Organized Stalking and Mind Control / Electronic Harassment

  • About
  • Contact

Recent Posts

  • Psico-bombe e assassini programmati – Project: Soul Catcher
  • Psycho-Bombs and Programmed Assassins – Project: Soul Catcher
  • Interview with Robert Duncan
  • The Matrix Deciphered VideoBook – Robert Duncan
  • Mente alveare cibernetica e clonazione EEG – Robert Duncan

Recent Comments

  • Maria on Organisiertes Stalking: Information für Leute für die dieses Verbrechen ein neues Thema ist – Teil 4
  • Tony on Organized Gang Stalking: A Form of Terrorism
  • James Tomko on Organized Gang Stalking and Targeted Individuals – The 6 Phases
  • aucheinOpfervondenPerversen on Organisiertes Stalking: Information für Leute für die dieses Verbrechen ein neues Thema ist – Teil 4
  • Frances on Stalking organizzato: arrivano le testimonianze – Francesca Invernizzi

Archives

  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • September 2019
  • February 2019
  • March 2018
  • February 2018
  • January 2018
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • January 2014
  • December 2013
  • October 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013

Categories

  • Bewusstseinskontrolle / Elektronische Waffen
  • Controllo mentale / Armi elettroniche
  • Deutsch
  • English
  • Italiano
  • Mind Control / Electronic Weapons Harassment
  • Organisiertes Stalking
  • Organized Gang Stalking
  • Stalking Organizzato

Directed Energy Weapons – High-Powered Microwaves

Jun18
on 18. June 2017 at 20:00
Posted In: English, Mind Control / Electronic Weapons Harassment

New World War: Revolutionary Methods for Political Control - Mark RichHigh-powered microwaves (HPM) include two primary technologies. The first is the electromagnetic pulse bomb (e-bomb). The next is the microwave amplification by stimulated emission of radiation (maser) which uses millimeter wave technology. Both weapons produce power in the megawatt range.

They have a variety of applications based on their power level. At low levels they can confuse sensors and at higher levels they can bum electronic circuitry. They can disrupt communications systems and computer networks. They are used for counter-personnel and counter-material purposes. Many of the details regarding HPMs are classified.

Active Denial Technology

A maser is similar to a laser, but instead of using energy from the light portion of the electromagnetic spectrum, it uses energy from the radio portion of the spectrum, which is a lower frequency. Masers have existed since the early 1950s.

The ADT is a type of maser which operates in the millimeter wave band. ADT was developed by Raytheon Corporation in cooperation with the US Air Force Research Laboratory (AFRL). The ADT’s development was a matter of complete secrecy for about 10 years, and it was not until 2001 that its existence was revealed in mainstream news. Most of the testing regarding its human effects remains classified. The wave emitted from this weapon is just over 3 millimeters, or 1/10th of an inch wide.

The Active Denial System (ADS) is an example of ADT. It operates in the 95 GHz frequency of the radio band of the electromagnetic spectrum. Specifically, this weapon operates in the millimeter wave area of microwaves, which approaches the far infrared (FIR) portion of non-visible light.

The ADS is a counter-personnel, non-lethal, directed-energy weapon, describes the JNLWP in their ADS Fact Sheet, which projects a focused beam of millimeter waves to cause an intolerable heating sensation on a person’s skin. The invisible beam that it shoots, which travels at the speed of light, reaches a depth in the skin of only about 1/64th of an inch.

According to the fact sheet, there is minimal risk of injury because of this shallow depth as well as the tendency for people to instinctively move out of the way after being hit. In addition, there are both hardware and software safety measures built into the computer system which the ADS is connected to which limit the shot duration.

It is powered by a 100 kW ultra-high radio frequency transmitter. The 95 GHz radio frequency beam which it shoots is created from an electric gyrotron generator. The generator can be adjusted. The device is cooled with a closed-loop de-ionized water cooling system. The ADS fires 4-second bursts. It has infrared targeting capabilities for nighttime use and is simple to point and shoot.

The power level of the ADS is adjustable from 100 Kw to 100 MW. The power level and duration of the beam is controlled by a computer, which contains a setting that limits the depth of the beam to only 1/64th of an inch. In addition, the computer allegedly shuts off the beam after only a few seconds of exposure, if it’s tuned properly.

So, its power level and frequency can be adjusted. Its focal point can be adjusted too, from a small dot to a large area which would irradiate several people. The beam can be adjusted to focus on a single individual in a crowd of thousands.

Depending on the power level, it can cause a variety of effects. They include a heating of the entire body, an intolerable burning of a specific area, or a bee sting effect which can cover the entire body. It can also produce resonance (vibration) within the body.

The ADS passes through even the most bulky clothing with ease. It can pass through unshielded walls. Its official range is classified, but it is documented to have a distance of at least 1 km without losing any of its power. Its beam is silent and invisible. And because it operates at the high end of the microwave area of the spectrum (near light), it travels at the speed of light.

The Defense Science Board’s 2004 report Future Strategic Strike Forces, says that for neutralizing individuals, while lasers could be used at long ranges for a strategic strike, the ADS will be effective at much shorter ranges. In its NLW report of 2005, the CFR added: “With its long range and rapid, universal, and reversible effect, ADS has many potential military applications.”

It appears that the safety claims regarding the power level and shot duration of the ADS are the result of a setting which can be used if the operator chooses to do so, and not a limitation of the weapon itself. This was reported in New Scientist in July of 2005 when it was described that a person suffered an injury when the weapon was accidentally set at the wrong power level.

In its Army Orders Pain Ray Trucks: New Report Shows Potential for Death article, of October 2008, ABC News mentioned that the ADS could be used as a “flesh-frying killer.” The Guardian warned in October of 2006, that the new weapon has the potential for a traceless form of urban political control.

The National Institute of Justice (NIJ), which is the research division of the Department of Justice (DOJ), has funded Raytheon for the production of smaller vehicle-mounted and hand-held weapons which use ADT. Presumably, these too are to be used on civilians, according to a University of Bradford NLW report in March 2006.

According to New Scientist, the US Department of Justice plans to give mobile ADT units to police forces around the country.3 And National Defense News reported that some portable ADT weapons can be powered by a truck battery.

The NIJ’s interest in these smaller weapons was only one of many possible domestic applications, says ABC News. There have been other proclamations in mainstream sources that the military and police have been preparing for the use of the ADS on civilians in a variety of scenarios.

There are multiple masers which use ADT, including the Vehicle Mounted Active Denial System (VMADS), Silent Guardian, Portable Active Denial System (PADS, also called ADS2), and a type of compound directed-energy weapon with multiple lethal and nonlethal weapons mounted onto a single platform, called Project Sheriff. All of these weapons were developed by Raytheon for agencies such as the DOE and NIJ/DOJ, with the cooperation of the Air Force.

Active Denial System

The ADS2, also called System 2 and Portable Active Denial System (PADS), was developed by Raytheon Corporation beginning in 2005 for the Department of Energy’s Office of Security and Safety Performance Assurance (SSA) and the Department of Defense’s Office of Force Transformation (OFT).

The ADS2 is an enhanced, ruggedized version of the original system. A nonlethal weapons report by the University of Bradford, UK describes it as a smaller, more portable version of the original. It is a self- directed weapon. It can be mounted to a plane or vehicle.

National Defense Magazine says the ADS or ADS1 was the prototype version of this weapon, and the ADS2 is basically the same, but more stable. The ADS2 has improvements in its design that allow it to be used in many operational environments. It is available to the military, civil law enforcement, and private security companies, according to Raytheon Corporation.

Project Sheriff

Project Sheriff, also called Full Spectrum Effects Platform (FSEP), is a vehicle-mounted ADS developed by Raytheon in 2005 for the DOD’s Office of Force Transformation (OFT), as well as the DOE’s Office of Security and Safety Performance Assurance (SSA). Allegedly, the DOE will be using it to protect nuclear facilities.

The unit contains a suite of lethal and nonlethal weapons mounted onto a single weapons platform. Among its nonlethal arsenal are two weapons which can focus tight beams of sound and light. The first uses a laser to temporarily impair a person’s vision by transmitting a focused beam of bright light into their eyes.

Next, the Long Range Acoustic Device (LRAD) is capable of transmitting an intensely focused beam of noise directly into their ear. This noise can be a warning made in real-time by an operator, or an MP3 sound file.

The FSEP is also equipped with a lethal weapon with an obscure description called the gunslinger, which contains acoustic and infrared sensors to detect the exact location of sound and movement, allegedly to locate and destroy snipers. After the origin of the commotion is detected, says National Defense Magazine, “it automatically swivels, locks in and fires in the direction of the assailant.” The FSEP may be equipped with other weapons as well.

Silent Guardian

The Silent Guardian, built by Raytheon, is about the size and power of other ADT systems. It is a 7.5 foot high, 5 ton, vehicle-mounted or stationary system, with a 45 x 45 inch dish antenna, and a 360 degree shoot zone. It has an auto-tracking feature, which can fire 2-second bursts of directed-energy up to 250 meters away. It can switch from standby to armed mode in less than 2 seconds. It can also engage alternate targets in less than 2 seconds.

Allegedly it will be used for checkpoint security, embassy protection, homeland security, and peacekeeping operations. The Silent Guardian uses an antenna to transmit a focused millimeter wave beam for the “precise targeting of specific individuals,” says Raytheon. In addition to the auto-tracking feature, the operator can manually observe people through a targeting screen and attack them with the use of a joystick. The infrared sensors on the antenna are said to be able to detect the excessive heating of a targeted individual, which results in a signal being sent to the operator to move off that target.

Vigilant Eagle

Vigilant Eagle is a ground-based weapons platform developed by Raytheon. It consists of three primary units: a C2 unit, a sensor unit, and an amplified antenna grid which fires a beam of microwave energy. Its intended use is to detect and disable surface-to-air missiles at airfields and commercial airports. It does this by frying the electronic circuitry of the missile.

The sensor unit includes a constellation of distributed infrared sensors called the Missile Detect and Track subsystem (MDT). The infrared sensors on this platform are configured to detect missiles. The sensors are said to be so reliable and accurate that they provide a 360 degree dome of protection around an entire location.

False alarms are few because detection is verified by multiple sensors. The C2 unit is referred to as the Fire Distribution Center (FDC). It can both track and identify all objects in the airspace that are detected by the sensors. After it identifies an object, the C2 unit can then recommend appropriate action. The FDC has been used in the military since 1994, and has recently been installed to protect the airspace over Washington D.C.

The large rectangular antenna is called the Active Electronically Scanned Array (AESA). It consists of a group of microwave antennas whose rays flow into a solid-state amplifier, which combines them into single beam of energy. The result is a highly focused microwave beam with a range of at least 60 miles.

