Patents on the technology being used have been around for years. (SHOCKING: Secret NWO Gov. Document Has Been Unfolding Before Our Very Own Eyes!!! )
TheFreedomArticles| Total Individual Control Technology is a nefarious type of EM (Electromagnetic) and V2K (Voice to Skull) weaponized technology that is being experimented with and deployed against segments of the American population. Those attacked by this electronic stalking are known as TIs(Targeted Individuals).
Recently another brave whistleblower has stepped forward to expose it. Bryan Kofron (who formerly used the alias of Justin Carter) is a security industry specialist who used to work for a private security company SIS (Security Industry Specialists) in Seattle, Washington. He quit in disgust after realizing that his former firm, and others just like it, were actively using this so-called total individual control technology to target people, then ultimately control and destroy their lives. Since he quit, he has himself become a victim of the technology via gangstalking.
What Total Individual Control Technology is Capable Of
According to Kofron, this technology is so advanced that it can be used to read your mind, program your mind with thoughts (that you would believe are your own) and induce emotional states in you (including pain, hate and fear). It can be used to tap into your optical nerve and auditory systems to see and hear what you are seeing and hearing. It can target particular people by engaging in individual-specific attacks (based on the target’s DNA resonance). Finally, it is being used in vast social engineering programs as a way to experiment upon poor, homeless and weak people who have little or no chance of fighting back.
In interviews or presentations such as this and this, Kofron explains that this technology is being used by psychopaths who have little scruples about the harm they are causing. They are targeting specific groups of people: those who are cognitively inclined, highly intelligent, knowledgeable about advanced technology or interested in alternative research (i.e. conspiracy research). In general, they are either targeting empowered individuals with free minds (to stop dissidents and revolutionaries) or those too poor and weak to fight back.
VIDEO: Electronic Harassment & Organized Stalking Whistleblower
VIDEO: Bryan Kofron Q&A
Using Kofron’s own words, here are some of the things Total Individual Control Technology is able to do:
“This technology manipulates the electrical signals in the brain, thus controlling thoughts and feelings and emotions and sensations throughout the body. It works by rewiring the brain by creating new neural pathways and destroying existing neural pathways, thus this literally changes the way a person thinks and thus behaves.”
“This technology can also be used to control the muscle movement of the target. It can take over one’s hands or feet while driving and make you press on the accelerator or press on the brake or turn. This can be used to cause accidents it can also be used to prevent accidents from happening.”
“This technology can also tap into the optical nerve of the target, and the auditory system of the target, so that those monitoring the target can see what the target is seeing and hear what target is hearing. This information is then downloaded and stored on a computer, in a highly secure classified site on servers that are guarded by some of the tightest security in the world. This results in the individual’s entire day, everything they see, everything they hear, everything they experiment, everything they experience, and everything they feel being recorded till the end of time.”
“This technology can also be used to manipulate the emotions of the target. It can induce fear, love, hate.”
“This technology can be used to beam images and even motion pictures into one’s brain. Images and motion pictures that are so realistic that you think you are actually watching a movie or seeing something in reality. It’s like a virtual reality 3D rendering that takes place within the target’s mind. The images and motion pictures manifest themselves in such a way that the target if they are not aware that this technology is being used on them will believe that they are natural thoughts and natural images.”
“This technology can also be used to induce and control dreams. It can be used to control dream cycles and sleep patterns. To cause one to sleep very deeply or to cause one to not sleep at all. REM cycles, alpha beta and delta brainwaves can be induced immediately by this technology. And this technology can also be used to mimic spiritual experiences. Joy, love, peace that passes understanding can all be induced artificially by this technology to make the target believe that they are having a genuine spiritual experience when they’re not.”
“This technology can also be used to sexually manipulate the target. Make them feel sexual arousal or turn off their sexuality altogether, it can stimulate them and it can shut them down at a moments notice. It can also be used to manipulate the hormones of the target, thus lowering and raising estrogen and testosterone levels in women and men respectively.”
“This technology can also be used to read the thoughts of the target in real time … they can read your thoughts verbatim as they occur within your own mind.”
