60-llw-Py-Michael Brown, Fergurson, Mo., Wake Forest University, Winston-Salem, NC, CRB Library;The EPA’s Silent, Guilty Role in the Flint Water Crisis
5/31/16
The following DVD on You Tube summerizes all of blogs and
who Gwydolyn Gwyn and son who pulled weapon on me are-they were started in the
projects through making deals with white male authority; where they try and
intimidate a person to join their gang or white male authority will put in
jail=illegal;\
Gang Stalking - Targeted Individuals - Psychological
Harassment
Definitions
Aldous Huxley on propaganda or
brainwashing: “There will be, in the next generation or so, a
pharmacological method of making people love their servitude, and producing
dictatorship without tears, so to speak, producing a kind of painless
concentration camp for entire societies, so that people will in fact have their
liberties taken away from them, but will rather enjoy it, because they will be
distracted from any desire to rebel by propaganda or brainwashing, or
brainwashing enhanced by pharmacological methods. And this seems to be the
final revolution.”
RELATED READ:
|
Agent Provocateur is a person assigned to
provoke unrest, violence, debate or argument by or within a group while acting
as a member of the group but covertly representing the interests of another. In
general, agents provacateur seek to secretly disrupt a group’s activities from
within the group. Agents provocatuer are employed to disrupt or discredit a
group by performing acts for which the group will be falsely accused, by
leading the group into activities that they would not otherwise pursue or by
creating discord between group members. Provacateurs may encourage illegal
acts, recomend belligerant tactics a group might otherwise reject, spread false
rumors intended to provoke hasty action by a group, spread malicious rumors
within a group about a group member or employ other tactics intended to provoke
improper action by a group or to divert a group from its chosen purpose. An
agent provocateur might attempt to implicate as an accomplice an innocent
target who the agent unwittingly involves in a crime or criminal conspiracy (sourcewatch.org).
BATF – U.S. Bureau of Alcohol, Tobacco,
and Firearms
Black Listing A list of individuals or
organizations designated for special discrimination or boycott; also to put a
person or organization on such a list. Blacklists have been used for centuries
as a means to identify and discriminate against undesirable individuals or
organizations. A blacklist might consist, for example, of a list of names
developed by a company that refuses to hire individuals who have been
identified as union organizers; a country that seeks to boycott trade with
other countries for political reasons; a Labor Union that identifies firms with
which it will not work; or a government that wishes to specify who will not be
allowed entry into the country (legal-dictionary.thefreedictionary.com).
Bullying is generally seen as aggressive
intentional behavior to control someone physically, mentally, or emotionally.
Not all bullying is aggressive sometimes it’s punitive. Bullying occurs in
every city, community and school. Bullying has no barriers it affects all races
and gender (Bullying Information).
C-SPAN – cable channel dedicated to
broadcasting both houses of Congress and other U.S. governmental functions.
CALEA - A 1994 law (“Communications
Assistance to Law Enforcement Act”) to force a massive reworking of the U.S. telephone
infra- structure so that the government can intrinsically wiretap it. Also
called the FBI Digital Telephony Act. It is a domestic extension of ECHELON.
Cause stalking is an alternate term for
what some multi stalking targets call “organized stalking” or “gang stalking.”.
It is specialized groups of people who think they are supporting some cause,
but are more interested in harassing targets designated by their leaders. Lies
told by the leaders add fuel to the fire (raven1).
CISPES – Committee in Solidarity with the
People of El Salvador
COINTELPRO or Counter Intelligence Program
was a series of covert, and often illegal, projects conducted by the United
States Federal Bureau of Investigation (FBI) aimed at surveilling,
infiltrating, discrediting, and disrupting domestic political organizations.
COINTELPRO tactics included discrediting targets through psychological warfare,
planting false reports in the media, smearing through forged letters,
harassment, wrongful imprisonment, extralegal violence and assassination.
Covert operations under COINTELPRO took place between 1956 and 1971, however
the FBI has used covert operations against domestic political groups since its
inception. The FBI’s stated motivation at the time was “protecting national
security, preventing violence, and maintaining the existing social and
political order” (Wikipedia).
Coercive Persuasion or Thought Reform is
best understood as a coordinated system of graduated coercive influence and
behavior controls designed to deceptively and surreptitiously manipulate and
influence individuals, usually in a group setting, in order for the originators
of the program to profit in some way, normally financially or politically.
Using rewards and punishments, efforts are made to establish considerable
control over a person’s social environment, time, and sources of social
support. Social isolation is promoted (Organized Stalking by Groups – FAQ).
Conspiracy a secret agreement between two
or more people to perform an unlawful act (The
Economist: A Powerful Elite IS Secretly Running Things…but You’re Still Crazy).
Councils (llluminati) - The Illuminati has
frequent meetings. Some of these meetings are organized to appear “acephalous”
and “accidental” in their meetings, when in reality they are structured and
planned. One group, MJ-12 has gone by the following names: the Group, the
Special Study Group, the Wise Men, the Operations Coordinating Board (OCB),
5412 Committee, 303 Committee, 40 Committee, PI-40 Committee, and Policy
Planning Group (PCG). Some of the formal policy and ritual groups have names
that all Illuminati members who have gotten high enough to learn, will
recognize: The Council of 3, Council of 5, Council of 7, Council of 9, The
Grand Druid Council, The Committee of 300, and the Committee of 500 (known as
Fortune 500). Many of the meetings are conclaves without formal names. The
Grand Druid Council is not something fictional, but an actual body of people
who formally meet and whose membership, we have been trying to keep track of.
The groups which make decisions to control this planet are networked together.
Each decision has its own origin and route that it takes. (The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
Crime Against Humanity means murder,
extermination, enslavement, deportation, imprisonment, torture, sexual
violence, persecution or any other inhumane act or omission that is committed
against any civilian population or any identifiable group and that, at the time
and in the place of its commission, constitutes a crime against humanity
according to customary international law or conventional international law or
by virtue of its being criminal according to the general principles of law
recognized by the community of nations, whether or not it constitutes a
contravention of the law in force at the time and in the place of its
commission. “genocide” means an act or omission committed with intent to
destroy, in whole or in part, an identifiable group of persons, as such, that,
at the time and in the place of its commission, constitutes genocide according
to customary international law or conventional international law or by virtue
of its being criminal according to the general principles of law recognized by
the community of nations, whether or not it constitutes a contravention of the
law in force at the time and in the place of its commission (Crimes Against Humanity and War Crimes Act).
Criminal Harassment The crime of stalking
is defined legally as criminal harassment. The following section of the
Criminal Code of Canada pertains to criminal harassment: Section 264. (1) No
person shall, without lawful authority and knowing that another person is
harassed or recklessly as to whether the other person is harassed, engage in
conduct referred to in subsection (2) that causes that other person reasonably,
in all the circumstances, to fear for their safety or the safety of anyone
known to them. Prohibited conduct: (2) The conduct mentioned in subsection (1)
consists of (a) repeatedly following from place to place the other person or
anyone known to them; (b) repeatedly communicating with, either directly or
indirectly, the other person or anyone known to them; (c) besetting or watching
the dwelling-house, or place where the other person, or anyone known to them,
resides, works, carries on business or happens to be; or (d) engaging in
threatening conduct directed at the other person or any member of their family
(The Criminal Code of Canada and Sexual Harassment).
Crowd manipulation is the intentional use
of techniques based on the principles of crowd psychology to engage, control,
or influence the desires of a crowd in order to direct its behavior toward a
specific action. This practice is common to politics and business and can facilitate
the approval or disapproval or indifference to a person, policy, or product.
The ethical use of crowd manipulation is debatable and depends on such factors
as the intention of and the means used by the manipulator, as well as the ends
achieved. Crowd manipulation differs from propaganda although they may
reinforce one another to produce a desired result. If propaganda is “the
consistent, enduring effort to create or shape events to influence the
relations of the public to an enterprise, idea or group”, crowd manipulation is
the relatively brief call to action once the seeds of propaganda (i.e. more
specifically “pre-propaganda”) are sown and the public is organized into a
crowd. Crowd manipulation also differs from crowd control, which serves a
security function. Local authorities use crowd-control methods to contain and
defuse crowds and to prevent and respond to unruly and unlawful acts such as
rioting and looting (Wikipedia).
Cyberstalking is the use of the Internet or
other electronic means to stalk or harass an individual, a group of
individuals, or an organization. It may include false accusations, monitoring,
making threats, identity theft, damage to data or equipment, the solicitation of
minors for sex, or gathering information in order to harass. The definition of
”harassment” must meet the criterion that a reasonable person, in possession of
the same information, would regard it as sufficient to cause another reasonable
person distress (Wiki: Cyberstalking).
