EM field murder of 23 chromosomes of Boy Scout Sam Hengel

Post date: Mar 28, 2020 5:18:59 AM

Rd-blog-1519 by Herb Zinser

The 23 chromosomes war with

the electromagnetic field accepted

by the Boy Scouts of America

claims the life

of Sam Hengel in Marinette, Wisconsin.

The Boy Scouts of America,

the FFA,

the 4-H Club will not help to

understand the EM brain wars

Modern EM warfare using television and radio waves to attack human brain electron thought circuits

FCC and European agencies approve of the angstrom wavelength attacks upon em life forms ---> the human em --> employee..

Electromagnetic Field wars

The electromagneticWAR with biological human systems

RD-blog-1519

Boy scout Sam Hengel sacrificed his life to help save the world. His obvious SIGNAL is very important .....and has been deliberately ignored by citizens, governments, and universities.

Sam Hengel and his subliminal mind intercepted various CARL JUNG collective unconsciousness signals and correctly interpreted the signals .... that there something very wrong ....... that major subconscious wars are going on.

The brave intellectual spirit of Sam Hengel stepped up and defended Nature and the Central Nervous System 370 abstract brain symbolic computer from attack. His bravery .....and his tragedy sent an important cryptographic SIGNAL ....... that eventually was figured out by a serious thinker. Citizens ought help understand the many facets of the social SCIENCE wars and the neuroscience secret language wars of society.

.

.

Sam Hengel, Marinette High School student who held classroom ...Nov 30, 2010 – Sam Hengel, Marinette High School student who held classroom hostage, ...

A Wisconsin teen

who held 23 students and a teacher hostage at ...

who held 23 students

who held 23 students

who held 23 students

who held 23 students

Boy Scout HERO in the genetic wars --> Sam Hengel.

Cryptography - Wikipedia, the free encyclopedia

Cryptography - Dec 16, 2011 – the study of transforming information in order to make it secure from unintended recipients or use.

A review of cryptography protocols, algorithms, and design.

Cryptography www.crypto-class.org/Cached

Cryptography www.crypto-class.org/Cached

Cryptography www.crypto-class.org/Cached

Cryptography

Cryptography is an indispensable tool for protecting information in bio-computer chromosome/ brain systems. This course explains the inner workings of cryptographic primitives and

23 Chromosomes --> Base 2 math power 3 = 8 data bits ....

secrets of chromosome life ..picture below

Bio-computer -->cryptography protocols, algorithms, and design.

Thus Sam Hengel was protecting his biology system from the high volume of electromagnetic activity that attacks the human skull...on a daily basis. This comes from televisions broadcasts, radio broadcasts, cellular phones, satellite transmissions, etc. These wireless electromagnetic field waves . .....now have reached a high level of density .... in space that individuals occupy on the surface of EARTH.

In the modern world, Darwinian evolutions of symbolic life involves our human data processing system. We are symbolic machines. We are biological computers.

We have brain electron circuits ...that are being attacked by wireless EM waves from the sky ....

This disrupts the Central Nervous System processing .... causing crime, illness, emotional problems, etc.

This is approved by the FCC ....in their arrogant ERROR attack upon the internal biochemistry system of Nature and its DNA FCC = DNA EM agent Francis C. Crick.

Humans are biological computers.....have been for thousands of years. Now, we are biological symbolic processors. We receive input data into our eyes and ears ..... and other sources of data ..touch, smell, etc. The brain computer has to look at this input data ..... make decisions, etc.

Now some wireless EM wave hits the skull and penetrates into the brain electron circuits ...just so some idiot can talk babber on a cellular phone.

.

Today, we have really have a battle of Central Nervous Systems using data streams composed of nouns, verbs, concepts, math equations, some pictures/graphics, etc.

Data Fields and data streams

Thus the increase in university and high school shootings in the last ten years; because the school systems are on such an ego trip ...they refuse to look at the ERRORS that independent researchers notice.

What are the 23 chromosome...biochemistry WAR secrets of Marinette?

DNA nucleotide zip code with 43 --> 4 exponent 3 = 64 codons.