“Anywhere from small groups of people 10-20 to 100, to medium size groups of people several thousand to tens of thousands. This is done by creating a field effect, where an entire field of electromagnetic energy is created in a geographical location and any human being within that geographical location within that electromagnetic field affecting that geographical location will be effected by the technology. This can be used to induce a general mood in a population or a crowd of people. It can be used to make them passive, it can be used to make them agitated. And this can be used to cause or stop, induce riots. Stop crime, start crime. Stop thoughts, start thoughts. Massive mind control on a citywide level.”
Total Individual Control Technology Attacks Specific Individuals Based on DNA Resonance
As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right?, the state of current mind control technology is beyond most’s people comprehension and idea of what is possible. Yet, we have had enough out-of-the-closet whistleblowers and leaked or declassified documents to give us a clear idea of the scary extent to which we can be psychically attacked.
Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.
Kofron bases his information on his own experience as an insider in this field, and also as recent victim of V2K himself. He was attacked once he went public. He claims he has been assaulted with a beta version which is especially nasty, piping thoughts into his head such as:
“Everyone’s against you”
“Please be quiet or we’re going to kill you”
“Don’t work again or we’re going to kill you”
“You’re the lab rat now motherfucker”
Kofron claims the Total Individual Control Technology attacks are attempting to turn him against his former work colleagues, friends and family. However, since he was trained in this area, he knows that the voices are technological and can defend himself against the manipulations once he hears them.
Kofron echoes exactly what Duncan has warned about: individual-specific attacks. Duncan states that every person has a “unique resonance signature”, and in almost exactly the same words, Kofron states that:
“… the DNA of the individual is used to determine the resonant frequency of the DNA itself, the resonant frequency is then used to fine tune the technology … to tune it perfectly to the resonant frequency of the targeted individual’s DNA.”
The Drive to Create a Worldwide DNA Database
This leads into another aspect of the NWO agenda: the drive to create a worldwide DNA database. When seen in the light of Total Individual Control Technology, the acquisition of an entire population’s DNA takes on a very sinister meaning.
It is no coincidence that Amazon and Google (who are ultimately controlled by the same force as David Icke suggests) are racing each other, along with Microsoft, IBM and other companies, to assemble a DNA database as quickly as they can. Those in power who gain access a completed worldwide DNA database and total individual control technology would have a horrifying weapon at their disposal to target literally anyone they wanted.
Kofron exposes how prospective employees are tricked out of their DNA. They apply for a job at SIS, get told they have to do a drug test, and when the urine sample is sent to a lab, part is siphoned off as DNA to go into Amazon’s burgeoning DNA database.
Americans, in the millions, are having their DNA stolen from them, without their knowledge or consent, so they become unwitting targets of this insidious program!
Social Engineering with Total Individual Control Technology
Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets.
On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.
In one such operation, the perpetrators would target certain geographical blocks of the city, and, for instance, cause everyone in that area to be in a bad mood. In another operation, SIS (employed by Amazon whose headquarters are in Seattle) would test upon Amazon employees. In another operation, SIS would experiment upon its own low level employees. In another operation, homeless people were brought in from all over the nation to special buildings that were then targeted. This is true gangstalking – the ganging up by sociopaths and psychopaths upon the innocent to electronically harass and stalk them.
READ MORE: Mind Control – Targeted Individuals
The Rising Danger of the Private Security Firm Industry in America
Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents.
As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary “clearance” to access the truly top secret information. These security firms, like the MIC itself, appear to operate above and outside the law.
The culture inside of these companies is toxic. People rising up the ranks are conditioned to use this technology against innocent victims, and are told they will be rewarded with everything (money, power, women, sex, connection, access, status, belonging to the power club) if they go along with the program and become perpetrators. If they have a strong conscience and refuse, they will be sacked, shunned, cut off, threatened and even made into TIs themselves.
The Human Rights Loophole: False Diagnoses
Another aspect of Total Individual Control Technology which the perpetrators use to shield themselves is the cruel use of false psychiatric diagnoses.
Here’s how it works: they manipulate TI victims to see a psychiatrist, and then they bribe the psychiatrist to deliver a fake diagnosis that the victim is mentally unstable, deranged, delusional, crazy, incompetent, paranoid, schizophrenic, suffering from Multiple Personality Disorder – or they invent some similar legal-medical-psychobabble diagnosis. This has the unfortunate effect of stripping away the victim’s natural or human rights, which leaves him or her with no recourse to fight back against his attackers, since his claims and testimonies will be dismissed as the ravings of a madman.