DEA – U.S. Drug Enforcement Administration
DIA – U.S. Pentagon Defense Intelligence Agency DIA – U.S. Drug Interdiction
Agency (older)
Decoy(ing) is usually a person, device or
event meant as a distraction, to conceal what an individual or a group might be
looking for. Decoys have been used for centuries most notably in game hunting,
but also in wartime and in the committing or resolving of crimes (Wikipedia).
DICTIONARY – Keyword searching with
exclusion logic software.
Direct Energy Weapon (DEW) emits energy in
an aimed direction without the means of a projectile. It transfers energy to a
target for a desired effect. Intended effects may be non-lethal or lethal. Some
such weapons are real, or are under active research and development (Wikipedia: Directed-energy weapon).
Dielectric heating, also known as
electronic heating, RF heating, high-frequency heating and diathermy, is the
process in which a high-frequency alternating electric field, or radio wave or
microwave electromagnetic radiation heats a dielectric material. At higher
frequencies, this heating is caused by molecular dipole rotation within the
dielectric. At lower frequencies in conductive fluids, other mechanisms such as
ion-drag are more important in generating thermal energy. RF dielectric heating
at intermediate frequencies, due to its greater penetration over microwave
heating, shows greater promise than microwave systems as a method of very
rapidly heating and uniformly preparing certain food items, and also killing
parasites and pests in certain harvested crops (Wikipedia).
Disability as a condition which limits a
person’s ability to function in major life activities – including
communication, walking, and self-care (such as feeding and dressing oneself) –
and which is likely to continue indefinitely, resulting in the need for
supportive services (What is the Legal Definition of a Disability?).
Dehumanization is to make somebody less
human by taking away his or her individuality, the creative and interesting
aspects of his or her personality, or his or her compassion and sensitivity
towards others.[citation needed] Dehumanization may be directed by an
organization (such as a state) or may be the composite of individual sentiments
and actions, as with some types of de facto racism. State-organized
dehumanization has been directed against perceived racial or ethnic groups,
nationalities (or “foreigners” in general), religious groups, genders,
minorities of various sexual orientations (e.g., homosexuals), disabled people
as a class, economic (e.g., the homeless) and social classes, and many other
groups (Wikipedia).
Disinformation is false or inaccurate
information that is spread deliberately with intentions of turning genuine
information useless. For this reason, it is synonymous with and sometimes
called black propaganda. It is an act of deception and false statements to
convince someone of untruth. Disinformation should not be confused with
misinformation, information that is unintentionally false. Unlike traditional
propaganda techniques designed to engage emotional support, disinformation is
designed to manipulate the audience at the rational level by either discrediting
conflicting information or supporting false conclusions (Wikipedia).
ECHELON is NSA’s world-wide surveillance
network and associated software.
Electronic Harassment is a term referring to
the use of electronic devices to harass, torture, and/or physically harm a
person, not to be confused with cyberstalking. In Michigan, Public act 257 of
2003 makes it a felony for a person to “manufacture, deliver, possess,
transport, place, use, or release” a “harmful electronic or electromagnetic
device” for “an unlawful purpose”; also made into a felony is the act of
causing “an individual to falsely believe that the individual has been exposed
to a harmful electronic or electromagnetic device.” In Maine , Public law 264, H.P. 868 – L.D. 1271
criminalizes the knowing, intentional, and/or reckless use of an electronic
weapon on another person, defining an electronic weapon as a portable device or
weapon emitting an electrical current, impulse, beam, or wave with disabling
effects on a human being (Publicsignal).
Electromagnetic radiation can be classified
into ionizing radiation and non-ionizing radiation, based on whether it is
capable of ionizing atoms and breaking chemical bonds. Ultraviolet and higher
frequencies, such as X-rays or gamma rays are ionizing. These pose their own
special hazards: see radiation and radiation poisoning. Non-ionizing
radiation, discussed here, is associated with two major potential
hazards: electrical and biological. Additionally, induced electric current
caused by radiation can generate sparks and create a fire or explosive hazard (Wikipedia: Electromagnetic radiation and health).
Electromagnetic shielding is the process of
reducing the electromagnetic field in a space by blocking the field with
barriers made of conductive and/or magnetic materials. Shielding is typically
applied (1) to enclosures to isolate electrical devices from the ‘outside
world’ and (2) to cables to isolate wires from the environment through which
the cable runs. Electromagnetic shielding that blocks radio frequency
electromagnetic radiation is also known as RF shielding. The shielding can
reduce the coupling of radio waves, electromagnetic fields and electrostatic
fields, though not static or low-frequency magnetic fields[citation needed] (a
conductive enclosure used to block electrostatic fields is also known as a
Faraday cage). The amount of reduction depends very much upon the material
used, its thickness, the size of the shielded volume and the frequency of the
fields of interest and the size, shape and orientation of apertures in a shield
to an incident electromagnetic field (Wikipedia).
Electrosensitivity Electromagnetic
hypersensitivity, called also electro sensitivity or electro hypersensitivity
is a disorder in which a person presents symptoms of a sickness caused or
aggravated by magnetic fields or waves. These symptoms are recognized by the
WHO and by numerous scientific studies (ref. Bioinitiative Report). Here is the
WHO’S definition: “For some time, numerous individuals complained of diverse
health problems attributed to exposure to electromagnetic fields. While certain
individuals report mild symptoms and are able to avoid these fields, others are
so gravely affected that it becomes necessary to stop working and to modify
their lifestyle totally. This sensitivity is presumed to be from
electromagnetic fields and is generally called electromagnetic sensitivity (EMS )” (aseq-ehaq.ca).
FBI – U.S. Federal Bureau of
Investigation
Flash mob A flash mob (or flashmob) is a
term coined in 2003 to denote a group of people who assemble suddenly in a
public place, perform an unusual and sometimes seemingly pointless act for a
brief time, then disperse, often for the purposes of entertainment and/or
satire. Flash mobs are organized via telecommunications, social media, or viral
emails. The term is generally not applied to events and performances organized
for the purposes of politics (such as protests), commercial advertisement,
publicity stunts, that involve public relation firms, or paid professionals (Wikipedia).
GAK - Government Access [to cryptographic]
Keys. Any cryptography product with GAK has been compromised so the government
can read it.
Harassment covers a wide range of offensive
behaviour. It is commonly understood as behaviour intended to disturb or upset.
In the legal sense, it is behaviour which is found threatening or disturbing.
Sexual harassment refers to persistent and unwanted sexual advances, typically
in the workplace, where the consequences of refusing are potentially very
disadvantageous to the victim. In 1984, the Canadian Human Rights Act
prohibited sexual harassment in workplaces under federal jurisdiction (Wikipedia).
Hate Crime The Criminal Code of Canada says
a hate crime is committed to intimidate, harm or terrify not only a person, but
an entire group of people to which the victim belongs. The victims are targeted
for who they are, not because of anything they have done. Hate crimes involve
intimidation, harassment, physical force or threat of physical force against a
person, a family or a property. Sections 318 and 319 of the Criminal Code of
Canada address hate crimes. (What
is a hate crime?).
Human rights concerns the private rights
and power of people. This typically has broad meaning, covering all human
rights protected under the law outside of the criminal law context. Civil
rights primarily gravitates around issues such as discrimination,
accommodation, suffrage (voting), and to a lesser extent, property rights.
Human rights are primarily protected under the federal and provincial Human
Rights Acts in private context, and under the Canadian Charter of Rights and
Freedoms where the state is a party to the matter. Controversial human rights
issues in Canada have included patient rights, freedom of speech, freedom of religion,
parents’ rights, children’s rights, abortion rights vs rights of the unborn,
minority rights, majority rights, rights of the disabled, aboriginal rights,
tenant rights and economic, social and political rights (Human rights in Canada).
Gagged Person (GP) is whispered lies and
slander, by a Perp, about a TI. If the GP believes the lies, they become
infuriated at the TI — and are recruited into piling on, and targeting
(perping) them. GPs are threatened, either subtly or aggressively — when they
are gagged by the Perp, even though they usually have no legal authority to do
so. After this the GP will not advise the TI — of either the slander they have
been told, or the identity of the cowardly Perp who whispered it. The GP’s fear
is based on the possibility that the slander may be justifiable and true — or
even worse — if it is false, they fear that similar slander may be unleashed
against them, unless they cooperate with the unjust targeting of the TI (exposegangstalking.com).