Electromagnetic Pulse Weapon

The electromagnetic pulse (EMP) weapon, also called the e-bomb, or the radio flash weapon, is capable of disrupting or damaging the circuitry of most electronic devices.

The weapon accomplishes this by sending either a single pulse or a series of fast, high-powered pulses of electromagnetic energy in the range of 100 MHz to 20 GHz. These pulses are similar to a lightening strike or a nuclear blast. The power level of these pulses can be several hundred megawatts (MW). The EMP weapon has a range of at least several hundred meters, but reportedly can be transmitted up to 15 Km.

The specific method by which the pulse attaches to the circuitry is called coupling. Coupling is simply the binding of an energy wave onto a conductor. There are two types of coupling. The first is called front door coupling and it happens when the energy wave binds to the antenna of a device. The other type is called back door coupling. It occurs when the wave binds to external components such telephone lines, network cables and power lines.

It can also occur with ports on the back of a computer, such as serial ports. After the energy binds, it then moves through the circuitry, frying or disrupting sensitive internal components, such as crystal diodes, ICs, mixers, logic circuits, etc.

The precise targeting of electronic devices can be accomplished in the following way: First the EMP weapon can be aimed in a specific area. The primary factor is not the power of the pulse, but the ability to focus the output. The energy must be accurately deposited at a certain range to be effective.

Next, it can be configured to send a single pulse consisting of a specific frequency, which will only destroy the circuitry of a device that functions on that frequency. In this manner, if an operator has the frequency signature of a target device, then only that single device will be affected, while others in the area remain unharmed.

Furthermore, a series of fast pulses consisting of multiple frequencies can be sent to an area, which will affect the circuitry of all devices operating on those frequencies. This type of delivery is referred to as an ultra wideband pulse (LJWBP). It can be adjusted to cover large areas, even an entire city.

In 1990, the International Review of the Red Cross, declared, “It is possible today to generate a very powerful microwave pulse… with an energy level of several hundreds of megawatts.” Using specially adapted antenna systems, “these generators could in principle transmit over hundreds of meters… ( or up to ) approximately 15 km.”

There is allegedly no unshielded device that can withstand one of these strikes. Dr. Nick Begich declared, “With this kind of weapon there is no machine which could get by this invisible wall of directed- energy.” The US Air Force, Center for Strategy and Technology at Maxwell Air Force Base says an EMP weapon could destroy any electronic device within its range.

Its intended targets include: missiles, aircraft, vehicles, boats, communications systems, computers, networks, radars, and radios. It can interfere with radio, shortwave, and television transmissions. It can also disrupt or destroy an ignition system. Another proposed use is to disrupt the electrical utilities of an enemy. An entire city can even be hit.

Platforms for the EMP weapon are air-based, sea-based, ground-based, and portable. They can be mounted on aircraft or ships. The ground-based weapons can be mounted on a hilltop or building. They can also be mounted in a van for concealment and mobility purposes. In 1997 the FAS advocated the use of a man-portable EMP weapons by police officers and ground troops.

Summary

High-powered microwaves with ranges of up to 60 miles exist. Smaller variations of these weapons with adjustable levels of lethality also exist and have been deployed to police and military units to be used on civilians. These weapons are silent, traceless, invisible, and can easily pass through most unshielded structures.

New World War: Revolutionary Methods for Political Control – Mark M. Rich

└ Tags: Active Denial Technology, DEW, Dictatorship, Directed Energy Weapons, Electronic Harassment, Electronic Weapons, Mark Rich, New World Order, New World War, Non Lethal Weapons, Revolutionary Methods for Political Control, Targeted Individuals
 Comment 

Stalking organizzato e controllo mentale – Un male strisciante

Jun12
on 12. June 2017 at 10:36
Posted In: Controllo mentale / Armi elettroniche, Italiano, Stalking Organizzato

Stalking organizzato e controllo mentale - Un male striscianteC’è una quantità crescente di attività scelleratamente criminali che vengono continuamente svolte nella società. Vengono spesso mascherate come attività ordinarie o coincidenze che coinvolgono gente che non ha ragione apparente di agire – di proposito – in un determinato modo. Gli sconosciuti che passano nella strada, gli inquilini nell’edificio in cui si vive, la gente con cui si ha a che fare sul posto di lavoro durante il giorno e perfino gli amici e i famigliari potrebbero iniziare ad agire in modo sospetto, strano e bizzarro cosa che provoca nella vittima stati emotivi di natura negativa come la frustrazione personale, la collera, l’angoscia emotiva, stati di paranoia o peggio ancora.

Quello a cui mi riferisco non è qualcosa di isolato e che succede solo a poche persone tra la popolazione. Osservando il numero crescente di vittime che si fanno avanti e che raccontano le proprie storie e esperienze, si può arrivare alla conclusione che si tratta di un fenomeno dalle proporzioni epidemiche.

Le vittime vengono prese di mira da una rete di individui altamente organizzati ma connessi in modo non diretto che spesso vengono coinvolti in qualcosa di cui perfino loro non sembrano comprenderne completamente il significato. La vita delle vittime viene manomessa o completamente distrutta, e sebbene sembri che lo scopo e le ragioni potrebbero essere diverse, il tutto si riduce a un sistema dittatoriale ledente di governo dove ogni individuo nella popolazione deve alla fine essere controllato completamente, e dove ogni possibilità di fuga è impossibile.

Le attività a cui questa rete di individui partecipa sono varie, ma ogni singola attività ha come conseguenza la negazione delle libertà e la libertà di scelta che una persona normalmente dovrebbe avere nella nostra società.

Le evidenze mostrano che questa rete è in fin dei conti diretta e controllata da gente incredibilmente potente e dalle risorse illimitate ma che rimangono dietro le quinte e che si tengono a distanza da queste attività mascherandole anche da qualcosa d’altro in modo da non attirare l’attenzione nell’opinione pubblica su quello che sta succedendo. Bisogna fare qualcosa per fermarli prima che sia troppo tardi. Può essere che sia già troppo tardi.

Alcune persone che riferiscono di essere stati obiettivi di queste attività affermano che gli “stalkers”” usano metodi come le molestie offensive continue, la tortura psicologica e fisica e qualche volta perfino l’omicidio. Queste strane attività non saranno eventi isolati nella vita di un obiettivo ma continue, di solito succedono abbastanza regolarmente in modo che non ci può essere più dubbio sul fatto che non si tratti soltanto di coincidenze. Per la persona posta come obiettivo, questi eventi di solito continueranno per molto tempo, per molti anni, e gli “stalkers” spesso aumenteranno i loro attacchi con il passare del tempo.

Queste strane attività vengono comunemente chiamate gang stalking, cause stalking ( stalking per una causa, nota mia ) o stalking organizzato, e per la gente che non ne ha mai sentito parlare prima, è piuttosto difficile capirne bene la natura o di credere che sia vero perché è difficile da credere che i gruppi che organizzano questi eventi possano investire così tanto tempo e risorse per pianificare e organizzare il tutto per uno scopo all’apparenza così irrazionale, e che nessuno che è coinvolto nel tutto non dice mai niente. Il fatto è che la maggior parte degli stalkers – se non quasi tutti – che partecipa a queste attività non ha idea della dimensione della rete di cui fanno parte né sui veri motivi perché semplicemente fanno le cose che gli è stato ordinato di fare, né hanno idea su chi in fin dei conti li dirige e il perché. Sono di solito condotti in questi gruppi di stalking organizzato attraverso la manipolazione e l’inganno, usando il loro senso di responsabilità e morale ( o la mancanza di queste caratteristiche ) e facendoli credere di influenzare la loro cooperazione. Qualche volta potrebbero perfino stare agendo senza qualsiasi controllo consapevole o coscienza di esser coinvolti in qualcosa. Questi ultimi sono in aumento, sono vittime involontarie del controllo mentale elettronico.

Diventa molto ovvio che questi gruppi sono organizzati e diretti sia da entità governative che private ( le corporazioni e le multinazionali ) ma certamente non sono gli unici. È risaputo che coinvolgono gruppi di chiesa, i gruppi di giovani esploratori, gli anziani, gli imprenditori come anche i lavoratori, la polizia, le bande di strada, i tossicodipendenti e perfino i senzatetto. Possono coinvolgere membri di un qualsiasi ceto sociale ma al livello di strada, dove la maggior parte di queste attività hanno luogo, ho potuto sperimentare e constatare personalmente che la gente che partecipa sono perlopiù gente con un basso reddito come anche i tossicodipendenti, delinquenti sessuali, gli omosessuali o i criminali, sebbene la polizia, gli imprenditori locali e altri membri della comunità siano pure coinvolti. La motivazione principale per la gente alla fine più bassa dello spettro sociale per partecipare, è la ricompensa finanziaria o la considerazione accordata o privilegi in cose legali, ma spesso potrebbero prenderne parte soltanto per il divertimento e l’eccitazione, o perché pensano che servono una buona causa. Molte di queste persone possono essere state obbligate contro la propria volontà nel partecipare in queste attività e possono essere inizialmente state loro stesse degli obiettivi a cui è stata distrutta e rovinata la vita per poi essere reclutate per prendere parte nelle operazioni di stalking organizzato. La ricompensa, non importa quanto piccola, può essere usata come un incentivo per costringere lo stalker a continuare a partecipare in queste operazioni di gang stalking organizzato. È soltanto questione di conoscere le debolezze di una persona e usarle a proprio vantaggio. Comunque, questo non è sempre necessario.

Questi gruppi di gang stalking organizzato possono svilupparsi in una qualsiasi situazione e a qualsiasi livello della società dove la gente si unisce come gruppi che perseguono scopi comuni o hanno sistemi di pensiero comuni o simili, così come anche tra quelli che non sono altrimenti affiliati l’un con l’altro prima di avere iniziato a fare parte di questi gruppi di stalking organizzato. I gruppi di gang stalking potrebbero venire anche formati da gruppi politici, aziende e gruppi aziendali, gruppi religiosi o gruppi del controllo della comunità ( community watch groups ) come anche da bande criminali o un qualsiasi altro gruppo di persone o individui che possono essere reclutati.

Quando questo problema epidemico ebbe inizio, gli organizzatori e dirigenti di queste attività si concentravano sul reclutare gente da gruppi già organizzati di persone che, a causa della natura del loro gruppo, potevano essere facilmente influenzate e convinte a partecipare in queste attività facendo apparire la cosa come se servissero la propria causa ( è da questi gruppi che deriva il termine cause stalking ). Ma le cose sono da allora avanzate al punto che adesso la gente viene reclutata in un qualsiasi modo, sia per quanto riguarda i singoli individui che i gruppi che altrimenti non hanno cattive intenzioni. Possono reclutare chiunque, dal livello più alto della società al più basso. Lo stesso vale per gli obbiettivi di queste persecuzioni come anche per le scuse e le motivazioni usate per prendere di mira un obbiettivo sono anche diventate molto varie.

