From: UFOLAWYER1@aol.comTo: CAUSupdates@caus.org Subject: [CAUS updates] - Saturday Commentary: Profile of a Grey & MIB Counter Measures Date: Saturday, January 23, 1999 1:30 PM Dear CAUS Members: On this Saturday, CAUS shares with you two interesting articles. CAUS does not necessarily agree with all the points raised in each article. CAUS presents them both for your reactions and comments. 1) Profile of the Grey (author unknown) Entirely lacking in positive qualities such as compassion. Reported most often is a complete lack of emotional response, even when physically assaulted. Some report signs of crude emotional states such as anger or frustration, but this isn't common. Except in minor ways, completely lacking in the ability to make individual decisions. Little or no individual consciousness. "Hive" based behavior, i.e., decisions made almost entirely through collective consciousness communicated through electromagnetic impulse. Often noted are simultaneously identical responses to a single stimulus. Will often show uncertainty or long delays in response to unexpected circumstances. The above characteristics throw strong doubt on the notion that the grays possess true awareness, a soul, or a free will. Highly sophisticated neurology with electromagnetic radar abilities. Capable of sensing even tiny variations in em fields; therefore, keenly aware of local electrical devices. Extremely sensitive to human brain function within several feet. Cannot directly read thoughts, but able to read level of brain activity with high degree of accuracy, even through doors. This process is probably not passive, i.e., it is the result of electromagnetic feedback similar to radar. Usually does not approach directly unless victim is sound asleep. Can apparently sometimes use remote electromagnetic devices to induce or deepen sleep in victim. May observe victim with unnatural patience, waiting motionless for hours on end, sometimes night after night, until victim falls into sleep. Will then approach. Able to direct strong electromagnetic impulses towards human brain, though only effective over a short range of a few feet. The effect is disorienting and paralyzing. Most effective when several at a time beam signals at the victim from close proximity. Presence will usually deflect small magnets or compasses within a few feet. This may be due to electrical apparati, but the gray itself is strongly electromagnetically active, at least relative to our biological norm. Large, almond-shaped eyes appear to focus both outgoing and incoming electromagnetic stimuli. Electromagnetic fields in craft severely disruptive to electrical equipment. Conversely, modest electrical fields common in household appliances can effectively disrupt the gray itself and can interfere with abduction. Gives off distinctive stench due to incomplete digestive system. Wastes are excreted directly through the skin. The smell is often described as burnt wood or ammonia. Requires light within visible wavelength for motor functions. Cannot physiologically transmit or detect all em waves through all frequencies. Detailed graphs of both transmission and reception potentials would easily lead to devices able to disable or kill the gray, as well as their equipment or craft. It would not be possible for the "alien" invasion to succeed without silence in official circles, the naivette of the general public, and a significant number of implanted abductees. Extreme stealth has been the most striking aspect of abductions, but sightings and abductions are growing bolder and more careless every day. Physiology often described as chlorophyll based, but this could be an error. More likely that feedings are widely spaced. Often reported that food is taken in through the skin by immersion in solution, the solution often being liquified animal or human remains. It has been claimed that a significant portion of the world's missing children have been used for these purposes. Lack of reproductive function. Most are probably cloned or cultured from biological materials obtained by animal mutilations or abductions. Abductees routinely implanted with one or more devices. Pattern of repeat abductions indicate that these serve as locating devices, though they may have additional functions. Craft are highly sophisticated, bristling with electrogravity devices. Strength of the gravitational field around the craft varies constantly, therefore bending visible light so that the shape, color, and strength of the image also varies. Gravitation field generated around craft permits intertial system independent of physical coordinates, so that appearance of rapid acceleration and movement is actually due to the relative displacement of coordinates rather than actual changes in velocity. Because the human experience is normally confined to a single space-time continuum, it isn't possible to say where these "aliens" or craft really originate from. It hardly makes any difference. The government has been conducting a disinformation program for 50 years to deceive or desensitive the public. The current stage is to allow the alien presence to come to full public awareness, but present them as benign beings with official apologies for the past coverup. The government will deny knowledge of the abductions, allowing CSETI, mind-control victims, and staged alien abductions to cast blame on the government itself, which it will tacitly accept. By the time the public learns the entire truth about the "alien" practices and intentions, the infiltration and invasion will have been completed. The government, if that is what it may be called, will be totalitarian and "gray" controlled. Those who assisted the aliens, either naively or in the hopes of dividing the spoils, will also be enslaved or consumed. 2) Counter Measures for MIB Encounters by Robert Parish (http://members.tripod.com/~RealMIB/index.html) After reading various reports of people who have had encounters with Men In Black after a UFO related siting or happening, It has brought to my attention that common, average people without any previous military tactical or planing training are defenseless to the tactics that have been reported to frighten and intimidate these people to be silent or change their minds about reporting or turning over any information or evidence to UFO Investigators. I have decided that this would be a good application of some of my U.S. Army (Over Training) that I have acquired in my younger days. This should not deal with weapons or combat, but more of a counter physiological warfare approach. Although weapons training and hand to hand combat training greatly enhance confidence of an individuals ability to cope with an abnormal encounter situation. It gives you a power platform to relate from. The so called (EDGE). But knowledge and reasoning is a greater power and can and should be used first to avoid any physical conflict. The key to winning any conflict either mental or physical is to turn the enemies forces exerted against himself or to use it for your advantage and to exploit his weaknesses. Remembering and working from some of the Men In Black document files