Gaslighting is a form of psychological
abuse in which false information is presented to the victim with the intent of
making them doubt their own memory and perception. It may simply be the denial
by an abuser that previous abusive incidents ever occurred, or it could be the
staging of bizarre events by the abuser with the intention of disorienting the
victim. Gaslighting had a colloquial origin explained below, but the term has
also been used in clinical and research literature (Wikipedia).
Gang Stalking Under Occupational Health and
Safety laws, individuals are being flagged and placed on community notification
lists. This is happening without the targets knowledge. In many countries these
community notifications are being used by companies and others to target
innocent individuals such as whistle-blowers, the outspoken, etc. In
conjunction with these notifications, companies and others are in some cases
using a practice that was used in the former soviet union called the
psychiatric reprisal. This is used as a means of retaliation, blacklisting,
silencing, or controlling members of society. Once on the notification system,
warnings about the targets are sent out to every individual the target comes in
contact with, thus poisoning their associations, and socially annexing the
targeted individual (targetedindividuals.com).
Gang-Stalker is a person who participates,
in a group that stalks, follows, mobs, bullies, harasses, and slanders TI’s on
a 24×7 basis. Block Watch programs are notorious participants, as are organized
motorcycle gangs (OMG’s), churches, or any other group that can be infiltrated
and manipulated. The orchestrating umbrella above the gangs of stalkers has
access to the most sophisticated law enforcement surveillance and communication
resources. The scheme is government sponsored, their funding is endless, and
the protocol is secretive (Definitions gang stalking related).
Handler in the intelligence services (and
MKULTRA survivor group) is the direct supervisor of an intelligence “asset”.
Someone who has been programmed to do the will of a controlling agency, such as
a mind control target, is a “asset” to the controlling agency. Current day
organized stalking and electronic harassment targets are not usually acquainted
with their handlers, however, we can be certain at any given time that each of
us has one. The term handler is heard and read much more frequently among
MKULTRA survivors. The handlers know the appropriate hypnotic words, tones, or
other signals to invoke the “asset’s” hypnotic programming (raven1).
HAARP or Highfrequency Active Auroral Research
Project The vast majority of unscientific theories, research or
reason, so if you want to focus on HAARP (High Frequency Active Auroral
Research Program) which is a military and a scientific program of research on
the ionosphere driven by the Air Force, United States Navy, DARPA (Defense
Advanced Research Projects Agency) and the University of Alaska. Its main
objective is the study is to improve the radio telecommunications and
monitoring systems such as missile detection. HAARP by definition can not
change the climate: the energy transmitted to the ionosphere is not absorbed by
the troposphere and the stratosphere, the two layers of our atmosphere where
weather phenomena occur. All electromagnetic interaction occurs near the area,
about 70 miles up. At this point the influence of the sun’s rays are immensely
more powerful than any made by electromagnetic emission antennae on Earth,
therefore, if the ionospheric turbulence caused by the Sun is not able to
create weather havoc on our planet, much HAARP can cause less (What is HAARP and why has not caused earthquakes).
Illuminati - The Illuminati are 13 elite
bloodlines which have maneuvered themselves into control over this planet. They
lead double lives, one for society and a hidden one which is based on a gnostic
luciferian philosophy which consists of lots of blood rituals. (The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
Informened Consent The signing of consent
forms for other kinds of medical procedures, such as surgery, or for cancer
treatments such as radiation or chemotherapy. However, informed consent for a
clinical trial involves much more than just reading and signing a piece of
paper. Rather, it involves two essential parts: a document and a process. The
informed consent document provides a summary of the clinical trial (including
its purpose, the treatment procedures and schedule, potential risks and
benefits, alternatives to participation, etc.) and explains your rights as a
participant. It is designed to begin the informed consent process, which
consists of conversations between you and the research team. If you then decide
to enter the trial, you give your official consent by signing the document. You
can keep a copy and use it as an information resource throughout the course of
the trial. The informed consent process provides you with ongoing explanations
that will help you make educated decisions about whether to begin or continue
participating in a trial. Researchers and health professionals know that a
written document alone may not ensure that you fully understand what
participation means. Therefore, before you make your decision, the research team
will discuss with you the trial’s purpose, procedures, risks and potential
benefits, and your rights as a participant. If you decide to participate, the
team will continue to update you on any new information that may affect your
situation. Before, during, and even after the trial, you will have the
opportunity to ask questions and raise concerns. Thus, informed consent is an
ongoing, interactive process, rather than a one-time information session (cancer.gov).
Key Recovery - See GAK.
Lawful interception (LI) is the legally
sanctioned official access to private communications, such as telephone calls
or e-mail messages. In general, LI is a security process in which a network
operator or service provider gives law enforcement officials access to the
communications of private individuals or organizations. Countries around the
world are drafting and enacting laws to regulate lawful interception
procedures; standardization groups are creating LI technology specifications (lawful interception).
Mind Control The most insidious threat to
our basic freedoms, such as freedom of mind and freedom of speech, is a
little-known phenomenon known as mind control. As used by FACTNet, “mind
control” refers to all coercive psychological systems, such as brainwashing,
thought reform, and coercive persuasion. Mind control is the shaping of a person’s
attitudes, beliefs, and personality without the person’s knowledge or consent.
Mind control employs deceptive and surreptitious manipulation, usually in a
group setting, for the financial or political profit of the manipulator. Mind
control works by gradually exerting increasing control over individuals through
a variety techniques, such as excessive repetition of routine activities,
intense humiliation, or sleep deprivation (FACTNet).
MISO The U.S. Special Operations Command,
which, by law, is the executive agency for psychological operations, or
“PSYOPs,” decided that a name change was in order: Operations aimed at
influencing the emotions of people outside the United States would now be known as
“Military Information Support Operations.” When the name change was first
proposed, it took a millisecond for the thousands of active psychological
operations officers and noncommissioned officers to deride the new acronym.
“MISO” (Psychological Operations Get a New Name).
MK-ULTRA or Project MKULTRA was the code
name for a covert, illegal CIA human research program, run by the Office of
Scientific Intelligence. This official U.S.
government program began in the early 1950s, continuing at least through the
late 1960s, and it used U.S.
and Canadian citizens as its test subjects. The published evidence indicates
that Project MKULTRA involved the use of many methodologies to manipulate
individual mental states and alter brain functions, including the surreptitious
administration of drugs and other chemicals, sensory deprivation, isolation,
and verbal and sexual abuse (Wikipedia).
Mobbing can be understood as the stressor
to beat all stressors. It is an impassioned, collective campaign by co-workers
to exclude, punish, and humiliate a targeted worker. Initiated most often by a
person in a position of power or influence, mobbing is a desperate urge to
crush and eliminate the target. The urge travels through the workplace like a
virus, infecting one person after another. The target comes to be viewed as
absolutely abhorrent, with no redeeming qualities, outside the circle of
acceptance and respectability, deserving only of contempt. As the campaign
proceeds, a steadily larger range of hostile ploys and communications comes to
be seen as legitimate (Introduction To Workplace Mobbing).
Monarch Programming - This was a specific
Project carried out by secret elements of the U.S. government and intelligence
groups. There were, according to someone a few years ago who had access to the
computer(s) which contains all the names of active monitored human slaves,
40,000 actively monitored Monarch slaves. However, this book uses the term
generically to include all victims who have suffered this type of trauma-based
mind-control. In the same way, that a brand name like “Hyster” is used to
describe all lifts–when we use the term we use it in its broadest sense. This
is the only way it can be used and technically correct, because as of this
date, the authors have not seen who is on the active Monarch Program list of
slaves. (The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
The Nazi Pig Theorem (NPT) Anyone who
nonconsensually violates your brain/mind/mentation using Mengele-like methods
is a Nazi pig. You do not care what a Nazi pig thinks. You do not care a Nazi
pig’s opinions. You do not respond to a Nazi pig ridiculing you, threatening
you, trying to distract you, or otherwise trying to manipulate you. You work to
get a Nazi pig hanged (Mental Firewalls).
New World Order or NWO The phrase New World
Order is a probable mistranslation of novus ordo seclorum (which literally
means “new secular order” in Latin), part of the seal of the United States .
The actual phrase “New World Order” was used by George Herbert Walker Bush in
the context of post-Cold-War politics (sourcewatch.org). Also: The New
World Order is the global design for a One-World-Government One-World-Dictator
and its constituents. Insiders call themselves the “network” and “the neighborhood.”
