Vous êtes sur la page 1sur 16


This is the html version of the file http://www.rob-files.com/Mind%20Control%20Attacks%20-%20Joseph%20Hohlman.doc. Google automatically generates html versions of documents as we crawl the web.

THISISADOCUMENTFROMWWW.ROB-FILES.COM EDITEDSEPTEMBER2012 Original JUNE 2009: FROM: WWW.ROB-FILES.COM Below is a very detailed, interesting and factual account from an honorable and professional friend, Mr. Joseph Hohlman. As with other issues in this report, all data and links can be researched for validation. One point is - there are hundreds of these type cases throughout the world (all with similar but different characteristics). Most have been properly reported to Federal Authorities. VALUABLELINKSATEND BobButner Mind Control Attacks (Mindcon), Neurological Weapons Attacks, Electronic Attacks, Electronic Harassment, Electronic Implants and Brain State Monitoring / Brain State Control, Brain Entrainment, Brainwashing, Brainwave Signatures, Mind Reading (Mindread), Behavioral Modification, Body Control (Bodycon), Brain Stimulation, Subliminal Mind Control Programming Technologies, Ultrasonic Mind Control, Manchurian Candidates, Electronic Gang Stalking, Binaural Beats, Voice-to-Skull V2K Technology, Gang Stalking, (EWS)Electronic Weapons Systems, (DEW)Directed Energy Weapons, (EWSI)Electronic Weapon System Implants, (FLIR) Forward Looking Infrared ( thermal ) Imaging, Laser Technologies..'Gang Stalking'.."Electronic Gang Stalking" (EGS); "Massive Electronic Attack Nightmare" (MEAN) sometimes called, "electronic gangstalking," ; "Microwave" gang stalking and also including such technologies as "Ultrasonic" gang stalking..
"Electronic Weapons Systems" (EWS); "Directed Energy Weapons" (DEW); "Electronic Weapon System

Implants" (EWSI); 'Gang Stalking'..

Dear Sirs.. { My only question is why are these specific spy"technologies" and "gang stalking" activities currently legal for spying/harassment/stalking/torment/terrorizing/torture of any/all American citizens..For basically any reason they/someone may choose..} Below is a ( rather long/detailed ) overview of these "gang stalking activities/technologies" with specific referenced web-links ( at the end ).. Some information maybe dated and/or obsolete..Some maybe hard for the 'unaware' to believe or even mentally phantom it's existence.. It's all very real and being used/implemented daily_in American communities across America.. I've sent this email to: White House, 'D.O.J./Eric Holder, House Speaker Nancy Pelosi, Rep. John Conyers, Senator Patrick Leahy, Senator Dianne Feinstein, Senator Russ Feingold, Rep. Jane Harmon, House Democratic Leader Steny Hoyer, Senate Majority Leader Harry Reid.. U.S. Secret Service, FBI, CBS, MSNBC, NBC, ABC, Time.. (ACLU) 'American Civil Liberties Union'_Attorneys..'Herman', 'Jaffer', 'Goodman', 'Rabinovitz', 'Guttentag', 'Hafetz', 'Spitzer'.. Electronic Frontier Foundation( EFF )..Jennifer Stisa Granick 'Civil Liberties Director' (EFF).. Bryan Cave LLP..Atty's Bryan Cave, Daniel I. Prywes, Kip F. Wainscott.. Anthony D. Romero, Director ( 'ACLU' ); Amnesty International USA; Human Rights Watch; Also sent to: "chicago@ic.fbi.gov" <chicago@ic.fbi.gov>, "criminal.division@usdoj.gov" <criminal.division@usdoj.gov>, "nsd.public@usdoj.gov" <nsd.public@usdoj.gov>, "us.marshals@usdoj.gov" <us.marshals@usdoj.gov> It would be nice to see something positive enacted in congress, or in the courts negating these very serious violations of our Constitutional Rights and Freedoms by in some cases, the very people sworn to up hold those ( time honored ) rights and freedoms..
Generated with www.html-to-pdf.net Page 1 / 16

You at the 'D.O.J'.,'ACLU', and 'EFF' do the 'most important work' in keeping this, our democracy strong and true.. _____________________________________________________________________ Any specific questions about electronic weapon systemscan be directed to:

John J. Williams, M.S.E.E. 'Lone Star Consulting Inc.'

Link:http://www.lonestarconsultinginc.com/ Email:tekmaster@lonestarconsultinginc.com 'MIND CONTROL TUTORIAL / ELECTRONIC ATTACK TUTORIAL / ULTRASONIC ATTACK TUTORIAL'( link below ) [http://www.lonestarconsultinginc.com/free-mind-control-tutorial.htm#EMWEAPONS] Thank You, Joseph Hohlman (Targeted individual)

"Electronic Weapons Systems" (EWS); "Directed Energy Weapons" (DEW); "Electronic Weapon System Implants" (EWSI)..'Gang Stalking'
"To Covertly Manipulate and Control Human Behavior".. Causes.. (1) can cause severe cranial/cranium/brain/pain (2) sleep deprivation, tetanus, malaise, lethargic, lethargy, enervated, stupor, languor, listless, exhausted, phlegmatic, languid, indolent, lazy, slothful, logy, sleepy, sluggish, torpid; tired, weary; feeble, frail, weak; apathetic, impassive, inert, limp etc.. (3) instill fear, rage, anger, irritability, agitation, exasperation, bitterness, indignation, impatient, petulant, vehemence, temper, resentment, paroxysm, furor, acerbic, acrimony, ferocity, violence etc.. (4) can cause strokes, heart attacks, or memory loss.. (5) long term exporsure causes a wide variety of illnesses, including lupus, fibro-myalgia, multiple sclerosis, chronic fatigue, lymphatic breakdown, depressed immune system, low t-cell count.. Symptoms.. __ You find that you suddenly awake at precisely the same time, every night __ Hot needles (or "stings") deep in your flesh, especially when trying to sleep __ Limbs jerking wildly, muscle twitching; can cause severe cranial/cranium/brain physical pain __ Forced awakening, can't go back to sleep, as if on high doses of caffeine __ Very high body heat, no fever, relaxed, cool surroundings __ Extremely powerful itching which may start as small electrical shocks __ Very fast heartbeat while relaxed (not having exercised recently) __ Ringing in ears - may start/stop when switching on or off electronic devices __ Sudden "drop-you-in-your-tracks" fatigue at times you should not be tired __ Brain or body vibration; throbbing sensation in any part of your body __ Non-random traffic through the neighborhood, indicating use of thru-the-wall radar __ Repeated evidence of break-ins and sabotage both at home and at work __ Repeated instances where it seems others know things about you that could only be found out by bugging your phone, house, or vehicle Additional symptoms caninclude athrobbing, numbing, vibrating,and/or pulsing feeling in the brain and/or through out any part of the body when attacked.. A feeling of your heart pounding in your head while your body is still.. Electronic attackcan disorient normal thought processes and brain function etc; making it hard to concentrate..Sometimes associated with severe physical pain in the brain.. Can stimulate, precipitate,the feeling of heart attack, stroke etc. Can cause you to think or hear things in your mind.. Futher government harassment has been witnessed by individuals from;
Generated with www.html-to-pdf.net Page 2 / 16

Specific local Police Departments/Fire Departments/ EMS/government agencies harassment of all types, sometimes in conjunction with either gang stalking activities and/or the use of ( EWS, DEW, EWSI, FLIR, Microwave) technologies etc.. The airline industry, private individuals,using aircraft of all sizes, helicopters ( commercial, private, and in some cases military aircraft )..Specifically/recently from O'Hara International/Chgo; Joliet, IL Regional Airport, Eppley Airfield and Millard Airport, Omaha, NE; instances from Offutt Air Force base, NE, to actually target flights and noise specifically over/around individuals on the ground.. Railroad industry targeting individuals with train and engine/horn noise when in close proximity of railroads..Specifically 'BNSF' in the Chicago area; and 'Union Pacific R.R' in the Omaha, NE andCouncil Bluffs, IA area.. Re-timing of any/all street stop lights; regulatingtraffic flow to consistently interfere with any driving activity..( Wherever you drive ) Using gps implants and/or mobile tracking devices to stalk any movement whether walking or driving of victims by others (ie. gang stalkers/police etc).. The main objective of these 'gang stalking' activities in conjunction withspecific electronic harassment/electronic torture technologies is to demoralize and isolate victims sociallyand covertly.. Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, to cause severe sleep deprivation. Talking in public about private things in the targets life..Disorientating victimsboth mentally and emotionally.. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time. Flat tires, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action.. Spying on everything a victim does; spying in everyway on everything they do; computer use, phones, gps surveilance, infared imaging surveillance, video, audio bugging; all forms of"Electronic Weapons Systems" (EWS); "Directed Energy Weapons" (DEW); "Electronic Weapon System Implants" (EWSI); Microwave Surveillance.. It might seem harmless to some, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. It's like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but overtime the target is slowly worn down. To cause unending physical, mental and emotionaldiscomfort and pain24/7/365..In essence ruin victimslives ( and minds ).. 'Gang stalking' is acompletely clandestine operation..It violates human rights; hate crime laws; discrimination laws;Many other specific constitutional and privacy laws.. The people and/or groups invovled in these .." Electronic Gang Stalking" (EGS) and/or "Massive Electronic Attack Nightmare" (MEAN),apparently have no respect for our
U.S. (and all human beings ), most sacred and fundamental values, lawsand way of life..They spit on this countries truth values, and justice system in general..

