Targeted individuals are experiencing a form of experimentation that follows a progression of phases that include selection, surveillance, stalking, defamation, attack, and monitoring. These six phases may have some overlap; however, they are distinct enough to separate them into phases. The time spent on each phase may vary from individual to individual and is probably a reflection of the desires of the perpetrator of the experimentation. Again, the description is based upon a compilation of data and counter-intelligence gathered from surveillance of a perpetrator group identified in San Antonio, Texas. The group in Texas that was counter-surveilled has been independently identified by four unrelated victims from four different geographic areas of Texas.
Targeted Individuals – Phase 1: Selection
Selection of a target may be for a myriad of reasons at the local level. One must remember this technology is not available to the average person. The groups perpetrating this type of experimentation are given access to the technology as covert, independent contractors of the government agencies responsible for its development. This research is a continuation of earlier behavioral control operations which were mostly done through front companies. The current experimentation is no different. The groups given access to the technology are allowed to choose victims for any reason they deem necessary. The agencies behind the technology are merely interested in collecting the data on its successes or failures. Therefore, as the data is collected at the top from each of the many perpetrator groups, the selection of victims probably appears random. The selection demographics look very different at the local level.
While a small number of victims have come forward with convincing evidence of direct harassment from various government agencies, these are mostly whistle-blowers employed by the same agencies and comprised the minority. Most victims are everyday people who would be considered “common” by most standards. Through interviews and questionnaires, we have found some trends among the victim population. To summarize, the selection of targets for inclusion into this experimental protocol may be specific at the local level with some aspect of particular traits that are sought out by the perpetrators. At the agency level, where the data is ultimately compiled, each perpetrator group’s inclusion criteria probably average out to give the target population a random appearance.
Targeted Individuals – Phase II: Surveillance
Surveillance of the chosen target closely follows selection. The surveillance phase differs from the stalking phase in that during the surveillance phase the target is unaware that it is occurring. Once selected, the target is extensively surveilled through multiple means which include background checks, credit checks, mail tampering, email hacking and direct observation, both physically and electronically. Surveillance accomplishes several important goals that are integral to the success of the remainder of the operation. It allows the perpetrator to accurately determine the target’s daily living activities. Most importantly, where they live, work, bank and how they spend their leisure time are quickly assessed. The people they spend the majority of their time with are identified and scaled in order of importance. For instance, highly valued circumferential targets would include the target’s close family members, supervisors, physicians, clergy and anyone else that they may spend substantial time communicating with. This allows the perpetrators to know with reasonable certainty who the target will confide in once they are aware of their targeting. During this phase the target’s social status is ascertained with regard to their relationships with loved ones, neighbors, co-workers, supervisors, and others. Any participation in taboo behavior such as drug use, excessive alcohol intake, domestic violence, infidelity or pornography are especially noted and followed up on very closely. All the data collected during this phase will be used to control, mislead, defame, and isolate the target. Also, during this phase the perpetrators will often have neighbors, coworkers and relatives assisting them with the surveillance. This is usually accomplished by misleading those individuals into thinking they are assisting with a legitimate law enforcement investigation. In one instance the private investigative agency perpetuating the surveillance identified themselves to a target’s neighbor as FBI agents, complete with fraudulent identification badges. One would be very surprised at the number of people who fall for this ploy without even asking for appropriate identification or contacting the alleged agency to inquire if the surveillance is legitimate. Ignorance of the laws, both nationally and at the state level, regarding surveillance and right to privacy, make this a very effective ploy. The successful application of this technique by the perpetrators will later legitimize the defamation phase and protect them from possible arrest during the stalking phase. With the neighbors believing that they are assisting with an investigation by a legitimate agency, they are more apt to believe the defamatory remarks they are told about the target. Moreover, they are less likely to call the police and report the vehicles they see parked in front of the target’s home throughout the night.