(The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
Neuro-monitoring or Intra-Operative
Neurophysiological Monitoring (IONM) Intraoperative neurophysiological
monitoring (IONM) or intraoperative neuromonitoring is the use of
electrophysiological methods such as electroencephalography (EEG),
electromyography (EMG), and evoked potentials to monitor the functional integrity
of certain neural structures (e.g., parts of the brain, spinal cord and
peripheral nerves) during surgery. The purpose of IONM is to reduce the risk to
the patient of iatrogenic damage to the nervous system, and/or to provide
functional guidance to the surgeon and anesthesiologist (Wikipedia).
Noise Campaign is an orchestrated effort to
produce stress in a victim through prolonged exposure to significant noise levels.
A Noise Campaign can range from multiple neighbors routinely playing loud
music, individual stalkers with air-horns or fireworks, or organized “repair
work” that involves a high level of noise (myspace.com).
Nonpersonis a citizen or a member of a
group who lacks, loses, or is forcibly denied social or legal status,
especially basic human rights, or who effectively ceases to have a record of
their existence within a society (damnatio memoriae), from a point of view of
traceability, documentation, or existence. The term also refers to people whose
death is unverifiable and about which inquiries result in a “blank wall” of
“nobody knows” (Wikipedia).
ORATORY – Speech recognition. Think of it
as speech-to-text software. Subject to DICTIONARY searches.
Organized Stalking is the preferred term
for that portion of the full crime of organized stalking and electronic
harassment where people who live in the community will mercilessly harass a
designated target, based on LIES, such as the target is a drug dealer, the
target has a long criminal record, or the favourite lie, the target is a
pedophile (raven1).
Perps are perpetrators of the organized
stalking and electronic harassment crimes (raven1).
Perpetrator a person who does something
harmful or dishonest, especially a person who commits a crime (Law-Glossary).
PGP – Free and unbreakable encryption,
available world-wide.
Propaganda is a form of communication that
is aimed at influencing the attitude of a community toward some cause or
position. As opposed to impartially providing information, propaganda, in its
most basic sense, presents information primarily to influence an audience.
Propaganda often presents facts selectively (thus possibly lying by omission)
to encourage a particular synthesis, or uses loaded messages to produce an
emotional rather than rational response to the information presented. The
desired result is a change of the attitude toward the subject in the target
audience to further a political agenda. Propaganda can be used as a form of
political warfare. Common media for transmitting propaganda messages include
news reports, government reports, historical revision, junk science, books,
leaflets, movies, radio, television, and posters (Wikipedia).
Psychotronic weapons remain, at least for a
layman uninformed of secret military research, in the sphere of science
fiction, since so far none of the published scientific experiments was
presented in the way which would allow for its replication. That it is feasible
to manipulate human behavior with the use of subliminal, either sound or
visual, messages is now generally known. This is why in most of the countries
the use of such technologies, without consent of the user, is banned. Devices
using light for the stimulation of the brain show another way how the light
flashing in certain frequencies could be used for the manipulation of human
psychic life. As for the sound, a report on the device transmitting a beam of
sound waves, which can hear only persons at whom the beam of sound waves is
targeted, appeared last year in the world newspapers (bibliotecapleyades.net).
PSYWAR or PSYOP Psychological warfare
(PSYWAR), or the basic aspects of modern psychological operations (PSYOP), have
been known by many other names or terms, including Psy Ops, Political Warfare,
“Hearts and Minds,” and Propaganda.[1] Various techniques are used, by any set
of groups, and aimed to influence a target audience’s value systems, belief
systems, emotions, motives, reasoning, or behavior. It is used to induce
confessions or reinforce attitudes and behaviors favorable to the originator’s
objectives, and are sometimes combined with black operations or false flag
tactics. Target audiences can be governments, organizations, groups, and
individuals (Wikipedia: Psychological warfare).
Satanic Ritual Abuse (SRA) -This is used to
represent all categories of ritual abuse which would be inspired by the desire
to rob, kill, or destroy something worthwhile in a person, especially their
freedom of thought. Many groups carrying out SRA do not mention Satan by that
name. They may make Pacts to Baphomet, and call upon Rex Mundi, or Belair, or
Lucifer, or the Father of Light, God, or Kali or even “Jesus” or “Jesus
Christ”. SRA is not a value judgment by the authors against some group, the
victims themselves on some level know that he or she is being abused. (The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
Sensitization is an example of
non-associative learning in which the progressive amplification of a response
follows repeated administrations of a stimulus. An everyday example of this
mechanism is the repeated tonic stimulation of peripheral nerves that will
occur if a person rubs his arm continuously. After a while, this stimulation
will create a warm sensation that will eventually turn painful. The pain is the
result of the progressively amplified synaptic response of the peripheral
nerves warning the person that the stimulation is harmful. Sensitization is
thought to underlie both adaptive as well as maladaptive learning processes in
the organism (Wikipedia).
SIGINT – Signals Intelligence = NSA =
electronic snooping
Skin effect is the tendency of an
alternating electric current (AC) to distribute itself within a conductor with
the current density being largest near the surface of the conductor, decreasing
at greater depths. In other words, the electric current flows mainly at the
“skin” of the conductor, at an average depth called the skin depth. The skin
effect causes the effective resistance of the conductor to increase at higher
frequencies where the skin depth is smaller, thus reducing the effective
cross-section of the conductor. The skin effect is due to opposing eddy
currents induced by the changing magnetic field resulting from the alternating
current. At 60 Hz in copper, the skin depth is about 8.5 mm. At high
frequencies the skin depth may be much smaller. Increased AC resistance due to
the skin effect can be mitigated by using specially woven litz wire. Because
the interior of a large conductor carries so little of the current, tubular
conductors such as pipe can be used to save weight and cost (Wikipedia).
Sleep Deprivation The forced deprivation of
someone’s necessary amount of sleep has been used in the interrogation of
terrorist suspects to make them more amenable to providing information or
confessions. There is some debate about whether sleep deprivation is a form of
torture or one of a number of “stress and duress” techniques, and thus whether
it is a legal and ethically acceptable in interrogation. According to the
United Nations, sleep deprivation is a form of torture. The effects of sleep
deprivation range from irritability, confusion and a decreased ability to
concentrate, to loss of consciousness resulting from the failure of red blood
cells to transport oxygen to the brain (Sleep Deprivation).
Stalking is a term commonly used to refer
to unwanted, obsessive attention by individuals (and sometimes groups of
people) to others. Stalking behaviors are related to harassment and
intimidation. The word “stalking” is used, with some differing meanings, in
psychology and psychiatry and also in some legal jurisdictions as a term for a
criminal offense. It may also be used to refer to criminal offences or civil
wrongs that include conduct which some people consider to be stalking, such as
those described in law as “harassment” or similar terms (Wikipedia).
Street Theater when spoken of in an
organized stalking context refers to carefully scripted harassment by neighbours
and strangers especially, but can include harassment by family, friends and
co-workers. These acts are designed to keep a target at a high stress level,
and are crafted so that outside observers are likely to wave the skits off as
“life’s normal breaks”. The cumulative effect of such acts can be crushing to
sensitive targets. Noise, crowding in person or on the highway, stealing items
from shopping cart when in the checkout line, and kids sent to hang out in
front of, stare, make noise, and even throw tennis balls against the target’s
house are simple examples. What differentiates street theater from “the breaks”
is that street theater goes on every day, often by different mind control
operatives, far too often to be random or “natural”. Cover is provided by the
tendency of people to refuse to acknowledge the frequency of these acts and
consider the complainer just being “a crank” (raven1).
Switching - This is when one part
(fragment) of the mind takes over from another, or in simple terms, this is
when one alter personality (or alter fragment) takes the body from the alter
which is holding the body. Switching can occur via the Programmers’ codes for
calling up alters, or by external or internal stimuli that trigger an alter to
come out. Switching will usually cause at least a flicker of the eyes, and for
outside observers, who know the different personalities, they will observe
another personality take the body. (The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
System - This term is used in several ways.