I primi casi documentati di gente presa di mira da questi gruppi di gang stalking furono le spie, sia governative che private – spionaggio industriale – molte delle quali sono state anche attaccate con armi ad energia diretta e del controllo mentale. Ma questi casi sono unici per la loro situazione perché avevano a che fare con le attività di quelli che possiedono queste armi e tecnologie ( che è proprio quello che queste spie cercavano di esporre al pubblico ), e quindi le armi e le tecnologie sono state messe a disposizione per usarle contro di loro. Queste armi e tecnologie non sono usate su tutti gli obiettivi e le vittime di stalking organizzato e non sono nelle mani di chiunque ma rimangono prevalentemente in possesso delle agenzie di intelligence e dei militari. Di gran lunga, la maggioranza di attività di stalking organizzato vengono effettuate dalla gente comune usando mezzi ordinari e disponibili in commercio e non con le tecnologie avanzate. I gruppi di gang stalking organizzato possono essere organizzati e ordinati nelle loro operazioni di infliggere miseria e distruzione alla gente senza la necessità di impiegare tali tecnologie avanzate. Comunque, l’applicazione di tecnologie avanzate in questa area non è fuori questione e possono essere integrate in queste operazioni.

Uno degli scopi per creare gruppi di stalking organizzato è quello di semplicemente farli controllare e riportare su individui all’interno della comunità e fare in modo che non facciano niente che i controllori di questi gruppi non vogliono che facciano. Questi programmi di monitoraggio vengono usati sia per monitorare i gruppi di gang stalkers che gli obbiettivi, sebbene gli obiettivi siano di solito d’interesse per altre ragioni. Gli obbiettivi vengono spesso presi di mira perché sono persone oneste che cercano di denunciare la corruzione e i crimini perpetrati sia dal governo che dalle multinazionali, perché non sono disposti a rinunciare alle proprie libertà con la scusa della minaccia percepita del terrorismo o sono altrimenti visti come una minaccia potenziale per i controllori e l’esecuzione dei loro piani dittatoriali per il nostro futuro. Qualsiasi scusa plausibile con cui convincere un determinato gruppo di percepire qualcuno come una minaccia, sembra essere abbastanza per influenzare i partecipanti per reclutare il gruppo nel partecipare in attività e operazioni di gang stalking contro una persona.

Le attività che vengono intraprese non sempre sembrano a quelli che partecipano così distruttive, perché un gruppo di gang stalking organizzato potrebbe non essere al corrente delle attività e degli sforzi perseguiti da altri gruppi di gang stalking che contemporaneamente vengono effettuati contro l’obiettivo e inoltre potrebbe essere al corrente solo delle proprie parti e il proprio gioco di gruppo. Molti piccoli sforzi intrapresi da parecchie persone diverse che sono ignare delle attività degli altri gruppi, possono rapidamente venire aggiunte al tutto fino a creare problemi seri per un obiettivo. Basta che qualcuno che è in condizione di controllare e influenzare ciascuno di questi partecipanti o gruppi separatamente e dirigerli contro l’obbiettivo per creare la sorta di danno alla vita di una persona che queste attività di stalking organizzato hanno come conseguenza.

Sebbene questi gruppi di stalking organizzato abbiano membri da qualsiasi e tutti i livelli della società, e questa gente potrebbe non sembrare di essere impegnata in niente più che attività di basso livello per ragioni all’apparenza giustificabili, la verità è che sono organizzati e diretti dai livelli più alti dei settori governativi e corporativi per ragioni più profonde che soltanto il monitoraggio o la punizione di certi individui. Il gang stalking è un metodo di vigilanza all’interno della comunità che serve per vigilare sui gruppi stessi allo stesso momento così da sviluppare i mezzi per manipolare i membri della comunità nel pensare ed agire in modo che soddisfi le esigenze dei controllori. Perciò, tutti i segmenti della società sono coinvolti in queste attività in un modo o nell’altro, in modo che tutti i ceti sociali siano coperti.

Un tipo particolare di persona che è molto facilmente influenzata a prendere parte a queste attività di gang stalking organizzato e che tende a prendere parte regolarmente e completamente volontariamente in queste operazioni, è il tipo credulone e naïve ma con buone intenzioni che è più o meno non al corrente della crescente corruzione molto diffusa nei ranghi più alti della società. Questi “benefattori” sono quel tipo di gente che non osa mettere in discussione l’autorità e che facilmente reagirà a minacce e intimidazioni. Tipicamente, se vengono avvicinati dalla polizia e viene chiesto loro di assistere in un’indagine, si sentono onorati e perfino fieri di essere coinvolti in qualcosa che pensano che è per il bene comune. Poiché non oserebbero mai mettere in questione le autorità, non fanno troppe domande e pensano che va bene fare qualsiasi cosa venga loro chiesto di fare da parte della polizia. I poliziotti lo sanno e diranno qualsiasi cosa è necessario per persuaderli a prendere parte in queste attività. Questo fatto rende la maggior parte dei membri patriottici e rispettosi della legge nella società e che si fidano ciecamente delle autorità, facilmente suscettibili nel venire reclutati in questi gruppi di gang stalking. Questo è un fatto molto preoccupante, perché queste sono persone che danno molto valore alle proprie libertà e pensano che combattono per i propri interessi partecipando a queste attività mentre in verità vengono usati per distruggere queste libertà.

Ci sono anche alcuni gruppi che sono stati molto facili da reclutare perché si fidavano della gente che li reclutava e credevano che quello che veniva detto loro su un obiettivo era vero. Questa è stata la prima gente a venire reclutata per far parte di questa rete di spie nella comunità. Tra questi ci sono gruppi di controllo comunitario ( community watch groups ) come anche i gruppi di chiesa che sono di solito avvicinati dalla polizia e a cui viene chiesto di assistere nel monitoraggio delle persone che vengono ritratte come una minaccia potenziale per la comunità. La polizia ha istituito uno stretto rapporto con questi gruppi e li usa regolarmente nelle operazioni di stalking stalking.

Gli eventi del gang stalking comportano parecchie e diverse tecniche di molestia che sono in modo imparziale comuni tra questi gruppi, ma altre tecniche più innovative non sono fuori questione. Il gang stalking organizzato nelle comunità girerà per lo più intorno al quartiere dove un obiettivo vive e/o il loro posto di lavoro, ma può estendersi a qualunque posto in cui l’obiettivo si reca in pubblico. La maggior parte degli eventi artificiali creati da questi gruppi di gang salking sono stati progettatati e testati in precedenza, molti dei quali vengono effettuati in modo da richiedere un vasto numero di partecipanti ben posizionati che coordinano le loro azioni in un modo da creare una situazione negativa per l’obiettivo ma che sembra a qualcun altro che non è al corrente di queste cose come degli eventi quotidiani, delle pure coincidenze. Questi eventi artificiali organizzati, quando succedono in pubblico, vengono chiamati con il nome di “teatro di strada” perché succedono in pubblico al livello stradale, ma altri eventi organizzati possono concentrarsi intorno alla casa dell’obiettivo o sul suo posto di lavoro. Il numero dei partecipanti coinvolti, l’ambito dei loro sforzi coordinati, il tipo di eventi organizzati e il periodo di tempo in cui questi eventi continuano rivelano un’impresa profondamente radicata e molto sofisticata che può solo essere orchestrata da gente con mezzi non a disposizione di cittadini ordinari. Questo indica il settore più alto della società da cui gli ordini di quelli che orchestrano questi eventi provengono.

Sebbene mi riferisca principalmente alla polizia quando parlo dei reclutatori e controllori di questi gruppi di gang stalking organizzato, non sono gli unici ad essere coinvolti nel reclutamento o la gestione dei membri di questi gruppi e non sono sempre consapevolmente consci in che cosa sono veramente coinvolti come la maggior parte delle persone o organizzazioni che partecipano in queste attività. Questi gruppi di stalking organizzato e le loro attività sono dirette e prendono comandi da una catena di comando e la polizia spesso segue soltanto ordini e “normali” procedure di polizia. Comunque, ci sono molti all’interno dei corpi di polizia ( e altrove ) che sono corrotti e le cui ideologie e punti di vista sono in accordo con quelli che in fin dei conti controllano e dirigono le attività di questi gruppi di stalking organizzato. Eseguire gli ordini senza fare domande e la partecipazione in una tattica segreta equivoca per “combattere la criminalità” sono procedure standard da seguire per la polizia. Quelli che siedono nella catena di comando e di controllo sanno esattamente quale gente che lavora per loro è più adatta per agevolare le attività di questi gruppi di stalking organizzato in modo da ottenere fini desiderabili, e quindi faranno in modo che quelli più adatti vengano usati dove ce ne bisogno, quando ce ne bisogno e nel grado di coinvolgimento di cui hanno bisogno. Questo è un punto da tenere a mente quando si fanno considerazioni sul come questi sforzi delle operazioni di gang stalking organizzato possono esser compiuti senza esporre quello che realmente succede. Si deve anche capire che la compartimentazione è la procedura abituale all’interno di tutti i settori del governo, che è un metodo molto efficace per tenere le cose segrete. Questo stesso metodo è anche usato nel settore degli affari, soprattutto con quelle entità corporative che tendono a lavorare molto strettamente con il governo o che maneggiano informazioni sensibili.

Il tipo di attività e di tattiche che potrebbero esser usate contro un obiettivo includono il vandalismo, pneumatici tagliati, finestre rotte, violazioni di domicilio, manomettere la proprietà, avvelenamento di animali domestici, aggressioni casuali, furti, campagne diffamatorie, rumori persistenti e disordini, sorveglianza illegale della residenza, molestie eccessive da parte della polizia, perdita inspiegata del lavoro, bollette telefoniche o dell’elettricità eccessive, posta che arriva in ritardo o che non arriva, pedinamento sfacciato ed eccessivo da parte di sconosciuti, villania eccessiva da sconosciuti, strani commenti da parte di sconosciuti riguardo a cose non dovrebbero sapere fino ad attività ancora più bizzarre e criminali. Per esempio, è molto comune che il domicilio della vittima venga violato regolarmente e che vengono lasciate piccole evidenze che la violazione di domicilio sia avvenuta in modo da fare capire alla vittima che qualcuno è entrato in casa ma non abbastanza per potere fare una denuncia alla polizia. Niente sarà di solito preso, ma l’obiettivo può trovare oggetti spostati, sentire l’odore di fumo di sigaretta o trovare le luci accese anche se le aveva spente prima di uscire. Come è facile da immaginare, questi tipi di attacchi, se avvengono con sufficiente frequenza, possono condurre facilmente la vittima a stati confusionari, di ansia e di paranoia. Una persona che subisce tali abusi può essere fatta passare per delirante molto facilmente.

