Skip to content

THE SILENT MASSACRE: ELECTRONIC STALKING AND MIND CONTROL

Mind Control & Cults
Articles & Interviews

Dr. Stan Monteith, Author

February 25, 2014

Dr. Eric Karlstrom

February 25, 2014

Organized Gang Stalking Quotes

February 23, 2014

From Rudy2’s Multilingual Blog (https://rudy2.wordpress.com/silent-massacre-electronic-stalking-and-mind-control-in-the-usa/)

SILENT MASSACRE / ELECTRONIC STALKING AND MIND CONTROL IN THE USA

with 210 comments

THE SILENT MASSACRE:

ELECTRONIC STALKING AND MIND CONTROL

IN THE UNITED STATES OF AMERICA

By Max H. Williams

(Published by Rudy Andria on June 13th, 2011 with permission of the author)

Author’s Note

The world is learning that in the last half of the  twentieth century, scientists developed a device/method that allowed them to  locate, focus on, and lock onto a person’s brain by remote to manipulate that  person’s thoughts and thus his actions. Mind control assaults now loom as one of  the main challenges to human rights in the 21st century. The targeted  person often never discovers that he has become a mind control victim, and he  ends up hurting others, taking his own life, or simply becoming another “Alzheimer” statistic. This paper discusses some of the elements of what I call  electronic stalking and mind control (ESMC). I am one of the targeted  individuals (TIs) of those activities.

Organized stalking on the ground often accompanies  the remote-operated electronic and mind control harassment. The on-ground  stalking entails a variety of criminal acts committed on the victim, including  monitoring his location on foot and in a vehicle, covertly entering his  domicile, tampering with his food, introducing gases and odors into his  dwelling, harassing him in his work place, vandalizing his vehicle and other  property, and strangers making rude signals and engaging in rude behavior with  him wherever he goes.

However, victims of organized stalking are not always  victims of electronic and mind control effects. Likewise, targets of  remote-operated electronic stalking and mind control are not always physically  stalked. This paper deals mainly with electronic and mind control activities.

In The Silent Massacre, I discuss my  particular case, inform readers of what I know for certain about the ESMC, and  speculate about other facets of it. Targeted individuals will readily identify  with what I talk about in this paper. They understand the veracity of my  descriptions of the effects of electronic and mind control attacks, which to  others read like science fiction. This paper is written principally for those  victims. However, readers who are not TIs but who are intellectually curious  about electronic and mind control assault will learn much about the sick attack  on hundreds of thousands, perhaps millions of targets, that also indirectly  affects everybody in those targets’ lives.

The human resources and the enormous cost required to  carry out electronic stalking and mind control, re-enforced in many cases by  organized stalking, almost certainly limit its use to governments. Only  governments can mobilize the enormous outlay of funds and successfully  camouflage the use of those funds. Only governments have the sophisticated,  highly-classified equipment and computers required for electronic abuse and mind  control. Only governments can train in secrecy the cadre of handlers who  administer the electronic assault and mind control activities, using deception  and psychology.  The intelligence community in the United States operates with  an almost limitless secret budget without Congressional oversight.

Having stated that, I recognize that the secret  device(s) and method(s), after decades of usage, may have been purloined by  those involved and passed on to other entities. It is also possible that other  scientists discovered the device(s) and method(s) either collaterally or later  independently. Effort from many sources went into the development of electronic  stalking and mind control. With so many pure and applied scientists, social  scientists, CIA/military propagandists, intelligence agents, high-ranking  government officials, and medical personnel involved in the development, the  secret could have been stolen and used for many originally-unintended purposes.

Nevertheless, no non-government entity could carry  out electronic stalking without government knowledge of it. U.S. Government  intelligence and military units continually scan the air waves for suspicious  radio frequencies. Thus, even mega corporations, businesses, and other groups  would not be able to carry out electronic assault and mind control in secrecy  unless they did so under cover of the government and with government protection.  Several countries, including the United States of America, have experimented  with directed energy weaponry (DEW) and mind control for many years. Once-secret  documents obtained through the Freedom of Information Act prove that the CIA and  other elements of the intelligence community have electronically targeted  American citizens without their knowledge and consent for almost three-quarters  of a century.

Fortunately for TIs, the internet brings together  targeted individuals of electronic torture and mind control from all conceivable  backgrounds. Race and ethnicity, color, gender, religion, politics,  philosophical views, and all other human characteristics and thought become  insignificant as targets unite to do battle with their unseen enemies. The  internet provides a link among the many targets of electronic stalking and mind  control. Working together, we shall eventually identify the devices and methods  used in the remote torture, learn the identity of the perpetrators, and bring  the cowardly perpetrators to justice.

The perpetrators also recognize the value of the  internet; consequently, they fill the internet with a massive amount of  misinformation on electronic stalking and mind control activities and work  relentlessly toward curtailing targets’ use of the internet. The government’s  super computer system, called Echelon, sweeps the internet and monitors our  phone calls, looking for any signs of unrest against the status quo in the name  of “War on Terrorism.”

In the following chapters, I often use several terms  concerning the ESMC. I shall define briefly three of those terms. Many targets  use the term “perpetrator,” or perp, in a generic sense to refer to all of the  persons involved in electronic stalking and mind control. I prefer to  differentiate between the perps and the other assailants.

  • Powerbrokers or perpetrators (perps)  refers to the group that sponsors the ESMC. That group probably represents one  or more of the following: (1) national law enforcement and intelligence agencies  or a coalition of those entities, which operate under the executive branch of  the U. S. Government; (2) a Radical Right or other so-called civic organization  or PAC powerful enough to command the support and protection of the executive  branches of all levels of government; or (3) a foreign power, working with the  knowledge and acquiescence of the U. S. Government or a group in the U.S. that  works for that foreign government.
  • Handlers work for the powerbrokers in  actually employing the still-secret device(s) to carry out the torture and mind  control on targets by remote.
  • Accomplices support the handlers by engaging  in on-site organized stalking, spreading rumors, and interfering with the  targets’ communications and their daily lives.

The handlers and their accomplices seek to neutralize  TIs in any possible way. Interfering with the targets’ ability to communicate  aids the handlers in neutralizing the targets. My handlers, who have had access  to my computer for years, tried their best to prevent my writing this paper.  They especially interfered with the sections dealing with the perpetrators and  the psychiatrists by continually deleting my text, keeping me from saving the  text to the computer, causing countless other mechanical problems, and  distracting me with their voice-to-skull telepathy (more about that later). But  they failed to silence me. Their downfall will come from public awareness. I  shall do my part to educate the public.

The Discovery

All targets of electronic stalking and mind control  can remember when they first realized that they had been targeted. Although it  is now obvious that I had been targeted since at least the mid-1970s and very  probably even from the early 1960s, I did not discover it until December, 2005,  when my assailants, or handlers, started bombarding me with electrical-like  jolts, strong vibrations, and other physical torture. The first electronic  vibrations struck me with such force that I could hardly stand on my feet. Only  a few days later, I began hearing voices from unseen speakers. Only I could hear  those voices.

I gradually learned that the physical electronic  effects, although annoying and often painful, were simply used to “soften” or “sensitize” or “pre-condition” me for the real objective – mind control. I later  learned that victims are normally targeted for years before they finally realize  it. Some targets suffer physical attacks for long periods and visit doctors  frequently without realizing that their symptoms are not natural consequences.  Other targets die, sometimes probably from the consequences of their torture,  without ever having discovered that they were targeted.

Four days after the electronic attack, the handlers,  began “talking” to me subliminally through my brain. I later discovered that TIs  call that communication voice-to-skull, or V2K. It is also sometimes called “synthetic telepathy, microwave hearing,” or “subliminal communication.” Of  course, by design, only the victim can hear the talking. At the time that the  ESMC hurled me into reality, I was sixty-eight years old and in exceptional  physical and mental health. I knew full well that I was not delusional.

The voices first occurred as I drove in Texas near  the Mexican border. The vehicle radio was not on. At first the voices sounded  like they came from the door panel on the driver’s side. I thought that someone  for some reason had perhaps planted a bug in the door. I later learned that  targets can be located using their cell phones. However, at that time, I did not  use a cell phone. When I reached Baton Rouge, Louisiana, I sought out a private  detective who did a bug sweep on my vehicle without finding anything. At that  time, the voices that seemed to come from the vehicle were very weak and  scarcely “audible.”

Shortly after visiting the private detective, I  figured out that the voices were not coming from the vehicle but from my own  body. Having had much dental work performed overseas, I suspected that a bug  might be hidden in a tooth. A few days later, I went to a dentist and requested  that he take full x-rays of my teeth and mouth. He saw nothing unusual in the  x-rays. I did not either at the time, as I was looking for a clearly visible,  well-defined object; however, later, in May of 2009, I found those same x-rays  and looked at them very closely. In the roof of my mouth were two tiny specks of  what looked to be the same metallic substance used for fillings. In my gums was  a very slender, light-colored, cylindrical-shaped sliver of some object. Those  objects are still unidentified, as I can get no doctor’s order to examine more  closely those specks.

The first few months of electronic and mind control  attacks threw me into a state of confusion. I was completely disoriented, as I  could not understand what was happening. I later discovered that all targets go  through that stage of initial bewilderment without having anywhere to turn for  help.

As an historian and former government employee, I  understand the value of documentation. Thus, on the very day that the electronic  effects first pounded me, I started recording a detailed journal in which I  recount my experiences and my thoughts concerning them. I later realized that my  handlers could utilize my journal as a written record of the effects of their  torture, could adjust their effects on my mind and body accordingly, and could  circulate a written copy of my journal among themselves. Despite that, I felt  that it was more important to keep a record of those occurrences than to attempt  to shield myself by not keeping it. The journal today comprises nine volumes and  well over a thousand pages of single spaced typescript.

I do not yet know how the perpetrators of the  electronic and mind control assault “hooked” my brain by remote; however, I  suspect that I was implanted with a microchip or several microchips over the  years. I have had many inoculations, much dental work, and several minor medical  procedures performed in various locations. Locating the microchips is a major  problem, for they can be inserted in any part of the body, either only slightly  below the surface of the skin or very deep into the muscle tissue. I have  determined that there are probably nineteen or twenty locations on and in my  body where microchips could have been implanted.

Not being able to pin down the location makes finding  the devices much more difficult. In addition, if doctors know that a victim  wants an x-ray, CT Scan, or MRI to look for a microchip, they will not write  orders for those searches. In fact, they will ordinarily advise the authorities  of your purpose in wanting those pictures, in effect suggesting that you are  paranoid schizophrenic.

As the reader will later see, whatever method was  used to “hook” my brain had been employed in my case perhaps by the early- or  mid-1970s and no later than the mid-1980s. More recently, I have recalled  conditions and events that indicate that I could have been targeted even in the  early 1960s. If the latter date proves correct, it would probably implicate the  military doctors and other military medical personnel who gave me shots and  inoculations when I served in the Active Army Reserves in 1961. I used to wonder  how our U.S. rescue forces were able locate lost servicemen who had become  separated from their units during a battle. The capability of locating those  disoriented troops suggests that all servicemen are routinely microchipped upon  entry.

Theories of Methods Used in  ESMC

We know that electronic and mind control assault  operates by remote, but we know little about its delivery system. The delivery  has to be either satellite-driven, land-based, or a combination of the two. The  debate about which one it is goes on. Likewise, there is still some question  about whether the delivery system requires a device implanted in the human body  or can be delivered without that implanted device.

“Remote” means that some object is used to make  contact with the human body over a distance through the air. Whatever is beamed  into the body does not waft aimlessly through space but follows a line of  trajectory, or a frequency. Anything that makes a sound or a movement creates a  frequency. There are thousands, probably millions, of frequencies. Almost  anything today can be controlled by remote using particular radio frequencies.

Today remote-controlled objects are also used in  guiding satellites and unmanned space ships, sending and operating military spy  drones, changing TV functions, opening garage doors, turning on light switches,  and working almost any other motorized or electrical object. It would be  difficult today for an American to live without remote devices.

Electromagnetism may play a role in the targeting. A  field of electromagnetism seems to envelope the target’s surroundings. In my  case, it appears to cover my house and the pastures and fields immediately  around it, as whenever I am outside, the handlers’ voices, or V2K, come through  stronger and clearer. Once again, we do not know whether that electromagnetic  field is projected by satellite, from a land site, or from a hidden device in or  near the victim’s house. Notwithstanding, what if there were some type device  that could make contact with that electromagnetic field that surrounds the  target and then operate within that field to attack us along our particular  brain frequencies? If that were true, distance would be no object and a person  could be pinpointed among several nearby people for electronic assault.

Satellites now possess amazing capabilities, all  performed by remote, and they may very well be utilized in electronic assaults  and mind control. In a 2003 article called Shocking Menace of Satellite  Surveillance, John Fleming wrote about the use of satellites in ESMC  assault. Discussing the realities of satellite-driven ESMC, Fleming said: “The  victim’s movements will be known, his conversations heard, his thoughts picked  clean, and his whole life subjected to bogus moralizing, should his tormentor  diabolically use the information gained. A sadist could harass his target with  sound bites, or audio messages, directly broadcast into his room; with physical  assault with a laser; with subliminal audio messages that disturb his sleep or  manipulate persons around him into saying something that emotionally distresses  him . . . .”

The satellite-guided GPS almost certainly figures  somehow in the electronic assault and mind control activities. Programs such as  Google Earth can locate and zoom in on houses and other objects on maps. That a  victim can be targeted regardless of his location and movement argues that a  satellite is very likely involved. For a satellite to be able to follow and  pinpoint the target wherever he goes, however, probably requires an object, a  substance, or a special condition in the target’s body or, as suggested above, a  device that can operate within and upon the electromagnetic field around the  target. The voices that many targets hear may be piggybacked over the GPS into  that electromagnetic field. Targets know that the intelligence community and  other agencies possess through-the-wall surveillance capability.

If satellites are used, distance is no object. Our  torture could be carried out from other countries just as easily as from the  United States. China, India, Israel, Russia, and other countries possess that  capability. Consider the use of drones in warfare. Today (November, 2009), the  United States often sends drones, or unidentified aerial vehicles (UAVs), to  strike targets in Afghanistan and Pakistan. Forward observers identify the  target, get permission to call in, and then communicate with the drone  operators. Those drones are guided by computer software by remote from  facilities in the United States, notably Fort Meade, Maryland, from thousands of  miles away through the GPS with pinpoint precision.

The use of satellites, however, does not prove that  the attacks come from a great distance. Satellites can also be used along with  the GPS from nearby. Handlers who live near targets can utilize satellites and  the satellite-driven GPS, using the same devices and methods, just as easily as  handlers who operate thousands of miles away. Information concerning weaponry  capable of being used by satellite for physical and neurological torture is  purposely vague about distances. Eventually we shall know from what range our  handlers operate. It will probably vary from case to case. Many targets believe  that our electronic harassment comes from U. S. Government facilities near  Fairbanks, Alaska called High Frequency Active Auroral Research Program, or  simply HAARP.

This paper does not explore in depth the methods used  to zero in on a person body and mind by remote. There are many schools of  thought on that subject. Here are some of them.

One theory believes that one’s voice can be recorded,  transferred to a computer, and the computer then used to locate the particular  voice and lock onto that voice’s brain. Experiments show that that can indeed be  done. Voices give off distinct vibrations that are as peculiar to a person as  his fingerprints and DNA. One day when the handlers were vibrating me  mercilessly, I tensed my throat, and the vibrations stopped.

That caused me to remember an incident that occurred  when I served in Africa in the 1980s. One day while working in my office, the  secretary from the embassy political section, the office that serves as a front  for our CIA agents, called me to ask some question that anyone could have  answered. I hardly knew the caller; thus, I instantly realized that the real  purpose of her call was to record my voice.

However, I believed that it was probably for security  purposes in case of kidnapping or being held hostage at some point. Voices are  very distinctive, and they can certainly be used to distinguish one voice from  another. That our intelligence community was recording voices in the 1980s makes  me believe that there may be some validity to the theory that perpetrators of  ESMC may be able to “hook” our brains, or at least determine our locations, by  zeroing in on our voices.

Some evidence also suggests that targets’ minds can  be “hooked” if the handlers know the targets’ DNA. If that is true, targets  would not necessarily have to have a microchip or other object or substance in  his body to be hooked. There may be some remote device that with the aid of the  GPS will locate a person and “hook” him using his DNA. If DNA can be utilized,  society is in deep trouble, for obtaining DNA samples of people is a very simple  matter. Even touching a glass or a can will leave useable traces of DNA.

It is reported that since 1979 all hospitals in the  United States have been required to send DNA samples of all babies born in the  U. S. to the Federal Government. I do not know the office or agency that is  supposed to keep that data. If that information is true, it adds credence to DNA  perhaps being involved in ESMC.

Still another theory talks about small devices  (nano-microchips) made so small that they can fit between molecules of water and  other liquids and be injected into the body in shots and inoculations. Patents  taken out by scientists describe that very procedure. Those same nano-microchips  can probably also be swallowed in food and beverages, attaching themselves to  the lining of the stomach.

There is also evidence that even human breath or  breathing somehow figures in electronic torture and mind control. Every  movement, even breathing, gives off a frequency. I later found out that when I  hold my breath for a few seconds, the vibrations temporarily cease. Yet, we do  not know whether breathing in itself has any connection with “hooking” a  target’s brain. The breathing theory does not explain how a target can be  pinpointed while in the close presence of others.

In addition, MRI and other machines have been  successfully combined with computers and used by remote along radio frequencies  to move digits and limbs, detect emotions, and “detect lying, racism, and even  identify which image a person is looking at, suggesting [that] one could  visualize scenes from a person’s dreams or memory” (Hospital Soup.com, June 10,  2008). The uses of a device such as that are endless if used on the brain’s wave  lengths or frequencies. Yet, those actions require an implant in the person on  whom the actions are performed.

Similarly, neurotransmitters can be used by remote to  communicate with brain cells through electrical impulses. That device can tap  into the brain’s functions that cause body movement, thought, feelings  (emotions), and communication. It could probably also influence the thalamus, or  the inner part of the brain, which regulates body temperature and controls urges  such as eating, sleeping, and sexual behavior, all of which figure among many  targets’ ESMC effects.

Laser guns may play a role in ESMC. A CNN news  program on February 23, 2009, reported that 148 incidents of lasers aimed at  airplanes had already been reported since the beginning of the year. In the last  incident, the laser was green in color and about the size of a pencil. If a  laser beam can be focused to such a fine point over several miles of distance,  imagine what it could do when trained on an individual or an object from a  closer distance over a period of time.