It is frequently used to refer to a victim of total mind control because the
victim consists of alters, programming, implant(s), internal computers, and
numerous dissociative states which function together as a system. The word is
also used in this book to refer to the body’s functional physiological units,
such as the respiratory system. The word is also infrequently used to denote
the established social-economic-political system controlling the world, also
known insiders as the Network. Other standard meaning may also occasionally be
used for the word. (The Illuminati Formula Used to Create an Undetectable Total
Mind Controlled Slave)
Targeted Individuals a department of
defence term, are people who locals deem unfit for society, in one way or
another. Some are whistle-blowers; some are dissidents, like anti-war
demonstrators; some have a beef with one corporation or another; some just have
different political or religious ideologies then the norm; some are targeted
for reasons of lust and greed, and some are targets of convenience. They are
targeted by means of gang-stalking, b & e’s, harassment, poisonings
(biological and/or chemical), remote electronic harassment (messing with radios
and tv’s, etc., remotely), vandalism, character assassinations, staged
accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted
Individuals).
TI or Targeted Individual is an individual
who has been placed into a maze of psychological and often physical warfare
tactics which is orchestrated by the U.S. military, C.I.A. and federal
law enforcement. From community harassment known as “Organized Stalking” and
various other invasion of privacy tactics and violations of basic
constitutional rights to invisible, silent physical torture through the use of
highly targeted overexposure to electromagnetic radiation (Targeted Individuals – And The C.I.A.).
Targeted killing is the targeting and
killing, by a government or its agents, of a civilian or “unlawful combatant”
taking a direct part in hostilities in the context of an armed conflict who is
not in that government’s custody and cannot be reasonably apprehended.[1] The
target is a person taking part in an armed conflict or terrorism, whether by
bearing arms or otherwise, who has thereby lost the immunity from being
targeted that they would otherwise have under the Geneva Conventions.[1]
Targeted killing has been used by governments around the world, and has become
a frequent tactic of the United States and Israel in their fight against
terrorism (Wikipedia).
Torture means any act or omission by which
severe pain or suffering, whether physical or mental, is intentionally inflicted
on a person (a) for a purpose including (i) obtaining from the person or from a
third person information or a statement, (ii) punishing the person for an act
that the person or a third person has committed or is suspected of having
committed, and (iii) intimidating or coercing the person or a third person, or
(b) for any reason based on discrimination of any kind, but does not include
any act or omission arising only from, inherent in or incidental to lawful
sanctions (Criminal Code).
UKUSA - pronounced ‘you-koo-za’ – a secret
wartime treaty that says member nations can spy on each others population
without warrants or limits, and that this can be shared with the spied-on
country’s SIGINT agency
Ultra-secret agencies: NSA
– U.S. National Security Agency; GCHQ – British Government
Communications Headquarters; CSE – Canada’s Communications
Security Establishment; DSD – Australian Defense Signals
Directorate; GCSB – New Zealand’s Government Communications
Security Bureau
Walter Bowart on DSM-IV: ”…Look at the
DSM-IV [Psychiatric Diagnostic Manual. It] is strongly influenced by the
insurance companies and people having no experience in the richness of the
human mind and spirit. That’s one of the things that the MK-Ultra victims
taught me. Over and over I heard the phrase, “They didn’t mess with my mind;
they messed with my soul.” I’ve begun to think in spiritual terms of what has
gone on here. This is a horrible thing. [It is] just like the Inquisition, but
more sophisticated and less visible. There’s no blood on the streets, but that
makes it even more insidious. And of course the technology is now available to
everyone…” (Walter Bowart interview)
Vengeance/Terrorist Stalkers do not seek a
personal relationship with their targets. Rather, vengeance/terrorist stalkers
attempt to elicit a particular response or a change of behavior from their
victims. When vengeance is their prime motive, stalkers seek only to punish
their victims for some wrong they perceive the victim has visited upon them. In
other words, they use stalking as a means to “get even” with their enemies (Organized Stalking by Groups – FAQ).
Victimization or victimisation is the
process of being victimised. According to Wiktionary, to victimise is to (1)
make someone a victim or sacrifice (2) punish someone unjustly, or (3) swindle
or defraud someone (Wikipedia).
Voice to Skull devices or V2K is a
nonlethal weapon which includes (1) a neuro-electromagnetic device which uses
microwave transmission of sound into the skull of persons or animals by way of
pulse-modulated microwave radiation; and (2) a silent sound device which can
transmit sound into the skull of person or animals. NOTE: The sound modulation
may be voice or audio subliminal messages. One application of V2K is use as an
electronic scarecrow to frighten birds in the vicinity of airports (fas.org).
Workplace Bullying is repeated, health-harming
mistreatment of one or more persons (the targets) by one or more perpetrators
that takes one or more of the following forms: Verbal abuse; Offensive
conduct/behaviors (including nonverbal) which are threatening, humiliating, or
intimidating; Work interference:sabotage which prevents work from getting done
(Definition of Workplace Bullying).
defining a crime and finding solutions
·
Home
·
About
Gang Stalking / Organised Psychological Harassment poisoning,
spying, and destroying lives
Presented here is, from my own point of view, the most
accurate description of ‘what is going on with this ‘gang stalking thing ‘. No one seems to
understand how these strange harassments happen, and no one is able to believe
any reasons as to why they happen.In the text below, presented to Gang Stalking
World, as an annonymous post, we can see how an enterprise has eveloved, one
that is criminal, and has brought organised crime and the common critizenry
together. Deceit, fabrication, threat, and technology seem to have made such a
union possible. Adding that such a union aims to destroy innocent people’s
lives, if not bring them to their deaths.What is most disturbing in the text
below, is the salient argument standing out in the first paragraphs, that
states that gang stalking is primarily about poisoning, drugging, and attempting to chemically
inducing psychotic-like symptoms in the targets of this crime, and contaminate
their physical health.Evidence, to support such, through individual accounts
are not necessarily mounting, but from my own personal experience with this
terror/gang stalking phenomena, as well as from what I have gathered by
researching this, the more equipped and modern these groups are, the more money
that has been thrown at them, the more they are apt to use highly covert
fumigations, poisonings, and daily incrimental druggings, in their effort to
cause undue suffering and pain for someone they have been hired to target.
I have edited the piece of writing below, hopefully
highlighting points of importance.
“If you have not been or are not being poisoned and/or
drugged, you are not being “gangstalked” . “Gangstalking” is described on some
websites as a bunch of people “just” following you around doing strange skits.
That would just be annoying compared to what it really is. Although it might be
possible that victims are not aware of where their “symptoms” are coming from.
I thought I was physically ill at first, but then began to see a relationship
between my “illnesses” and what can only be described as felony
assaults……………..”
annonymous post from
Full post here:
”
“Gangstalking” is a “catchphrase” name….
……describing what has become a part of traditional and new
organized crime that is networking through the United States and some other
countries.
Organized
crime groups
……and “criminal elements” from all walks of life use or hire
for pay, criminal organized stalking crews to assault “targets” to cover up
financial or other crimes.
These criminals
“contract” with the covert organized assault crews:
·
to silence any potential witness
or “trouble maker”, whether real or imagined, that could possibly effect their
lives.
·
“contract” / “assault squad” to discredit and
silence …………using their criminal “gas-lighting” methods.
These “organized
criminal crews“ assault
·
[victim’s] family, friends, neighbors and many
people in community.
There is always a reason someone is targeted
and most will know why and who started it, but apparently:
·
some victims never know what happened to them,
why it is happening or who “triggered” the overwhelming assault.
This is probably because the “trigger event” was irrelevant
and meant nothing to the victim, but was perceived as possibly damaging by the
criminal(s) involved.
The victim
·
could have “upset” somebody
·
and now that person simply wants revenge.
I would see that as a waste of time, thought and money, but
I guess some people could be “just that way”. I’ve seen estimates of the number
of victims of this type of crime, but nothing I consider credible.
One victim is
too many
I wouldn’t even try to guess how many career criminals
participate in this. It can’t be many as compared to general populations.
A VERY
LUCRETIVE ENTERPRISE
This is a very lucrative criminal enterprise
for many of the perp[etrator]s.
·
People considered important to the success of a
“hit” are offered large “bribes” to become a perp and start “working” the
victim.
ADVANCED
COMMUNICATIONS
Advanced communications such as the internet,
cellphones and voice over internet protocol:
·
have accelerated the growth and networking of
these organized criminal groups.
Their day to day stalking activities depend on these same
technologies plus:
·
gps and other hi-tech
devices…..
·
electronic spy
·
harassment equipment.
Law enforcement agencies are aware of these
criminal groups and are gathering information on them.
I have not read about a “targeted individual” that would
have believed this could happen to anyone, had they not become a victim
themselves.
These criminal stalking groups go to extreme lengths
to cover every aspect of their “covert” operations. They try to have a
plausible explanation for everything.
The crimes they commit are well planned and easy to
do but easily deniable.