Nucleic Acids to Amino Acids: DNA Specifies Protein |

Learn ...www.nature.com/.../

by A Smith - 2008 - Related articles

How can the four bases that make up DNA specify the 20 amino acids that ... It was also known that there are only four nucleotides in mRNA: adenine (A), ... However, a triplet code produces 64 (43 = 64) possible combinations, or codons. Thus …

The Information in DNA Determines Cellular Function via

The three-letter nature of codons means that the four nucleotides found in mRNA — A, U, G, and C — can produce a total of 64 different combinations. Of these ...

Piercing the corporate veil - Wikipedia,

Jump to Criminal lawý: In English criminal law there have been cases in which the courts ... received by a company have been regarded as having been 'obtained' by ... A court can " pierce" the carapace of the corporate entity and look at …

Basis for limited liability - Germany - United Kingdom - United States

Piercing ---> the skull and brain of BOY SCOUT experimental sample SAM Hengel..

.

.

.

.

.

.

Thus we have a biology communications war ...with many facets. It needs to be understood.

Maybe, someday, cities will face REALITY and help understand how EARTH LAB works and affects our daily LIFE or DEATH.

The reader may just glance at the concepts below ..to be aware that they exist.

Please be aware that bio-computer systems have existed..... such as the ancient Roman empire ...was really built by bio-computers using the human processor.

Below, we see --> keys, one to lock or encrypt the

Thus you see that a few events, with incomplete explanation in newspapers.

--> Sam Hengel was involved in bio-computer battle .

--> The Penn State locker room molestation issue ....

is a cover-up by Penn State administration to allow their computer science departments and biology departments to tryto control the human bio-computer system ..... a major political power scheme ....to manipulate the human mind. Thus Penn State uses the decoy strategy of blaming Sandusky ...while the real lock error issue is ignored.

Washington, DC funds this type of project ...on the theory they will end up on top of the society pyramid. Nature has other ideas ...... and subset humans and their subset institutions are small potatoes compared to Nature's vast intellect and social VECTOR forces.

--> Virginia TECH secret voodoo tricks failed.

They tried to attack Nature's ENcrypt process .....hence

ENcrypt --> En + Cry + pt -->

English shooting + cry for dead students + point finger at Mr.CHO as solely responsible for the EVENT. The biggest line of BS ever invented in modern society ..... lies about the deeper CAUSES of the EVENT. Thus the LIES/schemes of Virginia ....... spread to Europe at the BATTLE of LIES at Liege, Belgium.

From the internet -->

Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private. If the lock/encryption key is the one published then the system enables private communication from the public to the unlocking key's owner. If the unlock/decryption key is the one published then the system serves as a signature verifier of documents locked by the owner of the private key. Although in this latter case, since encrypting the entire message is relatively expensive computationally, in practice just a hash of the message is encrypted for signature verification purposes.

This cryptographic approach uses asymmetric key algorithms such as RSA, hence the more general name of "asymmetric key cryptography". Some of these algorithms have the public key/private key property; that is, neither key is derivable from knowledge of the other; not all asymmetric key algorithms do. ........ etc. See a book for more details.

.

.

.

.

.

.

.

Thus we see CLUES to a puzzle regarding the BOY SCOUTS, FFA (Matt Anderson), 4-H Club and many other organizations in the United States AND their failure to understand simple concepts ...regarding Margaret Mead atomic nuclear family laws ....that is atomic social anthropology and atomic social philosophy. While these organizations are very good ..for the most part; they assume that they are superior to the laws of Nature and the 23 chromosome laws of Nature.

Thus we Nature's Darwinian selection of special agent Sam Hengel....

address 2139 Pierce Avenue.......MISSION

penetrate--> Pierce the Corporate Veil ...message

The FCC electromagnetic field wars and North Pole pole magnetic field wars are well known components of the SCIENCE WARS. Of particular interest, is the Milwaukee Police attempt to help understand these complex issues and their role in Milwaukee social engineering projects and business projects. The Milwaukee Police are on the front lines of those nasty street events that happen and provide empirical data that is printed in newspapers. Such data provides researchers with clues .....tragic clues that help explain the societal architecture of Milwaukee ...which includes their English language incomplete, biased and distorted explanations of "How Milwaukee works?"