They can be compared to theKu Klux Klan (KKK) and other Neo Nazi individuals and groups..Even our government has been known to be implicitin using these technologies though certaincommunities and law enforcement agencies.. Also see: http://psychologicalwarfare.yuku.com/forum/viewtopic/id/602

Often victims of mind control and electronic attacks with long lists documenting every known type of mind control and electronic attack program ( we know of many other undocumented programs ), pleading with us to alert powerful national and international authorities to investigate and stop mind control and electronic attacks. We have researched and published about mind control and electronic attack technologies for decades now, and clearly, these authorities are also well-aware of these mind control and electronic attack technologies for decades now. Since they have done little or nothing to investigate or stop mind control and electronic attacks in the past, there is no chance that they will ever in the future - in many cases THEY are the ones behind them. Frankly, those who still believe that national and international authorities are the solutions are clearly fools. You have a better chance of the Tooth Fairy removing that electronic implant in your mouth than the Government! No one in any position of national or international power will ever take any meaningful actions to stop electronic attacks and electronic mind control ! Most everyone who contact us for help tells us that they have already complained to local police, FCC, FBI, CIA, NSA, DIA, their doctors, politicians, etc. and received no help - often treated disrespectfully - even ridiculed and threatened with incarceration in mental institutions - adding insult to injury. In fact, the need to obtain and use special detection equipment to prove electronic attack with hard evidence is one big reason why
Generated with www.html-to-pdf.net Page 3 / 16

electronic attacks are apparently rapidly increasing in popularity over shootings because bullets produce lots of physical evidence covered by existing forensic technology long ago developed to analyze and develop firearm evidence. While there is a vast number of possible mind control, body control and other electonic attack devices, there is only 4 known common modalities that such an attack can be delivered (with my rough estimation as to % of electronic attack signals involving each): (1) Electromagnetics (50%) (2) Ultrasonics (45%) (3) Electronic Implants / Electrical Body Contact (15%) (4) Infrasonics (15%). Particle beams and unknown modalities are probably about 1%. Note that the percentages add up to more than 100% because a substantial number of attacks are believed to be caused by a combination of these major modalities (e.g. ultrasonic signal modulated by an infrasonic signal), and that these percentages do not include electronic attacks involving more than one signal at the same time (e.g. an electromagnetic attack and ultrasonic attack occuring simultaneously). Each of these mind control, body control, etc. electronic attack modalities can be detected and countermeasured using special equipment designed for that modality. You need to use specialized equipment to ascertain the modality, frequency, direction and timing of electronic attacks. If you are being electronically attacked, it could be through electromagnetic waves AND/OR through ultrasound AND/OR through infrasound, AND/OR you have a non-transmitting electronic implant (i.e. totally internally programmed electronic implant). Each of these modalities require very different equipment to detect, determine and document (if necessary) modality, frequency, direction and timing of electronic attacks, and possibly jam and/or shield against electronic attacks. WHO ARE DOING ELECTRONIC WEAPONS SYSTEMS? These technologies are now in the hands of a vast number of technical people employed by various governments, corporations, institutions, secret societies and individuals on a global basis. Every major government, corporation and educational institution today which does substantial high-tech battlefield weapons research has some type of top secret psychological warfare operations (psyops) with ongoing programs researching and developing these technologies, including testing them on hapless targets usually located in some other countries or otherwise considered to be expendable. In the U.S., it is widely believed that DARPA (Defense Advanced Research Projects Agency) plays the biggest role in mind control and electronic attack technologies; we believe that while DARPA is major player, there are many other active electronic attack and mind control programs not funded or directly tied to DARPA. The old Soviet KGB developed the Psychotronic Influence System (PIS), which to our knowledge has branched out into at least six major current electronic attack and mind control organizations. Some aspects of mind control and electronic attack technologies are now so publicly well known often with news accounts of, for example, electronic implants, that only a few of us knew about decades ago. Note that apparently few of these devices are ever patented most are still not even publicly advertised or published about - and some patented devices have been "darkened" by intelligence agencies and thus no longer public WHY ARE ELECTRONIC WEAPON SYSTEMS BEING USED? There are many reasons why a person/entity might maliciously use these technologies on or against another person/entity, including in the order we believe is based on what is most common (this excludes non-malicious exposures, such as high-voltage lines, non-malevolent commercial / industrial / scientific / military / airport operations, police doppler radar, etc.): (A) Electronic Weapons Testing, (B) Medical Research, (C) Subliminal Advertising and Corporate Monitoring and Control of Buying Behaviors, (D) Military / Corporate / Terroristic Attack on Designated Targeted Individuals (often with collateral damage), (E) Personal Revenge, (F) Pranksterism, (G) Espionage, (H) Secret Society Agendas (known and unknown), (I) Criminal / Terrorist Weapon-of-Choice due to Lack of Evidence / Lack of Accountability ( of all methods of attacking and harassing people, electronic attacks and mind control attacks are the most easily concealed, hardest to prove, most unbelieved, and most difficult to prevent and stop without the use of highly-specialized equipment ) WHAT ARE THE MAJOR ELECTRONIC WEAPONS SYSTEMS TECHNOLOGIES? There are three main high-tech modalities used: (A) Electronic / Electromagnetic (including radio, pulsed microwaves and radar) (B) Ultrasonic (including audio modulation and infrasonic modulation of ultrasonic carriers) (C) Infrasonic (while raw, unmodulated infrasonic signals are sometimes used for gross electronic attack and electronic harassment, they are not used for mind control applications). Equipment used to detect and jam / shield in one modality is ineffective against the other - they each require different signal detection, jamming and shielding countermeasures. Each result in similar types of purported manifestations: Environmental manifestations, physical manifestations, and generalized 'medical manifestations' (which again also apply to many medical conditions not related to electronic attack and mind control attack, such as exposures to heavy metals, pesticides and biological toxins). These generalized 'medical manifestations' include, but are not limited to, headaches, irritability, angry outbursts, mental depression, suicide ideation or homicide ideation, intrusive thoughts, forced speech, feelings of going mad, feelings of being mentally programmed to commit abnormal acts (the "manchurian candidate" syndrome), thoughts being repeated back to you, wild and unexplained mood changes, hysteria or unexplained/uncontrollable crying, panic attacks, sensations of subliminal mind reading or mind control, hearing voices, music, buzzing, motor-like sounds, pings and other sounds emanating from inside the head, appliances (or other smooth flat surfaces, especially metal surfaces), walls, hidden spaces, etc., visual hallucinations, paranoia, feeling lost, aloof, goaless or detached from one's body, feelings of being overwhelmed, vertigo and light headiness, mental confusion, loss of balance, lost memory or erratic memory, chronic fatigue or lethargy, increased chemical sensitivities, immune system disorders, heart palpitations, skin problems, sores which don't properly heal, unexplained bleeding (especially through the ears or eyes), unexplained sweating or sudden temperature changes when you don't believe you have an infection, arthritic-like conditions, hair loss, "buzzing" (i.e. feeling that one's cells are twitching), crawling sensations or unexplained itching on the skin or underneath the skin or scalp, unexplained losses of feelings or sensations, etc. IDENTIFYING BRAIN OR BODY'S ELECTRICAL WAVEFORMS..Remote brainwave signature identification and tracking are forms of remote sensing technology. Remote sensing is believed to occur at high enough frequencies where wavelength is small and directionality is very good but at low enough frequencies
Generated with www.html-to-pdf.net Page 4 / 16

