THE Reality of Magnus Olsson’s blood – doctor’s report

THE Reality of Magnus Olsson’s blood – doctor’s report


During my staying in Poland, in Lublin I met a specialist Dr, who took a sample of my blood from my finger and we watched this together through an atomic microscope.

I will not now describe what is wrong with my blood, but I want you to notice the cristal which was made artificially.

what this is doing to me:

  1. 1. makes my blood, not circulate in a natural manner ( blood is too dense )
  2. 2. damage DNA
  3. 3. Influence memory ( lack of memory )
  4. 4. you can not walk normally nor run
  5. 5. destroy your skin ( you may have albinism )
  6. 6. having a hard time sleeping
  7. 7. easy access to the brain
  8. 8. lack of oxygen

and many other symptoms…

There are millions of this in my blood. Every victim should do this checking with a doctor who knows about People Online and will check this blood with you through a atomic microscope.

This, together with the waves RF, ELF, SCALAR, NEUTRINOS, QUATUM SPECTRA, LASER, SONAR and others is devastating.

Magnus Olssons blood

The most important for us is to secure ourselves and then cure. I am now working on a breathtaking solution for all of us, and I hope we will be free pretty soon. Then we can recover and heal.

Love and Light

Your Magnus

THE Reality of Magnus Olsson’s blood – doctor’s report:

Crimes against humanity are certain acts that are committed as part of a widespread or systematic attack directed against any civilian population or an identifiable part of a population:
THE PENTAGON’S BLUE-SKY research arm wants to trick out troops’ brains, from the areas that regulate alertness and cognition to pain treatment and psychiatric well-being. And the scientists want to do it all from the outside in:
What if a machine could read your mind?
While most developmental robotics projects strongly interact with theories of animal and human development, the degrees of similarities and inspiration between identified biological mechanisms and their counterpart in robots, as well as the abstraction levels of modeling, may vary a lot.
While some projects aim at modeling precisely both the function and biological implementation (neural or morphological models), such as in neurorobotics, some other projects only focus on functional modeling of the mechanisms and constraints described above, and might for example reuse in their architectures techniques coming from applied mathematics or engineering fields.
What are the ethical issues involved in simulating a human brain and in technology derived from human brain simulation?
Building computer models of the brain may challenge our concepts of personhood, free will and personal responsibility, and the nature of consciousness.
(Delgado stated that “brain transmitters can remain in a person’s head for life.
The energy to activate the brain transmitter is transmitted by way of radio frequencies.
In medicine, brain simulation could make it easier to communicate with people who cannot speak (e.g. people with severe disabilities, people in a vegetative state or with locked-in syndrome) or to enhance cognitive function in people with cognitive disabilities (e.g. dementia, trauma and stroke victims, etc.).
As in other fields of science, it also possible that new knowledge about the brain will be abused – deliberately, for example to create new weapons – but also involuntarily, because society does not realize the power and consequences of new technologies.
For instance, it may be possible in the future to use knowledge about the brain to predict and modify individual behaviour, or even to irreversibly modify behaviour through electrical stimulation of the brain, pharmacology or neurosurgery. In cases of intractable mental disease, this may be desirable, but in other cases, the costs and benefits will be debatable. One example of debate is whether society should allow cognitive enhancement in healthy people.
Similar considerations apply to technology. Future computers that implement the same principles of computation and cognitive architectures as the brain have enormous potential to improve industrial productivity and offer new services to citizens.
However, they could also be used to implement new systems of mass surveillance and new weaponry.
If such systems came into widespread use they would undoubtedly have a huge impact on patterns of daily life and employment – this could be both beneficial and detrimental

This is what it’s all about:
The development of your Future connected to a mindreading machine:
And the developing of Future Surveillance:
Imagine what U.S could do if they could master the nanoparticles that are distributed in vaccine to human’s worldwide and use them for remote neural monitoring:
Nanoparticles BMI in vaccine:
Nanofluids also have special acoustical properties and in ultrasonic fields display additional shear-wave reconversion of an incident compressional wave; the effect becomes more pronounced as concentration increases.
This speaks volumes about the hidden impact certain vaccines may have on your body and your brain in particular…

