{"id":178,"date":"2020-09-27T18:43:52","date_gmt":"2020-09-27T18:43:52","guid":{"rendered":"http:\/\/region10.herbzinser64.com\/dir\/science03\/?p=178"},"modified":"2020-09-27T18:43:52","modified_gmt":"2020-09-27T18:43:52","slug":"boy-scouts-of-america-and-the-23-chromosomes-war","status":"publish","type":"post","link":"http:\/\/region10.herbzinser64.com\/dir\/science03\/2020\/09\/27\/boy-scouts-of-america-and-the-23-chromosomes-war\/","title":{"rendered":"Boy Scouts of America and the  23 chromosomes WAR"},"content":{"rendered":"<p class=\"c8\"><span class=\"c6\">Rd-blog-1519 by Herb Zinser<\/span><\/p>\n<p class=\"c8 c2\">\n<h1 id=\"h.3jjfia79u2cg\" class=\"c34\"><span class=\"c15 c21\">The 23 chromosomes war with<br \/>\nthe electromagnetic field accepted<br \/>\nby the Boy Scouts of America<\/p>\n<p>claims the life<br \/>\nof Sam Hengel in Marinette, Wisconsin.<\/p>\n<p>The Boy Scouts of America,<br \/>\nthe FFA,<br \/>\nthe 4-H Club will not help to<br \/>\nunderstand the EM brain wars<\/span><\/h1>\n<p class=\"c8 c2\">\n<p class=\"c8 c2\">\n<p class=\"c8\"><span class=\"c29 c30\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h2 id=\"h.f0ngspcsho2m\" class=\"c7\"><span class=\"c16\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.zinoproject.com\/blog1\/index.php\/blog47\/&amp;sa=D&amp;ust=1601235737715000&amp;usg=AOvVaw2COd4Le-e6DZjyJ2ruf7Ly\">The Electro-Magnetic Field WAR casualties<\/a><\/span><\/h2>\n<p class=\"c8\"><span class=\"c6\">Modern EM warfare using television and radio waves to attack human brain electron thought circuits<\/span><\/p>\n<p class=\"c8 c2\">\n<h2 id=\"h.jpow23m0vdyz\" class=\"c7\"><span class=\"c16 c15\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=http:\/\/region01.herbzinser13.com\/index.php\/blog29\/&amp;sa=D&amp;ust=1601235737716000&amp;usg=AOvVaw0Gl2avstDa2r5H0LOalX2T\">The EM = Electromagnetic Field television and radio attacks on civilization<\/a><\/span><\/h2>\n<p class=\"c8\"><span class=\"c6\">FCC and European agencies approve of the angstrom wavelength \u00a0attacks upon em life forms &#8212;&gt; the \u00a0human em &#8211;&gt; employee..<\/span><\/p>\n<p class=\"c8 c2\">\n<p class=\"c8 c2\">\n<p class=\"c8 c2\">\n<h2 id=\"h.p0wpr8qhz78q\" class=\"c7\"><span class=\"c26\">Electromagnetic Field wars<\/span><\/h2>\n<p class=\"c8\"><span class=\"c6\">The electromagneticWAR with biological human systems<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c35\"><br \/>\n<\/span><span class=\"c1\">RD-blog-1519<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Boy scout Sam Hengel sacrificed his life to help save the world. His obvious SIGNAL is very important &#8230;..and has been deliberately ignored by citizens, governments, and universities.<\/span><\/p>\n<p class=\"c0\"><span class=\"c11\">Sam Hengel and his subliminal mind intercepted various CARL JUNG collective unconsciousness signals and correctly interpreted the signals &#8230;. that there something very wrong &#8230;&#8230;. that major subconscious wars are going on.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6847c23.jpg\" alt=\"\" \/><\/p>\n<p class=\"c0\"><span class=\"c1\">The brave intellectual spirit of Sam Hengel stepped up and defended Nature and the Central Nervous System 370 abstract brain symbolic computer from attack. His bravery &#8230;..and his tragedy sent an important cryptographic SIGNAL &#8230;&#8230;. that eventually was figured out by a serious thinker. Citizens ought help understand the many facets of the social SCIENCE wars and the neuroscience secret language wars of society.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Sam Hengel, Marinette High School student who held classroom &#8230;Nov 30, 2010 \u2013 Sam Hengel, Marinette High School student who held classroom hostage, &#8230;<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">A Wisconsin teen<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">who held 23 students and a teacher hostage at &#8230;<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">who held 23 students<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">who held 23 students<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">who held 23 students<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">who held 23 students<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd695a3ae.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Boy Scout<\/span><span class=\"c18 c28\">\u00a0HERO in the genetic wars<\/span><span class=\"c1\">\u00a0&#8211;&gt; Sam Hengel.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6a38103.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6b1ac85.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Cryptography &#8211; Wikipedia, the free encyclopedia<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Cryptography &#8211; Dec 16, 2011 \u2013 the study of transforming information in order to make it secure from unintended recipients or use.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">A review of cryptography protocols, algorithms, and design.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6c04d66.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Cryptography\u00a0<\/span><span class=\"c4\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601235737723000&amp;usg=AOvVaw2wdS5ZsLp02yDaa7wRmREV\">www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Cryptography\u00a0<\/span><span class=\"c4\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601235737724000&amp;usg=AOvVaw0U3A7KOiJP81gQEabx08PD\">www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Cryptography\u00a0<\/span><span class=\"c4\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.crypto-class.org\/Cached&amp;sa=D&amp;ust=1601235737724000&amp;usg=AOvVaw0U3A7KOiJP81gQEabx08PD\">www.crypto-class.org\/Cached<\/a><\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Cryptography<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Cryptography is an indispensable tool for protecting information in bio-computer chromosome\/ brain systems. This course explains the inner workings of cryptographic primitives and<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">23 Chromosomes &#8211;&gt; Base 2 math power 3 = 8 data bits &#8230;.