where most of the signal energy is not absorbed by the brain but passes through - about 800 MHz - 1 GHz (the same band where cellphone and cordless phone frequencies are assigned and probably not just coincidentally). Basically, the most popular method used to obtain brainwave signatures and track people by means of their brainwave signatures is by remotely and usually secretly transmitting a microwave carrier beam through the person (usually the head) and then receiving, amplifying and analyzing the signal that exits the head or body, which is now very slightly modulated by your brain's or body's own unique electrical waveforms. The carrier frequency is then filtered out and the modulation greatly amplified and specially processed to retrieve your unique "electronic signature" (i.e. "brainwave signature") or to conduct mind reading (mindread). In medical and laboratory situations, Functional Magnetic Resonance Imaging (FMRI) is sometimes used, but in the field where the invasive electrodes and skin contact electrodes popular to FMRI are impractical, a microwave transmitter (e.g. embedded in a cellphone or cordless phone signal) is generally used. Also see "Microwave Surveillance" ( below ) Each person is believed to have his/her own set of distinctive brain waveforms which are as unique as fingerprints. By using this technique, individuals - even groups of people (racial profiling and gender profiling technology and personality profiling technology using brain scans now believed to exist) - can be remotely and automatically tracked, targeted, controlled and attacked from even miles away (usually at much closer distances) and even in crowds, buildings and vehicles. These signals are now believed to be harvested enmass possibly through virtually omnipresent cellular towers, telecoil/magnetic loop systems, traffic lights, etc. where large numbers of people gather at or pass through relatively small public apertures (public portals ), such as doors to buildings, gated areas, hallways, sidewalks, intersections, streets, anywhere lines form, bus stops, train stops, airports, subway entrances / exits, malls, etc., and often piggybacking or linking them to surveillance cameras and metal detectors is how they are usually implemented to make them more effective, cheaper to implement, easier to secretly plant and maintain, less conspicuous, and increases deniability if discovered. One popular mind control technology is the, "Emotional Brainwaves Clusters" (EBC) technology, now believed to be the most popular form of mind control and brainwave attack involving brainwave signature capture. Emotional brainwaves clusters is basically a complex set of brainwaves one has when facing any kind of emotional situation, such as fear, anger, grief, shock, sexual excitement and pain, but can also involve clusters which result from passive acceptance, indifference, inhibition or apathy to otherwise emotional situations for brain entrainment purposes. Since there are differences between people in their emotional brainwave clusters, they are a type of brainwave signature and therefore fall under the brainwave signature technology. The perpetrator is not interested in individual brainwaves caused by emotions but clusters of brainwaves which emanate primarily from limbic system. The perpetrator records these emotional brainwave clusters for a targeted individual when the victim experiences some emotional event; he/she may even trigger the emotional events to capture brainwave clusters. He/she then modulates an high-frequency EM or ultrasonic carrier with these complex emotional brainwave clusters, and then plays them back to the victim whenever he/she wants to trigger that particular emotional response - brainwave entrainment for a Pavlovian response. If the emotional response is one to pain, for example, the perpetrator can then induce that same or similar pains in the victim whenever he/she chooses to do so at the push of a button. If it is for sexual excitement, the victim can be sexually stimulated during inappropriate times. Brainwave clusters can also be used for other brainwave signature applications, such as electronic tracking. The victim can be made apathetic to a life-threatening situation. The mind control and electronic attack abuses of emotional brainwaves clusters is practically unlimited. MIND CONTROL / ELECTRONIC ATTACK USING COMMON AC AND PHONE WIRING, METAL PIPES, TUBES AND STRUCTURES, AND ULTRASONIC ATTACK USING SPEAKERS..Your home/business wiring, piping, even car wiring can be hijacked to electronically harass or surveil you by hitchhiking signals onto them. These omnipresent conductors serve as the optimum means to connect up, transmit and distribute these very harmful electronic surveillance, mind control and electronic attack signals throughouta building. Offering optimum conductors for virtually endless varieties of bugs, taps, harassment, control and line blaster devices Because power and telephone lines, and metal pipe (e.g. plumbing), metal tubing (e.g. wire shielding) and linear metal structures (e.g. plumbing, rebar, girders, conduit, trim, rails, fencing, screens, picture frames, etc.) surround you virtually everywhere you go in any building electronic surveillance devices, equipment control devices, mind control devices and electronic attack devices can be connected to them in virtually every room and even outside the building for some distances. We have received reports, for example, of computers being altered so that they automatically access the Internet when plugged into AC power and turned ON even though they are not connected to any known modem - because they have been altered with devices hidden inside them which transmit and receive data and control signals through the AC power connection - plug the computer into your wall outlet to power it up and you are automatically Online where your sensitive files can be uploaded to an attacker and/or malware downloaded into your system! If you have set aside a computer to be offline because you do your accounting, taxes or other very private activity on it to protect your most sensitive data from Online access, without a special AC line filter, you may be only fooling yourself. This same tactic is used on other pieces of equipment connected to either an AC power line or a phone line - even if the equipment is turned OFF! The only known way to protect yourself from these types of attacks is to filter out your power and phone lines to eliminate high-band signals. Our WHHE-type devices both test for and filter out harmful hitchhiking signals. With today's technology, radio transmitters, receivers, electronic implants, recording devices and video cameras are often smaller than a stack of a few quarters, and can thus be easily concealed. However, especially when it comes to lower frequency and powerful radio transmitters, hiding the antenna is often problematic. However, clever snoops and electronic warfare specialists have developed all kinds of improvised antenna systems - many are ordinary metal wires, pipes, tubes, structures and other objects that one would not suspect to be antennas. Some examples include the telephone and AC power wiring inside or outside of buildings plumbing and pipes, metal clothes lines, fencing and posts, car luggage racks (can be made into very powerful transmitting antennas and sensitive receiving antennas which can cover large areas - especially nice for urban areas with tall buildings!), hair curlers, ink pens, tin cans, pots and pans, pie plates, hand tools, lawn tools, eating utensils, pieces of wire, screws and nails, shelves, belts, handles, etc. Even pringle cans and tennis ball cans have been adaped into RF shotgun antenna systems capable of receiving and transmitting wireless modem data from computers for about a mile. Tesla theorized that even the entire Earth could be made into one giant antenna. Even ordinary antennas, such as those used for TVs, radios, ham stations, CB, etc., can double as spy and/or electronic attack antennas. And loop antennas can be concealed in most anything of any shape and thickness adequate to contain it (e.g. inside of a book or book cover). Our rule of thumb is that if it is metal - or even if it is just electrically conductive - there is a good chance that it can be adapted into an antenna - even if the resulting antenna gain is so poor that the range is only a few dozen feet, and to look for 1-2 connected wires. Of all the improvised antenna systems possible for buildings, the most popular to perpetrators is unshielded home AC wiring and phone wiring, and metal pipes, tubes and structures. Improvised vehicle antenna systems include the normal radio antenna, the luggage rack, the metal bumpers, the +12VDC wiring under the hood, etc. These "ready-made" antennas are usually but not always big in size (especially the AC wiring) and installed in virtually all homes, businesses and vehicles usually in both the walls and ceilings (plus in the floors of some homes/businesses). All one needs is a single access point - anywhere in the network of wires, piping, etc. inside or outside the building - to inject and/or receive the offending signals, and/or to tap power off of the line to power mind control, electronic attack and/or surveillance devices. Since these conductors are so prevalent in virtually every building, added with the technologies of time multiplexing signals and frequency multiplexing signals, literally

Generated with www.html-to-pdf.net

Page 5 / 16

dozens - even 100s - of these types of very harmful signals can be operational on any day and night against you - usually no matter what rooms you are in. Your home or business is just several huge signal distribution networks plus transmitting and receiving antenna arrays. And all such wiring, piping, etc. can usually be just as easily abused for electronic surveillance, mind control and electronic attacks even if you turn OFF or disconnect them from their normal uses (e.g. turning Off AC power, disconnecting phones). This is nothing new - both power and phone wiring have been lawfully used for decades to carry high-band voice, control signals, and data (e.g. faxes, modems, DSL, zons, intercoms, alarm systems for phone lines, and intercoms and alarm systems for power lines) - proven technologies using common household AC wiring and phone wiring. Furthermore, because generic power and phone wiring and piping in all or part of one's home and business are often unshielded, they can be both easily accessed and connected up to AND used as a huge transmitting and/or receiving radio antennas to communicate with anything from electronic implants - to guys parked in the street - to cellphone towers down the road - to control centers 100s miles away - to ships at sea - to satellites - to electronically harass, control and/or interfere with your life! For examples: (1) Signals on them can be transmitted wireless for miles, and (2) Physical access to the wiring, piping, etc. is not even required; because the wiring, piping, etc. is unshielded, signals can often be inductively coupled into or out of power lines, phone lines, piping, etc. (e.g. inductively-coupled phone line taps are decades old technology). The trapped victims are boxed-in by the 4-6 sides of these huge matrix antennas for hours at a time - especially when asleep - and therefore they (and their electronic equipment / electrical equipment) are subjected to possible massively intense and long-duration EMF exposures - analogous to being zapped like a piece of meat in a microwave oven! We cannot emphasize enough that to protect yourself from these types of high-intensity mind control and electronic attacks and surveillance, you MUST filter out all unwanted high-frequency signals from both your two AC lines (usually two 120 VAC legs of a standard 240 VAC system) and phone lines your car, and unpowered wiring and metal piping, tubing and structures. This is becoming increasingly alarming to us because we have recently received reports from likely victims indicating to us that these forms of mind control and electronic attack are greatly increasing. Since these virtually endless varieties of bugs, taps, harassment, control and line blaster devices can take on virtually any appearance and/or be hidden in just about anything inside of or near your building, they can be very difficult to detect through physical searches (short of tearing down all of your walls and ceilings where the lines and piping run, and disassembling all of your equipment). For example, these devices can be easily concealed inside TVs, radios, computers, landline phone equipment, etc. - fully operating even when the TV, radio, phone, etc. itself is not turned ON. Or hidden in an outlet, inside of your wall or in your attic - even inside your car. Since not all of these harmful devices are RF devices, the non-RF ones cannot be detected using TSCM field strength testing used for wireless systems. Nor can strictly receiving devices be TSCM-detected. And usually nor can transmitting devices which transmit in bursts, randomly or pre-dawn hours, nor when the perpetrator believes the area is being electronically swept and turns Off the transmitters until the TSCM crew leaves. In short, your phone and power wiring, piping, etc. can be easily and secretly tapped into using hardwired or inductive-coupling techniques just about any place they are routed internal or external to your home/business Since ultrasonic transmitters can also be made very small and easily hidden, there is almost endless numbers of ways ultrasonic transmitters and ultrasonic circuits can also be hidden. Ultrasonic transmitters and ultrasonic circuits can be embedded in ordinary speaker systems, megaphones, loudspeakers, earphones, home entertainment equipment, appliances, computers, etc. commonly found in homes, businesses, cars, and even on the streets - each one secretly transmitting subliminal ultrasonic messages to you for mind control attack and electronic attack purposes. Say you are at a protest or political rally. That bullhorn you see may also be transmitting a secret subliminal ultrasonic mind control message to you. There is now a technology called, "Silent Sound Spread Spectrum" (SSSS, S-Quad or Squad) which is apparently now widely abused to do ultrasonic mind control and ultrasonic attack. One SSSS technology mentioned in mind control and electronic attack reports is the "Silent Subliminal Presentation System" (SSPS). Silent Sound Spread Spectrum basically entails randomly changing the high-frequency audio or ultrasonic carrier signal frequency (modulated by the mind control or electronic attack signal) to prevent detection and jamming by narrow-band sound and ultrasonic equipment. That's why our ultrasonic direction finding, ultrasonic triangulation and ultrasonic jamming equipment operate over the entire practical air ultrasonic band (20KHz - 220+KHz). The high-band signal frequencies used on power and phone lines, piping, etc. (which can be time multiplexed and/or frequency multiplexed to support several such systems) are usually 5+ times higher than the standard 60 Hz / 50 Hz (power wiring) or 3200 Hz maximum (phone wiring) bandwidth normally used on them. The usable bandwidth of many power and phone lines exceed 2 MHz for loops up to about 6,000 ft (1.14 miles) and much higher over much shorter loops - very usable for electronic surveillance, mind control and electronic attack. Metal piping, tubing and structures can conduct signals far higher in frequency than even power and phone lines (because most power and phone lines, pipes, etc. are unshielded, electrically noisy and inductive and leaky to high freqs, most highband signals are under 200 KHz and high in volume level). Loading these unshielded conductors with all kinds of multiplexed and high-band signals they were not designed for may cause the wiring, piping, etc. itself and their terminations to resonate with strange sounds and noises which seem to emanate from walls and ceilings often on quasi-random and directional bases (e.g. strange sounds you can hear when standing in one position but not in another position, and/or at some times and not at other times, and/or during certain conditions of humidity and/or temperature but not at other conditions), often throughout most of a building, and often similar to the vibrating and humming of an old or defective power transformer. They can also vibrate and hum in the ultrasonic and infrasonic bandwidths when signals mix and produce sum and difference frequency components. The weird sounds can also sound like a distant motor running, distant voices, whispering and mumbling, spiritual and God-like voices, high-pitched voices, low-pitched voices, chattering, music, animal sounds, whistles, echoes, pulsing, pounding, popping, finger-snapping, digital data sounds, zinging sounds, whooshing sounds, theremin sounds, etc., especially when real time complex signal mixings of possibly several signals at once result in partially demodulated and/or multiply-mixed high-band signals. These weird noises can literally drive some people nuts! If you are hearing sounds, noises or even voices or Morse-code sounding digital data signals or control signals coming from your walls, ceilings or appliances or inappropriately while you are on the phone, you may not be imagining it. Also, high frequencies imposed on power wiring can adversely affect induction motors (especially compressor motors common to refrigerators, freezers and air conditioners), causing them to operate roughly, chatter noisily and possibly stall out (because induction motor speed is proportional to the frequency of its power source, multiple frequencies can harm them), and can cause lights to unusually brighten or flicker. Modulated high frequencies on phone lines can cause malfunction of phone and computer equipment (e.g. loss of broadband sync, inability or slowdown in using DSL or even dial-up, faxes, zons, etc. because of a "noisy line"). Our device types include several popular Wiring Hitchhiker Harassment Eliminator (WHHE) device-types designed to detect and filter out high-band signals from AC power lines (WHHE1), telephone lines (WHHE2), car 12VDC power bus (WHHE3), and powered and unpowered conductors of many types such as unpowered wiring, and metal piping, tubing and structures (WHHE4) CELL PHONE MIND CONTROL / ELECTRONIC ATTACK, AND CORDLESS PHONE MIND CONTROL / ELECTRONIC ATTACK..Cellular phones, cordless phones, Ipods and other head-press wireless devices, especially in conjunction with satellites, are ideally suited as the perfect receiving and delivery systems for electronic attacks and mind control attacks, and it is now believed that electronic attacks and mind control attacks on both national and global bases are now routinely done through cellphones, cordless phones and other head-press wireless devices, and have been for years. Consider:
(A) Almost everyone these days has one and often several cellphone, cordless phone, etc. head-press wireless device. (B) Cellphones, cordless phones, etc. can be reached from virtually everywhere in the world so one or just a few centralized mind control / electronic attack