Le liste di notifica sono state inizialmente usate dalla polizia per tenere etichette su delinquenti pericolosi come i pedofili e i criminali violenti in modo di avvertire la gente nella comunità sulla loro presenza. Nel Regno Unito questa lista è chiamata l’Archivio delle persone violente. Queste liste sono state da allora espanse in ambito in modo che adesso qualcuno possa essere messo in questa lista anche se viene percepito come “potenzialmente pericoloso”, e non è più soltanto la polizia che può inserire qualcuno nella lista. L’espansione di queste liste si basa su alcune leggi sulla sicurezza e la salute, in cui viene ordinato ai datori di lavoro e ai dipendenti di riferire riguardo a gente che mostra segni minacciosi o un comportamento violento, o qualsiasi cosa che potrebbe essere considerato come un comportamento inadeguato. Un’occhiata minacciosa, una voce alzata o un commento politicamente scorretto possono essere abbastanza per mettere una persona in questa lista. C’è poco o nessun controllo per assicurare che quelli che vanno a finire in queste liste, e la situazione che ha provocato la cosa, vengano valutati correttamente, cosa che lascia spazio per ogni sorta di correzione e abuso delle liste. Una persona che è messa su una di queste liste non è di solito mai informata del fatto, e perciò non può neanche difendersi dalle accuse. Quando una persona viene messa in una lista, chiunque nella comunità di quella persona che potrebbe entrare in contatto con la persona viene informato. Questo può includere membri della famiglia e amici, vicini, compagni di lavoro, scuole, aziende locali, eccetera. Queste notifiche seguiranno una persona dovunque vada, ovunque decida di trasferirsi o viaggiare. Perfino quando una persona è eliminata dalla lista, quelli che hanno ricevuto le notifiche continueranno a percepirli come una minaccia. Queste liste sono usate dai gang stalkers come liste di obiettivi. Le liste provvedono un senso di giustificazione per le loro attività, e con un po’ di direzione, possono causare la devastazione totale della vita di una persona che viene presa di mira. Quando qualcuno è elencato come mentalmente instabile o come malato mentalmente, essenzialmente questo dà agli stalkers la libertà per tormentare questa persona, e se viene notata una qualsiasi reazione da parte della vittima viene usata per giustificare il fatto che la vittima è stata messa in una lista. Queste liste mettono l’intera comunità contro la persona e mai niente viene detto apertamente. In alcuni casi, questo silenzio è a causa dei accordi di reticenza che sono stati firmati da quelli che ricevono le notifiche. Si suppone che gli accordi di segretezza salvaguardino informazioni sensibili, ma la domanda è, salvaguardare da che? L’unica cosa che assicurano è che la persona posta come obiettivo non verrà mai a sapere di essere su una lista nera e che questo è il motivo per cui la gente lo tratta in modo diverso. Gli accordi di segretezza non sono sempre necessari per assicurare il silenzio della gente, comunque, il fatto che rivelare queste informazioni può avere come conseguenza una denuncia in polizia è abbastanza per tenere la maggior parte delle persone in silenzio, anche se vorrebbero parlarne a riguardo. Le liste di notifica sono diventate i mezzi per trasformare le comunità in reti di spie. Se quelli nella comunità che ricevono queste notifiche appartengono a gruppi di gang stalking, essenzialmente diventano gli occhi le orecchie e i canali di collegamento in una rete di sorveglianza e controllo. E poiché la polizia e il governo dirigono la distribuzione di queste liste una volta dato le notifiche viene dato essenzialmente il permesso di fare quello che vogliono contro la persona messa nella lista. La gente può essere elencata per essere degli “agitatori”, “devianti”, “dissidenti sleali”, “mentalmente instabile” eccetera, e queste etichette possono essere applicate abbastanza largamente per distorcere i fatti in modo che la reputazione di una persona venga completamente distrutta.

Alcune organizzazioni sono state anche fondate con lo scopo di reclutamento della gente nelle reti di spie comunitarie e dirigere le loro attività. Un organizzazione di questo tipo è la InfraGard, che viene gestita dall’FBI con divisioni in ogni stato così come in altri paesi. Viene gestita come organizzazione privata finanziata con fondi governativi, in modo che le informazioni che ha su un individuo non siano pubblicamente disponibili attraverso il Freedom of Information Act. Bisogna ricordare che l’FBI fu responsabile del COINTELPRO negli anni 1960 e anni 1970, e che fu un programma simile e dai risultati distruttivi per molte persone innocenti che furono ingiustamente presi di mira e etichettati come “sovversivi”. COINTELPRO è andato al di là di soltanto mettere in una lista nera una persona per molestarla, sabotare, manomettere la posta, violare il domicilio, intercettare e ricattare, che sono tutte attività portate avanti oggi dai gruppi di stalkng organizzato contro i loro obiettivi. Queste organizzazioni sono molto tecnologicamente avanzate, capaci di provvedere la logistica e la formazione ai membri, ed essenzialmente dargli il permesso per prendere di mira la gente elencata per conto del governo. Queste organizzazioni sanzionate dal governo perfino provvedono ai membri di questi gruppi sistemi GPS per monitorare i movimenti dei loro obiettivi. L’obiettivo verrà contro la propria volontà impiantato con un dispositivo di tracciamento ( non serve più al giorno d’oggi, nota mia ), sia nel proprio corpo che nel proprio veicolo in modo da poter venire localizzato con esattezza. È anche possibile che queste organizzazioni provvedono attrezzature di sorveglianza elettroniche ai loro membri.

Molti eventi organizzati potrebbero coinvolgere solo alcune persone ma possono includere livelli aggiunti di complessità, come l’uso di apparecchiature elettroniche per spiare, perseguitare e perfino torturare un obiettivo. Con il boom nelle innovazioni tecnologiche degli ultimi decenni e i diversi metodi per la modifica comportamentale e per il controllo mentale che sono stati testati e esperimentati, sia da entità governative che non ( particolarmente i militari e le comunità di intelligence ), come anche lo sviluppo di armi ad energia diretta ( ma non solo ). Il pensiero che tali innovazioni siano largamente testate e usate su un pubblico non sospettoso non è niente affatto inverosimile. I documenti che sono stati resi disponibili attraverso il “Freedom of Information Act” rivelano la realtà e la dimensione di queste tecnologie, così come il fatto che sono abitualmente testate sulla gente a loro insaputa.

Fonte: Gang Stalking and Mind Control – The Destruction of Society Through Community Spying Networks

└ Tags: armi elettroniche, controllo mentale, crimine organizzato, energia diretta, gang stalking, molestie, nuovo ordine mondiale, sevizie, Stalking organizzato, tortura
 Comment 

Organized Gang Stalking and Mind Control – A Creeping Evil

Jun12
on 12. June 2017 at 10:28
Posted In: English, Mind Control / Electronic Weapons Harassment, Organized Gang Stalking

Organized Stalking and Mind Control - A Creeping EvilThere is an increasing amount of nefariously evil activity going on amongst the public body. It is often disguised as ordinary activity and coincidental events that involve people who have no apparent reason to purposely act in the way they do. The strangers passing in the street, the tenants in the building you live in, the people you deal with at work all day, even your friends and members of your own family, each might begin to act in ways that seem suspicious, strange, often bizarre, and which result in causing you personal frustration, anger, emotional distress, paranoia, or worse.

What I am referring to is not isolated to just a few people among the population. According to the growing number of people coming forward and telling their stories, this is a problem of epidemic proportions. People are being targeted by a highly organized but loose-knit network of individuals who are involved in something that even they do not seem to fully comprehend the significance of.

People’s lives are being tampered with or completely destroyed, and although it seems that the purpose might be for any one of a number of reasons, they all boil down to an encroaching fascist system of government where every individual in the population is to eventually be controlled completely, and where every possibility of escape is impossible.

The activities that this network of individuals engage in are quite varied, but they all result in displacing the freedoms and choices that a person would normally expect to have in our society.

The evidence shows that this network is ultimately directed and controlled by people who have tremendous power and resources at their disposal, but who purposely remain hidden, and who are able to keep these activities separated far enough from themselves and disguising them well enough to not raise public awareness about what is going on so that something might be done to stop it before it is too late. It may already be too late.

Some people who report being the targets of these activities claim that the lengths that the perpetrators will go to in these acts include continual abusive harassment, psychological and physical torture and sometimes even murder. These strange activities will not be isolated events in a target’s life, but will be ongoing, usually occurring regularly enough that there can be no mistake that they are not just coincidental, but very purposeful.

For the person being targeted, these events will usually go on for a long time, usually for many years, and the perpetrators will often increase in their methods and persistence over time.

This odd activity is commonly referred to as ‘gang- stalking’, ‘cause-stalking’, or ‘organized stalking’, and for people who have never heard of it before, it’s somewhat hard to fathom both why and how the groups who stage these events can put so much time and planning into them, and can organize them so well for such apparently irrational purposes, and that is nobody involved in it ever says anything. The fact is, most or all of those people who engage in these activities have no idea of the extent of the network they are involved in, nor the real reasons why they are doing the things they are directed to do, nor who is ultimately directing them to do them and why. They are usually led into these gang-stalking groups through manipulation and deceit, using their sense of morals (or lack of them) and beliefs to influence their cooperation. Sometimes, they might even be acting without any conscious control or awareness of being involved in anything. These latter are among an ever-growing number of unwitting victims of electronic mind-control.

It’s becoming very apparent that these groups are organized and directed by both government and corporate interests, but certainly not limited to just these. They have been known to involve church groups, boy scout/girl scout groups, senior citizens, business owners and employees, police, street gangs, drug addicts, and even homeless people.

They can involve members of any and all social sectors, but at the street level where I have personally experienced these events most commonly taking place, the involved parties seem to typically be lower-income earners, drug addicts, sex offenders, homosexuals, or criminals, although the police, local business owners, and other members of the community are among those involved as well. The main motivation that I can see for people at the lower end of the social spectrum to participate is either financial reward or privileged consideration by the law, but often they might take part just for the fun and excitement of it, or because they think they are serving a good cause. Many of these people may have become caught up in these activities against their will, and may have initially been targets themselves and had their own lives ruined before being recruited to take part. The reward, no matter how small it might be, can be used as an incentive to coerce a person’s continuing involvement in these gang-stalking activities. It’s just a matter of knowing what a person’s weakness is and taking full advantage of it. However, this isn’t always necessary.