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">secrets of chromosome life ..picture below<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Bio-computer &#8211;&gt;cryptography protocols, algorithms, and design.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6cd9a63.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus Sam Hengel was protecting his biology system from the high volume of electromagnetic activity that attacks the human skull&#8230;on a daily basis. This comes from televisions broadcasts, radio broadcasts, cellular phones, satellite transmissions, etc. These wireless electromagnetic field waves . &#8230;..now have reached a high level of density &#8230;. in space that individuals occupy on the surface of EARTH.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">In the modern world, Darwinian evolutions of symbolic life involves our human data processing system. We are symbolic machines. We are biological computers.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6d92795.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">We have brain electron circuits &#8230;that are being attacked by wireless EM waves from the sky &#8230;.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd6ecd1ae.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">This disrupts the Central Nervous System processing &#8230;. causing crime, illness, emotional problems, etc.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd701fc9b.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">This is approved by the FCC &#8230;.in their arrogant ERROR attack upon the internal biochemistry system of Nature and its DNA FCC = DNA EM agent Francis C. Crick.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Humans are biological computers&#8230;..have been for thousands of years. Now, we are biological symbolic processors. We receive input data into our eyes and ears &#8230;.. and other sources of data ..touch, smell, etc. The brain computer has to look at this input data &#8230;.. make decisions, etc.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Now some wireless EM wave hits the skull and penetrates into the brain electron circuits &#8230;just so some idiot can talk babber on a cellular phone.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Today, we have really have a battle of Central Nervous Systems using data streams composed of nouns, verbs, concepts, math equations, some pictures\/graphics, etc.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd70f1b8e.png\" alt=\"\" \/><span class=\"c4\"><\/p>\n<p><\/span><span class=\"c22\"><br \/>\nData Fields and data streams<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd71e58a4.png\" alt=\"\" \/><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus the increase in university and high school shootings in the last ten years; because the school systems are on such an ego trip &#8230;they refuse to look at the ERRORS that independent researchers notice.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd72c3ac7.png\" alt=\"\" \/><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">What are the 23 chromosome&#8230;biochemistry WAR secrets of Marinette?<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd7eb0453.png\" alt=\"\" \/><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">DNA nucleotide<\/span><span class=\"c4 c28\">\u00a0zip code with 43<\/span><span class=\"c1\">\u00a0&#8211;&gt; 4 exponent 3 = 64 codons.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Nucleic Acids to Amino Acids: DNA Specifies Protein |<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Learn &#8230;www.nature.com\/&#8230;\/<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">by A Smith &#8211; 2008 &#8211; Related articles<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">How can the four bases that make up DNA specify the 20 amino acids that &#8230; It was also known that there are only four nucleotides in mRNA: adenine (A), &#8230; However, a triplet code produces 64 (43 = 64) possible combinations, or codons. Thus \u2026<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8130f8b.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">The Information in DNA Determines Cellular Function via<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">The three-letter nature of codons means that the four nucleotides found in mRNA \u2014 A, U, G, and C \u2014 can produce a total of 64 different combinations. Of these &#8230;<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd82bec75.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8441c5a.png\" alt=\"\" \/><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Piercing the corporate veil &#8211; Wikipedia,<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Jump to Criminal law\u00fd: In English criminal law there have been cases in which the courts &#8230; received by a company have been regarded as having been &#8216;obtained&#8217; by &#8230; A court can &#8221; pierce&#8221; the carapace of the corporate entity and look at \u2026<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8533d87.