Milwaukee 23 chromosome headquarters

and the DNA 64 codon headquarters

of the living EARTH Cell is a Computer Earth

geography address 2339 S 43rd Street

..known as Badger Genetic Units ....

or also known on

EARTH LAB geography surface as Badger Guns.

en.wikipedia.org › wiki › Genetic_code

The genetic code is the set of rules used by living cells to translate information encoded within ... The code defines how codons specify which amino acid will be added next during protein synthesis. ...

the 20 standard amino acids used by living cells to build proteins, which would allow a

maximum of 43

= 64 amino acids on

South 43rd Street Milwaukee.

Under the guidance of brilliant Milwaukee intellectuals ..... Milwaukee encouraged lawsuits against the

23 chromosomes and DNA 64 codons.

Thus a consequence of the shooting of Norberg in year 2009 and the lawsuit against the 23 chromosome location ..... we have the 23 student hostages and the death of Sam Hengel.

Milwaukee citizens and universities are very proud of their CAUSE and EFFECT demo ....and the murderer of Sam Hengel. This is part of Milwaukee and their M-theory physics atomic anthropology project-->

M-theory

Milwaukee arrogance and bragging brain errors

Murder =

M + ur + der --> atoM uranium 238 Margaret Mead error

Milwuakee uses puppets of Marinette, Wisconsin

for the amusement of Milwaukee experimenters

Milwaukee Journal Sentinel covers up the details to protect the CARL JUNG citizen/community COLLECTIVE unconsciousnsess schemes/ secret rackets.

Their explanations are incomplete, they OMIT many important details.

.

.

.

.

.

The reference book that helps explains Darwinian electromagnetic selection of Sam Hengel is:

Fundamentals of Applied Electromagnetics

by Fawwaz T. Ulaby

The 2004 Media Edition

Other books provide similar information.

Such books may be bought at a college bookstores or ordered from your local book store.

Such books are useful for bio-physics crimes.

In Milwaukee and Madison ..the colleges and universities can explain everything .....they have the resources. In Milwaukee we have the University of Wisconsin, MSOE = Milwaukee School of Engineering, Marquette university, and other schools. In addition we have several corporations that have experts in electromagnetic forces and magnetic field forces --> major components of

Milwaukee social forces.

.

.

.

.

.

.

The BSA experiments --> Curl operator and his blood circulation

.

.

.

.

Thus we see....the above SYMBOL MACHINE equation with the calculus integration symbol ...

with the Boy equation ......and the coffin --> Box

thus applied EM = Electromagnetic --> EM= EM.bassy diplomatic physics Hierarchy Problem WAR

with the world-wide BSA DEATH LIST:

BSA --> Boy Sam Hengel

BSA --> Boy Sa --> Boys + Sandusky (Penn State technology errors)

BSA --> Boy Sa --> Boy SyriA age 13 murdered

BSA also includes BC/BSA = Blue Cross/Blue Shield Association and cross-correlation statitical analysis on the EM health of society... and they have biased answers.

The Boy Scouts of America, FFA, 4-H Club look the other way as their EM friends in Washington,DC and at universities and corporations experiment with these young men. Parents could care less...they just talk babble ...which helps the problems continue. Only accurate and careful thinking can solve these big picture...gestalt system problems.

Meanwhile, the experiments continue ...the police detectives ought be interested in helping research this...rather than taking subliminal MIND orders from the big-shots.

LEWIS Carroll from year 1865 ..Alice's Adventures in Wonderland, WHO Stole the Tarts?

The LEWIS Carroll EARTH LAB message:

"Here one of the guinea-pigs cheered, and was immediately suppressed by the officers of the court. .....(I will explain to you how it was done. ..with STRINGS: into this they slipped

the guinea-pig, head first and then sat upon it).

I'm glad I,ve seen that done' , thought Alice."

Thus the suppression of the Sam Hengel situation by the University of Wisconsin ...and their cover-up of the brain programming ERRORS that result in the murder of SAM Hengel.

Some CLUES are mentioned above... provide a partial outline.

CONTACT: Principle science researcher HERB ZINSER

E-Mail: Herb@Zinoproject.com

Website: www.zinoproject.com