Mounting evidence suggests that a substance or an  object can also be introduced sexually into a target’s body to “hook” his or her  brain. Several of my correspondents mention that their ESMC began after having  had an intimate relationship with somebody. Those relationships may have been  set-ups. Spies and undercover agents have used sex for centuries to entrap  individuals. Some such object (nano-microchips) or substance could possibly be  introduced into targets vaginally, orally, or anally through sexual contact.

Some targets believe that the perpetrators’ device  enters through the targets’ eyes to carry out the electronic attacks on the  targets’ bodies. Presumably that would happen after the targets are already “hooked.” One target whom I know wears professional goggles that she says help  keep out the light used by the assailants. Another target also believes that he  is attacked using light. He describes the lights as very bright street lamp-type  elevated lights that seem to rotate. He believes that his attackers piggyback  their laser, or whatever the remote device might be, on the beams of light.

Remote cognitive neural monitoring is one of the most  recent theories. That theory has the targets’ minds being located and “hooked” using some type frequency by remote that somehow connects with the brain without  anything being implanted in the targets. I believe that theory is pure  disinformation, disseminated by the very elements who are carrying out the  remote torture. Why do I believe that? Use your brain. If it were that simple to “hook” a person’s brain, all the drug lords and pushers, heads of crime  syndicates, crooked politicians, white collar crooks, prostitutes, child porn  makers and distributors, foreign and domestic terrorists, bank robbers,  embezzlers, money launderers, and other criminals would already have been caught  and sent to prison. That has not happened; therefore, in my opinion, that  theory, which has caught on in the targeted community and is believed by many  targets, is not valid. Let me repeat: remote cognitive neural monitoring, in my  opinion, is not a valid theory.

Other theories include wiring in the ear that  connects with the brain and pins that penetrate the skull. If those ideas are  valid, the procedures would have to be done in medical facilities or at least  while the target is under sedation. If true, this further indicts the medical  community for its complicity in electronic and mind control assault.

All that said, pick a theory. In truth, we do not yet  actually know how high-tech assailants can focus on a single individual and  capture that person’s mind; neither do we know what instruments are used in the  process. Both are highly guarded secrets shrouded in deception. In fact, there  may be several methods of “hooking” the target as well as several methods of  administering the electronic and mind control effects. However, the only proven  method thus far is through implanted microchips.

Whatever device is used to “hook” the brain, it has  the capability of using that system on diverse targets in a variety of  circumstances in all types of locations. A super computer necessarily has to be  used along with the device, and that computer uses programs with an amazing  range of capabilities. Only the government, research institutions, and  mega-businesses and organizations would probably be able to own such computers  and be able to acquire some of the more sophisticated computer programs. We  shall later see some of its capabilities and the effects they have on the human  body and mind.

Although I cannot prove it and although I possess  little technical expertise, here is what I believe. The attackers use two  different methods, one for the V2K and another one for the array of physical  effects they are able to cause the body. The V2K is projected to targets via the  use of directed sound and GPS, and the physical effects by software used in  conjunction with implants. Both require frequencies. However, in my opinion,  without an implant, targets cannot receive the continual V2K. There is no way  for attackers to focus on targets with V2K regardless of where targets go, even  using satellite GPS, without their being some type of object in the human body  to receive the signals. I further believe that any other method disseminated  over the internet is probably disinformation coming directly from the perps.

Microchips, the Most Plausible Agent for  Targeting

The only proven method of “hooking” a target’s brain  is through surreptitiously implanting a microchip or a nano-microchip in the  target’s body. Scores of patents dealing with microchips in the human body and  operated by remote have indeed been filed, many of which, in the wrong hands,  could be utilized for electronic abuse. I have read of only two persons who  supposedly located microchips in their bodies, had them surgically removed, and  then had them identified. My efforts to contact those individuals failed;  however, their cases are well documented. I know other targets who have located  foreign objects in their bodies but have not been able to find surgeons who  would remove them. We know that many forms of microchips have been developed for  the human body for many purposes, all of them capable of being controlled by  remote.

If indeed microchips turn out to be instrumental in a  target’s electronic assault and mind control, it directly implicates the medical  profession. Only persons in the medical field, intelligence agents, and perhaps  law enforcement are able legally to acquire microchips. Those microchips had to  have been implanted at some point by a dentist, a doctor, an anesthesiologist, a  nurse, or somebody else in that field unless a target is somehow sedated by a  knowledgeable person who implants the microchip. Those cases have indeed  occurred.

Since syringes are generally used for the  implantations, nurses are particularly suspect in committing that crime. If a  doctor, nurse, or another member of the medical profession would implant a  microchip in a patient, he would also probably not hesitate, if given orders, to  inject that patient with live cancer cells, Hepatitis C, or AIDS. That, of  course, does not mean that every doctor and nurse engages in that sordid  practice.

I got a letter in early 2010 from the mother of a  victim in Scotland who stated that her son was implanted with a microchip while  he was in jail. He could later feel the lump where the microchip had been  implanted. For months he suffered relentless electronic and neurological  attacks. A local doctor later saw the microchip on his scanners and removed it.  The victim instantly improved. Afterward, the doctor refused to discuss it with  the victim and his mother, telling them that he found nothing.

Targets require some object, substance, or  characteristic in their body that will attract frequencies used by their remote  attackers. Otherwise, if the electronic and mind control assault is delivered  along a frequency, how does the effect distinguish that particular person? A  target can receive vibrations while in the presence of other people without the  others feeling it. Certain voice inflections and tones of narrators on TV also  cause jolts in a target’s body without others sitting nearby feeling them.  Something on or about the victim’s body has to act as the receiver for some  device that delivers those effects.

Whales, dolphins, sharks, migratory birds, endangered  animal species, and other animals, fowl, and reptiles have been fitted with  microchips for many years to trace their migratory patterns and monitor their  vital signs. If the animals’ blood pressure and other body functions can be  monitored by remote, they can also be manipulated by remote. If animals can be “tagged,” humans can also be tagged.

The microchip has been around since the 1970s. Since  then, many versions of microchips have been invented and manufactured. One such  microchip was invented by Peter Seth Edelstein of Menlo Park, CA and Benjamin  Theodore Nordell II of San Mateo, CA and patented on September 5, 2006 under the  name Method and Apparatus for Locating and Tracking Persons (Patent No. US  7,102,508 B2).

The patent was sold by the inventors to Persephone,  Inc. of Menlo Park, CA. Interestingly, my online search for Persephone turned up  very little on that company. It very well may be only a front for Department of  Defense contractors who carry out experiments and invent and improve gadgets for  the DOD. At any rate, it is not a highly visible organization.

Although the ostensible purpose of the above patented “device” is to locate and track persons who are lost or kidnapped, it lends  itself to many more devious and sinister purposes. Descriptions of patents of  this type are purposely made very vague; however, reading between the lines, we  can glean the following information about that particular patent as it relates  to targeted individuals.

–  the “device” is indeed a microchip;

–  the microchip can be implanted in virtually every  part of the human body, even in   body cavities (use your imagination);

  • the microchips serve as both transmitters and  receivers;
  • those microchips are encased in a substance that  does not irritate the flesh  around them;

– the remote operators [the handlers] use a handheld  device, probably a small radio or a cell phone, that in conjunction with cell  phone towers “activates” the microchips;

– the users, or handlers, also communicate with each  other by cell phone;

– the users do not have to be physically present in  a single location to coordinate  their efforts but can instead use “conference  calls from various locations;”

– the microchips CAN be shut off by the initiators;

– the microchip lasts indefinitely, as it can be  continually recharged;

– the microchip’s software can indeed see the  target’s body and even the organs  inside his body;

– the microchip can be programmed with a vast variety  of software that renders many of the physical and neurological effects (the  voices, etc.) experienced by targets;

– those effects can be programmed to occur whenever  the programmer wishes;

– users/operators of the microchip can monitor  several targets at the same time by  remote.

Distance was not mentioned in the patent. In the  drawing that accompanied the patent, communication is depicted by three cell  phone-looking towers. Patents, however, are often written in a vague and  misleading manner, especially those patents that can also be used for unethical,  intelligence, or military purposes. Thus, the communication system shown could  be the triangulation of satellites. The use of satellites would make the patent  workable at any distance. Even regular radio frequencies patched from one area  to another would allow the handlers to operate from a far  distance.

Likewise, the device used to communicate with the  microchip was not mentioned specifically. Although the three towers were shown  in the figure demonstrating how the patent works, the narrative did not state  whether the device was a radio tuner, cell phone, land line phone, or some type  of scanner/radio. Moreover, the radio towers may have represented a  triangulation of satellites.

The microchip’s computer software determines its  effectiveness. By adding new software, the microchip can be adapted by remote to  the target’s evolving situation and change in location. Additional software,  tailored for the particular target, can be introduced into the microchip by  remote at any time. That software can be continually refigured and reprogrammed  as necessary, based on the target’s actions and reactions.

To be used in the human body by remote, microchips  must have a unique identification (ID) such as a symbol, a number, a word, or a  combination of those. There is even some evidence that a target’s DNA profile,  or a distinct part of it, may be inscribed on the microchip. The target’s ID has  to be known and entered into the handler’s device for a match before it can be  contacted by remote. Once the codes are matched on the microchip and the device  used by the handlers, the device’s computer software, without which the device  is useless, acts through contact with the microchip to carry out its various and  many purposes. There must also be a radio frequency to connect the sender to the  receiver, becoming an RFID (radio frequency identification), much like that used  in store scanners at the check-out counters.

The device used by the handler who operates the  device and software must be reasonably small and portable (battery operated).  The name of that device is carefully avoided in the patents; however, it will  probably be a common or perhaps customized cell phone, a small radio or scanner,  laptop computer, or a similar object that has both receiving and transmitting  features. Logically, only one handler has use of the computer that controls all  the functions of the software on the target through the implanted microchip;  otherwise, the computer commands could conflict and negate each other.  Nevertheless, other handlers using those handheld devices can doubtlessly locate  the target using the device.

The trainer manual doubtlessly instructs the handlers  to vary their methods of attack on their targets. Some targets may get the V2K  and no neighborhood stalking; others may outwardly receive only the electronic  effects, i.e. jolts, vibrations, and pin pricks; still others may get a  combination of electronic effects, V2K, and organized physical stalking. That is  totally by design, for if the same technique were used on every target, it would  be far easier to research that technique, develop shielding for it, and possibly  trace it to its origin.

Introduction of the microchip into a target’s body  can be performed in a variety of manners: through shots and inoculations,  through medical procedures, through tiny projectiles (microscopic darts), and  drugging the victim first and then administering the microchip. Apparently many  targets are “tagged” using the latter method. Hypnosis often accompanies the act  so that the target will not remember being drugged.

Although hidden microchips have been recovered from  the bodies of unknowing and involuntary targets, their detection and removal has  proven very difficult, as doctors very reluctantly write orders for the use of  instruments that can detect those microchips. Moreover, today’s microchips are  purposely made too small to detect and with materials designed to conceal them.  Regardless of whatever other device(s) and method(s) might be used to perform  ESMC on involuntary targets, we know that microchips can be and are used for  that purpose.

Most microchips, like implanted medical devices such  as hip replacements and pacemakers, are probably not expected to last beyond a  certain period of time. That argues that targets are implanted with multiple  microchips so that if one stops functioning, another one will continue.  Continuity in electronic stalking and mind control is very  important.

Many targets receive both voices as well as physical  effects from their attackers. There is increasing evidence that the voices and  the physical assaults may stem from two different remote weapons. For example,  in my case I not only receive electronic effects but also get the voices. If the  voices come from an illegally implanted microchip, why did hundreds of holes  appear in sheets of aluminum foil I had placed over my bedroom windows? This  suggests that if indeed microchips are used, they must function in consonance  with the electromagnetism and directed energy weapons.

We have been led to believe that microchips are  cylindrical capsule-looking devices about the size of an oft-quoted “grain of  rice.” That may no longer be true. Today scientists have the capability of  manufacturing a microchip in many forms and shapes and from many substances. A  microchip may now look like a very thin wire no longer than perhaps a quarter of  an inch. Another possible microchip will look like a mole and will probably be  attached to the sub-dermis with very short wires that serve as antennas.  Nano-microchips can also probably be ingested orally.

Microchips have evolved from the traditional,  capsule-like ones often pictured in articles about the Verichip on the internet.  Today microchips take many shapes, forms, and sizes. There is proof that  microchips in the form of tiny darts smaller than a human hair and less than a  quarter of an inch long can be shot into a target from a distance.

I definitely feel that there is at least one  microchip in my body. Some of my symptoms could only come from within the body,  for example, the unusual salivation, the cramps, the gastric disturbances, and  the pin pricks. Those effects can probably be caused only by specialized  software. That software must operate in conjunction with a code from an object  within the body that responds to a computerized command – doubtlessly a  microchip. Let me repeat that despite the many theories, so far ONLY microchips  are PROVEN capable of interacting with victims to produce physical and mental  torture.

In my case, most of the symptoms occur on and around  my head, which leads me to believe that if there is indeed an object in my body  probably located in that region. Here are some of the effects on my head:  tinnitus (ringing in the ears); tops of ears oozing a colorless fluid; sensation  of bubbles popping in mouth; salivating from the mouth at any time; pin pricks  on the eyes and a loss of vision; the top of the nose coating over with a thick  crust; tingling on the skin (as a result a brown spot has appeared on the right  outside nostril and a sore-type depression, on the right side of my chin);  clicking on my head and in my left ear; frequent, long-lasting, pin-like prick  on the back of my neck; the sensation of flies crawling on my face; a  psoriasis-like area on my cheek near the left eye; a very sharp sensation on or  in several teeth (as if a dentist drill had hit a nerve); a heavy pounding,  throbbing in the back of my head; an unnaturally intense itching in the corners  of my eyes and on my eyelids; pin-like pricks in the depths of my ears that  cause me to shudder violently; air that pushes my lips out as if I were snoring  through my mouth; scratching of the throat, which causes either sneezing or  coughing; a tingling inside my nostril that induces sneezing; blockage in my  esophagus that makes it difficult to swallow; constant itching inside my  nostrils that makes me want to “pick” my nose; and of course the voices that  occur in my brain or ears. (More about symptoms later.)

Software and Its Uses for  ESMC

Regardless of how a target is “hooked,” to perform  electronic stalking and mind control on that target requires a computer and  computer software. The software is used for both the electronic, or physical  effects, and the neurological assault. Much of the software utilized can be  bought off the shelves in retail stores. Other software, particularly that used  for neurological assault, is specialized and probably can only be procured by  medical personnel and authorized persons in the military-intelligence-law   enforcement-industrial complex. That computers and software are used for those  purposes strongly argues that targets carry some type of foreign object in their  bodies for them to act upon.

Physical Effects

Everybody has seen movies in which scientists  manipulate radioactive and other devices from behind glass walls with  instruments by remote. Nowadays doctors can do the same thing, except at a much  greater distance. Physicians can monitor and adjust their patients’ heart beat  rate, blood pressure, and other bodily functions by remote over hundreds,  probably thousands of miles. I know a person in south Louisiana whose heart  doctor lives and practices in Houston. Whenever the person experiences an  irregular heartbeat, he simply calls the doctor who then monitors the patient’s  heart using his computer software and adjusts the heartbeat rate by remote. The  doctor’s device must necessarily key in the ID number or symbol on the patient’s  pacemaker to be able to do that.

It is only too logical that the same device that the  physician uses to regulate a heartbeat can also be used to cause the opposite  effect, an irregular heartbeat. My handlers often attempt to interfere with my  normal heartbeat while repeating subliminally, “Heart attack.” Targets call that “faux heart attacks,” or “induced heart attacks.” Many other targets also suffer  from irregular heartbeats caused by their handlers. Those targets only very  rarely wear pacemakers, which argues that they must host some other type of  receiver-transmitter in their body that carries an ID that can connect with  similar software.

In addition to the software that causes faux heart  attacks, the handlers possess software that allows them to cause severe gastric  problems, including the formation of much stomach gas or air on the targets’  stomachs, and to light up the interior of targets’ stomachs, intestines, and  esophagi. I suggest that the handlers employ software used for performing  colonoscopies. Although a doctor who does a colonoscopy operates from nearby,  the device nevertheless operates by remote.

The handlers use software that provides a light that  allows them to view our organs and the inside of our throats and stomachs by  remote. Moreover, the handlers can perform sodomy on targets, as they have on me  and on many of my correspondents both male and female. When that occurs, it  feels exactly like the tube used for the colonoscopy. If a device can function  from a few feet away by remote, what is to prevent its performing that same  function from many miles away?

Doctors also perform eye, nose, and sinus surgery  using computers by remote. Once again, normally the computer and the computer  software are in the same room with the patient. However, it could easily be used  by remote over a great distance. Likewise, hearing technicians who fit hearing  aids check and adjust the hearing by remote. That could be done a thousand miles  away as easily as from the desk in front of the hearing aid recipient.

Prostate problems are often treated by instruments  run off computers using specially designed software. Many male targets complain  that their handlers cause them pain in the groin and cause unnatural erections.  By stimulating parts of the penis or vagina and the colon by remote, the  handlers can cause erections in men and unnatural orgasms in women. Playing with  the targets’ sexual organs by remote is seemingly one of the favorite activities  of the handlers.

There is also various specialized dental software  that allows the user to view the patient’s teeth and mouth in great detail by  remote. Those programs work with x-rays of the patient’s mouth. Dentists  normally use a simple laptop computer for that purpose. I suspect that a  dentist, using the dental records of a particular person, could locate with his  dental software that person wherever he might be. The same type program can be  used with x-rays of any part of the patient’s body, either internal or external.  Many targets complain that their handlers are able to focus on particular teeth  to make them feel like they are being drilled without an anesthesia. Although  that computer software is normally used only a few feet from the patient, it can  also be used from many miles away.

Today there is specialized computer software that can  affect practically every part of the body by remote. Through such a software  program, actions can be carried out on the lungs, liver, and kidneys by remote  using highly specialized computer software. Renal and kidney failure can thus be  induced by remote. Several forms of cancer procedures can also be done by  remote. In the hands of the wrong people, that software can just as easily be  used for medical torture instead of medical healing.

An MRI machine, functioning by remote, can view our  entire body. It requires little imagination to think that if handlers can view  our bodies, they can also perform many effects on those bodies. The  sophistication of medical software and its range of activities are truly  impressive. In addition to performing the physical effects, the same software  can also doubtlessly indicate with precision a target’s location, especially if  it has the I.D. number of an implanted microchip.

