Like us on Facebook and Follow us on Twitter


Free Energy Blog:2013:09:27

Lasted edited by Andrew Munsey, updated on June 15, 2016 at 1:35 am.

  • This page has been imported from the old peswiki website. This message will be removed once updated.

Archive of Free Energy Blog posts from September 27, 2013

Blog Archive

Next Day

Free Energy Blog:Archive:2013:09:28

20130927_21:20: Z Power Seminar Tomorrow Online

'Free Energy Blog:Archive:2013:09:27'

Relevance: Directory:Zero Point Energy > Directory:Priza Technologies Inc.'s Z Point Energy

Shalender Singh of Directory:Priza Technologies Inc.'s Z Point Energy posted the following notice:

: Hi register for seminar tomorrow at 10AM PST: this is about science behind zero point energy. Topics covered:

: The topic covered are:

: 1. A completely mathematical proof of fallacy in Einstein's mass energy derivation.

: 2. Proof of why classical or quantum mechanical equations cannot even satisfy deflection of billiards balls.

: 3. The missing factor.

: 4. Matter Light duality.

: 5. Speed greater than light.

: 6. Zero energy non-zero momentum particles.

-- SilverThunder 21:17, 27 September 2013 (UTC)

20130927_21:10: 323Niklas' RotoVerter

'Free Energy Blog:Archive:2013:09:27'

Relevance: Directory:Electromagnetic > Directory:Motor-Generator Self-Looped with Usable Energy Left Over > Directory:323Niklas' RotoVerter

Just posted this:

Template: 2665

-- SilverThunder 21:02, 27 September 2013 (UTC)

20130927_19:35: Valy Promises a New (QMoGen) Video Ruling out
Image:JasonDaz q-mo-gen 300.jpg

'Free Energy Blog:Archive:2013:09:27'

Relevance: Directory:Electromagnetic > Directory:Motor-Generator Self-Looped with Usable Energy Left Over > Directory:ValyEnergiStar Self-Looped Motor-Generator System > Directory:ValyEnergiStar Self-Looped Motor-Generator System

I overlooked this in my overflowing inbox:

On September 23, 2013 10:39 PM [Mountain], Valy wrote by email (slightly edited):

: [In a] few days I [will] shoot another video proving that there is no [cheater] wire.

And yesterday, Directory:JasonDaz Self-Looped Motor-Generator in the Philippines (also created a QMoGen) wrote (slightly edited):

: Watch out for my next video upload. The real deal. No hidden wires. No scam. Vest of all, it works 100%, generating unlimited free energy.

: Made in the Philippines.

-- SilverThunder 19:35, 27 September 2013 (UTC)

20130927_18:25: This Week in Free Energy

'Free Energy Blog:Archive:2013:09:27'

Relevance: There was an error working with the wiki: Code[1] > This Week in Free Energy™

Template: 860

-- SilverThunder 18:20, 27 September 2013 (UTC)

20130927_15:00: NSA Creates In-Security

'Free Energy Blog:Archive:2013:09:27'

Relevance: Directory:Conspiracy > Directory:Big Brother / Orwell Conspiracy

The latest from Congress:Member:Paul Noel. (Needs editing.)

: From: Arthur Noel

: To: Sterling D. Allan

: Sent: Friday, September 27, 2013 6:47 AM [Mountain]

: Subject: NSA and Security

: Sterling,

: We just got a trivial but most exposing example of just what it means to have your computers in the control of others. This is the NSA to the limit even though the case is a teen hacker. The NSA is the agent of making sure that your computer and your encryptions are wide open to the control by others. It was the NSA that made sure that you could not lock down your computer. It was the NSA that insisted that you could not get real security. It was the NSA that co-opted the companies like Facebook, Google and the others and turned them against us.


: Does anyone really want your computer turned into a spy device against yourself? If you do, just stay silent.

: The Congress Critters need to wake up. They too depend upon secured communications to do their jobs. Imagine if the NSA rips open the private conversations of our congressmen. Then at a critical vote or juncture when the president wants something he simply threatens to spill some information to the press that congressman X was buying this or talking to someone or whatever. This is the complete co-opting of Congress at stake. This is the end of our republic if we tolerate the NSA continuing.