WELL PLANNED
·
A victim might see many work projects
in the area, small or large, constant maintenance all around the neighborhood
involving new workers you have never seen before. Endless traffic of all
descriptions.
·
Mobbing activities near your home,
on the highway, in stores and on the street. These are mostly perp[etrator]s or
all perps in some cases. They will always have a ready made reason to be where
they are before they are dispatched.
PIOSONING AND
DRUGGING
If you have not been
or are not being poisoned and/or drugged, you are not being
“gangstalked”.
”Gangstalking” is described on some
websites as a bunch of people “just” following you around doing strange skits.
That would just be annoying compared to what it really is.
Although it might be possible that victims are not aware
of where their “symptoms” are coming from. I thought I was physically ill at
first, but then began to see a relationship between my
“illnesses” and what can only be described as felony assaults.
The mental
and physical effects described by most targets are achieved by:
covert
poisoning
·
using more or less common
neruo-interrupters (organic phosphate pesticides),
·
psychotomimetic agents (drugs)
·
and irritants.
Some of these chemicals are mixed when
needed with additives to make them behave in desired ways.
Some are intended to absorb through the skin and
others are intended to out-gas. They are not all used in all the
described ways.
Some, what I will call irritants, are
sprayed on the target and act locally on the skin or spread out slowly
with various affects.
One perp[etrator]s will divert your attention while
another one sprays from a “breath spray” size can on bare skin behind or where
you won’t notice. They always make a noise like clearing their throat so you
won’t hear the sound. I caught them doing this too.
Some drugs are mixed with dispersant’s to make them out-gas.
These are squirted at or near an isolated target using covert methods. In
remote places where possible, constant “Area gassing” is done
from neighboring houses.
The perp[etrator]s spent a couple days at my
neighbors installing the devices they use to disperse their chemicals.
I’m sure they are well hidden but I know I can find them.
These house devices have been refilled on a regular basis
since they were installed.
Passing cars/trucks with an electric squirting
device are being used, each squirting an out-gassing mixture as they
pass by.
These were almost constant for several years and are
still coming. On the road perps will squirt “out gassing” mixtures
from the backs or fronts of their cars/trucks at your car/truck. When they can
get away with it perps even do this while walking past in order to gas the
target.
The chemicals will out-gas quickly or slowly
depending on their intended use.
The most dangerous assault is the direct assault
from a car/truck that has an electrically powered high pressure squirting
device behind the grill. These usually squirt pesticide
that is intended to stay put and absorb through the skin.
This attack can penetrate thick clothing and
is usually done in a parking lot or anywhere they can get close to you in a
car.
Be aware of cars pausing near you or “aiming”
at you in parking lots. Individual perps on foot will work their way behind you
and squirt your lower back using various covert “rigs”. This is what I first
caught one of them doing.
The chemicals can be administered by “flipped”
coworkers, neighbors, friends, family, local strangers and old or new
professional (paid) perps.
Neuro-interrupters
have a cumulative effect
·
With successive poisonings there is a gradual
decrease in cognitive functioning whidh is what is intended by the perps. I
read an account of one victim who had been poisoned to the point that he could
no longer speak.
A perp[etrator]s will always wait close by to
observe the condition of the victim after assaults.
The protection against this is waterproof or impermeable
clothing or any barrier that will block what is essentially a “high-tech squirt
gun” If the victim fails to protect themselves, they will go down as a result
of these assaults.
Some
psyhcotomimetic agents
·
usually LSD
or similar will be applied to surfaces the victim will ordinarily
touch, door handles, cabinet drawers, any place in their home, car and places
at work.
·
Daily vitamins, coffee, shampoo or
anything used or consumed on a daily basis is a potential
contamination target, especially single use items.
·
In the home milk is often
contaminated with OP pesticide.
It is obvious if put in any clear liquid because the liquid
becomes cloudy. Gloves and clothing might be turned inside out and “treated”.
Time to change your cloths, don’t forget to shower.
The perps will start slowly, only contaminating a single
item or items they have control over so no evidence will remain in case law
enforcement investigates. After they believe they have compromised the victims
credibility they will become more active and aggressive with contamination and
all other aspects of the “organized assault”.
The following as
well as this entire scam may take place over the course of many years.
COMMUNITY
INFILTRATION AND INFLUENCE
·
Co-workers, neighbors, friends, family,
law enforcement and the general public are told planned, consistent lies about
the victim/target.
·
This will start with law enforcement long before
the actual assaults begin.
They do this to “set up” the target, hoping law
enforcement will believe their lies and ignore the victim when they
first report this crime.
Perp[etrator]s may show a bogus “investigation” file
or flash fake badges in the community as part of the scam.
HIRED LOCAL
LAWYERS PRIVATE INVESTIGATORS
·
Perps might hire local lawyers and
private investigators in a ruse to “legitimize” the scam.
·
Later the perps will report crimes or
trip alarms in the area so the police will have to drive by the target’s house.
This is to make the target believe the police are part of
the stalking. They will also pull fake fire alarms for the same purpose.
Ongoing
double assault
·
While “working” this chemical attack,
the perps perform “street theater” around the target.
They hope the poisoned/drugged target will panic,
then report and try to describe these bizarre “skits” to law enforcement.
The goal is to :
·
create poison and drug induced psychotic
episodes, paranoia, and actions that could (the perps will say) appear
to be schizophrenic (only if you are not educated about schizophrenia would you
believe this).
The perps often launch large drug assaults against a
target in public. If the target is effected enough they will report or
encourage a bystander to report the target to law enforcement, saying the
target is schizophrenic, crazy or psychotic.
Some of the perp[etrator]s are bold enough to say
the cops do what they have them do, indicating the perps are making
“fools” of and are smarter than law enforcement and the targets. Many in law
enforcement are aware of perp stalker tactics now and they would like nothing
better than to bust this criminal enterprise or anyone in it.
People in
Community Tricked or coned
·
Some people in the community are tricked
or coned into participating. They are told clever lies about the
target
·
They may even be deluded into thinking
they are doing a “community service“.
If they knew the truth of what they were
involving themselves with they would not cooperate willingly.
·
Others accept money or other forms of
compensation.
·
Many who know or are close to the target
are forced to take part in this criminal scam, it’s essentially “the
offer they can’t refuse“.
·
Some are set up for various crimes and
blackmailed, or blackmailed for any existing secrets they want to keep
from co-workers, family, friends or the community at large.
Those close to the target that resist are threatened
and poisoned using these same methods until they obey.
·
After they are “flipped”
they are “coached” by these criminals in their “methods”
of assault and supplied with “covert equipment”
to topically spray or squirt these chemicals on or around the target or
in their food or drink.
·
This will be done at every opportunity
at the target’s home (at night to wake you up) or away, on foot or in
the car.
TECHNOLOGY/WATCHING/PRIVACY
INVASION
CONFUSING THE
VICTIM
Anywhere the target is or goes the perps will work
together, using surveillance, advanced communications, stealth
and simple diversionary tactics to draw the target into position for
an assault that will not be detected by the general public.
·
The perps have their own websites and
“shills” to spread mis-information and dis-information
on the internet.
·
Some pose as support for victims trying
to disrupt the actions of those who are really trying to help victims. There
are perps posing as victims.
These perps post intentionally “crazy
sounding” accounts describing bogus “satellite attacks“
or “advanced electronic weapons” and the ever popular
“mind control” which they stretch way beyond anyone’s imagination.
They want to frighten and confuse real victims
with a mix of real and bogus information that they hope will be believed and
repeated by victims.
These “posers” also try to befriend real targets to gain
information to launch yet another attack.
They also will tell targets things like “get out and live
your life”. What they really mean is “come out where we can get a clear shot at
you”.
I read one victims account that said they knew the man
that started their stalking and that the man had a reward poster with the
victim’s picture in a target on his office wall. I think the vic said the offer
was $25,000. If you’re a target, that will make you think, won’t it. Some
credible sounding things about this I read on the internet are gone now, disappeared.
I like to think I just can’t find them, even though that probably isn’t the
case.
CYBERSTALKING
Cyberstalking,
everybody knows what that is or can look it up. Just like all the things these
guys do it’s pretty much “business as usual”.
·
They take the information they have
gathered about the target and present it in a way that is supposed to make the
victim wonder “How did that stranger know that“?
It’s the same “directed conversation” stuff
they do to targets at stores and on the street.