Neurological Effects

In addition to the physical effects caused by  remote-operated computers and computer software, those devices can also assail  the mind. We do not yet know how our enemies invade our minds. However, once  they do so, they must use computer programs for their neurological torture,  thought-mining, neural programming, and interrogations. Most of the computer  software is probably secret, difficult to obtain, and highly classified.

The handlers’ software allows them with the stroke of  a particular key on their computer keyboard to send various messages and loop  play tapes to the targets’ minds. They can not only send the recordings and loop  play tapes to the victim’s mind but they can also send multiple recordings and  tapes that literally inundate the victim’s mind. Whether the target hears the  handlers’ voices or not, the voices are always there.

One software program that the handlers use works as  an interrogation tool and lie detector.  The handlers ask the target a question  and the target thinks the answer to their question without being aware of it or  without being able to resist. The handlers’ software can further determine  whether the target’s answer is true or false.

Other software can analyze the targets’ voices and  heartbeat to detect emotions such as anger, sadness, untruthfulness, loneliness,  anxiety, depression, and others. One such program measures target’s pulse to  accomplish that same purpose. The pulse rate tells the handlers whether the  target is lying, being deceptive, excited, or exhibits other  emotions.

The same software or perhaps a similar version of it  can cause a target to reveal data that he would not voluntarily tell another  soul. When he hears a particular word or sees a particular object that reminds  him of that secret, the software somehow alerts the handlers. They then proceed  to question the target about that secret until finally the handlers know every  detail.

There is also software that programs the targets to  think certain things or react in a certain manner when he hears particular  words. Those words can be persons’ names, places, or objects. The handlers  particularly like to use that programming in a sexual context. For example, a  male target is supposed to experience an arousal when he hears certain people’s  names or sees a particular scene. That software is re-enforced by the handlers’  subliminal talking into the victim’s subconscious.

All of the software used for neurological assault is  re-enforced by the handlers’ synthetic telepathy or subliminal talking to the  targets’ subconscious. Not all targets can hear those voices; nevertheless,  targets who receive electronic harassment also receive the voices. The  subliminal talking itself may be the result of computer software, for in their  synthetic telepathy the handlers most certainly use software to disguise their voices, make distinctive sounds, and project sounds to particular  areas.

Most targets who hear the voices also suffer from  induced tinnitus. I have often pondered the origin of the tinnitus. Although the  tinnitus could be intentional simply to annoy the target and affect his hearing,  it could also be unintentional, i.e., a side effect of either the device that “hooks” our brain or of some of the software used by the handlers. In my case, I  hear a change of tone in my tinnitus (to a much higher or lower pitch) whenever   the handlers attempt to cause a faux heart attack.

Programmable Software

All or most of the software mentioned above is  programmable. The handlers can use their computers to schedule the various  physical and psychological effects to function at particular times. They can  also program the software to be triggered by certain target thoughts, actions,  colors, and code words that they hear on TV, radio, and in conversation. They  can also use habitual locations of targets to triggers those effects.

Neither electronic harassment nor mind control could  be carried out without the use of computers and computer software. The  sophistication of the software requires the participation of medical personnel  and thus implicates doctors, nurses, and other health workers in the electronic  stalking and mind control scheme. If not, medical personnel had to have trained  the handlers to use those programs. In addition, the software that allows the  handlers to perform mind control on targets requires training provided by law  enforcement and intelligence. Thus, there can be little doubt that personnel in  the medical field, law enforcement, and U. S. intelligence are somehow involved  in the overall electronic stalking and mind control scheme although their  participation may be rogue-type actions.

Many targets claim that they receive “directed  conversation” from family members, friends, and other people. I suspect that  those people are being manipulated by the same handlers who manipulate the  targets. Evidence suggests that millions and millions of Americans are already “hooked” but most of them are not subjected to electronic stalking and mind  control. However, their frequencies have been identified, catalogued, and  entered into a mega-computer. The computer programs used by the handlers may be  able to connect the minds of the targets with those of other people to achieve  the “directed conversation.’ Those engaging in the directed conversation may be  completely unaware of it or unable to resist using it. On the other hand,  directed conversation perhaps does not exist; and the target’s subconscious is  only told subliminally that he will hear that conversation. Then again, the  people “directing” the conversation may be accomplices.

Automated Computer-to-Brain  Interfacing

As the number of targets increase, the powerbrokers  must find, hire, and train an increasing number of handlers. The powerbrokers  fear, however, that as the number of handlers increases, so does the possibility  of the secret becoming known. Moreover, lack of manpower in the USA is a great  disadvantage in training handlers when comparing that country with China, India,  and other more populous nations. Thus, the powerbrokers wish to limit the  manpower necessary to control the targets.

To do that, I believe that the powerbrokers are  presently experimenting with the development of a super computer and software  that can interface with targets’ minds through automation without the use of  human handlers. Large businesses already use computers that interact by phone  with customers’ voices. Some of that programming is very realistic. Remember  that mainstream American technology is always twenty to thirty years behind that  known and employed by the Department of Defense. If human thoughts can be  translated into actual words and those words processed through super computers,  computer-target interfacing is a realistic goal.

I further believe that those super computers are  being designed to connect to and work with the massive data bases kept on  targets already established for that purpose. That data base may be the Echelon  system, which is already in usage by the U. S. Government to glean information  on American citizens. Echelon scans the data and spits out information fetched  out of the data by using key search words. Much of the handlers’ psychological  material is already automated in the form of the previously recorded messages  played to targets’ subconscious. It is not farfetched to believe that in the  future, human handlers will either be altogether unnecessary or drastically  reduced in number.

My handlers consistently use certain expressions in  their subliminal talking, such as “That’s true,” or simply “True;” and “That’s  good” or only “Good.” They also often use the word “Dad.” The speakers are  always the same voices. For a long time, I wondered why the handlers used those  expressions, sometimes when they seemed irrelevant to what I was thinking. Now I  believe that they are computer-generated expressions that alert the computer to  mark certain thoughts of the targets. Those thoughts are then analyzed by the  computer and categorized in special areas for future automated use.

The handlers also carry out their mind control on  targets through code expressions that cause targets to act or react in a  presupposed manner. Although most targets cannot hear those codes, their minds  do. Once targets get used to hearing and responding to those codes, a computer  can take over the work of the handlers. Incredible, you say? Perhaps, but one  cannot overestimate the evil designs of the powerbrokers and the super high-tech  equipment in their possession for putting those designs into action.

The handlers themselves are probably totally unaware  of the reason behind their using the codes and other expressions. They only  follow the established protocol laid out in the training manual. A part of the  entire scheme is to ensure that the various units work independently without  knowing what other units are doing. That is the way a conspiracy normally works.  Only the powerbrokers’ most trusted lieutenants have access to the combined  knowledge of those various operational units.

I also believe that the U.S. Government and other  governments are working on a phone system that will electronically extract  information from the phone owner. Here is the way it will work. A caller will  telephone the phone owner, hypnotize him (or previously hypnotize him) using  particular words or methods, and use pre-determined codes to ask the person  questions. The person who answers will provide answers to the questions posed to  him. He will be told under hypnosis not to remember the phone call. After the  conversation ends, the phone owner’s memory will blank out completely his ever  having received such a call.

Psychiatrists would probably label paranoid anyone  with ideas such as machine-to-mind interfacing and hypnotic info-gathering by  phone. On the other hand, perhaps those methods only barely touch upon the  possibilities concerning the subject of electronic stalking and mind  control.

Capabilities of Perpetrators of  ESMC

The only fact that we know for certain about  electronic assault and mind control relates to the symptoms, or how ESMC  manifests itself to the victim. Targeted individuals are well aware of the  capabilities of the assailants, but for those readers who may be reading about  electronic stalking and mind control for the first time, this chapter discusses  some of those capabilities. I know the capabilities that I list firsthand, for I  have suffered or am suffering from those very symptoms. Here are some of the  capabilities of the target’s handlers through the types of patents already  discussed.

(1) Monitor movements. The handlers not only know  one’s vehicular movements but they can also view him and follow his movements on  his property and even inside his house. Once they “hook” the target with their  equipment, they have ready access to him at all times. Their torture follows the  target wherever he goes, even to other states and abroad.

Many targets believe that cell phones may play a role  in monitoring their movements; however, if they are correct, that use is not  universal. It is true, however, that many TIs trace the origin of their  electronic torture and mind control to the early 2000’s, when cell phone usage  was becoming increasingly more popular. In my opinion, the cell phone itself is  not a device used in targets’ torture but only a useful tool of the people who  do so. I have intentionally gone days without using or being near cell phones,  and my physical and neurological attacks continued.

It is also true that cell phones have to be used in  gang stalking, which goes right along with ESMC. In fact, the stalkers could not  coordinate their harassment against targets without the use of cell phones or  some type of walkie-talkie. Cellular phones may even somehow be used with the  device that renders the electronics effects on victims. It is known that cell  phones carried on one’s person near credit cards can cause those cards to  malfunction and wear out quickly. Credit cards are one of the hundreds of items  that operate through the RFID (radio frequency identification).

The cell phone, however, has nothing to do with the  voices and other physical and neurological effects. I have purposely left my  cell phone behind on various occasions to determine whether it might figure in  the ESMC. It simply does not. I have gone days without being around a cell  phone. If it is used at all, it may be used in locating some targets. However,  its main usage is for the handlers’ convenient communication concerning the  target.

The handlers appear to be able to map out your house  or apartment. They probably first locate your residence, using Google Earth or  some other program of that type, and then learn the configuration of the  structure. Once they have the layout of your house or apartment, they seem to  divide it into grids, probably with the help of an architectural-type computer  program. Then, they slowly zoom in on various locations where you habitually  sit, stand, or lie and program those locations on their device. In my case, they  first located the chair in the living room where I sit, then the lavatory and  commode in the bathroom where I stand. Finally, they had programmed every area  of the house, and they were able to jolt me and vibrate me in any location  inside my house. We know that devices and methods exist for accomplishing those  actions.

The handlers seemingly make a grid map of the  target’s dwelling. Then, they track the target within his dwelling and learn his  habitual locations within the dwelling. Using the grid map and their computer  software, the handlers can program their device to perform various effects on  the target in those locations. Their computer would probably use a Microsoft  tool bar. The handlers probably only have to highlight that particular grid on  their screen and then open Tools on the tool bar to choose from a variety of  physical and psychological effects with which to hit the target.

(2) Hear and record one’s conversations along with  those with whom one talks. This can be done even in a moving vehicle or while on  foot in a rural area. The harassers occasionally record and play back to the  victim excerpts of some of those conversations in his brain. The handlers can  also record a person’s voice and then later simulate that same voice.

(3) See through the victim’s eyes. One’s eyes are  controlled by his brain; thus, by controlling the victim’s brain, the handlers  can probably also see whatever the victim sees. Not only that but with their  specialized software they can also see what he thinks. Nevertheless, some of  what the handlers lead the victims to believe that they can see may be another  example of deception through psychological trickery. For example, the handlers  often comment on what I am watching on TV or what I am doing in the house. They  may know that because of my brain’s processes, as the brain is in constant  motion as I watch TV and do chores around the house. Someday we shall  know.

(4) View the victim’s interior and zoom in on any  part or organ of the body, even in the darkness. EKG, CT scans, and functional  MRIs can be performed by remote. The handlers probably use the GPS with directed  sound to see and torture the target’s body by remote. NASA has long used similar  telescopic instruments for carrying out delicate space operations. Although the  handlers can target specific areas both on and in the body, that capability is  greatly enhanced by communication with the targets’ brains, i. e., using  synthetic telepathy.

(5) Inject holographic pictures or images into a  victim’s thoughts. In my case, the handlers have shown images of my son  drowning, pictures of what Christians believe to be that of Jesus, pictures of  family members and friends, sometimes in suggestive poses, and countless numbers  of unknown individuals in induced dreams and thoughts. Some of the unknown  individuals in the dreams may be images of the handlers and their accomplices  themselves, which they display for the fun of it. They are safe in doing this,  as the victim usually will not know them and the victim will also very quickly  forget those images due to the handlers’ ability to blank out their memories. In  addition, their computer software can cause targets’ brains to view all people  and all situations in sexual and negative contexts. Again, this is pure mind  control.

I may be an unusual target, for I can not only talk  back to the handlers but can also project images back to them. I often show  images of piles of writhing poisonous snakes, many of them poised to strike.  I’ve also shown them huge explosions followed by fire and smoke. I can show them  a kaleidoscope of colors, turning and twisting, and blankets of symbols such as  those used on the keyboard. I also show them my idea of their appearances, which  are, of course, very unflattering.

(6) Induce dreams, stage scenarios, and engage in  subliminal interrogations. The reader will see later that the handlers have the  capability to read a target’s thoughts and project voices into his hearing.  Those activities are best carried out while the target sleeps. While the target  is in the dream stage, the handlers cause him not only to view dreams but also  to participate in them. Indeed, the handlers describe situations and talk the  target through them. They do not perform that simply for fun but to make  suggestions to the target that re-enforce their objectives and to extract  information.

I have often awoken from induced dreams in which the  handlers are telling me what is happening and allowing my imagination to  embellish the “dream.” Handlers also interrogate the target while he is in the  dream state. They do that in very subtle ways. For example, they will introduce  particular words and expressions and allow the target’s mind to being “processing” that thought. As the target contemplates those words and  expressions, the handlers question him about his thoughts about those particular  key words and expressions. They also begin sentences and then suddenly quit,  leaving the target to finish the sentences.

(7) Apply a variety of torture techniques to the  body. Many of those effects may perhaps be done through the use of silent  directed sound and various PC software used over the voice-to-brain  communication. Others may be psychological or aided by psychological suggestions  through the handlers’ subliminal first layer and second layer talking into the  target’s brain (more about the voices later). Those effects include

–  sensation of pin pricks in the eyes, shoulders,  face, feet, elbows, and other

areas. The pin prick can be instantaneous or can be  prolonged. In my case, the handlers have long caused an enduring pin prick on  the rear of my neck. At first I thought that the sensation was an irritation on  the neck caused by shirt labels; however, when it kept hurting in the absence of  labels, I knew that it was only one of the perverts’ bag of tricks. In addition,  the sensation was not in the same location as the shirt labels. They can also  cause the entire lower legs to feel like they are being struck by pins. In  recent months, they have pin pricked the depths of my auditory canal in my right  ear, causing me to shiver violently. They have also frequently pricked  underneath the toenail on my right foot, causing the toenail to recede for a  quarter of an inch between it and the skin, much like laser is used for ingrown  toenails.

–  intense pressure on the bridge of the  nose.

–  restless legs. A sensation begins in the small of  the back and extends into the extremities, causing the “restless legs” syndrome.  I can feel that sensation coming on as the handlers apply their vibrations to my  body. Sometimes when that happens, the legs will jerk  involuntarily.

–  electrical jolts. These affect the entire body  and feel much like the shock that one

gets from touching a low voltage electrical  fence. I suspect that the jolts work along  with previous hypnotic instructions  to the target. For example, when a target feels  the jolts, he is supposed to  open his mind to the handlers.

– tremors, or vibrations. These can affect the whole  body or be focused on specific

parts of the body. They can range from very mild to  violent. (I believe that the jolts and vibrations may partially be pre-hypnotic  suggestions causing the target to think that he feels jolts and vibrations  whenever the handlers whisper the code word. In other words, those physical  effects may instead be psychological effects resulting in physical reactions. I  have asked other people to touch my legs and body when they were vibrating, and  they felt nothing.)

–  zapping in/on the head. These sound much like  sparks from a welder’s torch or like children’s sparklers used as fireworks on  holidays.

– clicking in the left ear. (In my case, it is  always in the left ear, never in the right one.)

–  severe cramping, mainly in the calves of the  legs.

– numbness in the limbs from the base of the spinal  column to the toes.

–  coughing (I can feel an unnatural scratching in  the inside of my throat), and sneezing (likewise, I can feel an artificial  tickling in the inside of my nostrils).

– induced erections, by vibrating very lightly the  inside of the urethra and the groin.  Those erections usually occur while the  handlers whisper the names of friends and relatives, very obviously attempting  to cause the target psychologically to associate the sexual sensation with those  people.

–  stomach aches and pains, indigestion, nausea, and  dizziness.

– gas on the stomach and in the  intestines.

–  sodomizing and virtual rape, using some unknown  force to probe the anal cavity  and the vagina (perhaps directed sound waves,  which cause a strong vibration and can focus on a particular very  small area).  It could also be purely psychological suggestion.

–  lethargy and listlessness. I suspect that many  people suffering from Chronic Fatigue Syndrome are actually victims of  ESMC.

– tinnitus. I had never suffered from tinnitus  before the electronic stalking began. It

hit me the day the stalking became overt, and I have  had that condition ever since then. The tone of the ear ringing changes often in  a very notable manner,

sometimes reaching a very high pitch.

–  inability to urinate or frequent urination. I had  two prostate procedures in 2001,    although the prostate was not enlarged,  because I had the urge to urinate but could not do so. Now I know that it was  the work of the perverts who use the ESMC techniques, for since the handlers  became overt in 2005, they have continued making the bladder often seem full.  Now I can hear them saying subliminally to my subconscious, “Don’t  piss.”

–  constipation. Likewise, I often used to have a  problem defecating. Since I have developed an ability to “hear” the handlers’ whispers, I hear them repeating, “Don’t shit.” The brain learns over a period of  time to react to their commands. However, knowing now what causes the  constipation, I am no longer affected by it. In this case, knowledge is  freedom.

–  sleep deprivation. All of this leads to sleep  deprivation, which then becomes a symptom itself. This is designed to weaken the  victim’s body as well as his mind

and cause him to have motor, household, and other  accidents. In addition, it makes the victim more vulnerable to mind control.  Conversely, the handlers’ device can also make targets incredibly sleepy and  actually cause his eyes to close involuntarily. There also appears to be a  particular form of vibration that will “wire” the target to keep him awake at  night.

–  the sensation of crawling insects on the face and  neck.

– intense itching. This can be any place on the  body. They often will make it seem

like a mosquito bite or a fire ant bite. The itching  is normally on the hands or the feet.

–   twitching of the fingers. The perverts not only  want to annoy you but also

convince you that you are developing  Parkinson’s disease.