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">Basis for limited liability &#8211; Germany &#8211; United Kingdom &#8211; United States<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Piercing &#8212;&gt; the skull and brain of BOY SCOUT experimental sample SAM Hengel..<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus we have a biology communications war &#8230;with many facets. It needs to be understood.<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Maybe, someday, cities will face REALITY and\u00a0<\/span><span class=\"c29 c18 c28\">help understand how EARTH LAB works and affects our daily LIFE or DEATH.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd863c559.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd87c15c4.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd890c5b5.png\" alt=\"\" \/><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd89a3c69.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8ae805f.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8be82de.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">The reader may just glance at the concepts below ..to be aware that they exist.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Please be aware that bio-computer systems have existed&#8230;.. such as the ancient Roman empire &#8230;was really built by bio-computers using the human processor.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Below, we see &#8211;&gt; keys, one to lock or encrypt the<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus you see that a few events, with incomplete explanation in newspapers.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">&#8211;&gt; Sam Hengel was involved in bio-computer battle .<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">&#8211;&gt; The Penn State locker room molestation issue &#8230;.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">is a cover-up by Penn State administration to allow their computer science departments and biology departments to tryto control the human bio-computer system &#8230;.. a major political power scheme &#8230;.to manipulate the human mind. Thus Penn State uses the decoy strategy of blaming Sandusky &#8230;while the real lock error issue is ignored.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Washington, DC funds this type of project &#8230;on the theory they will end up on top of the society pyramid. Nature has other ideas &#8230;&#8230; and subset humans and their subset institutions are small potatoes compared to Nature&#8217;s vast intellect and social VECTOR forces.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">&#8211;&gt; Virginia TECH secret voodoo tricks failed.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">They tried to attack Nature&#8217;s ENcrypt process &#8230;..hence<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">ENcrypt &#8211;&gt; En + Cry + pt &#8211;&gt;<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">English shooting + cry for dead students + point finger at Mr.CHO as solely responsible for the EVENT. The biggest line of BS ever invented in modern society &#8230;.. lies about the deeper CAUSES of the EVENT. Thus the LIES\/schemes of Virginia &#8230;&#8230;. spread to Europe at the\u00a0<\/span><span class=\"c29 c18\">BATTLE of LIES at Liege, Belgium.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">\u00a0<\/span><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8d4b300.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8e160eb.jpg\" alt=\"\" \/><\/p>\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8eb507b.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd8fb25d6.png\" alt=\"\" \/><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">From the internet &#8211;&gt;<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private. If the lock\/encryption key is the one published then the system enables private communication from the public to the unlocking key&#8217;s owner. If the unlock\/decryption key is the one published then the system serves as a signature verifier of documents locked by the owner of the private key. Although in this latter case, since encrypting the entire message is relatively expensive computationally, in practice just a hash of the message is encrypted for signature verification purposes.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd90705b2.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd91dbde2.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd92a8aa5.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">This cryptographic approach uses asymmetric key algorithms such as RSA, hence the more general name of &#8220;asymmetric key cryptography&#8221;. Some of these algorithms have the public key\/private key property; that is, neither key is derivable from knowledge of the other; not all asymmetric key algorithms do. &#8230;&#8230;.. etc. See a book for more details.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus we see CLUES to a puzzle regarding the BOY SCOUTS, FFA (Matt Anderson), 4-H Club and many other organizations in the United States AND their failure to understand simple concepts &#8230;regarding Margaret Mead atomic nuclear family laws &#8230;.that is atomic social anthropology and atomic social philosophy. While these organizations are very good ..for the most part; they assume that they are superior to the laws of Nature and the 23 chromosome laws of Nature.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus we Nature&#8217;s Darwinian selection of special agent Sam Hengel&#8230;.