These gang-stalking groups can develop in any situation and at any level of society where people are joined together as a group with a common cause or similar beliefs, as well as among those who are not otherwise affiliated with each other in any sort of way prior to engaging in these activities. Gang-stalking groups might be formed out of political groups, businesses and business groups, church groups, or community watch groups just as easily as they might be formed by criminal gangs or any other groups of people or individuals that can be recruited into them.

When this epidemic problem first started, those who organize and direct these activities focused on recruiting from already organized groups of people who, because of the nature of their group, could be easily influenced to engage in these activities by making the activities appear as though they were serving their cause (thus the alternate term ‘cause- stalking’). But things have since progressed to the point that now people are being recruited in any manner of ways, both individually as much as from within these otherwise well-meaning groups. They can include anybody at all, from the highest levels of society to the lowest. The same goes for those who are targeted as well, and the excuses for being targeted have become just as various.

The earliest reported cases of targeting by gang- stalking groups were government and corporate whistleblowers, many of whom have suffered the effects of what are called “directed-energy weapons” and mind-control technologies. But these cases are unique to their situation because they have been centered around the activities of those who possess these weapons and technologies (which is what they were often exposing as whistleblowers), and so the weapons and technologies have been available to use on them. These weapons and technologies are not being used on all gang-stalking targets, and they are not in the hands of just anyone, but remain predominantly within military and intelligence circles. By far, the majority of gang-stalking activities are carried out by ordinary people through ordinary means and without high- tech gadgetry beyond what is commonly available to the public. Gang-stalking groups can be organized and directed in their operations to inflict misery on people without the need to employ such advanced technologies. However, their application in this area is not out of the question, and they may be being integrated into these operations.

One of the purposes for setting up gang-stalking groups is to simply have them monitor and report on certain individuals within the community, and to see that they don’t do anything that the controllers of these groups do not want them to do. This monitoring often involves monitoring the gang- stalking group members as much as the targets, although the targets are usually of interest for other reasons as well. They are often targeted because they are vocal about government or corporate corruption, are not submissive to giving up their freedoms under the perceived threat of terrorism, or are otherwise seen as a potential threat to the controllers and the implementation of their fascist plans for our future. Any plausible excuse that will cause a certain group of people to perceive someone as a threat seems to be enough to influence the participants to recruit the group into engaging in gang-stalking activities against that person.

The activities that are undertaken do not always appear to those engaging in them to be as damaging as they actually are, because the gang- stalkers may not be aware of much more than the small parts they or their group play and will be ignorant of the activities of other gang-stalking efforts simultaneously taking place against the target. The many small efforts taken by a number of different people who are unaware of each other’s activities can quickly add up to serious problems for a target. It only takes someone who is in a position to be able to influence each of these participants or groups separately and direct them in what to do to create the sort of damage to a person’s life that these gang-stalking activities result in.

Although these gang-stalking groups are made up of people from any and all levels of society, and these people may not seem to be engaged in anything more than low-level activities for seemingly justifiable reasons, the truth is that they are being organized and directed by the highest levels of government and corporate sectors for deeper reasons than just monitoring or punishing certain individuals. Gang-stalking is a means of policing the community by having it police itself, while at the same time developing the means for manipulating members of the community to think and act in ways that suit the needs of the controllers. Therefore, all segments of society are being brought into these activities by one means or another, in order that all social sectors are covered.

One particular type of person who is very easily influenced to take part in these gang-stalking activities, and who tends to take part regularly and completely voluntarily, is the more gullible and naïve but well-meaning ‘do-gooder’ who is more or less blind to the increasing corruption that permeates the higher rungs of society. These ‘do- gooders’ are those people who don’t dare to question authority and will easily react to threats and intimidation. Typically, if they are approached by the police and asked to assist in an investigation, they feel honored and even proud to be able to be involved in something that they think is for the good. Since they dare not question authority, they don’t ask too many questions and feel that it’s okay to do whatever they’re asked to do at the request of a police officer. The police know this and will tell them whatever might be necessary to persuade them to take part in these activities. This makes the most patriotic, law abiding members of society who trust authority without question the easiest to initiate into these evil activities. This is worrisome, because these are the people who most value their freedoms, and they think they are fighting for them by engaging in these activities when really they are helping to destroy them.

There are also certain groups that have been very easy to recruit specifically because they trust those who recruit them and believe that what they are being told about a target is true. These were the first people to be approached and brought into this network of community spies. These include neighborhood watch groups and church groups, which are usually approached by the police and asked to assist in monitoring certain people who are portrayed as a potential threat to the community.

The police have established a close relationship with these groups, and use them regularly for gang stalking operations.

Gang-stalking events entail a number of different harassment techniques that are fairly common among these groups, but other more innovative techniques are not out of the question. Community based organized gang stalking will revolve mostly around the neighborhood where a target lives and/or their workplace, but can extend to anywhere at all that the target might go in public. Most gang-stalking events are preplanned and many of them are carried out in a manner that requires an extensive number of well-placed participants coordinating their actions in a manner that creates a negative situation for the target but which seem to anyone else like purely coincidental everyday events. These staged events, when they occur in public, are in some cases referred to as “street theatre” because they occur in public at the street level, but other staged events can center around the target’s home or place of employment. The number of involved parties, the scope of their coordinated efforts, the type of staged events, and the length of time that these events continue reveals a deeply-rooted and very sophisticated enterprise that can only be orchestrated by people with certain means that ordinary citizens just don’t have. This indicates the higher sector of society that those who orchestrate these events come from.

Although I focus mainly on the police when I talk about the handlers or controllers of these gang- stalking groups, they are not the only people that are involved in recruiting or managing the members of these groups, and they are not always consciously aware of what they are actually involved in any more than anyone else might be that takes part in these activities. These gang- stalking groups and their activities are directed and handled through a chain of command, and the police are often just following orders and normal police procedures that they have been trained to do. However, there are many within the police forces (and elsewhere) who are corrupt and whose ideologies are completely in line with those who ultimately control and direct the activities of these gang-stalking groups. Following orders without question and engaging in underhanded covert tactics to ‘fight crime’ are standard requisites to being a police officer. Those who sit at the top of the chain of command-and-control know exactly which people working under them are best suited for what might need to be done to facilitate these groups and their activities for the desired ends, and so they will see that those best suited are used where they are needed when they are needed and to the degree that they are needed. This needs to be kept in mind when you consider how these gang-stalking efforts can be accomplished without exposure of what is going on. It should also be understood that compartmentalization of knowledge is routine procedure within all sectors of the government, which is a very effective method of keeping secrets secret. This same method is also used in the business sector, in particular with those corporate entities that tend to work very closely with the government or who handle sensitive information.

The sorts of activities that might be used against a target include slashed tires, broken windows, break-ins, tampering with property, poisoning pets, random assaults, thefts, spreading of false rumors, persistent noises and disturbances, bugging of residence, excessive police harassment, unexplained loss of employment, over-charging on phone and electrical bills, delayed or missing mail, blatant tailing, excessive staring by strangers, excessive rudeness by strangers, odd comments by strangers regarding things they should not know… the list goes on, and the activities can be much worse and much stranger. For example, it is very common for a target’s home to be broken into regularly, where only minor signs are left behind that a break-in occurred, but which are significant enough to be noticed yet not significant enough to warrant calling the police. Nothing will usually be taken, but the target may find things moved around, or they might detect the smell of cigarette smoke, or lights that were turned off will have been turned on. As you can imagine, these sorts of things, if they happen with enough frequency, can lead from confusion to a state of anxiety to full- blown paranoia very quickly. A person who experiences such activity can be made to appear delusional very easily.

Notification lists were initially used by the police to keep tabs on dangerous offenders such as pedophiles and violent criminals, and to warn people in the community about their presence. In the United Kingdom this list is called the Violent Persons Registry. These lists have since been expanded in scope so that now someone can be put on one even if they are perceived as being potentially dangerous, and it is no longer just the police who can put someone on the list. This expansion of these lists centers around certain health and safety laws, which require employers and employees to report people for showing signs of threatening or violent behavior, or whatever might be deemed inappropriate behavior. A threatening look, raised voice, or politically incorrect comment can be enough to get a person listed. There is little or no oversight provided to assure that those who go on these lists and the situation that got them put on it have been properly assessed, which leaves plenty of room for corruption and abuse of the lists. A person who is placed on one of these lists is usually never informed of the fact, and therefore has no chance of defense. When a person goes on a list, anyone in that person’s community who might come into contact with the person is notified. This can include family and friends, neighbors, co-workers, schools, local businesses, etc. These notifications will follow a person wherever they go, should they decide to move or travel. Even if/when a person is removed from the list, those who have received notifications about them will continue to perceive them as a threat. These lists are used by gang-stalkers as target lists. The lists provide a sense of justification for their activities, and with a little bit of direction, they can cause devastation to a targeted person’s life. When someone gets listed as emotionally unstable or mentally ill, it essentially gives others free reign to torment the person, and any reaction from the person is seen to justify the label that has been put on them. These lists turn the entire community against the person, and yet nothing is ever said openly. In some cases, this silence is due to non-disclosure agreements having been signed by those receiving the notifications. These non- disclosure agreements are supposed to safeguard sensitive information, but the question is, protect it from what? The only thing that they assure is that the targeted person never knows that they are on the list and this is why people are treating them differently. Non-disclosure agreements are not always necessary to assure people’s silence, however, and merely reminding someone that disclosure can result in criminal charges being laid is enough to keep most people silent, even if they want to speak up. Notification lists have become a means for turning communities into spy networks. Whether those in the community who receive these notifications belong to gang-stalking groups or not, they essentially become the eyes and ears and communications links in a network of surveillance and control. And since the police and government manage the distribution of these lists, those who are given notifications are essentially being given permission to do what they want to the person.

People can get listed for being ‘troublemakers’, ‘deviants’, ‘disloyal dissidents’, ‘mentally unstable’, etc., and these labels can be applied broadly enough to distort the facts so that the character of a person is destroyed. Certain organizations have also been erected for the purpose of recruiting people into community spying networks and to direct their activities. One such organization, called InfraGard, has been set up by the FBI with chapters in every state as well as in other countries. It is set up as a government- funded private corporation, so that the information it has on an individual is not publicly available through the Freedom of Information Act. It needs to be remembered that the FBI were responsible for COINTELPRO in the 1960s and 1970s, which was a similar program that had destructive results for many innocent people who were unfairly targeted as ‘subversives’. COINTELPRO went beyond just blacklisting, and involved harassment, sabotage, mail tampering, break-ins, wire-taps, and blackmail, which are all activities being carried on today by gang-stalking groups against their targets. These organizations are very high-tech, capable of providing logistics and training to members, and essentially giving them carte-blanc license to target listed people at the behest of the government.