– partial loss of sight. The handlers do something  to the eyes that make them feel as if a grain of sand is underneath the eyelid.  They also cause pin pricks in the eyes. I have lost much sight in my left eye as  a result. I do not wear glasses to read or to drive. Until a few months ago, I  could read the TV captions clearly. Now I have to be very close to the TV set to  see the captions and I often have double vision and blurred vision, especially  in the left eye. In addition, the lips and mouths of speakers on TV are not in  sync with their words. I also recently discovered while watching Wheel of  Fortune on TV that the movements of objects on TV are likewise not in sync. When  the participants in that program spun the wheel, the result on my TV (or in my  vision) was about two clicks of the Wheel of Fortune off what they should have  been.

– Destabilization of hand-to-eye coordination,  causing targets to strike their hands against objects, misstep, bump against  objects, stumble, and misjudge their distances.

– inability to open left eye in the morning. The  handlers often do something to my left eye during the night. In the morning when  I wake up, I can hardly open the left eye.

–   twitching eye lid, usually the left eye. The  handlers cause this because of my taunting them, telling them that certain  actions and things are amazing and adding “but then anything is amazing to the  pervs. Just being able to open both eyes at the same time is utterly amazing to  them.”

– throbbing in the head. This has something to do  with “mining” the brain or it is part  of the psychological conditioning to make  the target believe that he must reveal his thoughts.

– aches and pains in various parts of the body. I am  very physically active; thus, the handlers attempt to cripple my knees and my  right arm and hand (I am right handed) to keep me from being able to work. They  can also cause arthritic-type pain in the hands, pains in the lower back, and  extreme pain in the legs by striking the sciatic nerve.

– unnatural salivation. The pervs’ device can cause  me to salivate at night while I

sleep as well as during the day when I am  active. For no reason, spittle will

sometimes seep from the corner of my mouth. I  can feel the sensation when it

issues from my gums.

– conversely, dry mouth.

–   tingling vibration focused on the outside of the  right side of the nostril (it can, of

course, focus on any location). As a result of the  vibrations (or perhaps lasering)    on that area, a small brown bump has  appeared at that location. That bump remains very sensitive and often runs and  forms a scab. It was later found to be cancerous.

–   involuntary physical movements. For example,  when I type my emails and

computer documents, the pervs’ software, which  constantly pummels my brain, causes me to reverse certain consonants and vowels,  slowing down considerably my typing speed. Other targets have suffered serious  falls, when the devices caused their knees to buckle. The handlers’ device can  also cause the arms and legs to flail and jerk involuntarily. I have awoken  while sleeping when one of my arms flailed into the head board. Occasionally,  when I nod on the sofa, the handlers cause one of my legs to jerk  involuntarily.

–   heart flutters and irregular palpitations. In  particular, the perverts cause the heart

to beat at a far greater than normal rate, or at  least they lend the perception that it is beating rapidly through psychological  or perhaps post-hypnotic suggestions. The handlers want the target to believe  that his heart is overworking and that he may suffer a heart attack, stroke, or  chronic heart problems.

– extreme sensitivity to light. Now, I must wear  sunglasses at all times whenever I’m  outside because of my eyes’ sensitivity to  glare.

– pressure on the bladder, causing the victim to  want to urinate very often. Because   of that sensation, I underwent two painful  and costly prostate procedures with a urologist before I knew the real cause of  the problem. The pervs still apply pressure on the bladder; however, now that I  know that it is their evil work, it does not bother me.

– sores in various areas. The handlers continually  vibrate (or laser) the outside of my right nostril, which remains continually  sensitive. That area scabs over, loses its scab, and then scabs over again. A  brown mole-like bump appeared at that point, which became an indentation. The  handlers have telepathically referred to it as the “mark of the beast” or “mark  of the lamb.” A spot has also developed on my chin, where I often feel the  tingling and stinging of their lasering.

–  high and sudden temperature rises in the body.  Those may be psychologically induced, as I have heard the handlers remark “123  degrees.” That term may be post-hypnotic code, causing my mind to imagine that  my body will reach 123 degrees. The feet and lower legs, in particular, are  normally very warm.

– stopped-up ear canals. A hearing specialist whom I  once visited told me that my hearing canals were “sucked-in.” I now know that  that is induced by the handlers’ device(s). That condition hinders my hearing  and allows the handlers’ programmed material that I hear to have greater  effect.

–  pressure (causing numbness) on bridge of nose,  the kidneys, and the prostate.

– intense itching on the scalp. This is sometimes  preceded or followed by pin pricks on the scalp.

–   constriction in the esophagus and hiatal  hernia.

– “faux” heart beat that occurs on the back opposite  the heart or on the head. This is purely neurological, as I can tell my mind  that there is absolutely no connection between my real heart beat and the beat  that feels like it is a heart beat. It immediately stops. That throb-like faux  heart beat occurs as I sit watching TV or using the computer.

–   electrical-like buzz in the groin and on the  right hip. This vibration is different from the body vibration and appears to be  designed to stimulate the penis and vagina to cause sexual reactions.

The physical symptoms listed above are some of those  that have occurred in my case. Other targeted individuals may have experienced  other symptoms, perhaps in addition to some of those I have listed. For example,  many other victims develop psoriasis, fibromyalgia, carpal tunnel syndrome, and  other physical ailments. Some targets experience induced bowel movements. Making  victims defecate often is psychological as well as physical. That action  humiliates victims and keeps them from leaving home.

My handlers often cause a pain near my right hand on  the other side of my arm from my wrist bone. I can only believe that they seek  to cause carpal tunnel syndrome, which they believe will interfere with my  writing. However, now I am acutely aware of their aims, their tactics, and many  of their methods, so I can successfully ameliorate those pains through my own  form of mind control.

Most, if not all of the symptoms and ailments listed  above can be delivered by remote through an assortment of software used by a  computer that connects to involuntarily implanted microchips. The computer  software is aided by the unheard subliminal voices of the handlers, which  themselves may be rendered through the same software. The specialized software  coupled with the synthetic telepathy subject victims to incredulous electronic  and neurological torture.

The physical symptoms named above are a very  deliberate and important part of the handlers’ protocol. The objective is to  make the target continually aware of his seemingly hopeless situation. That in  turn causes sleep deprivation and anxiety. The feeling of hopelessness, sleep  deprivation, and anxiety lay the groundwork for mind control, the ultimate  aim.

Many targets seek to escape those physical symptoms  and their neurological attacks by relocating to another site, even to a  different country. As far as I know, no target has ever succeeded in escaping  those ESMC activities. Moreover, those effects, including the V2K, occur  whenever targets are in airplanes or when they are far underground. That fact  implies that at least some portion of the ESMC attacks is made via satellite and  that there must be some way to contact the subject, i.e., implant.

The electronic jolts and vibrations also affect  domesticated animals. My handlers can beam their frequencies (or whatever it  might be) in broad waves that cover very wide areas, including my yard and the  adjoining pasture. My dog, which is an outside pet, is much affected by the  electronic assault methods despite her being in excellent health and getting  regular checkups by the veterinarian. She often trembles violently and appears  frightened. At times, she pants heavily, gulping for air, and almost collapses.

She very often also shakes her head as if she is  trying to get something out of or off her head. I have taken her to the vet  twice for that symptom, and he diagnosed her both times with an ear infection  and prescribed her medicine. Despite that, after almost three years, she still  shakes her head. My cat, on the other hand, does not seem to be affected by the  electronic effects. Gender could not be a factor, as they are both spayed  females.

Jolts and Vibrations

Almost every victim of electronic stalking and mind  control mentions electrical-like jolts, or shocks, and vibrations when  discussing his symptoms. The jolts and vibrations not only cause targets  discomfort and remind the targets that they are being monitored but they also  serve a neurological purpose. It took me a very long time to learn that those  sensations are essential elements of mind control. Here are some of my thoughts  about them.

Jolts – This effect is felt physically; however, it  may also be aided by psychological suggestion. This sensation may work along  with “post hypnotic” suggestions planted in the target’s subconscious through  the handlers’ subliminal voices to prepare the victim’s mind for interrogation  and programming. The target’s subconscious has been previously advised by the  handlers that when they feel the jolts, they will open their minds and thoughts  to the handlers. Thence, the handlers are able to exploit more easily the  target’s mind.

Vibrations – Vibrations may be partially  psychological or, if not, be augmented psychologically. Usually a jolt precedes  the vibrations. I believe that the target may have already been conditioned by  hypnotic pre-suggestion to believe that following the jolts, he will feel  vibrations. Likewise, he has been further conditioned, or sensitized, that once  he feels the vibrations, he is supposed to open up his mind and thoughts to the  handlers.

In addition, the vibrations sap the energy from a  target’s body. It is well known that microwaves are capable of rendering a  person lethargic to the point of being unable to exert the least amount of work.  Indeed, those microwave vibrations can make a target so weak that he can hardly  stand and walk.

The vibrations signal the target’s brain that he will  submit to the handlers’ voices. Then, those voices instruct him how he is  supposed to react. For example, while vibrating a target, the handlers will  often tell the target that he will go to sleep. While he is sleeping, the  handlers interrogate him, probably with the fMRI. They also tell the victim that  when he wakes, he will have no memory of the interrogation.

Vibrations are not simply conducted at random but are  deliberately aimed at specific parts of the human body at varying intensities to  accomplish specific purposes. Stomach vibrations, for example, cause much  discomfort and gas on the stomach. That lends itself to handlers’ causing  anxiety and disquiet in the target. Vibrations in the groin area cause sexual  arousals or make that area vulnerable to sexual arousals caused by other  interventions. The vibrations can focus on the penis or the vagina, causing a  tickling sensation. Those around the heart, combined with pin pricks by the  handlers in that location, help to reinforce the target’s idea that he is  experiencing a heart attack. Vibrations in the duodenum cause gastric  disturbances and indigestion, which likewise help induce anxiety in the victim.  Once again, the vibrations alone do not cause those effects. The handlers’ verbal instructions during the vibrations determine how a target reacts to the  vibrations.

Moreover, I have noted that the vibrations also vary  in intensity, in duration, and in the way they are applied. This suggests that  different vibrations have different functions. The length, location(s), and  intensity of the vibrations probably contribute to the handlers’ desired  effects.

Although it may be possible to deliver the jolts and  vibrations from a long distance by satellite, they can also be directed from a  far shorter distance. When I first experienced the vibrations, I was in a hotel  room. I could hear the occupants in the adjoining room laughing and giggling;  thus, I presume that they were behind the vibrations, perhaps using some type of  handheld device. They were about twenty feet from me, and the vibrations were  extremely intense.

Regardless of the origin of and the method behind the  jolts and vibrations, they have a powerful psychological effect, causing the  victim anxiety. Targets should keep in mind that one of the main objectives of  the handlers is either to drive him insane or to convince others that he is  insane. The handlers’ ability to produce extreme anxiety in their victims causes  the latter to seek out psychiatrists. The resulting psychiatric attention  effectively ends the target’s credibility concerning mind  control.

None of the handlers’ actions is solely to harass you  physically. Every symptom that a target feels, smells, sees, tastes, or hears  takes him closer to mind control, the ultimate objective in causing the victim  to self-destruct. Knowing that fact can help a target defend himself against the  handlers’ objective.

The jolts and vibrations serve several purposes: (1)  to remind the victim that he is targeted and monitored ceaselessly; (2) to  disturb his rest and sleep, resulting in sleep deprivation, one of the handlers’ principal tools; (3) to cause apprehension and continual uneasiness,  contributing to anxiety; (4) to condition, or sensitize, the target to cooperate  with the handlers. The latter will normally consist of interrogations, data  gathering, and subliminal commands by the handlers.

Targets can use their minds to counter the purposes  of the jolts and vibrations. After all, their targeting is aimed at their minds.  First of all, they should realize that the jolts and vibrations themselves are  not normally lethal. The exception is when they act in consonance with the  handlers’ subliminal voices suggesting that the target is suffering a heart  attack and other harmful conditions. Knowing that, targets can instruct their  minds that when they feel the jolts and vibrations, those minds will not  cooperate with the handlers’ intentions. Moreover, they can instruct their minds  that they will not succumb to the negative suggestions of the handlers. Targets  can learn to use their own brand of psychology to thwart the neurological  assault of the handlers.

Earlier Tell-Tale  Symptoms

In the 1990’s, I experienced several strange symptoms  that I now know were the handlers’ work. Although at the time I thought that  they were odd, I did not connect them to any evil source. Who would? Those  symptoms follow.

– The muscles in the calves of my legs pulse  unnaturally in a rippling manner. That symptom continues to this day. There is  absolutely no physical explanation for that strange occurrence. There seems to  be no particular pattern to the pulsing. Moreover, weather and other conditions  do not seem to affect the pulsations. I believe that the strange pulsing has  something to do with the electromagnetic force or frequencies of whatever device  is used by the handlers to connect with my mind and body.

– The tops of both ears began to exude a colorless  fluid that became crusty. Likewise, there is no physical explanation for that  condition, which still continues whether I use sun screen or not. Other victims  have also mentioned the fluid coming from the tops of their ears. Also, the top  of my nose forms a crust. I remove it with a soapy bath cloth one day and the  next day it reappears. Sun screen does not prevent its doing that. I do not have  particularly sensitive skin.

– I also experienced the sensation of something  crawling on my skin or underneath my skin, normally on my face. Unable to sleep  well at night, I sought out a dermatologist. The doctor called that condition  dermatitis and told me that it had no known cure. Strangely, he said that he  also had dermatitis. That condition gradually went away and did not return until  the electronic effects and mind control activities became obvious in December of  2005! I now know that the “dermatitis” in the mid-1990’s was the work of the  handlers, probably telling my brain that I felt insects crawling on my face,  i.e., psychology reinforced by post-hypnotic suggestion.

– I became weak and lethargic for no apparent  reason. That malady is often called chronic fatigue syndrome. Such was my lack  of energy that oftentimes my son would have to help me up from my chair. Even  then, I was unsteady on my feet. I was still in my fifties. Despite those odd  conditions, I failed to see anything sinister in them. Over time, I regained my  strength, and today I am again exceptionally fit. I later learned that the  handlers’ device can cause chronic fatigue. Other targets complain of the same  effect. I suspect that directed energy weaponry may even be the cause of the  relatively new chronic fatigue syndrome (CFS).

– I also often had “restless legs” at night when I  retired. That symptom is a favorite with the handlers, and it appears to have  some kind of relationship to the pin pricks and vibrations. It first begins at  the small of the back, or spine, and then continues down the leg, in my case  usually the right one, to the bottom of my foot.

– My left leg and foot often cramped while driving.  That had never happened before. I later learned that cramping was almost always  a symptom of targets.

– I noticed that food seemed not to empty into my  stomach but got stuck in my esophagus. I do not take large bites, and I am a  slow eater; yet, the food did not go down easily. Also, while driving I was  often struck with what seemed like a hiatal hernia. I learned that if I kept a  beverage in the vehicle and took a swallow, that sensation disappeared. Again,  other victims mention that symptom.

At the time, I thought little about those symptoms.  Now, however, I know that they were signs that I had been targeted. At first,  targets normally ascribe their ailments and physical problems to simply “bad  luck,” lack of exercise, genetics, a poor diet, or advancing age. It literally  takes years for most targets to realize that their symptoms are induced by  remote by people who want to harm them.

Once the target does become aware that the effects  are unnatural, he has absolutely no defense against the torture, and his  frustration, anger, and anxiety mount. Nobody believes him. Law enforcement will  not investigate his claims. When that scenario develops, the handlers have  achieved what they wanted and anticipated. Many targets die without ever knowing  that they have been targeted.

(8) Cause the target financial problems and ruin his  credit. Keep in mind that most targets live on fixed incomes and most of them  have to live frugally. Yet, the handlers employ a bag of tricks designed to  drain the target financially through the following actions.

–   Making the target spend thousands of dollars on  remedies and gadgets that

supposedly neutralize or ameliorate the effects of  ESMC and causing him to hire detectives to investigate the ESMC.

–  Causing the target to make mathematical errors on  his taxes and other documents that result in substantial losses.

–  Affecting the target’s judgment that ends in his  making faulty and costly decisions.

–  Destroying expensive household and other items,  making targets have to replace them. In my case, they have ruined two printers,  two blenders, and other household items. Their device, however, can only affect  machines that have small motors or batteries. My coffee makers, which have no  motor, are not affected.

–  Distracting the target so that he forgets to pay  bills on time, leading to his paying costly penalties.

–  Creating problems with the electrical system and  mechanical devices, especially computers and printers, which make targets have  to hire technicians to repair. I have had to hire PC technicians many times  paying from $95 to $250 a visit.

–  Urging the targets through their voice-to-brain  subliminal suggestions to buy expensive needless items.

–  Fomenting personal and other problems that  require that targets hire lawyers. A TI correspondent wrote about her taking  videos of neighbors overtly harassing her and then being arrested for that  action. She had to hire a lawyer to get out of jail. Of course, nothing happened  to the harassers. Moreover, now that law abiding citizen has an arrest record  that will follow her to the grave.

–  Sending targets to hospital emergency rooms due  to physical problems they cause with their devices. One TI correspondent rushed  to the ER on at least three occasions when the handlers caused her throat to  constrict, keeping her from breathing. Most medical insurance policies do not  pay the total costs.

–  Ruining the targets’ credit. The manipulators and  their accomplices will steal credit card and other statements from the targets’ mail boxes or “lose” them in the postal system, causing targets to pay late  fees; by whispering into the targets’ brains, make them forget to pay bills; and  interfere with the targets online payments to cause them bill payment problems.  The handlers have changed my passwords many times to hinder my paying my bills  and preparing online tax returns.

–  Robbing targets of their time by harassing them  continually with electronic assault and mind control, thus keeping them from  tending to their business affairs. Very often targets lose their jobs because of  the ESMC distractions in their lives. I have spent countless hours taking notes,  recording them in my journal, corresponding with other TIs, researching on the  internet, and trying objects and ways to neutralize the ESMC effects, time that  I could have spent on home improvement projects and other useful activities. I  am a very able genealogical researcher, and I used to spend hours a day at that  pastime. Now I very seldom do family research because of the many distractions  that affect my concentration.

Causing targets financial ruin is one of the aims of  the handlers. Broke people are usually harmless and defenseless. Many of the  targets with whom I have corresponded have depleted their savings and have gone  into bankruptcy because of the perverts. Others have been forced into homeless  shelters and still others have become virtually street people. The handlers set  out to break targets financially, and they often do.