This is a similar tactic to what is used with other victims of mind control. In my interview with Max Spiers, he touched on the use of the Big Pharma “false memory” foundation, which includes bogus therapists and psychiatrists who convince mind control victims that they’re having false memories (when they are actually recalling how they were tortured and programmed).
The Infrastructure Underlying Total Individual Control Technology
The infrastructure that is enabling the total individual control technology is composed mostly of antennae, radar and cell phone towers. Often, the antennae are camouflaged (hidden behind walls).
Some or most of the radar used is from military bases. Kofron was not able to explain much of how the technology actually works, although an electrical engineer who called in on one of the radio interviews suggested that the perpetrators are setting up a standing wave of DNA, then doing slight variations in the phasing using pulse code modulation.
Final Thoughts: Total Individual Control Technology Perpetrated by the Cult of Power
In concluding, it’s important to realize how such cruel surveillance is being perpetuated. As Kofron explains, it’s all about creating an “in” club of perpetrators who get rewarded with money, sex, power and the intrinsic human need for belonging, get told they are on the “right” side and the TIs are on the “wrong” side – and get threatened that if they speak up or quit, they may end up on that wrong side. It’s the cult of power.
Hopefully this testimony can serve as a wakeup call for those on the fence who can’t quite bring themselves to believe or act. In many ways, time is running out and the net is being drawn tighter and tighter.
The more technology advances, the more weapons the cult of power will have to enslave those who stand for truth and freedom. At a certain point, there will literally be nowhere to run or hide. The only option is to face it now before it’s too late.
About the author: Makia Freeman is the editor of alternative media / independent news site The Freedom Articles and senior researcher at ToolsForFreedom.com, writing on many aspects of truth and freedom, from exposing aspects of the worldwide conspiracy to suggesting solutions for how humanity can create a new system of peace and abundance.
A popular weather app known for precise forecasts and storm warnings has been caught tracking users and sharing the location data with a third-party monetizing firm.
RT America’s Marina Portnaya brings us the details.
In our smartphone-obsessed digital age, we effectively live our entire lives online, which makes us increasingly vulnerable to unseen threats.
Cyber crime, fraud and identity theft are exponentially growing concerns. Our personal lives, locations, and increasingly our passwords are made public online for anyone to find.
If the highly invasive Investigatory Powers Bill (AKA the Snooper’s Charter) isn’t blocked, then every single digital move you make will be recorded for up to 12 months.
Also, infinite junk mails.
But erasing your digital trace from the World Wide Web can seem overwhelming, especially since each person has on average 1,000,000,000 preferences, passwords, subscriptions and linked accounts. So how would you go about tracking them all down?
In step two Swedish developers, with the easy-assemble, Ikea-style approach.
Wille Dahlbo and Linus Unnebäck have created Deseat.me, which allows you to log in with a Google account, and immediately see which apps and services are linked to it.
The genius part is, instead of having to search all those accounts separately, the site links you directly to the relevant unsubscribe page for that service. It’s easy, efficient, and free.
Unfortunately, thusfar the service is only available for accounts and subscriptions linked to Google, which leaves your Hotmail, Yahoo and AOL-related content untouched.
Here are some other helpful hacks to help ease your digital footprint:
- Change your passwords – billions are now available online, and letter-only English-word passwords are the easiest to crack
- Consider using symbols and numbers, as well as different passwords for different accounts
- Delete unnecessary social media accounts – this could also benefit mental health and productivity
- For any accounts you deem necessary, check privacy settings (also consider whether your Instagram page needs to be public)
- Since 2013, every tweet posted from your Twitter account from 2006 onwards is archived, even if you delete your account. Consider converting your privacy settings so only approved followers can read your tweets
- For undeletable accounts such as Evernote and Pinterest, change your name to a pseudonym, create a random email address to reassign, and delete all the information
- Go to ‘My Activity‘ section of your Google account, wipe all search/location history and change account preferences
- Similarly, delete all activity from other search engines such as Yahoo and Bing
- Consider using a search engine that doesn’t track your activity (e.g. DuckDuckGo) rather than Google or Bing
- Make sure you click ‘unsubscribe’ at the bottom of each spam email, before blocking it
- Request that search engines delete certain results about you (e.g. via a URL removal tool)
- Consider employing the services of a data clearinghouse – although this can be a lengthy and time consuming process
- Check with your phone company to make sure your number isn’t listed online, and request that they do not post your details in future
- Remove yourself from data collection sites such as Spokeo, Whitepages and PeopleFinder – this can be difficult, so consider paying for a service like DeleteMe
When does a phone company stop being a phone company and more like a covert surveillance company?