<\/span><\/p>\n<p class=\"c0\"><span class=\"c18\">address 2139\u00a0<\/span><span class=\"c18 c15\">Pierce\u00a0<\/span><span class=\"c18 c29\">Avenue&#8230;&#8230;.MISSION<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">penetrate&#8211;&gt;\u00a0<\/span><span class=\"c18 c15\">Pierce\u00a0<\/span><span class=\"c29 c18\">the Corporate Veil &#8230;message<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">The FCC electromagnetic field wars and North Pole pole magnetic field wars are well known components of the SCIENCE WARS. Of particular interest, is the Milwaukee Police attempt to help understand these complex issues and their role in Milwaukee social engineering projects and business projects. The Milwaukee Police are on the front lines of those nasty street events that happen and provide empirical data that is printed in newspapers. Such data provides researchers with clues &#8230;..tragic clues that help explain the societal architecture of Milwaukee &#8230;which includes their English language incomplete, biased and distorted explanations of &#8220;How Milwaukee works?&#8221;<\/span><\/p>\n<p class=\"c0\"><span class=\"c14\">Milwaukee 23\u00a0<\/span><span class=\"c4\">chromosome headquarters<br \/>\nand the\u00a0<\/span><span class=\"c18 c15\">DNA 64 codon<\/span><span class=\"c4 c15\">\u00a0<\/span><span class=\"c4\">headquarters<br \/>\nof the living EARTH Cell is a Computer Earth<\/p>\n<p><\/span><span class=\"c14\">geography address 23<\/span><span class=\"c18\">39 S\u00a0<\/span><span class=\"c18 c15\">43rd Street<br \/>\n<\/span><span class=\"c1\">..known as Badger Genetic Units &#8230;.<br \/>\nor also known on<br \/>\nEARTH LAB geography surface as Badger Guns.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<h3 id=\"h.sg7gwxuga3b\" class=\"c17\"><span class=\"c20\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Genetic_code&amp;sa=D&amp;ust=1601235737755000&amp;usg=AOvVaw3P01nTKudz9iwfM9eouWD-\">Genetic code<\/a><\/span><span class=\"c27\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Genetic_code&amp;sa=D&amp;ust=1601235737756000&amp;usg=AOvVaw0G-zkAyvE6FWqfcrmfBy0r\">\u00a0<\/a><\/span><span class=\"c20\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Genetic_code&amp;sa=D&amp;ust=1601235737757000&amp;usg=AOvVaw30oI9Nw7FgjyqbJEOFiOKR\">of Badger Guns<\/a><\/span><\/h3>\n<h3 id=\"h.t5ouw15fkahw\" class=\"c17\"><span class=\"c24\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Genetic_code&amp;sa=D&amp;ust=1601235737758000&amp;usg=AOvVaw3YMIBblpnDGfcrKiRjzLQP\">&#8211; Wikipedia<\/a><\/span><\/h3>\n<p class=\"c0\"><span class=\"c3\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=https:\/\/en.wikipedia.org\/wiki\/Genetic_code&amp;sa=D&amp;ust=1601235737759000&amp;usg=AOvVaw2gn1GMBD30PxL5KORTHnse\">en.wikipedia.org \u203a wiki \u203a Genetic_code<\/a><\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">The genetic code is the set of rules used by living cells to translate information encoded within &#8230; The code defines how codons specify which amino acid will be added next during protein synthesis. &#8230;<br \/>\nthe 20 standard amino acids used by living cells to build proteins, which would allow a<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\"><br \/>\n<\/span><span class=\"c12\">maximum of 4<\/span><span class=\"c12 c33\">3<\/span><span class=\"c12\"><br \/>\n<\/span><span class=\"c23\">=\u00a0<\/span><span class=\"c5\">64 amino acids on<br \/>\nSouth\u00a0<\/span><span class=\"c5 c15\">43rd Street\u00a0<\/span><span class=\"c5\">Milwaukee<\/span><span class=\"c22\">.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9369173.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd95eac1c.png\" alt=\"\" \/><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c4\">Under the guidance of brilliant Milwaukee intellectuals &#8230;.. Milwaukee encouraged lawsuits against the<br \/>\n<\/span><span class=\"c29 c18\">23 chromosomes and DNA 64 codons.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">Thus \u00a0a consequence of the shooting of Norberg in year 2009 and the lawsuit against the 23 chromosome location &#8230;.. we have the 23 student hostages and the death of Sam Hengel.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Milwaukee citizens and universities are very proud of their CAUSE and EFFECT demo &#8230;.and the murderer of Sam Hengel. This is part of Milwaukee and their M-theory physics atomic anthropology project&#8211;&gt;<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">M-theory<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Milwaukee arrogance and bragging brain errors<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Murder =<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">M + ur + der &#8211;&gt; atoM uranium 238 Margaret Mead error<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Milwuakee uses puppets of Marinette, Wisconsin<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">for the amusement of Milwaukee experimenters<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Milwaukee Journal Sentinel covers up the details to protect the CARL JUNG citizen\/community COLLECTIVE unconsciousnsess schemes\/ secret rackets.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Their explanations are incomplete, they OMIT many important details.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">The reference book that helps explains Darwinian electromagnetic selection of Sam Hengel is:<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Fundamentals of Applied Electromagnetics<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">by Fawwaz T. Ulaby<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">The 2004 Media Edition<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Other books provide similar information.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Such books may be bought at a college bookstores or ordered from your local book store.