Generated with www.html-to-pdf.net

Page 6 / 16

central control facility ("Mind Control Central") is now easily implemented. Today, you can almost as easily be electronically attacked and surveilled by a guy in Asia, Africa, South America, Europe, and the Mideast as you can from the guy next door.
(C) Cellphones, modern cordless phones, etc. usually operate in the 800 MHz -

1,800 MHz band - ideal frequencies for mind control and electronic attack because of the brain absorption characteristics of these frequencies, and in a pulsed microwave signal format make this band ideal for remote sensing attacks. with some people, on a near constant basis - yet almost always 10+ times that distance from the nearest other human brain - so mind control / electronic attack victims - Targeted Individuals (TI) - can be easily isolated and individually selected for mind control or electronic attacks (either by calling them or piggybacking on one of their usual calls), or selected by characteristics filtered from databases (e.g. by race, political beliefs, religion, ethnicity, socio-economic group, gender, age, shopping habits, location, etc.), or enmass through computer-generated mass dialings (cordless phone, cellphone, etc. antennas have incredible direct and intimate access to your brain - no other antenna is routinely placed that close to the brain - so close that the brain is exposed to substantial levels of both the magnetic and electrical components of the electromagnetic fields). regions of the brain also much more precise, automatic, continuous and easily done.

(D) Your cellphone, cordless phone, etc. antenna is just a few inches from your brain -

(E) Furthermore, the antenna's closeness to the brain with very little relative motion between the brain and the antenna also makes the targeting of specific

(F) Furthermore, because of antenna closeness to the brain, you not only get a good dose of the wireless device's electrical component of the electromagnetic field but also its magnetic component - believed to be even more dangerous and disruptive to brain function and therefore more effective for electronic attack and mind control attack applications. Even if you wrapped your head in aluminum foil, which might shield you against most of the electrical component, aluminum foil is virtually transparent to the magnetic component. You would have to wrap your head in iron foil or an iron helmet, which is hardto-get, expensive, heavy, stiff, and rusts. 2 x 2 meters), making secretly tracking YOU incredibly fast, easy, continuous, reliable, inexpensive, and covert.

(G) Modern cellphones, etc. have embedded GPS systems where the user can be located just about anywhere on Earth within 15 x 15 meters (some within (H) Cellphone, cordless phone, etc. transmitted carrier frequencies can easily be time multiplexed and/or frequency multiplexed with other nearby frequencies

modulated with electronic mind control and electronic attack signals which you are oblivious of and can't eliminate (however, while limited shielding is possible, shielding can worsen the situation (see herein); some say that many cellphone drop-outs are actually due to multiplexing problems).
(I) Cellphone, cordless phone, etc. conversations can be eavesdropped upon in a variety of ways -

this gives the mind controller and electronic attacker an ideal source of real time feedback to the malicious signals he/she is injecting into your brain (it is believed that some of these devices are also programmed to act as room bugs - continuously transmitting nearby conversations just by being turned ON - with or without you making a phone connection ). making you vulnerable to mind control, electronic attack and

(J) Cellphone, cordless phone, etc. mind control attack techniques can be coupled with other mind control attack techniques, such as electronic implants. (K) Cellphones, cordless phones, etc. and their call records and data records can be hacked -

surveillance efforts perpetrated by rogue states, terrorists and criminals. ELECTRONIC IMPLANTS..Electronic Weapon System Implants (EWSI) - commonly referred to as electronic implants - and their complexity and miniaturization have progressed tremendously in the last decades. There are now countless variations of electronic implant designs, implant functions, implant applications, and size, material, and placement (usually inside a tooth or shaded from XRay by an irregularly-shaped bone like vertebrae). The smallest electronic implants are less than the size of a grain of rice, and these implants can be injected directly into the body using a syringe. Reports indicate that nanomotor implants (tiny motors) and nanobot implants (tiny robots) are either now or will soon be in widespread use. Electronic implants is yet another way of electronic tracking, targeting, controlling and attacking Targeted Individuals. Also, some full-up electronic transmitters and transceivers are now so small that they can be easily concealed in such external things as cellphones, Ipods, clothing, eye wear, jewelry, watches, pens, etc. - not even to mention RFID technology. The major efforts in this area now is to couple these types of devices with mind control and electronic devices to develop extensive and linked mind control networks of these systems so that huge invisible electronic nets can be thrown over urban areas, towns and gatherings so that everyone and even every animal under the net can be instantly tracked, viewed, overheard, controlled, programmed, punished, rewarded - electronically gang stalked if you will - at the push of a button. Network implementation and integration is now believed to be well underway in every major American city based on information we have recently received. Texas Instruments (TI) has developed a technology, the AUDEO technology, which is a wireless sensor worn on the neck which captures neurological activity the brain sends to the vocal cords, digitizes these signals, and then converts the signals into clearly spoken speech. While the Audeo technology is admittedly an almost miracle for people suffering from serious neurological disorders which impairs or prevents speech, it is clearly another technology which can also be abused by governments, corporations and criminal and terroristic organizations to produce fake or doctored spoken words from people, including forced spoken confessions, which they never intended to make, simply by adding, removing and/or changing the actual words the person intended to speak to much more nefarious words. Furthermore, since it captures speech signals on their way to the vocal cords, this captured speech information can be used to modulate a carrier frequency and transmitted and divulged to eavesdroppers even before the person actually speaks the words, giving the eavesdroppers head starts on using/abusing the information to their own advantages. Or after intercepting the speech signals, the speaking of the signals can be instantly blocked or changed by the perpetrators to prevent the victim's thoughts from ever being verbally disclosed, thereby resulting in forms of thought interception and speech control, and giving perpetrators even more time to use/abuse the information before the victim can write it down. Andother example, a person may have a strong desire to tell a crooked politician, "Stop robbing the people!" but out of fear, mute the actual stating of the thought (how many times has anyone said something really bad under the breath, whispered or mumbled); however, the evil powerful politician can now intercept the thought to determine exactly what the person was going to say using a technology similar to Audeo, and therefore, be able to persecute, intimidate and control people based only on their strong thoughts and whispered and mumbled statements. Is a more effective form of mind control than this even possible! And evil politicians can use the technology to force crowds to cheer them - instead of jeer them by soon ordering these implants for everyone. Texas Instruments is just one of many entities now engaged in such implanted electronics R&D with clearly huge potentials for abuse. The 2/12/09 issue of "Electronic Design's" cover story was dedicated to medical implants. Here they talk about medical signals generated by implantable devices which can be picked up via a Bluetooth-equipped cellphone, stating that, "the technology is already here." Is that person near you with a Bluetooth using it for normal cellphone uses? Or is he/she conducting an electronic attack or mind control attack against you or someone else? And if integrated with cellphones and Bluetooth technology, how about Ipod technology, telecoil technology (below), and with computers, speaker systems, megaphones, earphones, other phones, home entertainment systems,
Generated with www.html-to-pdf.net Page 7 / 16