Some of these phone company buildings are leading doubt lives.
Via Truth stream Media:
Truthstream Can Be Found Here:
Amazon Affiliate Link (help support TSM with every Amazon purchase, no cost to you!): http://amzn.to/2aTARRx
Almost everyone had Wi-Fi in the house due to its convenience. However, there have been some safety concerns and the conclusion it that Wi-Fi can be detrimental to the overall health, especially in children.
So, Wi-Fi has a negative effect on various things, from brain health to sleep quality.
Potential Dangers of Wi-Fi
Damages Childhood Development
The non-thermal radio frequency radiation from Wi-Fi can disrupt normal cellular development, especially fetal development. This radiation affects growing tissues, such as in children and youth. Consequently, they would be more susceptible than average to the described effects and are at greater risk of developmental issues.
Contributes to the Development of Insomnia
Wi-Fi has also a great effect on sleep. If you feel like you cannot fall asleep, have an irregular sleeping pattern, it may be due to the low-frequency modulation from cell phones and Wi-Fi. People who are exposed to electromagnetic radiation have a significantly more difficult time falling asleep. And we all know that sleep deprivation can be harmful to the health.
Agitates Brain Function
Wi-Fi affects the concentration and the brain function. So, the brain activity is reduced, and as a result, you may experience trouble concentrating or have memory loss.
Wi-Fi is another reason which threats man’s virility. Hence, exposure to Wi-Fi frequencies reduce sperm movement and cause DNA fragmentation. Moreover, it may impact fertility or increase the risk of abnormal pregnancy.
Causes Cardiac Stress
Many people experience a real physical response to electromagnetic frequencies, including increased heart rate. Therefore, Wi-Fi increases the risk of cardiovascular diseases.
Increases the Risk of Cancer
The exposure to electromagnetic radiation increases the risk of tumor development.
Wi-Fi Radiation – How To Protect Yourself
Fortunately, there are ways you can protect yourself from the dangers, including:
- Avoid placing a wireless router in your kitchen or bedroom.
- Do not keep the phone in your pocket.
- Use wired phones when at home, to reduce electromagnetic radiation.
- If you’re pregnant, don’t keep the phone close to the belly.
- Make sure you keep your phone at the other end of the room, or on the seat of the car.
- Use texting more than talking.
- Do not use wireless baby monitors, as they all operate on microwave frequency.
- Disconnect all Wi-Fi devices before going to sleep.
Anyone believing in the mainstream Global Warming/Climate Change Hysteria, at this point, with how obvious what is taking place in the sky, are Dangerous Fools.
Sources and Documents to support the videographer’s findings:
Watch Via KafkaWinstonWorld:
Weather Modification Test Technology Symposium 1997
Smart Pills with Cameras, RFID and other sensors to track delivery mechanisms
Much of our products are made in China and abroad, how easy to sprinkle smart dust aka tracking chips into the food and beverage supply, electronics and even cheap merchandise could easily be tainted with these tracking technologies!
Much of the Vaccine supply today comes from China, known for putting faulty chips in computers and defense systems the US has used for decades.
What about sabotage, putting this stuff in Organic Cereal, Crackers, Vitamins, Fruit Drinks, even the meats that are processed over seas?
What about the dark cabal that works inside the system here in the US?
How easy with these technologies would it be?
Its getting deep folks
I often wonder why, why there is no serious Revolt or Revolution , no real change, even when many people are dying and being catastrophically injured you see this regularly and people never really do anything about it? Why? Why is the world so docile ? What would be more effective than a microscopic enemy already in your backyard and probably already inside you?
What happens when your mind has already been rewritten, with or without your consent ?
You’ve probably seen the Rats, Bats and other animals controlled via remote control microchip connect in the Lab?
Wifi tech with 5G type capabilities and trillions of chips around the globe that emit the MK signal
Electricity, Serpent Archons, The controllers behind the controllers that you don’t see, i might not see them and i feel them and it becomes more clear everyday for me, what about you?