Targeted Individuals – Phase III: Stalking
Stalking of the target is a natural extension of the surveillance phase. These phases differ in that the surveillance phase is usually unknown to the target while the stalking phase is done with full awareness of the target. In current literature, the stalking phase of this type of victimization is usually described as gang stalking, organized stalking, or cause-stalking. Gang stalking and cause-stalking are inaccurate descriptions in that they imply either street gang involvement or some grandiose reasoning behind the stalking. Organized stalking is probably the most accurate description, reflecting the highly organized and methodically planned out form of stalking that these victims experience. The methods involved are directly adapted from the COINTELPRO operations ran by the FBI in the 1950’s and 1960’s against groups seen as radical elements. The tactics include total inundation of the target at home and wherever they may go, breaking and entering of their domicile and physical harassment and intimidation. Electronic harassment is used during this phase with regard to email tampering, computer hacking, cell phone spoofing and cyber-bullying! More exotic forms of electronic harassment are covered as part of the attack phase but may be present in any phase of this type of victimization.
Targeted Individuals – Phase IV – Defamation
The stalking phase serves several important functions for the group perpetuating the operation to insure that the target is totally I enveloped in the operation with minimal chance of escape. It places the victim in a victim-mind state of hopelessness, especially once the victim has been ignored by police agencies through which the victim has sought help. Stalking is very difficult for police agencies to prosecute under normal circumstances. Police assistance in cases of organized stalking where the victim’s everyday actions have been studied through surveillance for months or years is nearly futile. In addition, the stalkers are highly trained, often with federal or local law enforcement backgrounds themselves, in pushing the envelope just short of giving the police a reason to investigate. The hopelessness that ensues from the feeling that all backs have been turned from believing or assisting the victim is integral to the success of the operation. After repeated police complaints of break-ins where nothing is stolen and personal belongings have been rifled through, the victim is labeled mentally unsound and further police complaints are ignored. Only felony burglary will be investigated by law enforcement agencies. Criminal trespassing will only result in a report that is filed away without an investigation. At worst, multiple complaints of stalking and criminal trespassing will result in a psychiatric referral or mandatory twenty-four hour psychiatric evaluation. The inability of the victim to get appropriate law enforcement assistance helps instill the belief that law enforcement is complicit in their victimization and limits them from further complaints. Once this level of hopelessness is achieved, the perpetrators feel confident in escalating their stalking to more frequent breaking and entering as well as physical and sexual assault with less risk of arrest. The victim mind state often causes the target to go into an extreme state of reclusion which furthers their chance of a psychiatric diagnosis once a psychiatric exam is requested or mandated. This part of the operation has been brilliantly designed with assistance from psychiatric professionals and is a scenario that continues to play out to perfection in almost every case.
The stalking phase serves another purpose. The victim must be located through GPS in order for the constellation of other modalities to be used on them. This can be accomplished in several different ways. Stalking may be a way of performing constant 24/7 GPS location through GPS enabled devices in the hands of the stalkers. This obviates the need for tracking i , chips in the victim and explains why the stalking phase almost always comes to an abrupt end with only the electronic harassment remaining. At one time chipping the target, much like GPS chipping of animals to study migratory patterns, was probably the more common scenario. However, this exposes the perpetrator group to the possibility of arrest for physical assault if caught and provides evidence of assault to the victim if the chip is found. A less risky alternative to stalking the victim close 1 enough to remotely GPS them until their EEG can be catalogued and used through remote neural monitoring for the remainder of the operation. Our research has reinforced this fact. We have frequency scanned thousands of victims for covertly placed micro-chips with very few found on x-ray or MR1. To add to the confusion, part of the operation is apparently to convince the target that they have been chipped. This causes them to exhaust their finances looking for an embedded device that doesn’t exist contributes to their psychiatric diagnosis. Essentially, while chipping was once integral to the operation, it is now part of the psychological victimization. However, because many people have been complaining of this targeting for a decade or more, scanning for a tracking chip should probably be part of their work-up.