appliances, etc.? This article also states, "... neural implants are providing a vast range of information about how human beings behave." Is this a tacit admission that widespread implant monitoring of the populace is going on? Even St. Jude's Medical Center is doing medical implant research. Their device consists of 16 implanted electrodes, each individually programmed using external inductive coupling, to produce pulses of different intensities and frequencies to control pain. How difficult could it be to convert such a device to produce pulses which induce pain? Purdue University researchers developed a miniature device three times the width of a human hair, implanted underneath the scalp, records neural signals relayed to it by monitoring electrodes in various parts of the brain allowing doctors to "predict" upcoming seizures. How difficult would it be for a similar system to induce seizures or thought control? This device is so advanced that it transmits 10 times more data than other modern implantable transmitters while using a tiny 8.8mW of power. Could a similar system transmit vast amounts of data on your thoughts? Typically, the circuits used by modern electronic implants consume little power, and their long-lasting electronic implant batteries are quickly recharged using silent and non-invasive inductive-coupling devices - once implanted, they don't need to be removed to be serviced during a lifetime. Electronic implants can also deploy nanomotors and nanobots technology to crawl through and invade parts of the body like parasitic worms and wreak all kinds of havoc on the mind and body. I've been told that these technologies are just fine if well-regulated. Based on so-far unverified reports, telecoils / magnetic induction loop systems are more and more being hijacked and subverted into mind control attack and electronic attack transmitters. Telecoils (also referred to as Tele-Coils, TCoils, T-Coils, TSwitches, T-Switches, magnetic induction pick-up coils, etc.) are today installed in many hearing aids (about 80% of new hearing aids) and basically operate on a system where the speaker audio is outputed to a magnetic induction system (basically, a large magnetic coil of the right impedance wired to the speaker output of an audio system, which can be a public address system, various entertainment equipment, computer audio output, etc.) as an extrasensory means of "hearing" audio for the hearing impaired. The telecoil is embedded in the hearing aid itself (or possibly in the electronic implant!), and is a form of an assistive listening device. The magnetic induction coil transmitting antenna is located somewhere within the targeted room / area, and is usually vertically oriented. They are usually well-hidden and cannot be detected without special electronic equipment. Today many public and private forums have secreted magnetic induction coil systems to support telecoils hearing aids. The magnetic coil can be, for example, wrapped around a pillar in large meeting rooms / areas such as churches, auditoriums, conference rooms, classrooms, theaters, airports, stadiums, arenas, theme parks, museums, etc. - they are about as fast and cheap to make and install as a typical audio speaker system. This technology can also be hacked into or converted into surveillance systems where the spy, for example, stands just outside of a conference room / courtroom outfitted with a telecoil hearing aid, can intercept conversations occurring within the conference room / courtroom from a magnetic loop bug placed there by either the conference / court personnel or secretly by himself. A person can also be secretly "enslaved" as a spy if they have an telecoil electronic implant in which the electronic implant acts as a radio repeater / ultrasonic repeater and, unknowing to the victim, receives the telecoil-type audio signal, and then amplifies, converts and uploads it to a remote radio receiver / ultrasonic receiver. If such an electronic implant were to experience electrical leakage or just from the processing / retransmission of the signal by the electronic implant, a small amount of the signal can be received by the brain circuits, thereby possibly making the victim feel that he/she is also listening to the remote conversation. Even when used as intended, it is believed that the magnetic signal of the magnetic induction loop system can be more effectively manipulated into a subliminal mind control system than standard audio which is limited by one's hearing bandwidth. It is also believed that the embedded telecoil itself can receive actual brainwaves and through a repeater system built into the hearing aid or electronic implant, amplify, convert and re-transmit one's brainwaves; and also that the telecoil can also be wired as a transmitting antenna to transmit signals (e.g. control signals) into and/or out of an hearing aid or electronic implant. To ferret out these possible new, insidious and devastating electronic implant / telecoil magnetic loop system technolology abuses requires an EMF Direction Finder or EMF Triangulator. Note that the same telecoil magnetic loop systems can also be easily wired to serve as magnetic loop RECEIVING antennas to serve other surveillance, mind control and electronic attack functions. We predict the telecoil technology will eventually meld into Bluetooth or some other cellphone / IPod technology. Like virtually all mind control technology, much more investigation into possible abuses of this technology is required. An increasingly popular use of electronic implants is for secret communications. Basically, two or more people have implanted into them electronic implants which are radio transceivers tuned to the same frequencies and modulation modes. Transducers are installed at the vocal cords and at the auditory semicircular canals. Then, completely silently and secretly, each person communicates with each other anywhere from a few feet away to half way across the world through satellites without the use of any external phone or radio. The first auditory transducer is used to transmit the received speech from the sender into nerve impulses interpreted by the receiver's brain as the voice of the sender (but can also be used to send recorded messages or any other sound or noise). A second auditory transducer is used to pick up the sounds that the person is hearing - eavesdropping if you will - then transmitting those sounds to the receiver along with the "voice" tremors picked up by the vocal cords transducer. Thus, at all times, each person is simultaneously both a receiver and a sender. A limited version of such implant are implanted into victims who are not supposed to know that they have such an implant. This is easily done by excluding the first auditory transducer, thereby making the communications only one-way in which the victim is unknowingly the constant sender, and by doing so can monitor what the victim hears and says at all times. This is a powerful system used in espionage, surveillance, mind control and electronic harassment of all types. We now understand that an advanced version of this powerful system is being field tested, which also includes a transducer that monitors the optic nerve to essentially turn people's eyes into remote spy cameras. While these systems are rarely used on members of the general public, if you believe that somone seems to know virtually everything you say and/or hear no matter how private, then you might consider this type of electronic attack as a possibility. Aside from detection and removal of the implant - both difficult to do - the only other electronic countermeasures are personal jamming and shielding. We have heard of electronic implants being encased in small mercury sacks or bags to give the electronic implants a changing and more undefined and amorphouslike or bone-shaped appearance to X-Rays. If the Hg sack leaks inside the body, the Hg gets into the bloodstream and can then poison the brain and body. The first detectable symptom of an electronic implant may be mercury poisoning..

'Microwave Surveillance'..
Microwave Surveillance from Commercial Satellites.. Also see:


SATELLITE MIND CONTROL / ELECTRONIC ATTACK..Until recently, satellites were relatively rarely deployed this way (some say never), except when used in conjunction with cellphones and similar such devices, such as Ipods, PDAs, GPS locators, and as far as we know, never
Generated with www.html-to-pdf.net Page 8 / 16

used to transmit directly a harmful signal into a person. When satellites are used, they are mostly used to track people (e.g. GPS) and to control other more powerful equipment located closer to the Targeted Individuals assigned to do the actual damage on the Targeted Individuals. However, the government has recently publicly announced that both commercial and military spy satellites will now be directly and routinely deployed to surveil Americans; the roles of satellites in mind control attacks and electronic attacks will likely vastly increase in magnitude and sophistication in the future. Satellites are also ideally suited, in conjunction with cellphones, Ipods, PDAs, etc., to induce insanity in selected individuals. 1.0 Summary of Critical Points 1.1 Microwave Surveillance techniques have been in use for over fifty years. 1.2 As a result of the deployment of commercial communications satellites around the globe since the 1970s Microwave Surveillance from space has been conducted by governmental agencies and corporate entities against unsuspecting citizens without any governmental oversight whatsoever. 1.3 The effects of human exposure to elevated levels of microwave radiation range from discomfort to death- an effect called Electronarcosis. 1.4 Sufficient information about Microwave Surveillance is available that any citizen or organization desiring an understanding of this technology and its effects will find public source documentation which covers most aspects of the technologys use and abuse. 1.5 Reporting criminal misuse of Microwave Surveillance techniques is virtually impossible because of poor information transfer within the law enforcement community, lack of training on the part of law enforcement professionals, and, all too often, bad attitudes.

2.0 Statement of Problems to be Resolved 2.1 Would the United States Congress have the people that they are elected to serve believe that they are too busy to develop cognizance about Microwave Surveillance technology when a portion of each years federal budget is directed toward the acquisition of new equipment from this technology area? Solution- make the U.S. Congress aware of the problems and potentials associated with Microwave Surveillance. 2.2 Would the United States Department of Justice have the people that they are sworn to serve and protect, believe that they are too busy to develop any sort of understanding about a technology which is documented in their own literature and deployed by Special Agents on their payroll? Solution- help the United States Department of Justice to gain a broader awareness of the problems and potentials associated with Microwave Surveillance.

3.0 Commercial Communications Satellites for Microwave Surveillance In October of 1945, a gifted science and science fiction writer proposed the extraordinary idea of using stationary satellites to beam television and other communications signals around the world. Arthur C. Clarke (2001: A Space Odyssey, Rendevous With Rama, The Hammer of God, ect.) reasoned that if a satellite were positioned high enough above the Earths equator, its orbit could be matched by the rotation of the Earth. The satellite would then appear to be fixed in one particular spot in the sky. Because a satellites orbital speed varies with its distance from the Earth, a geostationaryorbit is only possible directly above the equator, in a narrow belt about 22,300 miles out. Although it took the technology a while to catch up with his simple but elegant concept, today there are hundreds of satellites taking advantage of his original thinking. In recognition of his pioneering vision, this band of outer space real estateis called the Clarke Orbit.

In 1965, the Early Bird satellite became the worlds first commercial geostationary satellite. It could carry 240 telephone communications circuits, or one television channel. On June 2, 1965, Early Bird introduced live television across the Atlantic Ocean. Early Bird was the first satellite to be owned and operated by the International Telecommunication Satellite Organization (INTELSAT).

First Canada, then the United States, and subsequently other countries constructed their own geostationary satellite systems. Each new satellite had greater capabilities, expanding our ideas of the technically possible. As of early 1998, there were more than 150 domestic and international communications satellites in geostationary orbit over the Earths equator.