Delgado stated that “brain transmitters can remain in a person’s head for life.
The energy to activate the brain transmitter is transmitted by way of radio frequencies.
In analysis such as computational fluid dynamics (CFD), nanofluids can be assumed to be single phase fluids.
The Worldwide Security Grid: MATRIX Smartdust is a system of many tiny microelectromechanical systems (MEMS) such as sensors, robots, or other devices, that can detect, for example, light, temperature, vibration, magnetism, or chemicals. They are usually operated on a computer network wirelessly and are distributed over some area to perform tasks, usually sensing through radio-frequency identification.–Partners/Projects/Edge1/Edge/
Without an antenna of much greater size the range of tiny smart dust communication devices is measured in a few millimeters and they may be vulnerable to electromagnetic disablement and destruction by microwave exposure.
The Grid Security Infrastructure (GSI), formerly called the Globus Security Infrastructure, is a specification for secret, tamper-proof, delegatable communication between software in a grid computing environment. Secure, authenticatable communication is enabled using asymmetric encryption.
In software engineering, the terms “front end” and “back end” are distinctions which refer to the separation of concerns between a presentation layer and a data access layer respectively.
The front end is an interface between the user and the back end. The front and back ends may be distributed amongst one or more systems.
In software architecture, there may be many layers between the hardware and end user. Each can be spoken of as having a front end and a back end. The front is an abstraction, simplifying the underlying component by providing a user-friendly interface.
In software design, for example, the model-view-controller architecture provides front and back ends for the database, the user and the data processing components. The separation of software systems into front and back ends simplifies development and separates maintenance. A rule of thumb is that the front (or “client”) side is any component manipulated by the user. The server-side (or “back end”) code resides on the server.
The Utah Data Center, also known as the Intelligence Community Comprehensive National Cybersecurity Initiative Data Center, is a data storage facility for the United States Intelligence Community that is designed to store data estimated to be on the order of exabytes or larger.
Its purpose is to support the Comprehensive National Cybersecurity Initiative (CNCI), though its precise mission is classified.
The National Security Agency (NSA) leads operations at the facility as the executive agent for the Director of National Intelligence.
It is located at Camp Williams near Bluffdale, Utah, between Utah Lake and Great Salt Lake and was completed in May 2014 at a cost of $1.5 billion.

Any Questions?

In the computer software world, open source software concerns the creation of software, to wIntelligence.

#NBIC #DualUseTechnology #HBP #LofarLois #Ericsson #IBM #SGI #Raytheon #NSA #MilitaryNanoTechnology #BrainInitiative #NeuroEthics

hich access to the underlying source code is freely available.
This permits use, study, and modification without restriction.
In computer security, the debate is ongoing as to the relative merits of the full disclosure of security vulnerabilities, versus a security-by-obscurity approach.
There is a different (perhaps almost opposite) sense of transparency in human-computer interaction, whereby a system after change adheres to its previous external interface as much as possible while changing its internal behaviour.
That is, a change in a system is transparent to its users if the change is unnoticeable to them.

All Human’s are Computers in Ubiquitous Computing that are monitored by Artificial Intelligence/Ambient

Mind Control Technology

Mind Control Technology
Correlates with Victim Allegations

Brain Thechnology

By breaking the problem down to manageable size, mind control technology used in mind control nonconsensual experimentation can be described. SQUID can read minute magnetic signals from the brain and with mathematic computations correlate this to processing of light stimuli by the brain, for example. In the development of MRI in the early 1970s, fourier transforms and pulse techniques were described as a way to decipher the very minute brain signals among all the electromagnetic background noise. And in 1980, Dr. Mackay described cross-correlation as one of the most powerful computational techniques for extracting significant information from brain signals. And now Tennenbaum and many articles describe the future use of HTSC for reading minute biological signals in the late 1980s. The theory behind detecting thought processes is passing the test of time.

MEG was used to pick up the magnetic signals which are oscillating millisecond fluxes of the brain in real time. If there were electromagnetic codes and programs for the brains processes that have already been discovered, (as in the gene mapping project), then the signals would have meaning.

foi mind control

Victims report that their thoughts can be read instantly and replied to, that pictures and dreams, memories and feelings can be remotely manipulated and controlled. Every nerve and muscle of the body can now be controlled. Again, breaking the problem down to manageable amounts is very helpful in describing the technology available that could account for victim’s allegations. One previous example was the artificial retina chip, a copy of the neural organization of the retina and visual processing as the human brain does. This and the visual processing of the brain by frequencies mentioned previously could have been discovered and would account for dreams, pictures and implanted visualizations reported by victims.

The hearing of voices has been described elsewhere via microwave effects by the military to be used against terrorists (see CAHRA, Intelligence tools). The manipulation of memory could be accounted for with Wiener’s theory of the storage via nucleic acid complexes. Others have made the hypothesis of a molecular code that may be searched out and finally mastered, according to discussions at the American Association for the Advancement of Science(Lessing,1967, DNA Pg. 56.). Long and short term memory may use different mechanisms and Pribram’s theory of holography may be a key process. Pribram has suggested that sensory information is relayed and reconstructed by neuron interaction and also the sensory cells can interact to form a type of hologram[which is made up of electromagnetic waves]. This information combined with previously described techniques demonstrate how in principle, this could be done without a chip or implant. From the many facts, it can be concluded that the functioning of the brain has been discovered and applied to military applications. The underlying principles have been discovered.