(9) Knock out and interfere with the function of  battery-operated or electrical household items. In my case, the handlers have  changed radio stations, caused halogen flashlights to blink and go out, caused  the tiny lights in a fingerprint reader used for PC security to quiver, caused  interference in TV programs, burned out electrical wall outlets, caused  microwaves not to function, burned out watch batteries while the watch was on my  wrist, changed the functions of certain keys on the keyboard of the computer,  and burned out the batteries in my smoke detectors, flashlights, and other  objects that use batteries – all by remote. In addition, they have ruined six  computer printers, two Weedeaters, three blenders, and other appliances and  motor-driven objects.

Their device can even cause the ink in ballpoint pens  to congeal or dry up so that the pens will not write. They can also make  inanimate objects move. Once, as I stood in the kitchen, the handlers caused the  loose cap of a gallon jug of milk to flap upward several times. They probably  thought that would rattle me. Instead, I ridiculed them because they weren’t  able to flip the cap completely off. All of this suggests that the handlers use  directed silent sound beamed in by a radio frequency and guided by the GPS. For  some reason, their device seemingly cannot disarm appliances that do not have  motors, such as a simple electric coffee maker, which operates through only a  heated coil. They can, however, damage the functions on the more elaborate  electric coffee makers.

(10) Manipulate the target’s computer and telephones.  (More about that in a following section.)

(11) Discredit the target by making him appear insane  or demented. They will also spread rumors about the target designed to isolate  him from neighbors. Those rumors will usually suggest that the target is a drug  pusher or user, a child molester (one of their favorites), a wife-beater, a  common street walker or male prostitute, a rip-off artist, a closet drunkard, a  white collar thief, a racist, an anti-Semite (another of their favorites), a  suspected domestic terrorist, and others.

In addition to socially isolating the target, the  handlers also seek to cause the target anxiety and other psychological problems  that drive him to a psychiatrist, who then diagnoses him as schizophrenic. The  handlers know that once the target sees a psychiatrist and it becomes a matter  of record, the target’s sanity becomes an issue. Afterward, whatever the target  says will be treated as suspect. This is important to the handlers, as they know  that the target will be discredited if he seeks out law enforcement. Many of my  target correspondents had already undergone treatment for mental disorders  before they discovered that their problems are caused by exterior  forces.

(12) Register the target’s emotions. Their software  allows them to use the target’s pulse rate and probably other methods to record  emotions such as anxiety, panic, fear, frustration, anger, sadness, loneliness,  and others. The emotions actually appear in the form of words that surface in  your thoughts, e.g., frustration, loneliness, anger. In addition, the perverts  continually whisper those words into your brain to actually cause those  emotions. Handlers prepare loop play tapes of their talking whose design is to  play on the target’s emotions. (More about subconscious talking  later.)

Moreover, their computer software is programmed to  alert the handlers when targets think of certain topics. In my case, a  computerized female voice will say in a reproving manner, “Max!” At that point,  the handlers cease their continual general talking and instead concentrate on  that topic. A voice on the computer often says “Good” when I think along the  lines desired by the handlers. Those verbal observations probably come from the  computer software that the attackers synchronize for the targets. This  re-enforces the conditioning of targets that the handlers attempt to accomplish.

Monitoring victims’ emotions will also indicate  whether they are lying when the handlers ask targets questions. In addition, the  handlers employ a particular software that exacts the true answers. I often tell  them wrong answers. I can project to them false images and wrong answers to  their questioning without their detecting them. However, if I do so, I must  concentrate on that action. Unless I am very alert, my mind signals them the  true answers. For example, I take vitamins. If I tell the handlers that I am now  taking zinc and I am actually taking niacin, after I think zinc, my mind will  then think niacin.

(13) Cause mood swings. The handlers’ mind control  programs can cause moods that range from explosive anger to total complacency.  This causes erratic behavior in the target that is seen by many observers as a  mental disorder.

(14) Transmit voices into the brain that only the  victim can hear. Targets usually refer to this as voice-to-skull (V2K),  subliminal speech, synthetic communication, or microwave hearing. When I first  heard the voices in December of 2005, I was driving on the highway. The radio  was turned off, as it normally is when I drive. The voices seemed to come from  near the driver’s side door panel. My first thought was that a device, or a bug,  had been planted in the vehicle and was somehow being used to project the  voices. A sweep of the vehicle by a private detective the following day did not  reveal a bug. Still, it took me a couple of more days to realize that the voices  were coming by remote projected onto or coming from within my body and not from  a bug in the vehicle.

I believe that the voices may be piggybacked over the  GPS, as the GPS can be used to track vehicles and also zoom in on houses. The  voices that I receive apparently come from an external source, as they are  louder and clearer when I am outside, and I can also muffle them partially by  using earplugs. However, the handlers apparently have to adjust their device or  perform some function with it, for whenever I go into the yard or the pasture,  at first the voices are scarcely telepathically “audible.” Then, after a few  minutes, the voices get increasingly stronger.

The voices are probably projected to the  electromagnetic field that envelops the house and grounds and then find their  way inside my house through various electrical appliances and objects. The  voices are definitely louder and clearer when an electrical heat, a/c unit,  refrigerator, or any other electrical appliance is connected. That would  certainly be possible using the GPS, as the perpetrators can use an  architectural program to produce a grid of the inside layout of the house.

In my case, I have discovered that the V2K voices  come through as loud and clear as voices over the radio or TV; however, the  handlers intentionally lower the volume. This is for psychological effect, as we  know that the lower in volume someone speaks to us, the harder we have to  listen. Moreover, the handlers want us to believe that the voices are coming for  a very long distance – and they very well may be.

Much of the V2K is whispered. There are at least two  reasons for that: (1) Whispers sound more sinister and threatening than regular  talking; and (2) More importantly, whispers all sound the same regardless of the  voices; thus, by using whispered recordings, a single handler can intersperse  his own whispered messages in-between the whispered recordings, making it all  sound like real-time whispering. Therefore, the whispers are a labor-saving  tactic on the part of the handlers.

If the handlers do not intentionally keep the volume  of their voices very low, their talking sounds over the frequency as if they  were standing beside you. Sometimes a word or a remark from the handlers spikes,  and it comes through loudly. What does it mean that the voices come through so  clearly? I do not yet know. It could mean that the voices come from very nearby.  It may mean that the acoustics or the devices used by the handlers are very  sophisticated. It could also mean that the voices are linked directly to me  through an object in my body that conveys the voices to my ears or brain, i.e.,  a microchip or a similar object.

The handlers must follow a very detailed training  manual. Probably ninety per cent of that manual is pure psychology. At first,  the handlers normally use the voices only to depreciate the victims with ugly  names and talking, and then they gradually begin to talk directly to the victim.  In my case, there are three principal voices as well as a far-off,  shrill-sounding voice that sounds like a female shouting. All of that is  deception. The shrill far-sounding voice is synthesized to sound shrill and  distant, and one single person can use all three voices. In addition, several  handlers rotate in shifts, using the same three voices. Moreover, males can  assume female voices and vice versa. The handlers can also hit certain keys on  their computer to repeat often-used phrases and sentences and to start loop play  tapes.

Over time, many targets who hear the voices learn  that they can also talk back to the handlers. Finally, the two parties establish  a hostile dialogue. Once I found out that I could also “speak” to the  psychopaths telepathically, I used that ability to ridicule, taunt, and demean  them. Then, I later learned that that is exactly what they wanted me to do, as  it established a stronger link between those speakers and me and got me  accustomed to dialoguing with them.

The device used for mind control on targets imposes  thoughts in the minds of those targets to make them act irrationally. Targets do  not at all feel that those thoughts are irrational or that they are compelled to  perform those deeds and acts. The thoughts appear perfectly natural though often  very negative in nature and perhaps aggressive. Those actions that cause targets  to look crazy are a direct result of handlers’ whispering and talking  subliminally into the targets subconscious. (More about that later.)

The voices represent the master element in mind  control. Every target who is electronically harassed by remote is also subjected  to mind control. Mind control is achieved by voices of the handlers instructing  the target’s subconscious and programming him through suggestions to his brain.  The voices can be projected on two different layers or levels (my terms). That  is not theory; it is fact. I hear both levels of voices.

(1) The first layer is the “audible” voices that  targets who receive the handlers’ V2K hear. The first layer voices are often  those of the actual handlers using V2K to convince the target that he is crazy,  telling him lies about family and friends, and attempting to keep him from  engaging in any meaningful activities. However, those same handlers also play  recordings. If the target listens and takes note, he will learn that they use  the same recordings time after time.

(2) The second layer of voices is inaudible even  to those targets who hear the regular V2K. These voices are either real-time  whispers, or pre-recordings. Very often they take the form of loop play tapes to  the victim’s subconscious, instead of to his conscious, telling him what  to say and how to act, making deviant sexual suggestions, and deprecating the  victim in many other ways. This layer of voices, audible only to a victim’s  subconscious, attempts to create schizophrenic and paranoid symptoms in the  target. Handlers using the “silent” voices try to create multiple personalities  in the target by telling him that he is various persons. The target will usually  know those persons whose personalities the handlers attempt to impose in them.  The second layer of voices, those not heard consciously by targets, is by far  the more dangerous of the two.

Using the unheard second layer voices described  above, the handlers cause severe anxiety or other nervous conditions in victims  by filling their subconscious full of garbage. This drives many victims to see a  psychiatrist. That is exactly what the handlers want, for after the victims  visit a psychiatrist, their complaints of electronic torture are not credible.  After the targets have seen a psychiatrist, the handlers can then begin their  full electronic assault, knowing that nobody will believe the targets.

All targets of electronic stalking know about the  V2K, or the first layer of voices. However, they will not be aware of the second  layer of voices. I was targeted for years before I accidentally discovered the  second layered voices, and I have learned how to pick up those voices. The  handlers do not want that information disseminated, for once targets learn that  the second layered voices are used to manipulate them and once targets learn to  hear those voices, they can successfully live without fear of the handlers. I  have learned to do so. Remember that MIND CONTROL CANNOT BE ACCOMPLISHED WITHOUT  THOSE TWO LAYERS OF VOICES, especially the second layer.

Keep in mind that only targets can hear the voices.  That is part of the clever scheme to keep targets from having witnesses and  presenting evidence. However, a few targets have devised ways to record the “silent” voices and turn them into readily heard ones. One of those targets  wrote me that he had succeeded in capturing the voices over a DVR and then using  a program to make the voices clearly audible.

One day soon the entire secret of the voices will be  revealed—the sources, the locations, the frequencies—and that will in turn  reveal the identity of the perpetrators.

The discovery of the perpetrators will also reveal  the software with which they  accomplish the mindreading, the lie detections,  the other neurological trickery, and the physical effects. Once the secret  behind the voices has been made public, the whole apparatus will break down, for  the perpetrators cannot perform their dirty work without the use of the  voices.

The handlers will oftentimes disguise their voices.  The handlers who attempt to manipulate me use three voices, and one voice in  particular, 24/7. Simulations can easily be made by computer programs readily  available in any computer store. Various handlers will alternate using the same  several voices. Moreover, using their specialized software, they can mimic  regional accents in a very authentic manner.

One of the talkers will sometimes simulate the voice  of the target himself. That is purposeful. Remember that psychiatrists and  psychologists designed the handlers’ software. The designers knew that a target  would be more comfortable and would relate more easily to a person using the  same accent and the same type voice. It is also a mockery of the  target.

Monitoring a target requires constant vigilance and  alertness, meaning that the handlers cannot perform longer than three or four  hours at a time. That suggests that in most cases the handlers must work in  shifts, each shift using the same voices. The objective of using the same voices  on each shift is to make the target think that the same three or four voices  that he hears are monitoring him twenty-four hours a day. The handlers use  simulations of voices not only to deceive the target into thinking that many  people are continually monitoring him but they also disguise their voices to  keep targets from possibly identifying them.

The handlers can program certain actions to take  place at certain times. Voices with particular messages are played to the  target’s subconscious as he sleeps. They can also program their device to send  jolts to targets whenever those targets are immobile for longer than, say, ten  minutes, and they can program the hours at which targets will receive the jolts  and vibrations and the circumstances under which they receive them. They can  perhaps even pre-determine the strength of those vibrations, based upon the  targets’ thoughts.

Even much of the subliminal talking of the handlers  is automated. Many of the subliminal voices that targets hear are pre-recorded  and played back either continually or at programmed times. The automation allows  the handlers freedom of movement and limits the manpower required for monitoring  targets. With automation, one single handler can efficiently monitor a target  for many hours at a time. It is also highly probable that the handlers have a  handheld device that allows them to perform their tricks while on the  go.

Nobody quite understands how telepathic  (non-auditory) communication occurs; yet, that it exists is a proven fact. As  early as 1952, a scientist briefed the Pentagon on the “possible uses of ESP  [extra-sensory perception] in psychological warfare.” Since then, research on  that topic via the intelligence community has become part of the government’s  experiments on mind control. In the 1970s, Stanford Research Institute engaged  in intensive research on it, calling the telepathic messaging “remote viewing.” Experiments included giving selected persons only geographic coordinates and  asking them what they saw there. The results were astonishing. The Russians have  long been interested in telepathic communication and have attempted to train  their astronauts to communicate non-verbally.

Tactics Using the Voices

From the outset, the handlers will attempt to make  the victims believe that their targeting must be their fault. Nothing could be  farther from the truth. There is a court system set up to handle crime, and it  has functioned for millennia. Victims must always keep in mind that the  attackers are the criminals, not the victims.

The handlers seek to establish a personal type of  relationship with the target. That does not mean that the relationship is  amicable. What the handlers want targets to think is that the handlers know them  and have known them for years. That is an important psychological point for the  handlers as they ply their neurological software, including the voices. My  handlers often tell me that they went to school with me. Although they most  certainly did not go to school with me, that ties them to me psychologically  from an early age.

The handlers constantly repeat certain phrases to the  target and make suggestions to him, oftentimes of a sexual nature. As they make  those suggestions, they mention names of family members and friends of the  target. After hearing those suggestions day after day, finally, the target  expects to hear those phrases and expects to hear the innuendos. The next step  is for the target to start relating to those suggestions and believing them.  That is psychological conditioning or sensitizing. I believe that many of the  aberrant acts that we see in the media stem from subliminal suggestions that  perpetrators of ESMC make to targets, most of whom do not know that they are  targeted.

There is growing proof that the equipment of the  perpetrators of the ESMC also has the ability to communicate with third persons,  or persons who ordinarily might interact with the target. Those persons are  instructed subliminally to say certain things and use certain words that cause  the target to believe that they are accomplices out to do the target harm. This  is called “directed conversation.” The third parties are not aware of their  brain manipulation. Likewise, most targets are not aware of that capability, and  thus do indeed believe that those people are working against him. Unlike willing  and paid accomplices, those third parties unknowingly do the handlers’ evil  work.

A few years ago, the handlers started repeating my  thoughts back to me (2008). There are several possible explanations for the  handlers’ doing that: (1) They are recording those thoughts on a digital voice  recorder, which they probably forward to another location. (2) They are  repeating the thoughts to others either present or also monitoring me by phone  who cannot hear those thoughts. The thoughts are probably picked up over  earphones attached to the computer. Perhaps only one person can listen at a  time; thus, they repeat the thoughts to others. (3) They simply seek to annoy me  and continually remind me of their capability of hearing my thoughts. (4) The  continual repetitions heighten anxiety. The objective may be a combination of  all of those possible scenarios.

In “talking” to the victim’s brain, the handlers use  code words and expressions. Many of the codes are embedded in their statements  and not readily recognized as code; others are very obviously code. Regardless  of how the codes are stated, they signal to the target’s brain certain reactions  that the handlers expect of him. That suggests that the target was hypnotized at  some point. If a victim notices the context, or situation, in which the handlers  use the codes and his mind responds to their codes, it is not difficult to  figure out the meaning of most of those codes. The target must have been  previously hypnotized; otherwise, the codes would be meaningless to him and he  would not respond.

Early in my targeting, a voice seemed to be  instructing the other handlers on some facet of mind control. That voice said to  the others (paraphrased), “First you start out in a simple manner, asking the  target ‘How old are you?’” I gradually learned that that was not at all an  instructor teaching other handlers mind control techniques but instead a code  that opened my mind to the handlers’ use of age progression in plying me with  questions concerning various phases of my life. I have awoken many times to hear  a handler telling me that I was a certain age and asking me questions. The  handlers can also make the target focus on time periods in the lives of other  family members and friends.

The codes that the handlers use are used for  particular mind control objectives. For example, in my case: “I scream,” or “ice  cream,” both pronounced the same, instills anxiety. I was supposed to think that  the code was ice cream; however, I later deduced the real meaning: “I scream,” designed to induce anxiety. The code “come in,” spoken as if they were inviting  someone into their home, opens up the victim’s mind to questioning; The  expression “beats the shit out of me” makes the victim feel an urge to defecate;  and “I see you” and “I hear you” prepare the victim psychologically for brain “mining” by the handlers. “Go git ‘im” causes an involuntary erection. All  handlers may have their own codes.

The code words and expressions used by the handlers  strongly hint that the handlers employ hypnotic pre-suggestions to trigger  thoughts and actions in targets. The codes consist of proper names, place names,  objects, phrases, and sentences. Several times I have awoken suddenly during the  night, when the handlers have not yet realized that I was awake, to hear very  weird music and the drone of a kind of singing, or chanting, using particular  words. On one occasion, a male was chanting, and I heard the word “vibrate” or “vibration” and my code name “Estados Unidos.”

As the target forms thoughts in his mind, the  handlers’ computer apparently provides the handlers dates, biographical facts,  and other information to add to and embellish the target’s thoughts. The purpose  of this is to intimidate the target into believing that the handlers are  all-knowing. The handlers, in fact, often blank out data in the target’s mind so  that they can supply the information to him. That action seeks to establish a  target’s dependence on his handlers. The handlers include all professions and  occupations. For example, if the target is a carpenter, one of the handlers on  every shift will be very knowledgeable of carpentry.

Very curiously, the handlers use many odd means to  project their voices. When I shower, the handlers cause voices to come over the  falling water. The second I turn off the water, the voices stop. The voices  obviously are not actually in the water. The water only provides an energy  source, which picks up the loop play tapes and other recordings from that area  that are playing at the time. Once again, that hints at directed sound. They can  even cause my stomach to “growl” and inject words and phrases into the resulting  growling sound. Sometimes when I push or pull an object and friction occurs, I  can hear the handlers’ voices. I gradually learned that the voices are also  recorded on loop play tapes and played continually to my subconscious,  constantly re-enforcing the handlers’ objectives.