3.1 Uplinks and Downlinks Each satellite is both a receiver and a transmitter. First, the ground station, also called the uplink, sends a signal to the satellite. The satellite automatically changes the signals frequency and retransmits it back to stations on the ground. This second path is called the downlink. A satellite is much like a broadcasting tower 22,300 miles high, an automatic relay station that can transmit into a coverage area, which encompasses up to 42.4 percent of the Earths surface.

Each satellite has a number of redundant modules, spare components that can be switched into operation in the event that any malfunction occurs. Ground control stations can remotely switch in backup facilities in case of failure.

3.2 Satellite Transponders ( dated information ) Every communications satellite carries several channels, called transponders, which process communications traffic. Most satellites have sixteen or more transponders in operation, each capable of transmitting one or more television signals as well as thousands of simultaneous telephone conversations.
Generated with www.html-to-pdf.net Page 9 / 16

The satellite frequency bandsare located high above those used by earth-bound TV channels. Sunspots, and/or other atmospheric conditions, do not affect these super-high frequencies. Satellites therefore provide extremely reliable communications coverage 24 hours a day.

Operating at frequencies of several billion cycles per second, or Gigahertz (GHZ), the regions satellites relay communications via two distinct communications bands. North Americas high-power services use frequencies ranging from 12.2 to 12.7 GHZ. A few operators using mediumpower satellites use adjacent frequencies from 11.7 to 12.2 GHZ. The entire frequency spectrum from 10.7 to 12.75 GHZ is commonly called the Kuband. Throughout the Americas, numerous other satellites are available that operate within a lower frequency spectrum ranging from 3.7 to 4.2 GHZ (the frequency of observed Microwave Surveillance operations). This frequency range is known as the Cband.

3.3 Footprints to Surveillance The satellites transmission area covers a certain part of the Earths surface, called a footprint. An agency, such as the Florida Public Service Commission, with access to a satellites operating codes can commandeerthe services of one of the satellites transponders and conduct surveillance of a targeted individual and intercept all conversations and sounds within the surroundings of this individual. 'GlowWormSurveillance' allows individuals to be tracked under ground, under water, anywhere. This writer has three gold bridges, each of which is at least three centimeters long. So long as the wavelength of the transmitted signal is shorter than the targeted object, which in this case it is, the signal will bounce back to the sender like a radar image.

3.4 Surveillance.. Externally induced auditory input could be achieved by means of pulsed microwave audiograms, or analogs of spoken word sounds. The effect on the receiving end is the (schizophrenic) sensation of hearingvoices which are no part of the recipients own thought processes. Such a device has obvious applications in covert operations designed to drive a target crazy with hearingvoices.

Tracking a target with a satellite-based communication signal, capturing the sounds in the targeted individuals environment via the transmission of voicesfrom the ground control station across 44,600 miles of space into the head of the targeted individual create a starting point for understanding the danger of covert Microwave Surveillance operations.

4.0 Electronarcosis and Signals Interception One way that Electronarcosis effects are produced is through the raising of the temperature of the targeted individual. When water molecules are heated, the body temperature rises. Between 105 and 107 degrees Fahrenheit the targeted individual will experience a seizure- at 109 degrees, death occurs.

Being targeted by the Active Denial System, a HUMVEE configured with a microwave transceiver and a parabolic transmission dish on its roof. Transmitting at 98 Gigahertz (GHZ), the unit will beam a focused beam of microwave radiation used to disperse crowds. The same painful effect is felt by an individual targeted by a microwave satellite transmission generated in the range of 3.7 to 4.2 GHZ, C-Band satellite operations.

The other way that Electronarcosis works is through the disruption of brainwave functioning by overloading the electrochemical operation of the brain with a steady, elevated level of microwave radiation. A victim will experience disorientation, vertigo, and nausea, echoing the painful, debilitating effect that can be induced by a focused beam of microwave radiation.

Signal interception of brain wave activity, is one of the most fascinating and interestingly, unmentioned characteristics of "Microwave Surveillance" operations. This ability to capture and record the images generated in the Visual Cortex and the sounds of a persons inner dialogue. The measurement of brain waves, Alpha, Beta, Delta, and Theta, by Electroencephalography (EEG) is an accepted practice around the world. The capturing, on-screen presentation, and recording of mental images and dialogue intercepted by a focused beam of microwave radiation, even a beam bounced off a satellite 22,300 miles above the equator, is a capability is retarded bymisdirected security statuspriorities and gross misinformation. 'Gang Stalking'.."Electronic Gang Stalking" (EGS); "Massive Electronic Attack Nightmare" (MEAN) - sometimes called,

"electronic gangstalking," "microwave gang stalking" and also including such technologies as "ultrasonic gang stalking"..
Gang Stalking is experienced by Targeted Individuals as psychological attack , that is capable of immobilizing and destroying a target over time. The covert methods used often leave no evidence to incriminate the Civilian Spies. It's similar to workplace mobbing, but takes place outside in the community. It's called 'Gang Stalking', because groups of community Spies organise to stalk and monitor targets 24/7.Gang Stalking is a systemic form of control, which seeks to destroy every aspect of a targeted Individuals life. A covert investigation is opened and the target is followed around 24/7 by informant, cops, community groups, local companies, private foundations, federal agencies. Overt and covert methods are used as part of the surveillance process. An especially
Generated with www.html-to-pdf.net Page 10 / 16

sadistic form of electronic attack and mind control attack is apparently becoming much more widespread. We call it the, "Massive Electronic Attack Nightmare" or MEAN. It is also popularly known as the "Electronic Gang Stalking" scenario or EGS. A MEAN or EGS Targeted Individual experiences widespread and varied manifestations because he/she is the victim of at least several different same-time-frame (not always simultaneous) mind control and electronic attack systems - usually including both electromagnetic and ultrasonic modalities, and both external devices and electronic implants. Under a MEAN attack, virtually no matter where the Targeted Individual goes or what he/she does or what time it is or who accompanies the Targeted Individual, he/she suffers greatly. Electronic attacks may be continuous, sporadic/random and/or periodic. The term, "gang stalking" or "gang mobbing, "which probably goes back to at least the 1950s, involves a covert and continuous psychological warfare conspiracy against a victim done in such a way as to make each individual part of the attack easily explainable (and thus not prosecutable) as mere "coincidence," "random event," "unexplainable event," "life's breaks," "bad luck," "imagined" or similar, but when considered in their totality evidences a complex and usually well-planned conspiracy to persecute, taunt and harass the victim for whatever reasons the perpetrators operate under to mentally, physically, financially and/or reputationally injure, discredit or destroy the victim. The perpetrators often have unknown connections between each other (e.g. belong to the same criminal organization, religion, cult, political group, special interest group, commercial group, government, etc.). It is the same ancient concept of killing an enemy by inflicting a thousand small cuts to inflict maximum pain and suffering from beginning to end. "Electronic gang stalking" - sometimes called, "electronic gangstalking," "microwave gang stalking" and also including such technologies as "ultrasonic gang stalking" - is simply gang stalking using electronic harassment, electronic attack, and brain entrainment and other mind control attack techniques. We prefer the MEAN term because "gang" means more than one perpetrator, while today all it takes is one perpetrator to be able to control - often on a remote control, programmed and/or automated basis often using artificial intelligence - all the equipment he/she needs to simultaneously perpetrate massive mind control or electronic attack on their victims. There was a time when MEAN attacks were relatively rare because the sophistication, manpower, expense and time involved to create, integrate and operate a functional MEAN system were prohibitive to almost everyone. At that time, MEAN Targeted Individuals - less than about 1% of all mind control and electronic attack victims - were either almost always very important people like major Government officials, CEOs of major corporations, important scientists and engineers or super spies, or they were so hated by powerful people that it was worth their tormentors to attack them. However, with today's circuit minituarization, computer automation, powerful electronic design programs, artificial intelligence, and mind control and electronic attack technologies now available to virtually everyone and often ecomically affordable by most people, a powerful MEAN system can be created and deployed in minimal time, and with minimal expertise, expense and manpower. One part-time MEAN perpetrator can now keep MEAN systems operating on several Targeted Individuals at the same time on a remote control, programmed and automated basis, often using artifical intelligence to both control and optimize his/her system. MEAN electronic attacks usually start out as simple electronic attacks. If the perpetrator then determines that the victim is not using effective countermeasures (e.g. shielding, jamming, detection, avoidance/evasion, documenting to increase credibility with authorities ), then escalates into more systems of attack. It's just like if someone punches you and you put up no effective resistance, chances are he/she will stomp you to death, but will often move onto an easier target if you punch back at the start. So the faster the victim deploys effective countermeasures against electronic attack, usually the better success at stopping escalation to a MEAN level of electronic attacks. No single electronic countermeasure device will defeat a full-blown MEAN attack. If you are a MEAN Targeted Individual, you may require numerous electronic countermeasure devices. Even so, no one can guarantee that the MEAN attack can be defeated because MEAN attackers are often highly motivated, persistent, intelligent and with greater resources than simple electronic attackers. In virtually all cases of mind control, electronic attack, mind reading, etc., it is much easier and cheaper to render an attack than to defend against one just as it is much easier to fire a shotgun than to defend yourself against 100 shotgun pellets coming at you at once. If a MEAN attack is not entirely defeated, it usually can be at least jammed and/or shielded against to tolerable levels. Or its location detected, which often identifies the attacker, permitting the victim to legally retaliate as well as to jam, shield against or evade future attacks. The Informants can be parts of these community oriented policing programs, but often they are just average citizens. Just like with Cointelpro investigations, everyone in the targets life is contacted and asked to be a part of the ongoing, never ending monitoring (systemic harassment), which is designed to destroy the target over years and leave them with no form of support. While there are all kinds of laws and regulations regulating experiments onanimals, there are no laws protecting people. This is why government agenciescan experiment on YOU.There is no recourse at this time for anyone wantingto "unvolunteer" themselves from these experiments.There are no metersavailable to the average citizen that will detect and therefore prove the use ofDEW being used against anyone.These directed energy weapons (DEW) candamage tissue, induce mood swings, loss of memory, and cause a wide variety ofphysical symptoms.Yet the DEW are just as effective as a bullet in "nullifying"the targeted individual.While there are laws regulating guns, there are no laws regulating DEW.Basically,the "hit men" deploying these weapons can never be detected.This is tantamount to having a firearm with a disappearing bullet.Granted, death occurs more slowly than by bullet, often appearing to be from natural causes, however; when death does occur, there is no "manhunt".Noone is brought to trial, the "hit man" goes free, moving on, no doubt, on to thenext "hit." Murder done slowly enough goes unnoticed. Many Targeted Individuals are harassed and placed under surveillance in this way for months or even years before they realise that they are being targeted by an organised protocol of harassment. What happens during this Gang Stalking surveillance is very similar to what happened to many innocent individuals in the former East Germany or Activists and Dissidents in Russia. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. In Russia it was used by the state to declare activist, dissidents or anyone they thought to be an enemy of the state as mentally unfit and many were institutionalised using this form of systemic control. The closest thing to Gang Stalking that democratic countries have seen before this is McCarthyism, Cointelpro, and RED SQUAD programs. Red Squad programs were used for monitoring, and harassment of various groups. They have been in place for over a hundred years, and they also employed Covert Human Intelligence Sources. Civilian Spies, also known as "Covert Human Intelligence Sources" are recruited from every level and sector of society. Just like with Cointelpro investigations, everyone in the targets life is made a part of this ongoing never ending, systemic psychological harassment and manipulation of the target. These actions are specifically designed to control the target and to keep them in line. These actions are also designed to destroy the target over years, make them look crazy and leave them with no form of support. For the targets of this harassment, Gang Stalking is experienced as a covert psychological, emotional and physical attack, that is capable of immobilizing and destroying a target over time. For the state its a way to keep the targets in line, control them, or destroy them. Worldwide programs of control and conformity have been used with equal success and lethality. What we are seeing now is a global co-ordinated and organised effort of control and conformity. Many countries around the world are currently using a model of policing called: Community Oriented Policing. It's described as a systemic approach to policing. It focuses on instilling a sense of community within a geographically located neighborhood. Communities come together and discuss what values they would like to have in their community, community development, and it's also a time to discuss any problems that might be happening in a specific
Generated with www.html-to-pdf.net Page 11 / 16