Manipulation of feelings could be done via electromagnetic signals. Penfield described the experiments in the 1930s of stimulating areas of the cortex while surgically treating epileptic patients and patients would describe reliving of a previous memory, a flash-back, smelling certain smells and feeling physical sensations. The process for targeting areas of the brain for rage, happiness, and many other feelings most likely have been located.

brain control

Manipulation of every nerve in the body can be explained via electromagnetic signals to specific locations of the brain. The process of sensations and movement may be catalogued in the atlas of signals which Wiener predicted. And the underlying brain mechanism for processing sensations have been determined. This does not seem so farfetched now that very weak signals can be detected and correlated to specific stimulus. The location of the electromagnetic source is possible with MEGs, magnetoencephalography, as stated in a previous article,(pg. 40) and therefore could be targeted by remote means. Recording the signals and then playing them back has been described as the means for direct communication with the brain. Any sensation could be created if a specifically tailored electromagnetic signal were known or mimicked and transmitted. The military interest in solving very complicated brain processes has created the funding needed for scientific projects such as this.

The robotic effects or street theatre that many victims describe is worth mentioning. Behavior of people can now be engineered as if they were puppets. Delgado’s research with implants which stopped a charging bull and then with remote electromagnetic signals is one part of this puzzle. The military has done extensive research on hypnosis(see Operation Mind Control, Walter Bowart1978). The electromagnetic signal or command is directed to the subconscious, and as in hypnosis the target will do whatever the command states. This has been demonstrated by J.F. Schapitz in government experiments(See The Controller, Martin Cannon). The brain is a complex system and there are no easy explanations. This was meant to be the beginning of a solid foundation of proof of government mind control technology that would overcome the lack of government documents that are classified under the National Security Act.


The capability to read and communicate remotely with the brain is a technology that governments would go to great lengths to develop, especially to surpass an enemy that is developing mind control technology also. Over 25 articles on Russian mind control are available (see also CAHRA UN Report) and a few of the many examples were presented here. The Soviets have had a documented history and interest in mind control weapons from the 1940s to the 1990s. The emerging technologies of quantum physics, brain biology and electromagnetic technology combined with cold war military funding and mind control technology was developed because of an arms race to control man.

The history of the Vietnam sensors technology and targeting of populations firmly established that the military has a bureaucracy for conducting classified research that would be similar for mind control technology. It is clear that remote surveillance is very sophisticated. DARPA and IDA, both active in sensors research, are two organizations to research further and would be likely conduits for mind control technology. Here is an absolutely classic summary of the science and government atmosphere in the early 60s in which mind control would proliferate. Charles Townes, who won the Nobel prize for invention of the laser in 1964 along with two Russian researchers, discussed DARPA in his book Making Waves, 1995. “The proposed position for me was Vice President and Director of Research for the Institute for Defense Analysis. The Institute was a non-profit “think-tank with a very important role, run by five or six prominent universities on the East Coast, Columbia University being one of them. It managed what was known as the Weapons Systems Evaluation Group. We had to pick the right people who would be responsible for analyzing how and whether a weapon worked and its effectiveness. We also advised a new organization, the Advanced Research Projects Agency, whose aim was to consider what could be done in space, and to help initiate new ideas and technologies of importance to national security. We also advised the State Department on arms control problems. …I met with Allen Dulles, then head of the CIA… It was a lengthy presentation of all the highly classified evidence we had. Finally he{Dullles} asked me, “What do you think?” (Townes, Pg. 199).

Tennenbaum felt that SDI, the Strategic Defense Initiative was a cover for electromagnetic weapons as the same technology is involved. He stated that in 1983, the beginning of SDI, Russian biophysics research went underground. This is when the strategic expert, Dr. Possony published his article on direct communication with the brain. So much more research is needed.

It is difficult to describe scientific technology while it is classified and has not officially been used. Several independent sources support claims of the existence of government mind control and many scientists worldwide have stated that mind control technology is possible. The bureaucracy is in place and the victims are alleging serious human rights abuse. This is a serious issue worthy of further investigation.

This is more than enough evidence to establish the need for an investigation. The burden of proof of obtaining the classified documents and/or tying the electromagnetic signals used on victims to the government or corporations involved, is too high and victims are suffering and dying. It is cruel to make alleged victims of mind control experimentation and use, meet this burden of proof in order to get help. The government has been and is developing a weapon used against the brain and mind. This fact alone deserves special attention. The claims made by victims may sound crazy, but not in light of the facts. Knowing past government motive and behavior, victims deserve a compensating government mechanism for an investigation into alleged abuses. Please share your thoughts, ideas, suggestions and conclusions with CAHRA.