In the case of the stomach’s growling, I used to  think that the handlers projected their voices into my stomach. However, I later  decided that the many voices and recordings of voices instead are projected into  the electromagnetism that surrounds my house and surroundings. When the handlers  cause my stomach to growl, either the noise or the friction picks up the voices.  I may be wrong. The handlers can also inject their real-time voices into the  growling. The same case applies to running water and the various appliances. The  handlers know that those sounds pick up the frequencies with the voices.

The handlers may also know several major languages.  If not, their computer software can interpret those languages. That type  software has been available for years and is in fact used to make actors in  movies appear to be speaking different languages from the original ones used in  making the films. Latinos, Afro-Americans, and East Indians have physically  cooperated with the handlers in harassing me at various times; however, they  were probably simply accomplices and not a part of the ESMC  teams.

One night I woke suddenly to hear the voice of a  young-sounding, male East Indian saying to me, “(A name) is in the bathroom  vomiting.” The name was my oldest and best friend, who was in his last battle  against stomach cancer. The handlers had been trying for some time to create  multiple personalities in me using the names of friends and relatives, including  that particular friend. The voice of the East Indian was a real-time voice, and  the speaker obviously did not realize that I had awoken. I have East Indian  friends and have traveled in India; thus, I instantly recognized the unusual  pronunciation of English by the East Indian. Accidentally hearing that sentence  by the East Indian causes me to think that perhaps the powerbrokers who  mastermind the electronic stalking and mind control projects may outsource some  of their targeting. My microchip may even have been manufactured in India  although it is more likely that it was manufactured in Israel.

As in the case of the electronic torture, the voices  will follow the target wherever he goes. That suggests that satellites may  somehow be used to project the voices. In a 2003 article named “Shocking Menace  of Satellite Surveillance,” author John Fleming writes that satellites are  employed for “manipulating a person’s mind with an audio subliminal ‘message’ (a  sound too low for the ear to consciously detect but which affects the  unconscious). In trying thereby to get a person to do what you want him to do,  it does not matter if the target is asleep or awake.”

It is my understanding that satellite use, except for  the GPS, requires knowledge of the nomenclature of the satellite and its  codes/signals. If that is true, individuals and renegade groups would not be  able to make use of them – unless they were provided the codes/signals. If  satellites are not used, then some other wide-ranging object such as radio  towers and cell phones may very likely provide the constant contact required for  conveying the electronic effects and the voices, i.e., mind control.

Targets often debate whether their electronic torture  and mind control is conducted via satellite or by local assailants. The answer  is probably both. One group of assailants probably “hooks” the targets in some  yet unknown manner and then uses a satellite to turn them over to local  handlers. A field of electromagnetism around the target may be necessary to  relay the electronic effects and V2K. I get the V2K continually 24/7, with only  very short intermittent periods of quiet. For a long time, I have thought that  the electronic effects and voices were projected by satellite. However, I  acknowledge that they could also come from a local source, perhaps through  directed sound

Targets who hear the voices know that the voices can  also be projected over household motors such as air conditioner/heating units,  space heaters, and even grass cutters or tractors used outside. Motors create  motion, and the motion in turn causes vibrations, or frequencies. Even the sound  and motion of running water, as in a shower, creates frequencies. I believe that  the handlers’ voices are projected into a field of electromagnetism that  surrounds a target and the voices then find an outlet in anything that produces  a vibration, or a frequency, including our brain.

Even the sound and vibration of a target’s breathing  provide frequencies that may allow the reception of the voices. If I am correct,  (a) the voices come over a field of electromagnetism that blankets one’s  domicile and surroundings rather than focusing directly on a target’s skull and  (b) the directed voices require some object or substance in the target’s body to  allow him to hear the voices; otherwise, anybody near him could hear the same  voices.

The voices are crucial to mind control. Mind control  cannot be carried out without them. In using the voices, the handlers seek  several objectives: (1) Make the target doubt his sanity. (2) Cause the target  not to be able to distinguish his own thoughts from the thoughts sent to him by  the subliminal voices. The thoughts inserted and injected into the target‘s mind  through the subliminal voices mingle with the target’s own thoughts. The brain  cannot readily separate the natural thoughts from the inserted thoughts. This,  of course, influences the target’s actions immensely. Those actions are normally  negative and adversely affect his well being.

(3) Distract the target. By constantly filling his  mind with ugly, directed, and oftentimes meaningless garbage, the handlers  confuse the target’s mind. That makes him very vulnerable to mind control  actions. The handlers do not have to be skillful psychologists to do this. Most  of the content injected is crude and extraneous. (4) Cause the target to hear  words and phrases intentionally programmed for him to hear while watching TV and  listening to normal conversation. Usually those words and phrases that he is  programmed to hear will be either very negative thoughts, suggestions of  suicide, or nasty sexual suggestions. He is led to believe that they are his own  thoughts although they are not; thus, this is similar to Number 2  above.

For those targets who receive the voices, your  handlers will attempt to appear helpful and make you believe that what they are  telling you is for your own good and that you will be better off if you follow  their advice. Nothing could be farther from the truth. What they are trying to  do is gain your confidence to get you accustomed to following their orders. The  handlers are not there to do you good but to do you harm!

The handlers, using second layered voices (those that  targets do not readily hear), will also try to create multiple personalities in  targets by whispering continually: “You are (the name of a person).” That was  one of the objectives of the CIA-sponsored MKUltra Project. The creation of  multiple personalities is not just a meaningless, fun exercise for the handlers;  indeed, it has a very real objective. The target’s additional personalities are  not random identities but those of other people whom the targets know. The  reasoning is that the targets and his other personalities might share some of  the same characteristics, thoughts, and ideas.

Methods of Sending the  Voices

Those targets who hear the voices have their own  ideas about how it is done. Here is my opinion about the voices. There are only  two ways that a target can receive the voices: (1) Via an electromagnetic or  microwave attack from afar, or externally; and (2) Via an implanted microchip,  or internally. I discuss below those two methods.

Electromagnetic Field (external  source)

Ample evidence argues that a microchip is not  required for handlers to project the voices to targets. When Bush the younger  attacked Iraq in 2003, the American invaders used a device on the Iraqi troops  known as the Voice of God. The Iraqi soldiers heard Allah telling them, in  Arabic, to throw down their arms and surrender. They did so by the hundreds.  Thus, it is a known fact that the U. S. military has the capability of  projecting to targets voice-to-skull talk. Targets who are able to hear the  handlers’ voices recognize that the Voice of God device used on the Iraqis is  very similar to the device used on them. That the voice was used on thousands of  Iraqi troops at the same time means that the device employed can focus on a  single individual, as in the case of targets, or on a crowd of  people.

However, the U. S. and its allies fighting in  Afghanistan apparently have been unable to utilize the “voice of god” in that  country. Perhaps the Afghans have been advised about that trickery by Iraqis and  other Arabs who have joined them. If the reason is not the Afghans’ knowledge of  that neurological action, the device that produces the “voice of god” must  require some type of special environment. Why does the “voice of god” work in  Iraq when it does not work in Afghanistan? Both countries are arid and neither  country has a well-established electrical/communication system. Could geography  play a role in using the device? Iraq is lare

When the “voice of god” was beamed in on the Iraqi  soldiers, there were few cell towers in Iraq to use as relays and also few cell  phones, radios, TVs, and other devices that in vast rural areas could be used as  conductors. Moreover, it is highly unlikely that Iraqi soldiers had been  implanted with microchips. Furthermore, the highflying American aircraft would  have been too high to project those voices through conventional speakers, and  the lower-flying attack planes would have been too occupied and fast- moving to  pull off anything like the “voice of god.”

In my opinion, the only answer for the “voice of god” is that it was projected by remote via a surveillance or spy satellite from a  great distance. It is my guess that the voices originated at the HAARP facility  in Alaska or perhaps even at one of the many U. S. military installations around  the globe. That synthetic telepathy was practiced on the Iraqi troops in 2003  proves that that method had already been tried and tested, probably on American  citizens in America. Distance would not be a factor. That capability could come  from near or far, for example, from Fort Meade, Maryland.

What condition is required for targets to hear the  voices? The answer is still highly classified; however, I suspect that first the  target’s immediate surroundings must be enveloped with an electromagnetic (EM)  field. The attackers can undoubtedly either create an electromagnetic field or  use a natural electromagnetic field wherever the target goes. To locate and  focus upon that particular area would probably also require the use of the GPS  unless the device were used from very near the target. The voices are projected  into that EM field following the device’s trajectory, either using the same  device, or perhaps by or with a computer. The voices permeate that entire area.  The target can hear them wherever he is; yet, others cannot. The “Voice of God” messages beamed in on Iraqi troops suggests that V2K operates separately and  perhaps independently from the remainder of the electronic effects.

Any electrical outlet, appliance, or other source of  energy aids the voices by increasing the volume. However, those sources of  energy only enhance the voices to make them more “audible.” Even if all the  electrical and other energy sources are eliminated, the voices can still be  heard, though not as hard and clear.

If this is the method, the question remains  unanswered about how a target can hear the voices when he has other family  members and visitors in his presence in that environment. My handlers use V2K on  me while I am working in the yard beside some other person. The other person, of  course, does not hear those sounds. That method also does not explain how the  target can hear the voices wherever he goes, in an airplane, a vehicle, a  cavern, or the inner recesses of a large building. That suggests some type of  embedded object in the target’s body.

Implanted Object (internal  source)

The voices can be projected into the target using a  microchip or other object or substance. The voices are projected via the implant  into the target’s nervous system and thus his auditory canal. If that is the  method, the voices would be directed to the target using the GPS to the target’s  surroundings and his microchip would pick up the signal from the electromagnetic  field. The magnetic field may not even be necessary. Animals and sea creatures  implanted with microchips can be tracked from hundreds of miles away. With  implanted microchips, only the target would hear the transmissions.

Testing for Microchips

Both of the methods described above may be utilized  by the handlers, depending on the situation of the target and whether he is  implanted with a microchip. I suggest that organizations that represent targets  set up a massive program to examine every alleged victim for foreign objects or  substances in his body. That can be carried out by examining targets by x-rays,  MRIs, CT scans, or some other instrument.

The test will either locate one or more microchips or  will rule out the possibility of implanted microchips. The outcome of the tests  may show that some victims do indeed have implanted microchips while others do  not. If microchips cannot be found on the victim examined, his ESMC will  probably be carried out from a relatively close distance. Some victims may be  targeted by both the internal method as well as the external method.

At any rate, the testing will either confirm or lay  to rest the microchip theory. If microchips are eliminated as a method, targets  can focus their efforts on determining the device(s) and methods used on them  externally and bringing those who are doing it to justice, presuming that  justice will be forthcoming. The latter is doubtful under the powerbrokers who  control the current form of government.

Subconscious Voices, the Mind Control  Clincher

Readers who receive electronic and mind control  effects, and especially those who can “hear” the “audible” voices, read the  following few paragraphs very carefully. As already stated, in addition to the “audible” telepathic talking (audible only to the target), mind control targets  should be aware that their handlers also continually speak into their brains in  voices so low in volume that the targets’ consciousness does not pick them up.

The victim is completely unaware of those “inaudible” voices, which makes them all the more dangerous. It took me years to “hear” those subconscious voices. Many targets never hear them. Nevertheless, they are  there. The subconscious talking by handlers makes that capability one of their  most formidable weapons in mind control.

Through their sub-conscious talking, the handlers  control what you think of and how you react to people, including your spouse,  parents, siblings, and children. They control how you perform on your job site,  how you view your job, and how you interact with your colleagues. They also  control your daily life: what TV programs you watch and your opinions about  them; what newspapers you read and how you interpret that news; where and how  you grocery shop; even when you go to the bathroom and what and how much you  eat.  Only those targets who hear the handlers’ voices can know the extent to  which the handlers’ consummate evil influences targets’ thoughts and actions.

I discovered what I call the “inaudible” voices, or  the second layer of voices, strictly by accident or perhaps through the  intervention of The Great Spirit. One night, I noticed that whenever my beard  stubble brushed against the pillow, causing friction, I could hear still a  second layer of voices in addition to those voices that I already “heard.” I  experimented by intentionally brushing the hairs of the beard against my pillow,  and each time the handlers’ voices became more intelligible.

Finally I caught a word and then a phrase. After many  attempts, I distinctly heard a Deep South-sounding voice saying, “You’re horny.” Only that short sentence was repeated time after time. Then, I realized that it  was not an actual real-time voice but the recording of a voice over a loop-play  tape continually telling my subconscious that I was horny. As most targets know,  the voyeur handlers are fixated on sex. I have no idea how many years the  handlers had pummeled my mind with those loop play tapes before I discovered  their presence.

Over the next few months, I discovered an additional  voice being projected into my subconscious through a similar loop-play tape.  That discovery, like the first one, was also accidental and occurred while in  bed. One night when I turned from my back onto my side, my ear brushed the  pillow. In the quietness of the night, the ear brushing the pillow caused me to  hear a human-like sound. After repeatedly brushing the outside of my ear canal  with the palm of my hand, I began to distinguish a word. After performing that  action many times using various strokes and angles, I very clearly heard a voice  repeatedly telling me, “Trust me.” As in the first case, the voice came over a  loop play tape.

A later incident revealed still a third subconscious  loop play tape. Here is what happened. I keep the hairs at the entrance to my  ear canal closely clipped. One night when I scratched my itching ear, my finger  touched the clipped hairs, and I caught the sound of a voice. By repeatedly  touching and moving my finger over the clipped hairs, I could finally make out  what the voice was saying. The voice was saying, “You want me.” Like the other  voices, this one also came over a loop play tape.

On the surface, the expression “you want me” appears  to be sexual in nature. However, I later learned that in addition to the sexual  connotation, the statement “You want me” also applied to food. The handlers’ objective was to cause me to become out of shape and fat. Before discovering the  expression “You want me,” I noticed that when I grocery shopped, I came back  home with many sweets and mainly carbohydrates. After learning the handlers’ intention, I started grocery shopping more carefully. Many targets tell me that  they gain much weight after being targeted. That is the reason. The handlers are  urging you to eat more than you should and consume high caloric foods through  the voices into your subconscious.

The loop play tape “You want me” also applies to  tobacco products or anything else that can be harmful to one’s health. I like to  smoke an occasional cigar. At one point, I found myself craving and chain  smoking the cigars. Now I know the reason. Whatever the “you want me” suggests,  it will be to the detriment of the target.

Months after discovering the subliminal talking to my  subconscious, I again found another area that revealed the handlers’ voices.  This time, I intentionally played with the beard stubble between my nose and my  mouth with my first and second fingers to see whether that area could detect the  voices. Gradually, the friction from rubbing the stubble produced sounds. By  repeatedly massaging that area, the sound took shape. A voice on a loop play  tape repeated, “I hate you.”

On still another occasion, I discovered the voices as  I scrambled eggs in a teflon skillet and stirred them with a regular metallic  spoon. The bottom of the skillet had concentric, slightly ridged circles in the  bottom. As I scraped the bottom of the skillet with the metal spoon, I heard  voices. By moving the spoon across the skillet over and over, I could finally  determine what the voices were saying: “Slow it down,” which is a code  expression whose meaning I do not yet know. Another voice was repeating “black  on white.” That may have been an attempt to make my subconscious believe that  blacks were behind my ESMC activities. Both expressions came over loop play  tapes.

I also found that I often heard their voices when I  slid a hard object over another hard object, like a china cup over a ceramic  counter top, creating friction. Even when I exercise on my weight machine, I  hear words coming from the friction caused by the pulleys. I also hear the “hidden” voices whenever I rub my hand over my pillow at night while my ear in  on the pillow. The friction apparently picks up the subconscious voices and  makes them “audible,” much like an old phonograph needle on a  record.

The handlers occasionally change the wordings of the  loop play tapes. The only loop play tapes to my subconscious that have remained  unchanged are the ones saying, “You’re horny” and “You want me.” Those tapes  play continually 24/7. The loop play tapes try to program a target without his  knowledge. For some time, the handlers have played loop play tapes in an attempt  to create multiple personalities, an old MKUltra objective, telling me that “You’re Joe” or “You’re Ted.” In every case, I know the persons whose names the  handlers are using to try to form multiple personalities.

Over time, I discovered that dozens, perhaps scores  of synthetic voices bearing short messages continually hammer my brain in the  form of loop play tapes. The handlers are obviously attempting to befuddle my  mind with the many simultaneous tapes. They are also trying to program me into  associating sex with the names of family members and friends of both genders,  including my son and my little granddaughter, as they attempt to cause erections  when they call those names. That action is obviously intended to cause me to  avoid those people, thus isolating me from my support group. I tell the handlers  contemptuously, “There’s no association, morons!” But such is the evil and  perverse nature of the monsters who serve as handlers.

That the handlers can aim so many loop-playing tapes  at my brain simultaneously indicates the sophistication of the methods used in  mind control. This implies that the main handler operates a very good computer.  Without a computer, mind control could not be achieved.

I urge mind control targets to test themselves to  find out whether they are being influenced by second layer voices. One way is to  experiment with your ears. Place the palm of your dominant hand (that will  usually be the right hand) over your ear with the large part of your palm well  below your ear. Then, while pressing on your ear, swipe your palm upward a few  inches. Do this repeatedly, experimenting with the pressure of your hand on your  ear and the position of your hand. At first, you will pick up only an  unintelligible “sssssh” sound. However, by repeating the process many times and  listening very closely, you will begin to distinguish words. The words will  consist of a phrase or short sentence, which is repeated over an unending loop  play tape. You can hear the words in either ear.

How the Subconscious Voices Are  Used

The second level subconscious voices take many forms,  and their uses are almost limitless. Here are some of them.

– Giving victims negative commands. Their commands  are often very subtle, for example: “If I were you, I’d . . . ; I think that you  should . . . .; and Why don’t you . . . .” In addition to the commands, the  handlers, by employing the inaudible whispers, cause victims to misplace items,  blank out names, dates and events, make errors while calculating and writing,  say things out of context while talking with others, and act in strange ways  that are completely alien to their usual demeanor and behavior.

The perpetrators also attempt to ruin the health and  looks of targets by encouraging binge eating. They whisper to victims that they  are voraciously hungry or that they should eat more sweets than usual. Their aim  is to get the target hopelessly out of shape and debilitated. Their whispered  commands are often sinister, causing targets to harm themselves. Some targets  have actually committed suicide as a result of suggestions by the handlers and  holographic images to that effect.