Via Leak Project:
Most Americans have already been programmed to accept ‘the chip’ implanted into our credit and debit cards. So taking this to another level, implanting that RFID chip into the human body, shouldn’t seem so Orwellian, should it?
Last week A Sheep No More reported on Three Square Market, in Wisconsin, being the first US company to “chip” their employees.
On Tuesday, the company and it’s employees, celebrated their decision to become part of the ‘beast’ system.
WBAY TV-2 reports:
A Wisconsin company is holding a party Tuesday to implant employees with microchips.
Three Square Market has received international attention since it announced the voluntary microchip program, believed to be the first of its kind in the United States.
The microchip program is voluntary. If willing, employees allow the company to implant a Radio-Frequency Identification chip between the thumb and forefinger.
The RFID chip will open doors, log in to computers, and make purchases from vending machines. The technology is similar to mobile pay services like Apple Pay and Google Wallet.
Three Square Market assures employees that they will not be able to track them because the chip does not have GPS. Data on the microchip is encrypted.
The company says the chip is FDA approved. It is removed “similar to a splinter.”
A reporter from our Milwaukee partner station WISN is covering the “chip party.” Tim Elliott had a chip implanted and tweeted that it “hurt a bit … like a mean pinch.”
Tim Elliott on Twitter: https://twitter.com/WISN_Tim
— Tim Elliott (@WISN_Tim) August 1, 2017
A closer look at the microchip! Lots of national & international media here to see employees get chipped. They’re calling it a “chip party”! pic.twitter.com/jmLdF9owET
— Tim Elliott (@WISN_Tim) August 1, 2017
A disturbing patent discovered this week reveals plans to hide vaccines within food particles without the public knowing about it.
US Patent application ‘US20080044481 A1’ (“Microparticles for oral delivery”) was filed in 2005, and allows drugs and vaccines to be embedded into tiny invisible particles of food.
Are we to assume the technology hasn’t yet been applied?
Is it operating at a stealth level? I’ll try to answer these questions in a minute. But first:
The inventor and assignee is listed as Mordechai Harel, who was associated with Advanced BioNutrition Corporation of Columbia, Maryland. Here are a group of quotes from the patent application. The statements leave no doubt about the wide, wide application of the technology.
“The particles described herein can be used to deliver bioactive agents (e.g., nutrients, drugs, vaccines, antibodies, and the like), bacteria (e.g., probiotic bacteria), smaller particles, or substantially any other material to the animal.”
“The particles described herein can be prepared and used as free-flowing dry powders, slurries, suspensions, and the like, and are useful for delivering to an animal a drug, a pesticide, a nutrient, a vaccine, a smaller particle, or substantially any other composition that can be contained in the particles. The particles are thus suitable for use in human food products, animal feeds (e.g., pet foods and farmed animal diets), therapeutic compositions (e.g., drugs), prophylactic compositions (e.g., vaccines, antibiotics, and probiotic bacterial preparations), and pest control products among other products.”“A ‘particle’ is a discrete piece of a (homogeneous or heterogeneous) material having a maximum dimension not greater than 5000 micrometers.”
“Furthermore, when the microparticles are to be used as components of a food product, it can be desirable that the microparticles are not visible.”
“The particles described herein can be used to deliver substantially any chemical species, combination of chemicals, cell, or other piece of matter that can be incorporated into the particle to a component of an animal. All such items are referred to herein as ‘bioactive’ compositions, regardless of what the utility of the composition is. Bioactive compositions include, for example, pharmaceutical compositions or compounds, nutraceutical compositions or compounds, nutritional components, probiotic bacteria, bacteriophages, viruses, flavorants, fragrances, detergents or other surface-active compositions.”