These government sanctioned organizations even provide GPS tracking systems for their members to locate their targets. The target will be surreptitiously planted with a tracking device, either on their person or their vehicle, and can thereafter be pinpointed. It is quite possible that these organizations also provide electronic surveillance equipment to their members.

Many staged events might involve only a few people, but may include added levels of sophistication, such as the use of electronic gadgetry for spying on, harassing, and even torturing a target. With the boom in technological innovations that have been made in the last few decades, and the diversity of methods of behavior modification and mind-control that have been and are being explored by certain factions both within and outside of government (particularly the military and intelligence communities), including the development of directed-energy weapons (but not limited to them), the thought that such innovations are being widely tested and used on an unsuspecting public is not at all farfetched.

Documents that have been made available through the Freedom of Information Act reveal the reality and extent of these technologies, as well as the fact that they are routinely tested on unsuspecting people.

Gang Stalking and Mind Control: The Destruction of Society Through Community Spying Networks – A. K. Forwood

└ Tags: Book, Directed Energy Weapons, Electronic Harassment, Experimentation, gang stalking, Mind control, organized crime, organized stalking, torture, Watch list
 Comment 

Organized Gang Stalking and Targeted Individuals – The 6 Phases

Jun09
on 9. June 2017 at 16:53
Posted In: English, Mind Control / Electronic Weapons Harassment, Organized Gang Stalking

Organized Gang Stalking and Targeted Individuals - Guinea PigsTargeted individuals are experiencing a form of experimentation that follows a progression of phases that include selection, surveillance, stalking, defamation, attack, and monitoring. These six phases may have some overlap; however, they are distinct enough to separate them into phases. The time spent on each phase may vary from individual to individual and is probably a reflection of the desires of the perpetrator of the experimentation. Again, the description is based upon a compilation of data and counter-intelligence gathered from surveillance of a perpetrator group identified in San Antonio, Texas. The group in Texas that was counter-surveilled has been independently identified by four unrelated victims from four different geographic areas of Texas.

Targeted Individuals – Phase 1: Selection

Selection of a target may be for a myriad of reasons at the local level. One must remember this technology is not available to the average person. The groups perpetrating this type of experimentation are given access to the technology as covert, independent contractors of the government agencies responsible for its development. This research is a continuation of earlier behavioral control operations which were mostly done through front companies. The current experimentation is no different. The groups given access to the technology are allowed to choose victims for any reason they deem necessary. The agencies behind the technology are merely interested in collecting the data on its successes or failures. Therefore, as the data is collected at the top from each of the many perpetrator groups, the selection of victims probably appears random. The selection demographics look very different at the local level.

While a small number of victims have come forward with convincing evidence of direct harassment from various government agencies, these are mostly whistle-blowers employed by the same agencies and comprised the minority. Most victims are everyday people who would be considered “common” by most standards. Through interviews and questionnaires, we have found some trends among the victim population. To summarize, the selection of targets for inclusion into this experimental protocol may be specific at the local level with some aspect of particular traits that are sought out by the perpetrators. At the agency level, where the data is ultimately compiled, each perpetrator group’s inclusion criteria probably average out to give the target population a random appearance.

Targeted Individuals – Phase II: Surveillance

Surveillance of the chosen target closely follows selection. The surveillance phase differs from the stalking phase in that during the surveillance phase the target is unaware that it is occurring. Once selected, the target is extensively surveilled through multiple means which include background checks, credit checks, mail tampering, email hacking and direct observation, both physically and electronically. Surveillance accomplishes several important goals that are integral to the success of the remainder of the operation. It allows the perpetrator to accurately determine the target’s daily living activities. Most importantly, where they live, work, bank and how they spend their leisure time are quickly assessed. The people they spend the majority of their time with are identified and scaled in order of importance. For instance, highly valued circumferential targets would include the target’s close family members, supervisors, physicians, clergy and anyone else that they may spend substantial time communicating with. This allows the perpetrators to know with reasonable certainty who the target will confide in once they are aware of their targeting. During this phase the target’s social status is ascertained with regard to their relationships with loved ones, neighbors, co-workers, supervisors, and others. Any participation in taboo behavior such as drug use, excessive alcohol intake, domestic violence, infidelity or pornography are especially noted and followed up on very closely. All the data collected during this phase will be used to control, mislead, defame, and isolate the target. Also, during this phase the perpetrators will often have neighbors, coworkers and relatives assisting them with the surveillance. This is usually accomplished by misleading those individuals into thinking they are assisting with a legitimate law enforcement investigation. In one instance the private investigative agency perpetuating the surveillance identified themselves to a target’s neighbor as FBI agents, complete with fraudulent identification badges. One would be very surprised at the number of people who fall for this ploy without even asking for appropriate identification or contacting the alleged agency to inquire if the surveillance is legitimate. Ignorance of the laws, both nationally and at the state level, regarding surveillance and right to privacy, make this a very effective ploy. The successful application of this technique by the perpetrators will later legitimize the defamation phase and protect them from possible arrest during the stalking phase. With the neighbors believing that they are assisting with an investigation by a legitimate agency, they are more apt to believe the defamatory remarks they are told about the target. Moreover, they are less likely to call the police and report the vehicles they see parked in front of the target’s home throughout the night.

Targeted Individuals – Phase III: Stalking

Stalking of the target is a natural extension of the surveillance phase. These phases differ in that the surveillance phase is usually unknown to the target while the stalking phase is done with full awareness of the target. In current literature, the stalking phase of this type of victimization is usually described as gang stalking, organized stalking, or cause-stalking. Gang stalking and cause-stalking are inaccurate descriptions in that they imply either street gang involvement or some grandiose reasoning behind the stalking. Organized stalking is probably the most accurate description, reflecting the highly organized and methodically planned out form of stalking that these victims experience. The methods involved are directly adapted from the COINTELPRO operations ran by the FBI in the 1950’s and 1960’s against groups seen as radical elements. The tactics include total inundation of the target at home and wherever they may go, breaking and entering of their domicile and physical harassment and intimidation. Electronic harassment is used during this phase with regard to email tampering, computer hacking, cell phone spoofing and cyber-bullying! More exotic forms of electronic harassment are covered as part of the attack phase but may be present in any phase of this type of victimization.

Targeted Individuals – Phase IV – Defamation

The stalking phase serves several important functions for the group perpetuating the operation to insure that the target is totally I enveloped in the operation with minimal chance of escape. It places the victim in a victim-mind state of hopelessness, especially once the victim has been ignored by police agencies through which the victim has sought help. Stalking is very difficult for police agencies to prosecute under normal circumstances. Police assistance in cases of organized stalking where the victim’s everyday actions have been studied through surveillance for months or years is nearly futile. In addition, the stalkers are highly trained, often with federal or local law enforcement backgrounds themselves, in pushing the envelope just short of giving the police a reason to investigate. The hopelessness that ensues from the feeling that all backs have been turned from believing or assisting the victim is integral to the success of the operation. After repeated police complaints of break-ins where nothing is stolen and personal belongings have been rifled through, the victim is labeled mentally unsound and further police complaints are ignored. Only felony burglary will be investigated by law enforcement agencies. Criminal trespassing will only result in a report that is filed away without an investigation. At worst, multiple complaints of stalking and criminal trespassing will result in a psychiatric referral or mandatory twenty-four hour psychiatric evaluation. The inability of the victim to get appropriate law enforcement assistance helps instill the belief that law enforcement is complicit in their victimization and limits them from further complaints. Once this level of hopelessness is achieved, the perpetrators feel confident in escalating their stalking to more frequent breaking and entering as well as physical and sexual assault with less risk of arrest. The victim mind state often causes the target to go into an extreme state of reclusion which furthers their chance of a psychiatric diagnosis once a psychiatric exam is requested or mandated. This part of the operation has been brilliantly designed with assistance from psychiatric professionals and is a scenario that continues to play out to perfection in almost every case.

The stalking phase serves another purpose. The victim must be located through GPS in order for the constellation of other modalities to be used on them. This can be accomplished in several different ways. Stalking may be a way of performing constant 24/7 GPS location through GPS enabled devices in the hands of the stalkers. This obviates the need for tracking i , chips in the victim and explains why the stalking phase almost always comes to an abrupt end with only the electronic harassment remaining. At one time chipping the target, much like GPS chipping of animals to study migratory patterns, was probably the more common scenario. However, this exposes the perpetrator group to the possibility of arrest for physical assault if caught and provides evidence of assault to the victim if the chip is found. A less risky alternative to stalking the victim close 1 enough to remotely GPS them until their EEG can be catalogued and used through remote neural monitoring for the remainder of the operation. Our research has reinforced this fact. We have frequency scanned thousands of victims for covertly placed micro-chips with very few found on x-ray or MR1. To add to the confusion, part of the operation is apparently to convince the target that they have been chipped. This causes them to exhaust their finances looking for an embedded device that doesn’t exist contributes to their psychiatric diagnosis. Essentially, while chipping was once integral to the operation, it is now part of the psychological victimization. However, because many people have been complaining of this targeting for a decade or more, scanning for a tracking chip should probably be part of their work-up.

The stalking phase takes place hand-in-hand with the defamation phase. Inevitably, the stalkers are occasionally caught and questioned by neighbors, onlookers, or possibly local law enforcement officials. The excuse most often given to those who question the stalking is that the target is under official investigation for a drug, sex, or criminal crime. Since most of this type of stalking is usually done by private investigative groups, they often have former officers on their payroll or close enough relationships with local municipalities that the police question them no further. Neighbors that have noticed the 24/7 stalking are usually receptive of the drug or sex crime excuse for the simple reason that only a legitimate agency would spend the money necessary to surveil someone “really dangerous” for twenty four hours per day. The defamation is much worse for licensed professionals such as doctors, lawyers, teachers, nurses or any state licensed professional. Moreover, until recently most states have had very weak anti-stalking laws that are not easily enforced. Texas has taken the lead in 2011 with a bill written by state legislator Jane Nelson and Judith Zaffirini that was passed into law. The bill was written after a young woman who complained of stalking to the Bexar County Sheriff’s Department was written off as mentally ill. Her stalker had held her at gunpoint while forcing her to slit her own wrists and write a suicide letter. She survived but was largely ignored by the appropriate agencies she entrusted to help her. Several months later her stalker followed her to work and murdered her in the parking lot. According to the new law, a restraining order can be issued now against an alleged stalker without first proving bodily injury by that person or persons. Furthermore, the definition of stalking has been changed to make the charge much easier to put forth. Unfortunately, this charge did not come in time for Kristi Appleby for whom the law was changed. An organized effort should be undertaken to force every state to follow suit in altering their stalking rules. This will make defending against organized stalking much easier. Currently, the perpetrators of this type of stalking take full advantage of the lack of legislation against it.