The power of suggestion to the brain’s subconscious  is truly amazing. The handlers condition targets for mind control by inducing “dreams” in which the victims plays out whatever role the handlers assign him.  On one occasion while I slept, the handlers caused me to believe that I was an  elderly Confederate veteran of the Civil War reminiscing about his experiences  in the battle of Gettysburg. I was telling about my horse being shot and going  down, about my being wounded, and about seeing comrades blown to bits with  cannon balls. I woke from the “dream” with real tears in my  eyes.

Handlers use known traits of victims in issuing their  commands. For example, I am a strong believer in politeness, and I try to  instill that quality in my grandchildren. Thus, knowing that, the handlers  normally preface their commands with “please.” Thus, instead of simply saying, “go to sleep,” they will say, “Please go to sleep.” Or they often say, “I’d  appreciate it if . . . .”

– Making statements about the victims’ family  members and friends intended to cause estrangement of relations between them and  the victims and thus isolate the victim. In my case, the handlers continually  mention my son, to whom I am very close, and my two sisters, always while  attempting to cause an involuntary erection. Such is the evil nature of the ESMC  assailants. I telepathically tell the handlers that they cannot damage my  relationship with my son, that my love for him and his family is undying,  eternal, and unconditional. Despite that, they continue to attempt to cause me  to think of them in a different manner and instill guilt in me.

Usually family members believe that a target is  delusional. If they do believe that their relative is being harassed, they are  placed in a very difficult position. If they support the target, they perhaps  put themselves and their family in danger of also being attacked. If they do not  support the loved one, they are effectively isolating that individual from his  family support system on which people have always relied.

Many of the targets are parents and grandparents. If  they are ostracized, they must live without the emotional support of their  family members. Moreover, their grandchildren must grow up without seeing and  interacting with their grandparents. It is a no-win situation for the target and  his family members. I know a target who has not seen either one of her two  children or her several grandchildren in over a decade.

– Causing victims to think in negative terms about  almost everybody and everything. Their device(s) cause absurd thoughts in  victims. For example, I have an elderly first cousin whom I like but to whom I  am not particularly close. We rarely visit. Yet, one day while thinking about  calling her, the thought of being an heir of hers surged into my mind. My cousin  has three children, several grandchildren, and even great-grandchildren. That  negativity colors many of my normal thoughts. Their software also causes me to  hear negative and suggestive words in place of ordinary words when I watch TV or  listen to the radio.

– Blanking out certain thoughts. The handlers’ whispering can not only cause targets to think about the topics that they  project into targets’ minds but also cause targets to fail to think about  important matters. The handlers delight in making targets forget appointments  with people, leave items behind that they intended to take with them, and forget  where they place common household items. The handlers also apparently enjoy  causing targets to remember people whose names the handlers have blanked out of  the targets’ minds. After the target tries hard for several minutes to remember  the name, the handlers will suddenly allow the target to remember that name.  This creates a psychological dependency on the handlers for information.

– Making threats. My handlers have often told me  that they were going to burn down my house. On other occasions, they have told  me that they were going to cause my son accidents, going to send “the death  squad,” and going to cause renal failure. I simply laugh at them.

– Introducing deviant sexual ideas and feelings that  victims would dismiss and reject if they were conscious of them. The handlers  continually emphasize incest, necrophilia, and other sordid sexual acts in their  talking. I cared for my bedridden mother for eight months before she died; on  one occasion, the psychopaths who attempt to control my mind showed me a  holographic picture of my climbing into bed with her just after she died. The  evil and sickness of the handlers is sometimes unbelievable.

– Creating in victims a lack of confidence in  themselves by disparaging their capabilities and accentuating their faults.  Whenever I work on home improvement projects or assemble items, the handlers  ridicule, taunt, and curse during the efforts, telling me that I’m doing it  wrong. Indeed, they do their best through their voices to my brain to cause me  to make errors. Knowing that and hearing their constant voices, I am very  careful in what I do. Although they do sometimes cause me to make errors, they  cannot stop me from starting and finishing  projects–successfully.

– Sending victims on wild goose chases and believing  things that are not true. This has happened to me on various occasions. Once,  for example, the handlers sent telepathic thoughts about the owner of a defunct  radio station in another city that I suspected may have been a clandestine site  of the local operations center, and I actually went and located his house. On  another occasion they convinced me that surveillance bugs were hidden throughout  my house, and I took screws out of receptacles and other items. On still another  occasion, they convinced me that I had psychic powers that allowed me to  determine the locations of implanted devices on other targets. I even informed  some of those targets where their devices were located. I later learned that the  handlers amuse themselves by causing targets to believe that they possess  special powers.

They also made me believe that my nephew’s business  computer had been hacked to obtain his business transactions and accounts and  that one of his employees was responsible. I even told my nephew about it, which  made him question my sanity. In addition, they caused me to believe that a  particular local Pentecostal church was responsible for the electronic and mind  control activities employed against me. The handlers even provided a fake name  of the minister of that church. On another occasion, they provided me the name  of an FBI agent in Houston, a fake one, of course, with whom I was supposed to  get in touch. I attempted to enlist the help of still another nephew who lives  in Houston in getting in touch with that agent. After having contacted him, I  realized that it was a ruse. The damage that they sought, however, had already  been done, for that nephew was sure that I was losing it.

The handlers still attempt to delude me. However,  experience is very valuable. I now know to question whatever thought comes to  mind. In traveling, I must be very careful, for the handlers will cause me to  make errors in driving, for example, turning at the wrong exit or missing an  exit ramp. At home while carpentering, I measure twice and concentrate on  remembering the number, as the handlers will introduce a different number in my  mind.

– Convincing the target that he is crazy. One of the  aims of the handler sociopaths is to cause the target to think that he is losing  his mind. My handlers very often remark subliminally, “He’s crazy.” I tell the  handlers who monitor me that if I am crazy everybody should be crazy, for I am  very content with my life. On the other hand, I tell them that they endure a “shitty” existence.

– Inducing anxiety. (More about anxiety  later.)

– Extracting information. By asking questions with  their whispers, the handlers can learn information not only about the target but  also about his relatives and friends. For example, whenever the target thinks of  a person, he will usually first think his given name. Let us say that the person  who comes to the target’s mind is named Joe. All the handlers have to do is ask  to the target’s subconscious, “Joe who?” The target then tells the handlers  Joe’s surname. I have attempted to resist telling the handlers surnames; yet,  there is something in the human brain that makes him think of the last name  whenever someone asks “Who?” The handlers’ computer also has a lie detector  program as well as a program that compels the speaker to tell the truth when he  is asked a question, a type of mechanical “truth serum.” The handlers, of  course, know that and use it to their advantage in obtaining information about  many people whom the target knows.

Although the handlers know your social security,  credit card, and driver license numbers, your email passwords, and your checking  and savings account numbers, they will normally not use that information for  criminal purposes. They have strict orders from the powerbrokers not to do  anything that can be traced. Thus, the handlers are not swindlers and con-guys  though they may try to convince the target that they are. My handlers often  suggest that for a certain sum of money, they will let off. That is pure  deception. I answer them by saying, “Let off? I’m not about to let YOU bastards  off the hook!”

– Getting the target to trust them. That was borne  out in the second-layered voices that I discovered, saying continually through  the loop play tape, “Trust me.” My handlers also continually tell me in the “audible” subliminal talking to trust them. I laugh at them and ridicule them  for thinking that I might ever possibly trust them. Trust psychopathic  criminals? Never.

– Causing targets to see holographic images. Most  targets who receive the voices also complain that they see horrible holographic  depictions. The handlers also used that conditioning technique on me, causing me  to see my son drowning and other heartrending scenes. I marveled at the ability  of the handlers to project holographic pictures to my brain until I learned  their secret. I later learned by holographic images derive from the handlers’ subconscious telling the target what is happening. The target then draws upon  his knowledge and experience to embellish and visualize that occurrence,  creating the holographic images. In other words, the holographic images stem  from a target’s own brain.

One night as I prayed to The Great Spirit, images of  Jesus popped into my mind. As soon as they appeared, I wiped them out by  superimposing a smiley face over the image. Then, I heard the Shitface voice  whispering, “Jesus, Jesus . . . .” At last, now I know how the holographic  images are projected into the brain: the handlers whisper what they want you to  see and tell you to view them. The target actually manufactures his own  holographic images. Here is how it works.

The handlers describe what is happening. The target’s  subconscious listens to the handlers’ descriptions, and it conjures up a mental  picture that fantasizes whatever subject the handlers want the target to see. In  my case, when the handlers whispered “Jesus,” my brain went back to my youth,  when I used to see pictures in Protestant churches of what Christians imagined  was the man called Jesus. It was a picture of a bearded man in a purple robe  kneeling with an aura of light around his head. When handlers induce a  holographic image, the target’s mind goes back to movies he has seen, childhood  impressions, things that he has heard, and real life experiences to build that  holographic image that the handlers want him to see. Now, whenever the handlers  attempt to project a holographic image into my mind, I simply say, either  subliminally or aloud, “That’s bullshit.” The image immediately dissipates, as  it cannot exist if a target closes his mind to it.

Handlers use the subconscious voices on the target  long before they start employing their electronic torture tricks on him. After  mining the target’s memories and thoughts and gathering information from all  other sources, they use the voices to convince the target that he is crazy. The  target is supposed to (1) commit suicide, (2) seek out a psychiatrist, or (3)  act or say something that will allow authorities to make him get a psychological  evaluation. All three actions neutralize the target: The first action physically  eliminates the target; the second two actions destroy the target’s credibility.

However, knowing is conquering. After I had been made  to look ridiculous several times by my handlers, I learned to discipline my mind  from falling for the handlers’ subconscious commands. I am now very careful  about what I do and how I go about it. The handlers also used to delight in  making me forget to take items with me when I left the house and forget where I  had placed other items. I used to sometimes lock my keys in the vehicle. Now I  make a concentrated effort to ensure that when I leave the house I have  everything I intended to take with me. I also now rarely misplace items in the  house because I am much more alert. My memory has actually  improved.

Before I discovered the hidden voices, I suffered a  bout of extreme anxiety attacks, underwent two painful prostate procedures, and  made many judgment errors. Now that I know the cause of those situations, they  will never happen again. Let me repeat that targets who get the electronic  harassment also get the voices. Although you may not hear the voices, know that  they are being projected into your subconscious. The subliminal loop play tapes  leave no doubt at all in my mind that psychiatrists and psychologists played a  major role in developing the protocol for the mind control element of ESMC.  Psychologists probably even serve as handlers in some cases and advisors in  others.

Other Uses of the Voices

The ESMC assailants are also able to project voices  and other sounds through objects near the victim, i.e., the TV, a PC, and other  electrical devices and even into the open air near him. Their sounds can take  the form of knocking on the walls, wind and rain, dogs barking, falling stacks  of lumber, and birds cooing or singing. Some of those sounds might be heard by  others if they were present; however, the stalkers are careful not to make the  noises if there are visitors. I live alone, as many victims do, and my dog often  barks at some of the noises that the stalkers project into the yard and pasture.  One can buy computer programs that make those same sounds.

The stalkers can send their voices through a radio,  even when the radio is turned off. They can also make you think that people at  nearby tables in restaurants and other public places are talking about you by  projecting voices into your ears/brain that seem to come from their direction.  (Directed sound again?) In applying their evil, the electronic stalkers make use  of equipment that changes their voices to hide their identity. Voice changing  programs are readily available on the internet for purchase. They can also  duplicate the voices of people with whom you often talk.

The handlers also bombard your brain with loop play  tapes using words that they want you to hear on TV and radio. Probably through  hypnosis, the handlers instruct the targets that they will hear those words  whenever the syntax, syllables, prefixes and suffixes in the language used on TV  and radio sound similar to the loop play words. I discovered that while watching  TV. The speakers were saying words that I knew had no relation to their subject  matter. It took over a year to figure out that the handlers were, in effect,  substituting their words for words used by the speakers.

The handlers’ voices have also programmed me to  reverse many of the letters in words that I type, for example, placing a  particular vowel before a particular consonant or vice versa. I used to type  accurately. Now I have to be very careful in typing and then go back and review  what I have written before sending anything by email. Usually simple words like “about” become “aobut.”

V2K Can Be Recorded

Several targets have succeeded in recording their  handlers’ V2K. I am one of those who have done so. Let me hasten to mention that  I did not initiate that action, for I am not at all technically inclined. Here  is what happened.

A target with whom I corresponded first told me about  capturing the sounds of his handlers. He explained that he had bought a small  digital voice recorder, had recorded the ambience around him, and then had used  a program called Audacity to enhance any sounds that the recordings might have  picked up. He was astounded to hear words, phrases, and expressions spoken by  his handlers.

I followed his advice and his instructions, first  buying a small Olympus DVR. In a location far from appliances and other  distractions, I recorded the silence around me. Then, I sent the recordings by  computer to my target friend, as my handlers had muted the volume on my PC and I  had not yet gotten a technician to correct it. The other target listened to my  tapes and heard many distinguishable words. Some of the words and phrases that  he heard on my recordings were instantly meaningful to me; others had little  significance to my knowledge to the targeting.

The other target had sent his recordings to a  nationally renown sound expert, who had verified the findings of my target  friend. At his suggestion, I also sent my recordings to that same technician.  Three paragraphs of the technician’s report follow.

Dr. Max H. Williams states that he has been a  victim of remote-delivered electronic physical and  neurological attacks by  unknown parties using unknown devices since no later than summer of  2005. In  December, 2005, he began to hear voices that were not his. Others around him  could  not, however, hear those voices. Advised by another victim that there was  a method to record  the voices, Dr. Williams decided to make that effort. In  January, 2011, Dr. Williams bought an  Olympus digital voice recorder and  recorded the ambience around him to determine whether he  might be able to pick  up the voices. He contacted me on February 1st, 2011 and asked if I  would  listen to fourteen sample recordings of various lengths, taken at various  times, and analyze them.  I decided to take his case.

. . . I went into the audio structure a bit  deeper and found amazing vocal patterns that I have

only heard on two other cases in my ten years  of experience.  The actual Hz (Hertz) levels  contained in one of his files were  of a paranormal nature in that they were not of the normal  sample rate pattern  of Dr. Williams’s recording device.  Those frequencies found were, in my  opinion, of a man-made or unknown origin.

The actual frequency numbers and settings  were, in fact, in my opinion, deliberate to Dr.  Williams.  I was able to  isolate the following frequencies in the area surrounding Dr. Williams:  The  right channel frequency is 1429.32 Hz and the left channel is 1438.36 Hz. The  actual location  of the transmissions is unknown, but I believe that they may be  very close to his vicinity. In

analyzing the recordings, I discovered one  dominate male voice captured at a decibel level of

46.7 and was able to amplify this voice to an  understandable level.  Although I could not clearly  hear the entire statement  of this male voice, I was able to hear certain words. The actual voice  message  that I heard is quite clear and appears to be giving Mr. Williams some kind of  instruction.

That technician is costly to hire. Short of that  part of the recording process, the cost is not great. My small digital tape  recorder that the other target recommended cost a little over a hundred dollars  at Best Buy. The Audacity program can be downloaded free of charge. If it is no  longer free, it will not be expensive.

What is it worth to capture the voices of your  handlers? I cannot say. However, now I have a statement from a recognized audio  expert certifying that there are indeed voices in my surroundings, which means  that I am not delusional. The certification may also be of some value should the  local or other authorities ever attempt to force me to undergo psychiatric  treatment. Even if a target cannot afford the assistance of a technician, he can  study and analyze his own recordings. In so doing, he may hear some subliminal  communication from his handlers that might prove meaningful in determining the  identity of his assailants.

Types of V2K

After studying my own V2K for years, I have reached  the following conclusions about their types and how they are used.

The voices can be categorized into three different  types: (1) those received by the target from real people talking into the  target’s psyche; (2) those from human voice pre-recordings, including the loop  play tapes already described; and (3) those used with an automated highly  classified system using highly specialized software for questioning and  programming targets via a non-human, mechanized method. Usually, the three types  work together during 24/7 projections into the target’s brain. The last two  types must be monitored by the handlers using the first type. One well trained  and experienced handler can easily manipulate all of those  functions.

(15) READ A VICTIM’S THOUGHTS. There is irrefutable  proof that many university, medical, and defense contractor scientists have  developed microchips and other devices that operate with computer programs to  achieve that capability. Many of those methods have been patented. Scientists  know that certain radio frequencies can pick up the natural frequencies of the  human brain.

My handlers at first made me believe that their  equipment picked up only a few one- and two-syllable words of my thoughts. I  even heard them talking excitedly about picking up those fragmentary thoughts.  That was total deception. They have had the ability to pick up complete thoughts  for many years. Their “discovery” was only a part of the mind game, which must  be very amusing to the handlers. In reality their device intercepts a target’s  thoughts BEFORE those thoughts fully develop in the target’s conscious. The  handlers always hear the target’s thoughts a few words before the target becomes  conscious of their thoughts.

For some time, my handlers have repeated my thoughts  in their subliminal talking. At first I thought that their repetitions of my  thoughts so that I could hear them was simply another psychological tool thrown  into the equation to annoy me. However, I now believe that perhaps the handlers  are repeating my thoughts for the benefit of accomplices or their superiors who  are listening on radios, cell phones, and other instruments. Or they are making  recordings of what they hear on their ear phones.

People think without realizing that they are  thinking. They cannot help thinking. That is quite natural. It is a  psychological phenomenon that once targets are aware that the handlers can read  their thoughts, the targets subconsciously articulate those thoughts carefully,  knowing that somebody else is “listening.” Instead of simply thinking naturally,  targets become very conscious of their thoughts and will make sure that those  thoughts are very clear. They will even “explain” those thoughts. Moreover,  whenever they handle or use an object, they will think the name of that object.  Certain software used by the perpetrators causes targets to articulate those  thoughts and even visualize them. When I take my vitamins, for example, the  software makes me form the thought of each one and name the particular vitamin  as I take them.

One of the major objectives of the handlers’ mind  reading ability is to interrogate the victim. Their device and software include  a lie detector. The handlers interrogate the target through their subliminal  voices to his brain (whether or not the target hears the voices), and the  software indicates whether his answers are true or not. Knowing about the  handlers’ lie detectors, the target can often deceive them by introducing  several answers. As the handlers try to get the target to identify the correct  answer, the target can totally confuse the handlers by introducing incongruent  information. The target can also have just as much fun playing that game as the  handlers! I enjoy frustrating the handlers who think that they control my  life.