: No Spy agency can continue to be allowed to exist if it insists that it must have the right to control our encryptions and our computers. This is absolutely clear in the US Constitution.

:: Amendment IV

:: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

: The issues here are most critical to the rights of mankind in the world. Several very important questions must be asked. Do your effects stop being yours because you handed them to a third party to manage them for you? Does your money as a result stop being yours at the bank? Does your car become someone else’s property because you park it in his parking lot at work or at the mall? Of course not! Then your emails don’t become someone else’s property just because they travel on his computer, yet this is what the US Courts have ruled. Congress needs to clean this up.

: With this in mind the people of the USA and of the world need to understand that the right of an individual to possess encryption at whatever level must be declared an unalienable right and that it is not trafficking in munitions to do so. For anyone to argue otherwise is to argue against your right to speak freely. (US Constitution Amendment I) You have the right to speak any language and even to make up new words as you see fit. No encryption is anything different from that! Language is by definition encryption. You apply an abstract meaning to a series of vocalizations or printed text or symbols. That is encryption! Ciphers and Codes and Encryptions are nothing but different languages. The fact that in using such a person may communicate to do good or bad things is inherent to being human. These facts cannot be altered in any way.

: The security of peoples to be able to communicate without others listening in is critical to the alternative energy community. Our safety is at risk if we develop or support disruptive technologies that may unsettle the fossil fuel and nuclear fuel industries as currently constituted. Our intellectual property is at risk if we cannot communicate so. Our very ability to earn a living is at risk without being able to have our own ciphers including very hard encryptions. It does not imply any criminal activity to demand that you be a private (What about private is not understood here?) citizen.

: The level of things at risk with the NSA continuing to maintain the insistence that it must be able to break all encryptions and must be able to invade all privacy and computers is too high to list. It literally is everything that you hold dear. A short lists of things put at risk by the NSA would include:

: (1) All of your money

: (2) All of your property

: (3) All of your privacy

: (4) All of our national security

: (5) All of our safety from terrorism

: The cost of the NSA is very high and the benefit is obviously trivial.

: An historical analysis of the NSA shows that it was established as the cold war developed at the end of World War II. It was heavily populated by NAZI members as the target was the USSR and these people had the most information on the USSR. The result was that this agency from the very start became a NAZI institution and has never held any truck with the ideas of freedom and human liberty. It’s behavior since that time is entirely predictable. This can be 3rd party verified in depth.

: This behavior explains entirely why the NSA is most determined to be against the concept that citizens have the right to their own communications and records free of US Government or any other invasion. They have their roots in the SS and the Gestapo.

: This explains without doubt why this group is so dangerous to freedom in the USA and around the world.

: Many thanks are to be given out to the people around the world today. Their reactions and actions to this situation have been exemplary. I am no fan President Putin in Russia but he has been spot on regards this. Imagine a former KGB man being right on the matters! The President of Brazil has been spot on too! Honestly even the people Australia and many other places have had the right reactions.

: The most thanks have to go out to the Worldwide Hacker Community who has eviscerated the NSA secrets by exposing all their exploits and forcing the attention to this matter. They are the ones who exposed the micro-code operations. They are the ones who have exposed the encryption exploits. Their concerted action has for the most part set in motion the demise of the weakened encryptions and the flawed computer chip manufacturing. The argument by some that we must continue these invasions is rapidly becoming moot because of their actions.

: For the non-technical out there, it is a metaphor I am going to describe here for your understanding.

: Imagine if you will your house with its locks on windows and doors. Your money is in a safe in the house. Everything is secure except there is one door which you don’t have a key to. It is the NSA entrance. They can come and go as they please. Your safe has an NSA door too. There are cameras in your house recording everything you do with NSA access. The keys to all those doors and cameras are also copied to anyone else in the world who wants them. How secure are you? You are not secure at all as every criminal in the world now has a key to your valuables, privacy and your home. Who do you blame? If you blame the criminals who use the keys you are a fool. The blame has to lie on the NSA for having forced the doors to be there in the first place.