area. If a problem is identified an investigation might be opened. These local programs in many countries have been forming partnerships with other government run programs at, provincial, state and federal levels. Reports of Gang Stalking are not only coming in from democratic countries, but they are coming in from many other countries as well. The modern day systemic form of control could only be funded at higher governmental levels, just like it has in other societies where these similar types of harassment programs have been implemented. It's all part of a system of control and conformity that has been in place for many years. A system of control with many local groups and appendages taking part.

What are the goals of Gang Stalking?

The goal is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalisation, or forced suicide. Other goals of this harassment is to destroy the targets reputation and credibility. Make the target look crazy or unstable. Other goals involve sensitizing the target to every day stimulis as a form of control, which is used to control targets when they get out of line. Once the target is sensitized, the Citizen Informants have an easier time identifying the Targeted Individual in public. These programs are designed to make the targets of this harassment vulnerable, they want to make them destitute. The secondary goals seems to be to make the target homeless, jobless, give them a breakdown, and the primary goals seems to be to drive the target to forced suicide, just like what they did with some of the targets of Cointelpro. It's a useful way of eliminating perceived enemies of the state.

What are other Names for Gang Stalking?

There are many names for this form of systemic control and harassment. Under the Gang Stalking label you will also find such terms as Organised Stalking, Cause Stalking, Multi-Stalking, Community Mobbing, but it's all part of the same harassment protocol. What many people do not realise is that Gang Stalking is just one appendage of this systemic form of control. There are other forms of control used to repress, and keep individuals in line. Other forms or appendages include, but are not limited to: Mobbing, Cointelpro, The Buzzsaw, Covert War, Electronic Harassment, etc. These are the just some of the names being given to a very old game, that is once again being played by governments on their unsuspecting citizens. How are targets chosen?

Targets can be chosen because of many reasons. They can be chosen for political views. They can be chosen for whistle-blowing. They can be chosen because they belong to a dissident movement. They can be chosen because they asserted there rights at work. They can be chosen because they made the wrong enemy. Were considered to be too outspoken, unwittingly investigated something that the state did not want investigated, signed a petition, wrote a letter. They were deemed as suspicious by a civilian spy/snitch and their names were handed over. Its becoming apparent that targets might be chosen for this systemic form of control, if they are not already in some way a part of this controlled system. Eg. Many Targeted Individuals seem to be unaware that large chunks of our society are now being used as Citizen Informants. Who gets targeted?

Targeting can happen to anyone in society. In the past primary targets of programs such as Cointelpro have been minorities. Targeting however can happen to anyone. Individuals are often targeted for being outspoken, whistle blowers, dissidents, people who go up against wealthy corporations, womans groups, (single) women, anti-war proponents, individuals identified or targeted as problems at these community meetings, and other innocent individuals. The majority of the targets are often not aware that they are being targeted in this way. When a target moves, changes jobs, the harassment still continues. Every time the target moves, the same information, lies, and slander will be spread out into the new community and the systemic monitoring and harassment will continue. Traits of those targeted

Who takes part?

People from all walks of life are being recruited to be the eyes and ears of the state. People from all races, ages, genders. Every sector of society that you can think of is a part of this. Civilian Spies/Snitches include, but are not limited to: General labourers, the wealthy, bikers, drug dealers, drug users, street people, punks, hip hop culture, KKK, black activists, church groups, youth groups, Fire Fighters, police officers, lawyers, health care workers, store keepers, maids, janitors, cable installers, phone repair persons, mail carriers, locksmiths, electricians, etc. There really is no minimum or maximum age range. An article came out recently in the Uk, saying they were recruiting children as young as eight years old to be Covert Human Intelligence Sources. Some of these citizens might be recruited via programs such as, Citizen Corp, Weed and Seed, Citizens On Phone Patrol, (COPP), City Watch, T.I.P.S. Many started with good intentions to help patrol and monitor their cities and neighbourhoods. Others are recruited via their families, others at school, others at work. Since

Generated with www.html-to-pdf.net

Page 12 / 16

every sector, class, race in society takes part, recruitment is multi-faceted. Many do not understand or care that the end consequence of this harassment protocol is to destroy a person.

Why people participate in Gang Stalking?

There are many reasons that someone takes part in this activity. 1. Some do it for the sense of power that it gives them. 2. Others do this as a way to make friends and keep friends. Its something social and fun for them to do. Many in society use the one handed sign language to communicate and it's very effective in breaking down race, gender, age, social barriers. 3. Others are forced or black mailed by the State or the police into taking part. 4. They are told that they are part of homeland or national security and being used to help keep and eye on dangerous or emotionally disturbed individuals. They see themselves as heroic spies for the state. Civilian spies can come from a variety of different programs such as the Citizen Corp, Citizen On Phone Patrol COPP, Weed and Seed, T.I.P.S., City Watch or some other centralized government program used for patrolling and monitoring cities. 5. Others are just local thugs or Informants who are already being used for other activities, and their energies are just diverted over into these community spy programs. Eg. Some may be given the choice of Spying for the State or the police vs going to jail. 6. Others are told outright lies and slander about the target to get them to go along with ruining the targets life. 7. Many are however just average citizens who have been recruited by the state the same way citizens were recruited in the former East Germany and other countries. It's the way the society is.

What are some techniques used against targets? A few of the most common techniques are listed below. a) Classical conditioning. Getting a Targeted Individual sensitized to an everyday stimuli. The targeted individual over a period of months, or even years is negatively sensitised to an everyday stimuli, which is then used to harass them. Its used out in public to let them know they are constantly being harassed and monitored. Some examples of everyday stimulus that might be used include: sounds, colors, patterns, actions. Eg. Red, white, yellow, strips, pens clicking, key jangling, loud coughing, loud whistling, loud smacking of clapping of hands together, cell phones, laptops, etc. b) 24/7 Surveillance This will involve following the target everywhere they go. Learning about the target. Where they shop, work, play, who their friends and family are. Getting close to the target, moving into the community or apartment where they live, across the street. Monitoring the targets phone, house, and computer activity. Surveillance Policy. c) Isolation of said target. This is done via slander campaigns, and lies. Eg. People in the targets community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched. Files will even be produced on the target, shown to neighbours, family, store keepers. d) Noise and mimicking campaigns. Disrupting the targets life, sleep with loud power tools, construction, stereos, doors slamming, etc. Talking in public about private things in the targets life. Mimicking actions of the target. Basically letting the target know that they are in the targets life. Daily interferences, nothing that would be too overt to the untrained eye, but psychologically degrading and damaging to the target over time. e) Everyday life breaks and street theatre. Flat tires, sleep deprivation, drugging food, putting dirt on targets property. Mass strangers doing things in public to annoy targets. These strangers might get text messaged to be at a specific time and place, and perform a specific action. It might seem harmless to these Citizen Informants, but it could be causing great psychological trauma for the target. Eg. Blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from targets. Etc. It's like the death of a thousand paper cuts. One or two minor incidents will not cause any harm to the target, but over time the target is slowly worn down. Targeted individuals say..