“Examples of these [deliverable micro] agents include antibiotics, analgesics, vaccines, anti-inflammatory agents, antidepressants, anti-viral agents, anti-tumor agents, enzyme inhibitors, formulations containing zidovudine, proteins or peptides (such as vaccines, antibodies, antimicrobial peptides), enzymes, (e.g., amylases, proteases, lipases, pectinases, cellulases, hemicellulases, pentosanases, xylanases, and phytases), liposomes, aromatic nitro and nitroso compounds and their metabolites, HIV protease inhibitors, viruses, and steroids, hormones or other growth stimulating agents, pesticides, herbicides, germicides, biocides, algicides, rodenticides, fungicides, insecticides, antioxidants, plant and animal growth promoters, plant and animal growth inhibitors, preservatives, nutraceuticals, disinfectants, sterilization agents, catalysts, chemical reactants, fermentation agents, foods, animal feeds, food or animal feed supplements, nutrients, flavors, colors, dyes, cosmetics, drugs, vitamins, sex sterilants, fertility inhibitors, fertility promoters, air purifiers, microorganism attenuators, nucleic acids (e.g., RNA, DNA, PNA, vectors, plasmids, ribozymes, aptamers, dendrimers, and the like), antioxidants, phytochemicals, hormones, vitamins (such as vitamins A, B1, B2, B6, B12; C, D, E, and K, pantothenate, and folic acid), pro-vitamins, carotenoids, minerals (such as calcium, selenium, magnesium salts, available iron, and iron salts), microorganisms (such as bacteria, such as probiotics, lactobacilli, fungi, and yeast), prebiotics, trace elements, essential and/or highly unsaturated fatty acids (such as omega-3 fatty acids, and mid-chain triglycerides), nutritional supplements, enzymes (such as amylases, proteases, lipases, pectinases, cellulases, hemicellulases, pentosanases, xylanases, and phytases), pigments, amino acids, agriculturally useful compositions to either prevent infestation (such as herbicides, pesticides, insecticides, rodenticides, fungicides, mixtures thereof) or to promote growth (such as hormones, fertilizers, or other growth stimulating agents), flavorants, and fragrances.”
Did you notice, among the blizzard of compounds deliverable through invisible microparticles, the drug called zidovudine? That’s AZT, a chemo medicine used to treat AIDS patients. To say AZT is toxic would be a vast understatement. It destroys the ability of cells to replicate. And back in 2005, it was mentioned as a drug that can be delivered in food.
So is this technology being applied?
Do we, in fact, have these microparticles and their bioactive components in our food?
And then there’s BioEngineered Nano Foods!
Let’s go back to the 2005 patent application. As I mentioned, the inventor, Mordechai Harel, was associated with a company, Advanced BioNutrition Corporation.
On the company’s website, we find a link to a scientific paper co-authored by Roger Drewes, who became the company’s chief science officer in 2010 (“A novel targeted delivery technology for protecting sensitive bioactive compounds…”). This is an interesting paper.
Here is some of the language in the paper. Does any of it remind you of quotes from the 2005 patent application? The paper mentions a novel and proprietary “delivery technology,” MicroMax, which “protect[s] sensitive bioactive compounds through food manufacturing processes.” Also mentioned: a “formulation containing natural polymers surrounding the probiotic bacteria or other biologically active materials…” The probiotic bacteria “remain quiescent while retaining their activity for a long period of time under challenging…gastric conditions…[MicroMax was tested using] bacteria, essential oils, vitamins, enzymes, pigments, and even vaccines in a variety of food and feed products…and the microparticles were sieved to deliver the desired particle range…”
This might help. Here is the abstract from the 2005 patent application: “The invention provides microbeads containing oil-associated biologically active compounds and methods for their manufacture and use. The microbeads consist of a soluble complex of non-digestible polymer and emulsifier with oil-associated biologically active compounds embedded in a matrix of digestible polymer. The disclosed microbead complex protects the biologically active compounds, such as vitamins, fish oil and carotenoids, from oxidation, taste and odor degradation. The disclosed microbeads also provide protection from the stomach digestive distraction [e.g., gastric activity] and allows for the delivery of the biologically active compounds in the intestine.”
I think we’re looking at the same technology in the 2005 patent application and in Advanced BioNutrition Corp’s MicroMax methods—or two technologies that closely resemble each other—in which case, yes, invisible microparticles in food are much more than a proposed system.
This is a working system, available now.
It can deliver a stunning array of chemicals and bioactive substances to people in their food. (Note: I have no idea what Advanced BioNutrition Corp is or isn’t delivering to its customers—but I think the company should make these facts known.)
Who knows what other companies have, and are using, this technology?
Are we looking at zero informed consent to be treated, in food, with medicines and vaccines? Zero knowledge on the part of the public? Zero accountability? Nothing on the food labels?
If this is happening to the population now, the word “stealth” only begins to describe it.