Well, the internet is a big place and you don’t have to
go where people get their “jollies” jerking you around. As a matter of fact you
don’t have to go there at all except maybe to do a little business now and
then. And you don’t have to share your thoughts or business on the phone or out
loud. You don’t have to provide them with information to use against you.
When you have to speak around perps, use only the
words you need. If you don’t talk unless needed the perps will just
have to wonder what you are thinking.
REALITY OF
POISONING CLOAKED WITH MISINFORMATION
Common
symptoms (use search engine) of the afore described poisons are
attributed to the bogus “secret weapons“. “Electromagnetic
weapons” of sorts are real but I have been unable to verify or find
credible information on any existing “electromagnetic weapons” as they are
described in this strange “internet chasm”.
·
Also some of the symptoms described
could be attributed to simple harassment electronics and some of the “itching”
or “burning” powders that the perps sprinkle in target’s beds.
·
They will contaminate your bed with
various drugs in an attempt to make you “freak out” while trying to sleep.
GUARDING
AGAINST ILLEGAL ENTRY
·
Keep the perp[etrator]s out of your home.
·
The perps might be able to open any lock that
uses a key.
·
That leaves some type of combination only lock.
·
If you can afford one or more, install them and
learn how to change the combination.
·
Disable all other entry lock key slots with
water soluble wood glue, it can be removed later. Secure all windows.
·
At least know if they were inside.
VIDEO CAMERAS
·Video
cameras anywhere, outside or inside are a good thing to slow the perps down or
keep them away if done correctly.
·Your own
well hidden cameras or listening equipment inside might keep them out.
POWDERED
PROMOTION OF ASTHMA
The perps
also use powders that will cause an asthma-like attack.
Don’t panic, an inhaler will stop it or it will go away soon
after you have gotten away from the source.
SIMPLE
ELECTRONIC/PROMOTING EAR RINGING
·
The perps will use amplified high
frequency (above human hearing, kind of like a high powered
electronic dog whistle) transducers (speakers) to
make your ears ring.
·
These can be purchased but it’s fairly easy to
build a big one with adjustable volume/range.
I have seen this “ear ringing” as well as “body
vibrations” associated with the non-existent “satellite weapon” attack. The
“satellite to earthbound human attack” is still science fiction at this
writing. And perps can purchase transducers of the type used in industrial
sonic baths and mechanically fix them with screws to floor joists or wall studs
underneath repaired drywall, completely hidden from view of normal inspection.
The transducers will make your floors vibrate and probably create heat.
They spend a lot of time hiding their stuff in houses or apartments so it won’t
be found under simple visual inspection. If somebody really decides to start
looking they *will* start finding these things. These tactics are part of the
never ending “smoke and mirrors” routine. Apparently the perps get a “charge”
out of inducing false perceptions.
MISINFORMATION
SUMMARY
This
“con-artist information attack” is intended to further psychologically
terrify the victims hoping they will react as if “crazy“.
After all, that is what it’s all about.
·
If the victim fails to protect
themselves they have already been poisoned and drugged to what the
perps hope is an “excited” state of reduced cognitive
ability.
·
At this point in time the victim is
usually attacked by the criminal’s very real covert weapon.
This is most often done at night because it can be effective
at waking you up and keeping you awake. It might also be hard to hide or get
away with in the daytime because of sound, size, location, etc.
This weapon was originally developed as a crowd control
device by a company called Scientific Applications & Research Associates
Inc. of Huntington Beach .
It is an acoustic/sonic weapon that will make internal organs resonate.
These effects have been described by victims of these
assaults.
The weapon I have seen in video demonstration is based
on a combustion chamber that releases multiple ignited fuel charges through a
wave guide to produce directional “very low frequency” (below human hearing)
waves. These waves at the time were hard to control over distance as a beam but
as used it probably doesn’t matter that much. This would most likely be used on
a detached house. There are electrical versions of these weapons that use
transducers that could be used from shorter ranges such as adjacent apartments
in an apartment building. The electrical versions I read about required a very
large amount power, were large and only managed a short pluse before needing
recharging. These weapons could be greatly improved by now as far as size and
power are concerned. The fuel combustion type I saw could be carried by one
man. These weapons have undergone some military testing and are not really a
secret, but I haven’t been able to find current up to date information (for an
old 1997 story, search – U.S.News Wonder Weapons by Douglas Pasternak).
TELECOMMUNICATIONS/BUGS
·
Almost all victims are aware their phone
and computer are “tapped” or will be.
Information is gathered from every
possible source in order to “custom tailor” the many various assaults and
“street theater” to the individual.
·
This surveillance information is used and
intended to give the target the impression of an “all knowing”, “Orwellian” or
“big brother” type of situation.
·
Some are not aware that using a “hard
wire tap” (cutting the wire and inserting a computer interface) that
the perps can use computer software to digitally edit your call on the
fly.
·
They try to illicit angry responses from
victims through constant harassing phone calls or even harassing
in public.
·
They digitally record these and clean
them up for later use.
Then when you call someone, usually a service that records
calls like a telephone company or maybe even 911, they will :
·
cut you off after a completed sentence and
seamlessly insert an out of context angry, ranting remark you justifiably made
at another place and time.
The more “crazy” it sounds the better.
I can just imagine how they laugh after one of these edits.
They can also use :
·
this method to create false recorded
conversations to turn people you know or others against you.
Imagine they record a public conversation
at a store checkout counter and someone asks about a person you know.
·
You say only good things about
this person.
·
Later in another conversation they ask
you about Osama Bin Laden and you say everything but good things. The
perps simply switch a few sentences around and clean it up some.
·
They have what they want and it is much easier
than altering a photograph using “photoshop” and almost impossible to detect.
TINY CAMERAS
COLLECT VICTIMS EVERY MOVE
Let’s talk about “covert”
(as if anything is not covert) cameras in or around your home.
I have gathered information that indicates that
live video of targets in their homes or while being stalked might be
“entertainment” content for an internet
website or sites run by the perps.
What would really be bizarre is if some people were
paying to view this stuff. It is at least viewed constantly by your local perp.
You might even be appearing in “The Best of (insert your perp given TI name
here)” video of the week. Your pictures and “perp created profile” are possibly
on a website for all “perp-ville” to view. Manufactured fictitious information
disseminated to all who have the perp web address or it could be passed out in
“hard copy”.
Audio
bugging?
You bet, they’ll do it
if they can and they can.
And just a note here,
·
hiring somebody to do a “bug scan” is useless.
·
It’s a highly specialized field that takes an
experienced expert and any of them worth anything will tell you it has to be
done completely covertly because good bugs can just be turned off while a scan
is in progress.
I’m sure the perps “just might” know the guy is coming
because they already have *you* under surveillance.
If you used your phone for contact that is a fore gone
conclusion.
If the bug is in an adjacent apartment, of course they will
just turn it off.
And if it is a hardwired bug there won’t be a signal to pick
up anyway.
If the perps can’t get inside to “bug” your home they might
use laser to window, a parabolic or shotgun mic.
You won’t catch them doing any of those, it’s not impossible
to catch them, just highly improbable.
One thing about this scam is that they need to hear your
business to work the scam “by the book”.
They can’t do any “directed conversations” anywhere without
this information and it’s harder to set up “mobbing” and coordinate “moving
surveillance” when they have to guess where you are going.
Outside anybody can pick up voice easily from a safe
distance using a parabolic or shotgun mic.
The conclusion is it’s ok to look every now and then for
covert cameras or bugs yourself after a little schooling on the subject, but
don’t expect to find anything because you probably won’t.
And don’t worry about it, just go about your business. You
can figure out If perps are repeating things you said over the phone or
something you said out loud in your house or apartment. Where did you say what
they repeated? You have control over what you say and where you say it.
CALL
REDIRECTION LANDLINES CELL
Don’t forget
about call re-direction on landlines and cell phones.
·
Know who you are talking to.
·
Do you think you called and talked to someone in
law enforcement?
·
Maybe you did, maybe you didn’t.
·
Redirecting calls you try to make to law
enforcement is something the perps do.
·
They will pretend to be a law enforcement
officer and tell you there is nothing that they can do to help.
·
And they will make suggestive remarks about your
sanity or reputation. They may refer you to another bogus “officer” to “work”
you again.
·
Always get the name and badge number of officers
you speak with over the phone.
·
Always identify/verify anyone you speak with
over the phone.
·
If you suspect your phone is
tapped/intercepted/redirected, and if you are being “gangstalked” it will be,
don’t use it.
·
You can use a random pay phone if you have to.
