Experiments

Contact Us
For purposes of electronic evaluation, electrical activity in the speech center of the brain can be translated in to the subject’s verbal thoughts. RNM can send encoded signals to the auditory cortex of the brain directly bypassing the ear. This encoding helps in detecting audio communication. It can also perform electrical mapping of the brain’s activity from the visual center of the brain, which it does by bypassing the eyes and optic nerves, thus projecting images from the subject’s brain onto a video monitor. With this visual and audio memory, both can be visualized and analysed. This system can, remotely and non-invasively, detect information by digitally decoding the evoked potentials in 30-50Hz, 5 milliwatt electromagnetic emissions from the brain. The nerves produce a shifting electrical pattern with a shifting magnetic flux which then puts on a constant amount of electromagnetic waves. There are spikes and patterns which are called evoked potentials in the electromagnetic emission from the brain. The interesting part about this is that the entire exercise is carried out without any physical contact with the subject.
This technology is severely abused by government scientists and agents assigned to law enforcement or intelligence occupations. While this advance in technology could be used to further develop mankind and monitor known dangerous criminals and psychopaths, sadly it has been used to torture citizens worldwide. In an attempt to expose this crime and the criminals using the technology to torture innocent victims trackastalker will be displaying on a weekly basis the suspected signal scans of a RNM victim. Much research has went into securing software that can detect the frequency range of a RNM signal and was tested rigorously before choosing the software that best depicts the RNM signal. This victim shall remain anonymous and together with the TAPS Foundation have developed software to monitor and record the intrusion signal generated by RNM software. This technology is believed to piggyback cellular signals and has been reported to be transmitted off of the same towers as cell phone transmissions. Below are the first weeks scans beginning with May 27, 2013
click on images to enlarge