I have read, I will try to recreate some reported situations of Men In Black encounters and give the reader my responses to repel, stop or eliminate the Men In Black threat. First, we will start off with the hypothesis that you have witnessed an unusual aerial craft and you have reported what you have seen to the press or radio or television reporters. That your story was printed or told on radio or television by reporters. And then a big new black car arrives at your address with two men dressed in black show up on your front porch or doorstep. They knock, ring your door bell and you go to the door and there they are! The Men In Black. You spot the big knew black car! 1. They announce that they are from such and such and flash a I.D. at you and quickly put it away. a. State, you to wish to verify their credentials. Tell them that you want each of them one at a time to remove the Badge or I.D. Card plus a drivers license and one major credit card for your examination for proof of identification. b. State, that otherwise you will refuse to speak to them and report them to the police for trying to impersonate an official. 2. This is a common security procedure. Ever try to cash a check or use a credit card at store? a. They are trying to cash a check with you using a badge or I.D. Card. The payment is to gain information. b. The payment also may include intimating you to keep silent by the power of their office. c. Know who you are dealing with. 3. You want to provoke a response from them to judge their reaction. Remember that you are judging them in the same manner as store clerk would to decide to cash a strangers check or approve credit card use. a. If they are truly who they say they are, they wont have a problem with complying. b. If they refuse, State that, "this conversation has ended". This is a standard verbal stiff arm. Ask them to leave and state that you are calling the police if they don't and that they can explain who they are to the police. c. Retreat and lock your door. Call the police anyway, whether or not you see them leaving and file a report of the incident. 4. If they comply with presenting identification, remember anything can be replicated. Apparent age the item in relation to it's printed date of issue, use and ware are harder to fake. a. Check for the same names used on all items from the same individual. b. Check for use of a middle initial or the lack of it. 4.b.1. If the printed name has a middle initial then the signed name in hand writing should have it. 4.b.2 If the printed name doesn't then the signed name should not have it. c. Check for the individuals date of birth compared to his physical appearance. d. Ask each for his/her social security card number. Use the palm of your hand it write it down on if you don't have paper but have a ball point pin or ask them to wait OUTSIDE while you get it. Never invite them in while you locate paper and pin! 4.d.1. All current police computers can I.D. Make anyone by running a social security number check. 4.d.2. Military types will know and remember their military serial number but have a problem with recalling their social security number. 4.d.3. A social security number is this BEST thing to use to run a computer tracer on an individual to see if him/her is who they say they are, date of birth, where the live and who they work for, valid drivers license and so forth. 4.d.4. As per the above, a social security number is better to have in hand from a suspect individual than his/her badge or I.D. card number! 5. While looking down at the identification look at their shoes. a. Most military types were only certain types of dress shoes. b. Most federal employee types were only certain styles and types of shoes. c. Undercover Police will copy each other and wind up waring the same styles of shoes. Foot care is just as important to policemen as it is to the military or postmen. d. Civilians, non military, non federal and non police will were anything that strikes their fancy. This means with no thought as to even the proper style for the clothes they are waring or (uniformity, ease of care, durability or comfort) when walking long distances or standing around for hours. e. Check to see if the shoes fit the clothes, the right shoe on the right foot and matched socks. Someone not familiar with earth dress may have got it wrong. 6. Don't let them lead you into any conversation and let them do all of talking. Do not elaborate on anything. a. Uh-haw, Yes, to respond true answers b. Un-haw, No, to respond to false or no answers c. Never try to hold a conversation or get any useful information with someone that only says uh-haw and un-hah? 7. Do not invite them into you home, house or apartment! Do all the talking at the door or porch and in the open were others may see you, them or both you and them. a. You don't really know who they are and they are no friends of yours. b. You don't know what action they may take when they are sure that no one else could witness it. 8. Offer them a cigarette if you smoke. If they accept a cigarette, offer them your lighter. Hand it to them before they can get their own. a. Try to wipe the sides of the front and back clean on the inside of your pocket and remove it from your pocket holding the side or edges only. b. When they return the lighter to you let them drop it in your palm and then let it slide it back into your pocket. c. You now have a sample of their finger prints if they had any so use a soft cloth to remove it later and grasp it with at the top and bottom only and place it in a plastic zip lock bag. 9. If they don't accept a cigarette, light up one yourself. a. If you smoke this will calm your nerves and put you at ease and possibly offend them at the subliminal level. This makes none smokers uneasy when placed in close proximity to a smoker. This gives you another small piece of the advantage. b. If the air currents are right for it you can slyly blow a little smoke their way to judge their reaction to the cigarette gases in the smoke. c. You can observe their reaction to consumed cigarette gases. 10. If they don't accept a cigarette, offer them a beer or any liquid refreshment you have on hand. Even a glass of water. But ask them to wait while you go and get it! The object is to get a finger print sample if possible, not to let them into your home! 11. If they really bug you and you get a strange feeling of uneasiness buy their presence at your home, standing their looking weird, trust your feelings! Excuse yourself for a moment, get your car keys and walk out right past them to your car, get in, lock the doors and drive straight to the nearest police station and park in the open right in front of it and ask the first policeman you see to help you to file a report of following and harassment and file a complaint report! Have a synchronistic Saturday and of CAUS...watch the skies! Peter A. Gersten Director Be sure to visit the CAUS web site at http://caus.org To join this mailing list, go to http://caus.org/feedback.htm To be REMOVED from this mailing list, go to... http://caus.org/remove/ Served by TheHostPros.com - http://TheHostPros.com