All victims
should report this as soon as they can do so in a reasonable manner. It
will never be stopped if nobody ever reports it.
REPORTING
THIS CRIME
When you report this crime:
1.
ALWAYS go in person with well planned information you
have compiled including a journal, video, audio, perp names and anything else
you can get.
2.
If you have been “gangstalked” for a long period of
time and you don’t have any “evidence” of any kind, just what have you been
doing all this time?
3.
Be organized and complete but brief.
4.
Don’t elaborate on unimportant every day details you
cain’t prove anyway. Don’t go into “gaslighting” details, all the particulars
are not important.
5.
You don’t have to file a complaint against anyone, you
are only providing information about a crime.
6.
Don’t tell anyone you are going to do this.
7.
If the perps know, there may be a “parade” of them
lining up to give you the “treatment” all the way there and even into the law
enforcement building.
8.
Be prepared to do this at any time and when you think
the time is right deviate from your normal routine and do it.
You can even make practice runs to check logistics, such
as where to park, where to go when inside the building, are there surveillance
cameras (big plus) in the parking lot or building. Any test run will also test
the Perps reaction. Going by there a few times to learn the area roads won’t be
noticed by anyone but the perps.
SOUND
DIFFUSSION, BUGS AND TAPS
·
While at home you can leave the radio or
other sounds going all the time to disrupt the perps probable recording
activities on some levels. It’s very hard to separate the multiple
sounds and I’m not sure that it would end up good enough for their purpose.
The perps don’t have to get into your home to install a “hook
switch” or “infinity device“.
·
It’s a type of phone tap that after the phone is
answered manually or by a machine, the switch on the microphone of the
“tapped” phone is “hooked” and remains on after hanging up.
·
It becomes an effective listening device
that can easily pick up conversations in an average size room.
·
This device can be installed
anywhere on the phone line between your phone and the local central office. It
would usually be fairly close to your home or in your apartment building.
·
It can be called and activated for
listening from any phone anywhere in the world.
For some, I guess obvious reason, the perps like using
these. They can be defeated after a call by unplugging the receiver, the phone
or installing an off switch on the phone microphone.
Secure phones that turn off the microphone
automatically are available but are expensive considering what little
is involved.
·
The perps can also sign you up for gps
tracking too, they only need a moment with your cellphone to
enter a code and you will be just like “one of their children”, tracked
everywhere you go with the phone on.
They will use your email or their own to verify the
gps account.
If you haven’t already, don’t leave your cell phone
anywhere unattended.
If they get your number, which is easy, they will
monitor and can redirect/edit your cell phone calls using what is known as a
portable base station.
Scanners are used too but are less effective and only for
listening anyway. They have or can get all the latest electronics that can be
had by anyone.
Always use an ssh2 encrypted stateside vpn
service for internet.
Don’t use a server offshore that skirts the law, if
a perp does something illegal you want them to be caught.
If you can find a vpn anywhere that is or is said to be a
government “honey pot” for cybercrooks, that is definitely the one you want to
use.
These perps will work to shut down servers using
their bot-nets, if only temporarily. And be aware that even after a
clean reload/install of your OS they will try to get the latest trojan, key
logger or virus to you in an email attachment from a formerly trusted source.
Sadly it might be that cute e-card from a family member or friend. If they have
the run of your home it only takes a minute to load “spy” software using a CD
or USB memory drive. If you can’t keep them out of you home, back up your data,
reload the OS and lock the drives down so they won’t boot on start up. Keep
your OS “locked down” or “hardened” against all known attack methods too.
THE REAL
BOTTOM LINE….
…..on any communication service is as long
as it runs through a wire/cable/fiber that is accessible to the perps, they can
get on it. If they’ve “got your number” common cell phones are not much better
as far as interception/manipulation is concerned.
This article is older but is still interesting.
Tapping Computer Data Is Easy
CRIMINAL
LINEAGE/ORGANISATION
These
organized criminal groups have an appointed leader(s)
that control(s) everything they do.
·
They operate much like a computer bot-net
receiving orders, tracking the target and dispatching a stream of perps.
Take appropriate measures to protect yourself
from their assaults and stay safe. Be aware of your
surroundings and…
·
don’t respond to “baiting” tactics.
What I’ve described is just part of what these
criminals do………..
·
……and if you are not a victim you are probably
saying to yourself, “I just can’t believe a large group of criminals
are getting away with crimes like that”.
The reason they are getting away with it is
because:
·
this large group of criminals literally
“hijack” the community
·
using the methods described above.
It took stalking of well known celebrities and a death
before anyone started taking effective action against stalking.
Many people
know this is very real and I know it is being investigated.
·
There are many laws that can easily be applied
to these crimes but no specific laws. A task force is usually appointed to
tackle tough crimes, that may be what is needed to address this.
You have permission to repost or print any part or all of
this information.
·
from
annonymouspost: Error!
Hyperlink reference not valid.
·Displayed in the
above are some points that may bring to light how gang stalking operates.
·The use
of high tech communications and surveillance equipment,
by tech savvy criminals make highly planned gang stalking initiatives do what
they do.
·
They are covert, and pervasive.
·
They have mastered a sell, and can hire lawyers and
others to do their PR and disseminate hate, via slander.
·
Recruiting uses all avenues, from con and
threat, to presentations of fabricated characters profiling.
·
The use of technology to manipulate photograhy,
and recorded sound support the fabricated character profiles.
Though, keeping on the noted highlights from the
above text, we can see that gang stalking/covert harassment
is not only about ostracizing, isolating, and gaslighting someone into the
hallways of behavior services and psyche wards.
It may be no question as to whether or not these protracted
criminal initiative, gang stalking, use poisons, chemical
gasses and psychotomimetic
agents (clik), chemical weapons that act on the human mind.
Gang stalking’s covert harassments that
included:
·
creating mishaps and complications,
·
skits on the street that direct
conversation towards the victim, using the victims personal
information (street theater)
·
baiting the victim to react emotionally or
violently in planned and staged situations.
These, all together, can very well tax a person, as well as
emotionally and mentally cripple, to extent, one who has been isolated through
a widespread, covertly done, slandering campaign. Thus said, evidence points to
an underlaying chemical element to these street level harassment tactics, by
covertly chemically undermining of the victims psychological well being.
From this author’s own experience:
·
chemicals, certainly, and
perhaps poisons, are distributed in covert ways, and
incrementally, usually avoiding outright drugging/poisoning effects,
and having a more subtle effect that is generalised through day and night.
From the author of this blog’s personal account of being
gang stalked, what stands out the most are:
·
fumigations
·
chemically laced items of consumption
·
pervasive strong unnaturally smelling
scents and odors(clothing, food, drink, bedding, rooms)
It seems only logically, from this, that gang stalking is
not necessarily exclusively about using isolation, gaslighting, and
orchestrated mishaps to cause someone to ‘lose it’, and become mentally
unstable. It is about contaminating a persons life with poisons,
chemicals, in conjuction with the street level, workplace harassment.
From my point of view, and my case, these criminals
undermine a victim’s psychology through ‘felony assaults:
·
chemical substaces and drugs, covertly admisistered
in an ongoing fashion.
Personally, the perpetrators have maed it impossible for
me to have a non taste corrupted cup of coffee, and perhaps poisoning me with
tactics that I have long thought were simply taste and odor harassments.
The entire enterprise is scary, even
horrific, in that common people are recruited into such efforts to
basically kill someone, by inducing suicide through a slow and incredibly
torturous method that include isolation, psychological and moral violence, as
well as dugging and poisoning.
To have such activity as covert poisonings/druggings
taking place in on going fashions, and involving victims who claim to be
targets of gang stalking / terror stalking /multi stalking,
points directly towards some sick element in contemporary life.
The media pays no attention, and the United
States, as a nation, and its government as well, point to human rights abuses
around the world, yet there is an insidious crime called gang stalking, using
slander and psychological terror to wreck lives and drive victims to their
death, right here in North America.
Do these criminal enterprises have so much
power that they have the federal level investigators at a loss as to how they
can tackle it? Has the War on Terror, caused such a diversion of attention and
energies for domestic law enforcement and the fed, so much that since 2001,
this pernicious covert criminal activity, aimed at
innocent people, could grow into a ‘lucrative enterprise‘,
and skirt the authorities. Are there seemingly law abiding folk, the wealthy or
well connected, that use gang stalking to eliminate enemies, targets of hate,
or people they see as being a threat?
Godwillsthttps://www.blogger.com/null
0 Comments:
Post a Comment
<< Home