The stalking phase takes place hand-in-hand with the defamation phase. Inevitably, the stalkers are occasionally caught and questioned by neighbors, onlookers, or possibly local law enforcement officials. The excuse most often given to those who question the stalking is that the target is under official investigation for a drug, sex, or criminal crime. Since most of this type of stalking is usually done by private investigative groups, they often have former officers on their payroll or close enough relationships with local municipalities that the police question them no further. Neighbors that have noticed the 24/7 stalking are usually receptive of the drug or sex crime excuse for the simple reason that only a legitimate agency would spend the money necessary to surveil someone “really dangerous” for twenty four hours per day. The defamation is much worse for licensed professionals such as doctors, lawyers, teachers, nurses or any state licensed professional. Moreover, until recently most states have had very weak anti-stalking laws that are not easily enforced. Texas has taken the lead in 2011 with a bill written by state legislator Jane Nelson and Judith Zaffirini that was passed into law. The bill was written after a young woman who complained of stalking to the Bexar County Sheriff’s Department was written off as mentally ill. Her stalker had held her at gunpoint while forcing her to slit her own wrists and write a suicide letter. She survived but was largely ignored by the appropriate agencies she entrusted to help her. Several months later her stalker followed her to work and murdered her in the parking lot. According to the new law, a restraining order can be issued now against an alleged stalker without first proving bodily injury by that person or persons. Furthermore, the definition of stalking has been changed to make the charge much easier to put forth. Unfortunately, this charge did not come in time for Kristi Appleby for whom the law was changed. An organized effort should be undertaken to force every state to follow suit in altering their stalking rules. This will make defending against organized stalking much easier. Currently, the perpetrators of this type of stalking take full advantage of the lack of legislation against it.
While it appears that I am solely placing blame on independent private investigative agencies for the stalking, I am not excluding participation by corrupt individuals that are active duty law enforcement at federal and local levels. This does occur, as I will illustrate. One must remember that the technology being used to commit these crimes originates at the federal government level. Hence, it is seen being used most often by private investigative agencies that are owned and operated by former FBI agents. These individuals maintain contacts with the agency who work with them in a reciprocal relationship. These relationships are imperative to the defamation phase. An active duty police officer or FBI agent spreading this same misinformation is seen as much more credible by the people being subjected to it..
Targeted Individuals – Phase V – Attack
The attack phase is characterized by directed-energy attacks meant to disrupt normal physiologic functioning. It may occur at any time during a victim’s targeting but is most noticeable as a distinct phase late in the targeting. Early attacks, prior to the victim’s awareness of stalking or defamation, may be perceived as ordinary physiological medical issues. Often the victim has multiple physician visits with complaints of muscle twitching, headaches, heart palpitations, skin burning and other more obscure complaints with nothing medically abnormal found. Later in their targeting the attacks are accompanied with voice to skull transmissions that make it very obvious to the victim that their ailments are not the result of medical pathology. Once the perpetrators are certain the victim is hearing their transmissions and have noticed the stalking, the attacks will escalate. During the attack please, the victim can expect to be assailed almost twenty-four hours per day. If the victim is lucky enough to still be employed by the time this phase begins, attacks will be used as their key weapons to sleep deprive the victim. Often, the attacks will subside just long enough for the victim to fall asleep with hopes that they will sleep through their alarm and be tardy or absent to work. Remember, the goal of this phase is complete annihilation of the victim’s personal and professional life. This phase will continue until these goals are met or the perpetrator group is diverted or hired to target someone else. Manpower constraints within the perpetrator group will often result in abrupt cessation of attack as they focus their attention on another target that they’ve been directed or paid to attack. However, the victim will still usually have the infrequent attacks as a reminder that they are still being watched and are not entirely free from the program.
It is my belief that some of the attacks are secondary to directed energy attacks at specifically targeted peripheral nerves, muscles and organs and not strictly through the central nervous centers controlling them. In effect, the same directed energy modalities being used to open and close garage doors, turn lights on and off and disrupt computer screens in the victim’s home may also be used to physically attack the victim at targeted sites other than the brain. This may explain why neuro programming to alter the EEG in most victims does stop some, but not all, of the attacks. It would stand to reason that with the myriad of weapons within the electromagnetic spectrum at their disposal, the mode of attack would be variable in nature and not dependent solely upon central nervous system manipulation.