While it appears that I am solely placing blame on independent private investigative agencies for the stalking, I am not excluding participation by corrupt individuals that are active duty law enforcement at federal and local levels. This does occur, as I will illustrate. One must remember that the technology being used to commit these crimes originates at the federal government level. Hence, it is seen being used most often by private investigative agencies that are owned and operated by former FBI agents. These individuals maintain contacts with the agency who work with them in a reciprocal relationship. These relationships are imperative to the defamation phase. An active duty police officer or FBI agent spreading this same misinformation is seen as much more credible by the people being subjected to it..

Targeted Individuals – Phase V – Attack

The attack phase is characterized by directed-energy attacks meant to disrupt normal physiologic functioning. It may occur at any time during a victim’s targeting but is most noticeable as a distinct phase late in the targeting. Early attacks, prior to the victim’s awareness of stalking or defamation, may be perceived as ordinary physiological medical issues. Often the victim has multiple physician visits with complaints of muscle twitching, headaches, heart palpitations, skin burning and other more obscure complaints with nothing medically abnormal found. Later in their targeting the attacks are accompanied with voice to skull transmissions that make it very obvious to the victim that their ailments are not the result of medical pathology. Once the perpetrators are certain the victim is hearing their transmissions and have noticed the stalking, the attacks will escalate. During the attack please, the victim can expect to be assailed almost twenty-four hours per day. If the victim is lucky enough to still be employed by the time this phase begins, attacks will be used as their key weapons to sleep deprive the victim. Often, the attacks will subside just long enough for the victim to fall asleep with hopes that they will sleep through their alarm and be tardy or absent to work. Remember, the goal of this phase is complete annihilation of the victim’s personal and professional life. This phase will continue until these goals are met or the perpetrator group is diverted or hired to target someone else. Manpower constraints within the perpetrator group will often result in abrupt cessation of attack as they focus their attention on another target that they’ve been directed or paid to attack. However, the victim will still usually have the infrequent attacks as a reminder that they are still being watched and are not entirely free from the program.

It is my belief that some of the attacks are secondary to directed energy attacks at specifically targeted peripheral nerves, muscles and organs and not strictly through the central nervous centers controlling them. In effect, the same directed energy modalities being used to open and close garage doors, turn lights on and off and disrupt computer screens in the victim’s home may also be used to physically attack the victim at targeted sites other than the brain. This may explain why neuro programming to alter the EEG in most victims does stop some, but not all, of the attacks. It would stand to reason that with the myriad of weapons within the electromagnetic spectrum at their disposal, the mode of attack would be variable in nature and not dependent solely upon central nervous system manipulation.

The weapons used in the attack phase include microwave, millimeter wave, radio-frequency, laser and probably scalar modalities. All of these modalities have been researched extensively and weaponized for military use as mentioned earlier in the book. While they have all been identified under the heading of “non-lethal” weapons, non-lethality in the research setting was not based on 24/7 exposure. Moreover, the exact effect of their exposure long term on the human body is not known, at least not in official research. The victims of the current experimentation may be the guinea pigs of some type of long term exposure protocol that is too unethical to be done under a legitimate Institutional Review Board with consenting volunteers.

Targeted Individuals – Phase VI – Monitoring

The attack phase is followed by the monitoring phase. Having worked with multiple victims that have been victimized for varying lengths of time, it is clear that the victims have been chosen for experimentation for the duration of their lifetime. Dr. Duncan and I are in agreement that the targeting is done for the life of the individual. However, once the goals of the perpetrators have been met, namely, social, personal and occupational destruction, the attack phase often lessens. As mentioned earlier, this victim will experience the occasional attack as a reminder to them that they are still being watched. Apparently, one of the rules of this experimental protocol is that once a victim is chosen, he or she must be monitored until their natural death occurs. Many victims are drawn to suicide by their respective perpetrators. This may be an attempt by the perpetrator groups to prematurely end the monitoring phase of one particular victim so manpower can be focused on other victims. The psychological resilience of the victim to the stress of the experimentation obviously plays a factor as well. From a medical perspective, the monitoring phase is probably to denote any immune problems, cancers, psychiatric problems or diseases that may result from the long term exposure to the electromagnetic weapons used in the experimentation. These issues will need to be elucidated before those modalities are released on the population as a whole for psycho-social control. In 1971 Dr. Jose Delgado, and MKULTRA researcher, published “Physical Control of the Mind: Toward a Psychocivilized Society.” His research required implanting the brain with a micro-chip to acquire the desired results. The development of directed energy has allowed for more efficient delivery with even better results without the need for brain implantation.

Guinea Pigs: Technologies of Control – John Hall

└ Tags: Directed Energy Weapons, Electronic Harassment, Electronic Weapons, Experimentation, gang stalking, Guinea Pigs: Technologies of Control, John Hall, organized stalking, Targeted Individuals, TI
1 Comment

Mind control: Total Population Control – Nicholas Jones

Jan22
on 22. January 2014 at 02:16
Posted In: English, Mind Control / Electronic Weapons Harassment

An overview of the ELF, GWEN towers, and HAARP inter-connection

Earth Resonant Frequency

Natural waves are created which result from electrical activity in the atmosphere. They are thought to be caused by multiple lightning storms. Collectively, these waves are called ‘The Schumann Resonance’, with the strongest current registering at 7.8 Hz. These are quasi-standing [scalar], extremely low frequency (ELF) waves that naturally exist in the earth’s electromagnetic cavity which is the space between ground and the Ionosphere. These ‘earth brainwaves’ are identical to the frequency spectrum of our human brainwaves.

HAARP

The Creator designed living beings to resonate to the natural Schumann Resonance frequency pulsation in order to evolve harmoniously. The Ionosphere is being manipulated by US government scientists using the Alaskan transmitter called HAARP, (High-Frequency Active Auroral Research Program) which sends focused radiated power to heat up sections of the Ionosphere, which bounces power down again. ELF waves produced from HAARP, when targeted on selected areas, can weather-engineer and create mood changes affecting millions of people. The intended wattage is 1,700 billion watts of power.

Geomagnetic Waves & GWEN

Sixty four elements in the ground modulate, with variation, the geomagnetic waves naturally coming from the ground. The earth’s natural ‘brain rhythm’ above is balanced with these. These are the same minerals found in red blood corpuscles. There is a relation between the blood and geomagnetic waves. An imbalance between Schumann and geomagnetic waves disrupts these biorhythms. These natural geomagnetic waves are being replaced by artificially created low frequency (LF) ground waves coming from GWEN Towers.

GWEN (Ground Wave Emergency Network) transmitters placed 200 miles apart across the USA allow specific frequencies to be tailored to the geomagnetic-field strength in each area, allowing the magnetic field to be altered. They operate in the LF range, with transmissions between LF 150 and 175 KHz. They also emit waves from the upper VHF to the lower UHF range of 225 – 400 MHz. The LF signals travel by waves that hug the ground rather than radiating into the atmosphere. A GWEN station transmits in a 360 degree circle up to 300 miles, the signal dropping off sharply with distance. The entire GWEN system consists of, (depending on source of data), from 58 to an intended 300 transmitters spread across the USA, each with a tower 299-500 ft high. 300 ft copper wires in spoke-like fashion fan out from the base of the system underground, interacting with the earth, like a thin shelled conductor, radiating radio wave energy for very long distances through the ground.

The United States is bathed in this magnetic field which can rise from ground up to 500 ft, but goes down into basements, so everyone can be affected and mind-controlled. The entire artificial ground-wave spreads out over the whole of the USA like a web. It is easier to mind-control and hypnotize people who are bathed in an artificial electromagnetic-wave.

GWEN transmitters have many different functions including:

  1. controlling the weather,
  2. mind control,
  3. behavior and mood control, and
  4. sending synthetic-telepathy as infrasound to victims with US government mind-control implants.

GWEN works in conjunction with HAARP and the Russian Woodpecker transmitter, which is similar to HAARP. The Russians openly market a small version of their weather-engineering system called Elate, which can fine-tune weather patterns over a 200 mile area and have the same range as the GWEN unit. An Elate system operates at Moscow airport. The GWEN towers shoot enormous bursts of energy into the atmosphere in conjuction with HAARP. The website www.cuttingedge.org wrote an expose of how the major floods of the Mid-West USA occurred in 1993.

Human Vulnerability

Dr Andrija Puharich in the 50’s/60’s, found that clairvoyant’s brainwaves became 8 Hz when their psychic powers were operative. He saw an Indian Yogi in 1956 controlling his brainwaves, deliberately shifting his consciousness from one level to another. Puharich trained people with bio-feedback to do this consciously, making 8 Hz waves. A healer made 8 Hz waves pass into a patient, healing their heart trouble, her brain emitting 8 Hz . One person emitting a certain frequency can make another also resonate to the same frequency. Our brains are extremely vulnerable to any technology which sends out ELF waves, because they immediately start resonating to the outside signal by a kind of tuning-fork effect. Puharich experimented discovering that

A) 7.83 Hz (earth’s pulse rate) made a person feel good, producing an altered-state.
B) 10.80 Hz causes riotous behavior and
C) 6.6 Hz causes depression.

Puharich made ELF waves change RNA and DNA, breaking hydrogen bonds to make a person have a higher vibratory rate. He wanted to go beyond the psychic 8 Hz brainwave and attract psi phenomena. James Hurtak, who once worked for Puharich, also wrote in his book The Keys of Enoch that ultra-violet caused hydrogen bonds to break and this raised the vibratory rate.

Puharich presented the mental effects of ELF waves to military leaders, but they would not believe him. He gave this information to certain dignitaries of other Western nations. The US government burned down his home in New York to shut him up and he fled to Mexico. However, the Russians discovered which ELF frequencies did what to the human brain and began zapping the US Embassy in Moscow on 4 July 1976 with electromagnetic-waves, varying the signal, including focusing on 10 Hz. (10 Hz puts people into a hypnotic state. Russians and North Koreans use this in portable mind-control machines to extract confessions. A machine was even found in an American church to help the congregation believe!) The Russian “Woodpecker” signal was traveling across the world from a transmitter near Kiev. The US Air Force identified 5 different frequencies in this compound harmonic Woodpecker signal that was sending signals through the earth and the atmosphere.

Nikola Tesla revealed in 1901 power could be transmitted through the ground using ELF waves. Nothing stops or weakens these signals. The Russians retrieved Tesla’s papers when they were finally returned to Yugoslavia after his death.