: One minor technical note I need to slip in here. Ciphers and Encryptions are worthless if you don’t change the keys often. This is true regards all computer security. All “Biometric” identity information used by computers for banking etc is to use a password that never changes and which can be copied with high fidelity easily. Apple’s fingerprint security is complete insecurity for example. Don’t buy off on biometrics for security. That is a dog that will not hunt. To copy a fingerprint only requires either a good photograph or a bit of tape or modeling clay. This has been demonstrated more than 20 years ago.

: Thanks

: Paul Noel

-- SilverThunder 14:53, 27 September 2013 (UTC)

'Free Energy Blog:Archive:2013:09:27'


'Free Energy Blog:Archive:2013:09:27'

Relevance: Directory:Electromagnetic

Deggory sent me this link this morning to a video by YouTube user Valdisch Pelscher. It shows a breadboard circuit with some kind of coil, then he puts some magnet-looking shielding around the coil, like a sandwitch then he applies what is probably a battery to the two exposed leads, I presume to "start" or "energize" the circuit, then removes the battery. After that, the circuit powers the LED lights on the board, both solid and flashing, in what is assumed to be a continuous mode thereafter. He's careful to keep the video trained on the circuit the whole time, so skeptics can't say he swapped something out when he put the camera down to screw in the sandwitched coil.

My questions: What would be the cost per watt of power produced? If mass produced, would this be cost-effective as a permanent light solution, such as a night light in a child's room, or a ventillation fan? I'm sending a message through YouTube to Valdesch asking him if he would be willing to publish his circuit.


(YouTube / Valdisch Pelscher May 22, 2013 [presently 3,322 visits])

-- SilverThunder 13:56, 27 September 2013 (UTC)

'Free Energy Blog:Archive:2013:09:27'

20130927_03:00: Pecostwister Hydrogen Fuel Rally Friday-Saturday, Oct. 11-12
Image:Arm-leg-firstborn Shell-prices.jpg

Relevance: Directory:Fuel Efficiency > Directory:Hydroxy or HHO Injection Systems

This event conflicts with the Event:2013:Global Breakthrough Energy Movement Conference conference in Boulder. I'm not sure how they could have missed that, given all the coverage Global BEM has been getting. But, thus it is.


: Hydrogen Fuel Rally Friday-Saturday, Oct. 11-12 Eddy County Extension Office, 1304 W. Stevens, Carlsbad, NM. For Motel Reservations: US Travelers Inn 575-887-1994, Two beds, breakfast, $85 plus tax. Deadline: Oct.7, 2:00pm, no pets, or smoking. 15 rooms available.

: Hydrogen Fuel Rally Oct-11-12, 2013

: Friday night mixer 7:00pm-??

: Saturday Fuel Mileage Run

: 7:00am-??, Free Classes: 8:00am-2:00pm Instructor Dan Merrick, Fuel Specialist. Lunch 12:00 Free hotdogs and sodas

: Awards Banquet 6:00pm

: Costs per entry $75 includes meals for two, one t-shirt.

: Not entering contest? $20 per adult, $10 children under 12 covers meals.

: Cash for 1st-3rd place for best fuel mileage increase by %. $300, $200, $100.


-- SilverThunder 02:52, 27 September 2013 (UTC)

20130927_02:35: Video tour of Fukushima Daiichi nuclear power plant -- Sept 2013

Relevance: Directory:Nuclear > Directory:Nuclear Meltdown > Directory:Fukushima Daiichi Nuclear Power Plant Fiasco > Directory:Nuclear Remediation

With all the criticism we've been giving of the Fukushima fiasco, it's good to see a video from the source describing the nature and extent of the problem and what they are doing to address it.

This was embedded at


(YouTube September 17, 2013)

-- SilverThunder 02:30, 27 September 2013 (UTC)

Previous Day

Free Energy Blog:Archive:2013:09:26