The weapons used in the attack phase include microwave, millimeter wave, radio-frequency, laser and probably scalar modalities. All of these modalities have been researched extensively and weaponized for military use as mentioned earlier in the book. While they have all been identified under the heading of “non-lethal” weapons, non-lethality in the research setting was not based on 24/7 exposure. Moreover, the exact effect of their exposure long term on the human body is not known, at least not in official research. The victims of the current experimentation may be the guinea pigs of some type of long term exposure protocol that is too unethical to be done under a legitimate Institutional Review Board with consenting volunteers.
Targeted Individuals – Phase VI – Monitoring
The attack phase is followed by the monitoring phase. Having worked with multiple victims that have been victimized for varying lengths of time, it is clear that the victims have been chosen for experimentation for the duration of their lifetime. Dr. Duncan and I are in agreement that the targeting is done for the life of the individual. However, once the goals of the perpetrators have been met, namely, social, personal and occupational destruction, the attack phase often lessens. As mentioned earlier, this victim will experience the occasional attack as a reminder to them that they are still being watched. Apparently, one of the rules of this experimental protocol is that once a victim is chosen, he or she must be monitored until their natural death occurs. Many victims are drawn to suicide by their respective perpetrators. This may be an attempt by the perpetrator groups to prematurely end the monitoring phase of one particular victim so manpower can be focused on other victims. The psychological resilience of the victim to the stress of the experimentation obviously plays a factor as well. From a medical perspective, the monitoring phase is probably to denote any immune problems, cancers, psychiatric problems or diseases that may result from the long term exposure to the electromagnetic weapons used in the experimentation. These issues will need to be elucidated before those modalities are released on the population as a whole for psycho-social control. In 1971 Dr. Jose Delgado, and MKULTRA researcher, published “Physical Control of the Mind: Toward a Psychocivilized Society.” His research required implanting the brain with a micro-chip to acquire the desired results. The development of directed energy has allowed for more efficient delivery with even better results without the need for brain implantation.
Comments on “Organized Gang Stalking and Targeted Individuals – The 6 Phases”
My name is James Tomko and my wife Mary and i have been intensively stalked since 2011. However, we believe that we have probably been stalked at some level all of our lives. We live in Pueblo, Colorado now and the stalking continues. If you can help us in anyway with more information or by putting us in contact with a local support group we would greatly appreciate it.
I am Swiss, you should contact someone in the USA and ask them. You can write me an e-mail and I will provide you with information about shielding, detox, how to survive, stay healthy etc.
Looking for info about shielding, detox, how to survive, stay healthy
Re your entry of 2019 with ref to targeting etc,I am a 5 yr ti, and like you I would like to find a group of people dealing with this heinous crime.If you would like to contact me,at my email address,I would be very pleased.
J,female t i, uk
I’m a TI living in Scotland. I hope you are surviving the onslaught. Write if you want and I will share my story with you.
Same as James. I met them in 2011 in the Internet, it was when they started to directly contact me, it is unknown if there was any activity before. And they cyber-stalk me since then and I can’t have any any contact who is not a part of that online. I have lots of proof of all the abuse and harassment. It is not the case when anybody would find it not convincing or hard to believe as I documented pretty much everything and do not claim anything about invisible weapons. Yet there is no easy way to stop it or get any help.
I am Swiss, you should contact someone in the USA and ask them. You can write me an e-mail and I will provide you with information about shielding, detox, how to survive, stay healthy etc.
The theater acts had low effect on me, not easily scared or unconfined about my perception. What they do is fake friends, people who be-friend you or even try to date you. They wait till you become emotionally engaged to start a destruction program. I repeatedly was emotionally abused and tormented by them to the state of extreme depression and helplessness. But I want to encourage people to not fear them. They want you to be scared, to sound paranoid, weak, lost. Get back them, call them out on any BS, document everything, expose. Do not give them an easy win.
Where is the best place to live. I have traveled ca Texas Idaho Wyoming Utah Colorado wash Oregon but the harassment persist and my husband is sinking into cognitive decline and speaks to himself and so much more. I purchased a phone for him and the app is on his phone if you know what I mean. The abuse goes on. It appears he has directed impulses again similar to published online reports and articles I have read or again cognitive decline.