Puharich continued to monitor the Russian ELF wave signal while in Mexico and the higher harmonics produced in the MHz range (5.340 MHz). He met the CIA and started working for them. He and Dr. Robert Beck designed equipment to measure these waves and their effect on the human brain. Puharich started his work by putting dogs to sleep. By 1948/49 he graduated to monkeys, deliberately destroying their eardrums to enable them to pick up sounds without the eardrum intact. He discovered a nerve in the tongue could be used to facilitate hearing. He created the dental tooth implant which mind-control victims are now claiming was surreptitiously placed in their mouth by controlled dentists causing them to hear ‘voices in their head.’ The implant was placed under dental caps or lodged in the jaw.

Vaccine Implants

Implants are now smaller than a hair’s width and are injected with vaccine and flu shots. Millions have had this done unknowingly. These ‘biochips’ circulate in the bloodstream and lodge in the brain, enabling the victims to hear “voices” via the implant.

Electromagnetic Disease Transmission, ELF, & Chemtrails

The physics and engineering behind electromagnetic disease transmission are frightening. Diseases can be reproduced as ‘disease signatures’ in that the vibration of a disease can be manufactured and sent on to be induced. (The brainwave pattern of hallucinogenic drugs can also be copied and sent by ELF waves to induce ‘visions’.) Once diseases are sprayed in the air, electromagnetic-waves attuned to the disease, using harmonics and subharmonics, will make them more lethal and infectious by sending particular disease frequency death-patterns.

Chemtrails are being sprayed daily all over USA (and other countries too) in a white crisscross pattern. They contain diseases and chemicals which affect our state of consciousness. They can produce apathy which works in conjuction with fluoridation of the water, as well as aspartame and drugs. Fluoride disables the willpower section of the brain, impairing the left occipital lobe.

Fluoride and selenium enable people to ‘hear voices’. ELF waves create disturbances in the biological processes of the body and these can be activated in the population once the diseases are introduced into the body from the chemtrails.

Some chemtrails have been analyzed and shown to be creating cleavages in spacial perceptions, blocking the interaction of various amino-acids that relate to higher-consciousness and to increase dopamine in the brain producing a listless, spaced-out state of lower reactive mind.

Basically, the goal is to fog the difference between the real and unreal and some of this could be connected with the many UFO abductions occurring en-mass. Hundreds have been witnessed laid out on tables and implanted. Intelligence agencies are in league with each other behind this disablement of the masses to such a point that they can’t even fight back. In order for the perpetrators to do what they want, they need the overall ‘frequency’ of each victim to function at a specific rate below the threshold of awareness.

Could this be part of a greater plan with mind-control transmitters covering the whole of USA and England, cleverly disguised as cell phone towers and trees? The power from microwave towers may be turned up to such a level that people can die.

A brain functioning at beta-level (above 13 Hz) is agitated and can’t change its perceptions, if it is artificially maintained by technology to that frequency. This may increase body electricity in others, giving them psychic powers. Is this linked to the New-Agers claim of a rising 12-14 Hz Schumann Resonance, inching us towards the 4th dimension? Stimulants ingested globally from caffeine genetically-modified plants, may also produce an impact on the ‘global-brain’ in the ionosphere collecting our brainwaves. New-age channellers say we are going into 4th dimensional frequency. They ‘heard’ the voice of some ‘ET’ who told them.

However, some ‘ETs’ may be local boys. Voices in the head were produced in prisoners in Utah prisons using Tesla technology. Each of the prisoners received the same message from an ‘ET’. Today, it seems, it’s easy to produce ‘voices in the head’ without implants.

A prisoner called David Fratus in Draper Prison, Utah in 1988 wrote:

“I began to receive, or hear, high-frequency tones in my ears. When I plug my ears… the tones are still inside and become amplified. It’s as if they had become electrified echo chambers with the sounds coming from the inside out..I began to hear voices..into my inner ears as vivid as though I were listening to a set of stereo headphones..with the end result being that I am now having my brain monitored by an omnipotent computerized mind reading or scanning machine of some sort ”

Hundreds of inmates at the Gunnison Facility of the Utah State Prison, and the State Hospital were subject to this brand of mind-control in order to test it. In the early 1970s, this was brought out in the Utah U.S. District Court, because inmates who had been subjected to this Tesla-wave mind-control in prison had tried unsuccessfully to fight back in court. The University of Utah researched how Tesla-waves could be used to manipulate the mind into hearing voices, overriding and implanting thoughts into the mind, and reading the thoughts, as well as developing eye-implants.

Tracking

Cray computers, using artificial-intelligence, monitor the victims of government implants sending pre-recorded sound-bytes or occasional live messages. They are picked up by satellite and relayed to whatever large TV broadcasting antenna, GWEN tower or other microwave antenna is near the victim. It’s believed that some type of body implants pick up the signal and broadcast the correct Tesla-wave pattern to create voices within the victim.

The tracking implant keeps the staff and the satellite system informed every few minutes as to exactly where to send the voice signals. The master computer and central HQ for this is reported to be in Boulder, CO. It is thought that transponders are being made there as well. The central cellular computer is in the Boulder, CO National Bureau of Standards building. AT&T is also cooperating in this project. Several government agencies work together on this.

Tim Rifat of UK wrote that: “this inter-cerebral hearing is used to drive the victim mad, as no one else can hear the voices transmitted into the brain of the target. Transmission of auditory data directly into the target’s brains using microwave carrier beams is now common practice. Instead of using excitation potentials, one uses a transducer to modify the spoken word into ELF audiograms, that are then superimposed on a pulse modulated microwave beam.”

The Sydney Morning Herald on 21 March 1983 published an article by Dr Nassim Abd El-Aziz Neweigy, Assistant Professor in the Faculty of Agriculture, Moshtohor Tukh-Kalubia, Egypt. It stated:

“Russian satellites, controlled by advanced computers, can send voices in one’s own language interweaving into natural thoughts to the population of choice to form diffused artificial thought. The chemistry and electricity of the human brain can be manipulated by satellite and even suicide can be induced. Through ferocious anti-humanitarian means, the extremist groups are fabricated, the troubles and bloody disturbances are instigated by advanced tele-means via Russian satellites, in many countries in Asia, Africa, Europe and Latin America.”

Another source says that these have been fed with the world’s languages and synthetic telepathy will reach into people’s heads making people believe God is speaking to them personally to enact the Second Coming, complete with holograms! The Russians broke the genetic code of the human brain. They worked out 23 EEG band-wave lengths, 11 of which were totally independent. So if you can manipulate those 11, you can do anything.

NSA Cray computers can remotely track people just knowing the specific EMF waves (evoked potentials from EEGs in the 30-50 Hz, 5 milliwatt range) of a person’s bioelectric-field. Each person’s emissions are unique and they can remotely track someone in public.

Thought Control

Subliminal words in the correct electromagnetic-field that expresses human consciousness, attuned to the human brain, can enter our minds at a subconscious level. Our brain activity patterns can apparently be measured and stored on computer by super-computers. If a victim needs subliminal-thoughts implanted, all that is necessary is to capture, save on computer, and target the person’s brainwave pattern to send them such low frequency subliminal-messages that they actually think it is their own thoughts [confirmed by Al Bielek and Preston Nichols with the Montauk Project in Long Island]. The researcher Majix says our brains are so sensitive that they are like liquid-crystal in response to the magnetic component of the earth.

We are sensitive to earth’s magnetic changes, changes in the ionospheric cavity and re-resonate those frequencies ourselves. We are incredibly complex, beyond comprehension and a type of biocosmic transducer. He adds:

“Physicists in Russia correlate the mean annual magnetic-activity, electro-magnetic and electro-static fields on human behavior and medical indications.They are similar to biorhythms.These magnetic frequencies can be manipulated. Our brain waves can mimic magnetic frequencies from very simple equipment at extremely low power levels. From half a second to 4 seconds later, the neurons and brainwaves are driven exclusively by the device, with power levels almost nonexistent. All one needs is a circularly polarized antenna aimed up at the ionospheric cavity and they can manipulate the moods of everyone within a 75 sq. mile area. The body picks up these “new” manipulated waves and begins to correspond immediately. “Sleep” frequency will make everyone become tired and sleep.”

The scientist cut through months of work. Now HAARP is slicing up the ionosphere, the world-brain, like a microwave knife, producing long tear incisions destroying the membrane which holds the reservoir of data accumulated by all earth’s history. A healer called Mr. “A” claimed to receive “Ancient Wisdom” from this protective Magnetic-Ring of energy which stores within it all knowledge since time began. Ruth Mongomery wrote about him in Born To Heal.

He claimed that if our energy flow is cut off from this magnetic-field, the Universal-Supply is obstructed and we are no longer in tune and start to get sick. The Power from this travels in split-seconds around the world and is available to anyone who is capable of receiving it and handling it. The waves from The Ring automatically translated into words in his mind, as wisdom to diagnose and heal others, coming from the storehouse of knowledge here since the beginning of time. He produced instant miracles, knitting broken bones and removing arthritis. A photo caught forked lightning coming from his fingers.

In Let’s Talk MONTAUK, Joyce Murphy shows that experiments on the 410-420 MHz cycle have been done which could affect the “window frequency to the human consciousness” as a whole:

“He (Preston Nichols) used his..radio equipment to learn that whenever a 410-420 MHz signal appeared on the air, the psychic’s minds would be “jammed.” Tracing the signal to Montauk Point and the red and white radar antenna on the Air Force Base…”

In Encounter in the Pleiades by Peter Moon and Preston Nichols, Preston wrote that:
“Dr. Nicholas Begich has picked up 435 MHz signals connected to HAARP and that a mind control function is being employed. He says that 400-450 MHz is the window to human consciousness because it is our reality’s background frequency.”

Tim Rifat wrote in his Microwave Mind Control in the UK article ( http://www.brazilboycott.org/ )that cellular phones use 435 MHz. UK police use 450 MHz exclusively. Dr. Ross Adey used this for CIA behavioral modification experiments. Police have a vast array of antennae to broadcast this frequency all over the UK. Adey used 0.75mW/cm2 intensity of pulse modulate microwave at a frequency of 450 MHz, with an ELF modulation to control all aspects of human behavior. 450 MHZ radar modulated at 60 Hz greatly reduced T-lymphocyte activity to kill cultured cancer cells. A study of USA 60 Hz power lines repeated this finding.

└ Tags: cellphone, Chemtrails, Electromagnetic Disease Transmission, ELF, GWEN towers, Haarp, microwave, Mind control, Thought Control, torture, vaccine, Vaccine Implants
 Comment 
  • Page 6 of 9
  • « First
  • «
  • 4
  • 5
  • 6
  • 7
  • 8
  • »
  • Last »