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Such books are useful for bio-physics crimes.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">In Milwaukee and Madison ..the colleges and universities can explain everything &#8230;..they have the resources. In Milwaukee we have the University of Wisconsin, MSOE = Milwaukee School of Engineering, Marquette university, and other schools. In addition we have several corporations that have experts in electromagnetic forces and magnetic field forces &#8211;&gt; major components of<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Milwaukee social forces.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd97383f8.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9861bdf.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9904fff.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9a29b0a.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9b30f83.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9c338b4.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c13\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">The BSA experiments &#8211;&gt; Curl operator and his blood circulation<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9d1d791.png\" alt=\"\" \/><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><span class=\"c6\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9dea971.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">.<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Thus we see&#8230;.<\/span><span class=\"c18 c28\">the above SYMBOL MACHINE \u00a0equation<\/span><span class=\"c1\">\u00a0with the calculus integration symbol &#8230;<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">with the Boy equation &#8230;&#8230;and the coffin &#8211;&gt; Box<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c8\"><img decoding=\"async\" title=\"\" src=\"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-content\/uploads\/sites\/4\/2020\/09\/img_5f70dd9ec37cb.png\" alt=\"\" \/><\/p>\n<p class=\"c9\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">thus applied EM = Electromagnetic &#8211;&gt; EM= EM.bassy diplomatic physics Hierarchy Problem WAR<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">with the world-wide BSA DEATH LIST:<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">BSA &#8211;&gt; Boy Sam Hengel<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">BSA &#8211;&gt; Boy Sa &#8211;&gt; Boys + Sandusky (Penn State technology errors)<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">BSA &#8211;&gt; Boy Sa &#8211;&gt; Boy SyriA age 13 murdered<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">BSA also includes BC\/BSA = Blue Cross\/Blue Shield Association and cross-correlation statitical analysis on the EM health of society&#8230; and they have biased answers.<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">The Boy Scouts of America, FFA, 4-H Club look the other way as their EM friends in Washington,DC and at universities and corporations experiment with these young men. Parents could care less&#8230;they just talk babble &#8230;which helps the problems continue. Only accurate and careful thinking can solve these big picture&#8230;gestalt system problems.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Meanwhile, the experiments continue &#8230;the police detectives ought be interested in helping research this&#8230;rather than taking subliminal MIND orders from the big-shots.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">LEWIS Carroll from year 1865 ..Alice&#8217;s Adventures in Wonderland, WHO Stole the Tarts?<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">The LEWIS Carroll EARTH LAB message:<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">&#8220;Here one of the guinea-pigs cheered, and was immediately suppressed by the officers of the court. &#8230;..(I will explain to you how it was done. ..with STRINGS: into this they slipped<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">the guinea-pig, head first and then sat upon it).<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">I&#8217;m glad I,ve seen that done&#8217; , thought Alice.&#8221;<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Thus the suppression of the Sam Hengel situation by the University of Wisconsin &#8230;and their cover-up of the brain programming ERRORS that result in the murder of SAM Hengel.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">Some CLUES are mentioned above&#8230; provide a partial outline.<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">\u00a0<\/span><\/p>\n<p class=\"c0 c2\">\n<p class=\"c0\"><span class=\"c1\">CONTACT: Principle science researcher HERB ZINSER<\/span><\/p>\n<p class=\"c0\"><span class=\"c1\">E-Mail: Herb@Zinoproject.com<\/span><\/p>\n<p class=\"c0\"><span class=\"c4\">Website:\u00a0<\/span><span class=\"c4\"><a class=\"c19\" href=\"https:\/\/www.google.com\/url?q=http:\/\/www.zinoproject.com\/&amp;sa=D&amp;ust=1601235737784000&amp;usg=AOvVaw32k95qBAR055yOxmxoZlj4\">www.zinoproject.com<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rd-blog-1519 by Herb Zinser The 23 chromosomes war with the electromagnetic field accepted by the Boy Scouts of America claims [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-178","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":1,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":220,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/posts\/178\/revisions\/220"}],"wp:attachment":[{"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/region10.herbzinser64.com\/dir\/science03\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}