Generated with www.html-to-pdf.net

Page 13 / 16

The Perps will mess with everything you do. It's their job. That's why they get paid. In order to justify their joband their pay, they have to mess you up.Knowing this you should takenothing for granted.For example, when you return to your workstationafter break, you must assume it has been sabotaged and double checkeverything before starting up again.When entering a fast food establishment, you may see perps standing back away from the counter,as though their order has already been placed.They are just waiting foryou to step up to place your order so they can accuse you of breaking inline.The list goes on. The Perps will mess up all your relationships. This means family, friends, acquaintances, and coworkers---no one willhelp you, no one will be able to resist Perp treachery, no one will beloyal to you.The Perps will lie, intimidate, and fabricate evidence untileveryone co-operates with their evil scheme to trash your life.Perps havebeen known to claim to be investigating Targets for drugs, terrorism, etc.Everyone you know will be forced to inform on you, and all informationgathered will be used to harass you in every possible way. The Perps will isolate you from everyone. This includes family, friends, and any new friends you meet.Again, thePerps use lies, intimidation, and fake investigations to easily accomplish this.After questioning your friends and family endlessly, the Perps letthem know that if they even mention the investigation, they can be jailedfor interfering with an ongoing investigation, and/or for aiding andabetting a criminal.Then the Perps strongly suggest that they "initiateno further contact with you until the investigation is finished." Ofcourse, family and friends are not told that the investigation will never be finished.Many Targeted Individuals have been "investigated" for20 years or more, with no end in sight. The Perps will mess with your communications. All means of communication you use will be messed with.Phoneconversations are sometimes disconnected or rendered unintelligible.Time sensitive snail mail and e-mail often arrives after the date of theevent, further contributing to isolation.E-mail is especially filtered sothat it arrives late or not at all. Unless you have a phone number to call to verify e-mail actually was delivered, don't count on it.Perps can sit ata computer anywhere on the planet and delete it with a touch of a button.Often the e-mail will be held and read by the Perps before being sent onto it's destination. The perps can dial a special code on their telephone key pad and hack into the central office of any phone company.Once this is done, it is easyto connect their phone to yours and listen in on your conversations.Thus, the perps know who your clients are and can turn this and othersensitive information over to your competitors.Other codes allow theperps to block phone calls to and from certain numbers or re-route callsto or from other numbers.This can cause your business to fail as yourclients will not be able to contact you. The Perps will mess up your credit. Even if you pay your bills on time, the Perps can mess up your creditthrough mail tampering and terrorist break-ins.Perps know where you keep everything, including any new mail you collect from day to day.Ithas been reported that the Perps will steal a selected bill from the pile ofmail on the kitchen table or wherever, so that the Target does not knowthe bill has arrived, until a late notice is received.Many Targets reportmail missing after a terrorist break in of their car.Even when you mailyour payments on time, the Perps can make sure the payment arriveslate whenever they choose to do so. The Perps will mess with every job you get. This is why most Targeted Individuals are not working. Even if you areable to find a job, the Perps will tell lies to your boss and co-workers soas to gain cooperation for on the job harassment.Then your projectswill be sabotaged, your co-workers will pick fights with you, your goodwork will go unrecognized, and eventually, you will be harassed right outof the job. If you are being considered for a job that pays well, the Perpswill simply tell more lies to the boss so that you will not get that position. The Perps will mess with your business. Most Targeted Individuals are self employed and usually work alone. Thisis because the Perps will mess with your employees so that they sabotage the business or steal from you. Even if you should decide to do telephonesolicitation from home, the Perps can call the same people and mess thatup too. Remember, your phone is bugged, so they hear every deal youtry to make. The Perp is paid to make sure you receive no income. The Perps will sabotage your vehicle. The Perps have lots of fun with your vehicle. This can be done while youare sleeping, shopping, visiting friends, and even when your vehicle is inthe repair shop.The perps have at least two methods of making sureyour vehicle will not start for as long as they want to keep you stranded.With a push of a button, your transportation is disabled, usually whilethey look on in veiled amusement.The real reason for the problem willnever be found by you or your mechanic.Targets have also reportedfinding Jello in the transmission fluid, dirt in the oil, lights left on to drain the battery, coolant drained out, and finding locked doors leftstanding open.Targets report a drop off in incidents after installing acamera over the driveway.Perps can still do a lot when you shop,depending on where, when, and how long you shop.Many things can be done while you are in the mall.Part of the Perp's job is to drain your resources through endless auto repairs made out to look likenormal wear and tear. The Perps may try to cause you to have an auto accident. Some Survivors report the Perps deliberately caused a car wreck.Oneparticular Target was forced by police to go to a hospital, even thoughher injuries were minor.Surgery was done and thereafter, she wastormented 24 hours a day.Another Target reports that after sustaininga serious injury in an auto accident, it took the doctor about two hoursto get to the hospital. She assumes he was being coached to do the bareminimum, so that she was permanently impaired.Another target reports24 hour harassment after having extensive dental work, after an injury.All three targets believe the doctors installed implants. There have been increasing reports that traffic lights are beingmanipulated in such a way as to; 1) turn yellow just as the target approaches the light or 2) turn red and stay red longer so as to hold the target at the intersection. Some survivors report that the yellow light has been used to writecitations.The red lights are used to delay the victim's progress until the perpshave time to set up vehicular street theater.This is especially trueof the traffic lights which govern the entrance to major highways.Some reportsindicate a perp vehicle, proceeding ahead of the targeted vehicle, appears to have a device to change the traffic light to red as the perp lead vehicle passes under thelight, leaving the targeted vehicle stopped at the traffic light.Perp theater is thusbetter organized further up the road orat the target's final destination. The Perps will make you appear insane. The Perps plan for you is deliberately designed to make you appear paranoid.Perps will enter your home, leave something out of place, stealsomething, or leave something there which was not there before. Thisis all part of the plan so that when you report this to the police, you looklike you just forgot, or your mind isn't

Generated with www.html-to-pdf.net

Page 14 / 16

"quite right".This is a terrorist break in,designed to make you look paranoid.Usually, when strangersenter a home, Police expect to find valuables missing.When you reportthe thieves stole a stick of butter and left the TV and VCR alone, thepolice will conclude that you are a mental case. The Perps may even use drugs on you. The Perps delight in causing terror to the Targeted Individuals.Drugscan be used from time to time to heap more misery on the Target.This is most often accomplished by adding the drug to the target's food.Some Targets have reported feeling very depressed or drowsy after eatinga hamburger from a fast food restaurant.Others reported the same symptomsafter being given a sandwich or piece of pie by someone they thought trustworthy.Some Targets even report missing time. Accept the fact the Perps can get to anyoneand that anyone can be coerced, brainwashed, or bribed into co-operating with them. The Perps will discredit you. The Perps will lie and brainwash your family and friends to believe thatyou have a mental problem.Telling your story becomes an exercise in futility,and in fact is frequently used as an excuse to end friendships and break offrelationships.Realize that once the Perps have started their campaign of lies, there can be no free and open discussion of what is happening to you. The Perpsdo not allow this because it might induce others to come to your aid.Realize that those near and dear to you have been programmed not tobelieve what is happening to you. Many Targets report friends andrelatives change personalities and fly into uncharacteristic rage at even the slightest attempt to discuss the truth of what is happening. Realizethat their desperate need to feel safe requires that they disbelieve youand actually stop caring. Where does the support or funding for this come from?

Though Gang Stalking itself is immoral and unethical in nature, programs such as this in democratic countries, and none democratic countries have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These Co-ordinated efforts then join hands with others for this systemic form of control and harassment. "Ruling the community with an iron fist. Savvy law enforcement types realized that under the community policing rubric, cops, community groups, local companies, private foundations, citizen informants and federal agencies could form alliances without causing public outcry. What can you do to help?

1. If you know someone who is being targeted in this way please dont go along with it. Dont assume that the person is guilty or a bad person. Many innocent people are currently being targeted, and people are being told lies. This form of harassment is systemic and it's about state control and conformity. The express goal of this harassment is to destroy the individual over time. 2. If you are aware of someone being harassed in this way, subtly direct them to websites that deal with Gang Stalking, or sites for Targeted Individuals. Knowledge is power. 3. You can subtly offer your support to someone who is being unfairly treated, in very small little ways. 4. You can bring up the subject of Gang Stalking or Targeted Individuals. 6. You can subtly suggest that your local newspapers or community papers print articles about Targeted Individuals or even an write an objective piece about Gang Stalking. Referenced site links: http://www.lonestarconsultinginc.com/free-mind-control-tutorial.htm#EMWEAPONS http://www.mindcontrolforums.com/archv-hm.htm http://www.lonestarconsultinginc.com/ http://www.lonestarconsultinginc.com/mindcontrol-devices.htm http://www.multistalkervictims.org/ http://www.multistalkervictims.org/osatv2.pdf http://www.gangstalkingworld.com/ http://gangstalking.wordpress.com/ http://gangstalking.wordpress.com/2007/05/27/covert-investigations-community-policing-gang-stalking/ http://psychologicalwarfare.yuku.com/forum/viewtopic/id/602 http://www.stopcovertwar.com/dew.html http://www.lonestarconsultinginc.com/radionics-devices.htm http://www.lonestarconsultinginc.com/electric-devices.htm http://en.wikipedia.org/wiki/Information_sensitivity#.22ULTRA_SECRET.22__or_SCI http://www.pbs.org/wgbh/nova/spyfactory/police.html http://www.brain.riken.jp/index.html http://www.leighbureau.com/speaker.asp?id=431 http://www.nanowerk.com/news/newsid=7944.php http://www.congress.org/congressorg/bio/userletter/?letter_id=247130666 http://rob-profile.com/Microwave%20Surveillance%20from%20Commercial%20Satellites.doc http://rob-files.com/ http://www.surveillanceissues.com/

Generated with www.html-to-pdf.net

Page 15 / 16

http://blog.aclu.org/2009/04/30/mass-con-fusion/#more-5320 http://www.freedomfchs.com/index.html http://www.freedomfchs.com/page3.html http://www.transparency-usa.org/ http://www.transparency.org/ http://www.freedomfchs.com/remoteneuralmonitoring2.pdf http://www.freedomfchs.com/evidenceofremotebehavioralinfltech.pdf http://www.freedomfchs.com/bioelectromagneticweapons2.pdf

Generated with www.html-to-pdf.net

Page 16 / 16