The handlers’ software also allows the handlers not  only to hear targets’ thoughts but also to see them. Of course, some of the  targets’ thoughts are not his own but are induced by the handlers. As a target’s  thoughts occur, the handlers’ computer program will use the target’s thoughts or  his induced thoughts to steer him in a particular direction to a specific topic.  The handlers reinforce the computer’s capability by whispering instructions to  the target.

Sometimes the handlers will say only one word to the  target’s brain. That word can be the name of a person, the name of a food that  they want you to eat, or the name of a topic that they want the target to think  about. I have learned that whenever I get a sudden thought while watching TV or  puttering, that thought is usually an induced handler topic.

The handlers want targets eventually to be unable to  distinguish their own thoughts from the handlers’ induced thoughts. Their  objective is to control that person’s actions. I have learned to separate out my  natural thoughts from the handlers’ induced thoughts that they want me to repeat  as if they were mine. With practice, all targets can develop that defensive  ability. I often tell my handlers telepathically, “if your thoughts and commands  just happen to coincide with my natural thoughts and actions, it is mere  coincidence, you assholes.”

I have already mentioned that mind control cannot be  achieved without the subliminal voices. Likewise, it cannot be accomplished  without the computer programs that the handlers use. Those programs not only  make sound effects, simulate voices, and perform other readily discernible  sounds but they also program many of the mind control functions. For example,  the computer can program a target’s thoughts to view people in a negative  context. A target’s thoughts about a specific person can be programmed in a  specific way, and they can also be programmed differently for particular  persons.

Programmed thoughts about others are often sexual;  they can also make the target believe that a person is stealing from him, that  another person is poisoning him, that a person is talking about him behind his  back, etc. They can also program the target to act and react in certain ways.  The programmed thoughts and actions aid the handlers in totally isolating the  target from society and convincing him and others that he is  crazy.

The handlers probably hear one’s thoughts using a  headset attached to a computer. My handlers have tried to make me believe that  my thoughts also appear on their computer in written form and can be printed  out. To convince me of that, the handlers subliminally exaggerate the  pronunciation of some words, for example “the,” as if they are second graders  reading from a book. I do NOT believe that one’s thoughts can yet be made to  appear as prose. In the future, however, that will almost certainly be  possible.

The handlers’ equipment and software can also see and  record the very images that your thoughts see. In other words, they can also see  what you see in your thoughts on their monitor. Science fiction? Hardly. Knowing  that they can see my thoughts, I have learned to project images, scenes, and  actions to the handlers. Sometimes when I hear good jitterbug music, I show  myself dancing. They comment on the dancing steps.

The mind reading capability not only gives stalkers  access to everything in the victim’s mind but also provides them massive amounts  of information about friends and family members of victims. The stalkers  feverishly exploit this information 24/7. In my case, the stalkers constantly  whisper the names of my son, two sisters, friends and acquaintances, and even  people whom I do not really know but who might creep into my thoughts to gather  information about those individuals. Knowing my thoughts also gives the stalkers  my computer passwords (and thus control over my communications), information  about my business matters, and previous knowledge of my actions and  movements.

While dozing, I have awoken to thoughts that I knew  were not my own. The handlers were introducing past events, places, and people  into my mind. The purpose was not to “mine” information. They already knew that  information. Their real motive was to make me remember the event, place, or  person to instill guilt/humiliation and/or to let me know that they had that  information.

The handlers’ equipment and software also have the  capability of inducing “dreams” and thoughts while the victim sleeps. In those  dreams and thoughts, the handlers introduce certain people, some of whom the  victim knows, though not always very well, and others who are unknown to the  victim. In the dreams, they set up particular scenarios in which the victim is  the principal actor, doubtlessly to study his interaction with the other actors.  In those skits, the handlers actually direct the actors while looking for signs  of phobias, sexual foibles, anxiety, and other human characteristics that they  can exploit.

In addition to the induced dreams and thoughts, the  handlers start sentences and then stop, letting the victim finish those  sentences. And they also flash photos before the victim’s eyes while he is in a  dream-like state of consciousness and ask him questions about those people. I  have awoken suddenly to see pictures being passed in rapid succession before my  eyes. Their monitors register the victim’s pulse rate, emotions (including his  sexual inclinations toward other people and his level of anxiety), whether the  victim is telling the truth about questions he is being asked, his dislike of or  fondness for certain people, places, or objects, and many other physical and  psychological reactions. The handlers’ objective is to learn increasingly more  about targets’ weaknesses.

Of those capabilities, Number 14, voices, and Number  15, mind reading, loom above the others in conquering the victim’s mind and  spirit. In fact, hearing voices and having minds read sound so incredible that  most victims do not report their electronic stalking and mind control assault to  law enforcement. After all, if one hears voices and believes that people can  read his thoughts, he must be crazy. And that is exactly what psychiatrists tell  victims, that they suffer from dementia or paranoia-schizophrenia.

Several targets with whom I have corresponded claim  that their handlers can inject mind-altering and body-function drugs into their  bodies. While that may be possible, it presupposes that those drugs have already  been deposited somewhere in their bodies and poised for release at some point.  That probably can actually be done. However, I suspect that the targets’ handlers deceive them into believing that those drugs are being administered by  playing with their minds. Again, post-hypnotic suggestions may figure in that  belief.

I consider myself very fortunate to know that I am  targeted and to be able to hear both layers of subliminal voices. Once a target  realizes that he is targeted, he can counter many of the handlers’ induced  actions and symptoms. It is far better for a victim to know that he is targeted  than for him to suffer strange symptoms and act in a bizarre manner that causes  him and others to question his sanity without knowing the reason.

Handler-Induced Ailments and  Conditions

Through the use of unknown and unseen instruments  employed by remote and also the use of neurological assault, conducted mainly  with the voices, the handlers can induce a variety of ailments, diseases, and  conditions in targets. Many of the symptoms of electronic stalking and mind  control have already been listed. Some of the induced effects are physical and  can either be visibly seen, detected by medical instruments, or measured. Other  effects are purely psychological and cannot be detected. Several conditions have  both physical and psychological origins. I discuss below some of those  handler-induced effects under three headings: (1) physical, (2) psychological,  and (3) a combination of both physical and psychological.

Physical

Using unknown and unseen instruments by remote, the  handlers can slowly debilitate a target physically. One of their instruments  acts as a type of “laser.” By continually lasering certain parts and organs of  the target’s body, the handlers can induce various kinds of cancer, including  pancreatic, lung, and skin cancer. The tactic involves repeated assault so that  the cells do not have time to repair themselves, thus causing  cancer.

The handlers induced basal cell carcinoma on my right  nostril in that manner. Night after night after I retired and lay still in bed,  I felt a laser-like beam passing over my face. The laser felt like it was  perhaps a quarter of an inch in diameter. After exploring my face for a while,  it would focus on my right nostril and remain there for several seconds.  Sometimes I felt a pin prick sensation when it focused on that spot.

After feeling the laser on my nostril for several  months, a small mole-like knot somewhat darker in color than the remaining skin  appeared there. I knew of course that the handlers had caused the small knot. I  visited a dermatologist to see if my suspicions were correct. Surely enough, a  biopsy found that the spot was cancerous. In looking back in my journal, I found  fifty-two references to the “lasering” before the dermatologist diagnosed the  spot as cancerous.

One target with whom I communicate had his intestines  perforated by probably the same laser-like instrument. As a result, doctors had  to perform a very serious operation on the target to remove most of those  intestines. Afterward, he could no longer work and make a living for himself.  Handlers can also cause appendicitis, fibromyalgia, hiatal hernias, herniated  disks, arthritis, poor eyesight, poor hearing, and other detectable ailments and  conditions. There is a wide pattern of physical assaults on targets’ bodies by  remote. Targets are virtually helpless against those attacks.

Psychological

The handlers’ neurological weaponry also causes many  ailments, diseases, and conditions of a psychological nature that are not  detectable. One of the main psychologically-induced conditions is what doctors  refer to as Alzheimer’s disease. The handlers induce that condition in a  methodical fashion. They first begin working on the target by blanking out the  names of certain persons, places, or objects in the target’s mind. Thus, when  talking with others the victim will often pause and search for a word. The  handlers gradually blank out more and more words, causing the victim to become  increasingly less functional. Then they blank out familiar locations. Those  victims often forget where their houses are located while driving and end up  having to be rescued and taken home. They later even forget the locations of the  bathroom and how to perform their bodily functions. They forget the names of  family members and friends. Many of those people who today are diagnosed with  Alzheimer’s are victims, not patients.

Many targets know for a fact that their handlers can  blank out thoughts in their minds. That has frequently happened to me although I  have learned largely to override the handlers’ effects. The handlers use a  computer to enter words, places, objects, people, and many thoughts familiar to  the victim into their data system, and they then program their software to blank  out those thoughts in a slow manner that makes the victim look like a sufferer  of dementia. The blanked-out thoughts gradually destroy the victim’s mind,  resulting in the disease commonly called Alzheimer’s. The handlers’ subliminal  suggestions and commands to the victim augment the effect of the computer  software.

Someday scientists will know that many, if not most  of the Alzheimer sufferers are instead victims of electronic stalking and mind  control. And they will know that the disease is not natural but is induced by  remote. Scientists will know, but will the powerbrokers and their controlled  media allow that knowledge to be revealed?

Just as targets know about the handlers’ ability to  blank out thought, they also know that the handlers’ directed energy weapons can  sap the energy of targets and cause complete lethargy. Chronic Fatigue Syndrome  (CFS) is a fairly recent phenomenon that first appeared in the 1970’s. I would  be willing to bet my last dollar that it is an induced condition. Likewise,  dermatitis, another relatively recent condition, is probably also a result of  the handlers’ “lasers.”

The handlers’ neurological assault, mainly through  the “hidden” voices, can also cause targets to exhibit signs of behavior usually  associated with schizophrenia and paranoia. Psychiatrists will someday realize,  if they do not already, that schizophrenic and paranoid conditions can be and  are regularly induced by the handlers’ remote subliminal voices.

Combination

Some conditions appear to be caused by a combination  of the handlers’ directed energy weapons as well as psychological suggestions  delivered through the handlers’ telepathic first- and second-layer  communications with victims’ brains. One such condition is commonly called a “pinched nerve.” The handlers can use their instruments to locate a victim’s  sciatic nerve, fix that location on the computer software, and relentlessly  strike that nerve, causing the victim great pain and debilitation. In addition  to the handlers’ using their instruments to cause a “pinched nerve,” they  re-enforce the condition by continually telling the victim subliminally that he  is experiencing great pain. Many patients who are told by doctors that they have  a “pinched nerve” are instead only victims of electronic stalking and mind  control. Other conditions such as “restless legs” also have both a physical and  psychological origin. The handlers can touch the spine in a particular location  in such a way that it causes the sensation of restless legs. At the same time,  the handlers tell the victim through synthetic telepathy that he is feeling the “restless legs” sensation.

The Voices and Alzheimer’s  Disease

Whether or not Alzheimer’s is a bona fide disease is  questionable, for Alzheimer’s can be and is continually induced by victims’ handlers. How does it happen? Mind control.

The process is slow and methodical. The handlers  start out by blanking out words in the victim’s thoughts. The blanked-out word  will be somebody’s name, a place, or an object. Then, the handlers will provide  that word to the victim through the whispers to his subconscious. He suddenly  remembers the word that he thinks he has forgotten. That method creates a  dependency on the handlers to supply words that the victim believes he has “forgotten.”

Finally, after many months of causing the victim to  forget words, the handlers begin causing the victim to lose his train of thought  while both thinking to himself and especially in talking with others. They do  that repeatedly, convincing the victim as well as those around him that he is  losing his mind. They keep blanking out more and more thoughts. One day, the  victim forgets where he lives, and he drives aimlessly around looking for his  house. Relatives later find him on the other side of the city. They take his  keys away from him and stop him from driving. He then forgets where the bathroom  is in his house. Much later, he has problems using his knife and fork when he  eats. By that time, he and his relatives and friends believe that he has an  advanced case of Alzheimer’s. He takes very expensive medicine that is supposed  to help him. It does little to stop his slide into oblivion. In the end, he  becomes little more than a vegetable, breathing but not living.

I am certain that one of my brothers-in-law was a  victim of induced Alzheimer’s. He was a brilliant chemist who started his career  with an oil company. He worked over the years with several oil companies. Later,  he bought land and developed a mobile home, or trailer, park on it. In the  latter work, he made enemies when he had to repossess trailers or force renters  to pay their rent. At some point, he was “hooked” by either somebody in the oil  companies or somebody who had something to do with the trailer park. I knew  nothing about targeting at the time. I watched as he slowly lost his mind. He  finally had to be led to the table, where he tried to eat with his hands. He had  to be led to his bedroom and be put to bed. He had to be bathed. He died in that  mindless condition.

Natural dementia has been around probably as long as  humans have existed. However, Alzheimer’s is a post-World War II disease that  can be either natural dementia, which is probably genetic, or induced. Each  decade, we see more and more Alzheimer’s. If Alzheimer’s is induced, who  benefits from it?

First of all, it benefits the pharmaceutical  companies that provide the medicines used to treat it. Despite those medicines,  I have yet to see them halt the advance of Alzheimer’s, which is further proof  that it is induced. Secondly, it is a way to neutralize somebody in a seemingly  natural manner. The Israelis neutralized Yasser Arafat through induced  Alzheimer’s. During the last six months of his life, he increasingly lost his  ability to think. By the time he died, he was practically a zombie.

I repeat that Alzheimer’s can be and is induced. It  is induced through the software that is used with the device that “hooks” the  victim. Through that software, the handlers whisper to the victim that he is  losing his mind, and they blank out and supply thoughts with the same whispers.  Finally they blank out increasingly more of the person’s memory. He eventually  loses his ability to think.

The Handlers’ Use of Neurological  Trickery

By using psychological trickery, the handlers  convince targets that their handlers are far smarter than they actually are.  Here is one example of that duplicity. When using synthetic telepathy on a  target, handlers will often induce a thought or intercept a target’s natural  thought about a person, place, or object. They will then blank out of the  target’s conscious some aspect that the target was thinking concerning that  person, place, or object.

The target’s subconscious knows the missing, or  blanked out, information, but not his conscious. Since the handlers can read the  target’s mind and thoughts, they pluck the answer out of his subconscious and  then tell the target the answer. That makes the target believe that the answer  came from his handlers and that they possess a vast store of knowledge, whereas  they only got the answer from the target’s subconscious. The target gives them  the answer; not the reverse.

Let me give you an example of that trickery. While  watching TV one evening, I saw a story about Rock Creek Park, a sprawling,  wooded acreage in Washington, DC where many residents bike, jog, and walk. I  remembered that a young Washington resident was murdered in Rock Creek Park. She  was an aide to a Congressman, and the Congressman was under suspicion for a long  while. Although I knew the name of the woman, when the name surfaced in my  conscious, it came up Sandra Levy.

The handlers had blanked out the young woman’s given  name. However, they had either seen or heard her real name in my subconscious.  When they told me “Chandra,” I was astounded. For a time I believed that they  actually had that knowledge and may have even been from the Washington area.  After years of studying the handlers and analyzing their actions, however, I  later realized that the handlers were using what I term “blanking out and  filling in.” They had blanked out my thought and had then made it look like  their thought.

They also use that method for other purposes. For  example, one day I looked in the fridge for some pickle relish that I knew was  there, yet I did not see it. Then I looked in all of the kitchen cabinets. I  still did not see it. Several days later I found the pickle relish in the fridge  exactly where I knew it should have been The handlers wanted me to think that  either I was losing my mind or that somebody had secretly entered my house,  taken the relish, and then re-entered my house to replace it (gaslighting). In  reality, the handlers had told my subconscious that I would not see the pickle  relish, so I did not see it. I have noticed that in my case the handlers can  only temporarily blank out a thought, and that thought will eventually return.   Such are the neurological tricks that the handlers play.

Knowing what the target is thinking, the handlers  also attempt to impress the victim with their knowledge. By using their  high-speed computers, they research very quickly topics that come to the  target’s mind to tell him information about the topics. They even steer him to  particular topics that they have already sought information on for the same  purpose. The handlers’ aim is to make the target feel that they are super  intelligent and informed. They usually are not. In actuality, they retrieve most  of what they know from the targets’ own minds and from the internet. Most  handlers have only very average minds, and many of them are undereducated for  the work that they pretend to do. Such is the neurological trickery that the  handlers employ.

A large percentage of the effects of electronic  stalking and mind control represent neurological tampering with the target’s  mind. If a target has unusual difficulty in swallowing food, if he has severe  indigestion, or if he feels sudden strange aches and pain, those occurrences are  often the results of handlers’ using the second layer voices instructing his  mind that he is experiencing those problems. Whenever I feel that the handlers  are causing a particular problem using their psychological tricks, I tell my  mind to correct that problem. It does.

Try it. Whenever you are hit the next time with some  of those annoying and sometimes frightening occurrences, tell your mind to find  the area of your brain that the handlers are using to do them and then tell it  to stop the resulting effects. You are the owner of your mind. You have to learn  to use your good mind against the handlers’ neurological trickery, a version of “fighting fire with fire.”

Before I go to sleep, I ask my mind to protect me and  to remember the induced “dreams,” staged scenarios, and other incidents that  occur while I sleep. Recently while sleeping, I suddenly woke choking. The  handlers had told my mind as I slept that I had swallowed some type of small  white ball. I woke trying to get the ball out of my throat. As I gasped and  coughed trying to get the object unstuck, my mind signaled me that there was  nothing in my throat. The effects stopped instantly. My mind even recalled  hearing the handlers’ instructions while I slept, telling me that I was choking  and describing the object caught in my throat.

Another psychological trick on the part of the  handlers is making targets believe that they see them at all times, including  when they use the bathroom. Because of that deception, many targets are afraid  to bathe and perform their bodily functions. It is true that the handlers’ device(s) can view a target’s movements and his locations throughout his  dwelling, but the figure that they see is probably a tiny dot or shadowy figure  on their monitor. Since they know the target’s dwelling very well and can follow  that dot, they do indeed know when he is in the bathroom. They also hear the  target’s thought that he is going to the bathroom.

It may be true that the handlers can see what a  target sees through his own eyes. However, if so they cannot see his entire  body, for the target himself cannot see his entire body. Nevertheless, the  handlers can read the target’s subconscious thoughts and his thoughts determine  his actions. For example, a target’s brain must register the thought of  shampooing his hair before the target actually performs that action. They cannot  see the target actually shampooing his hair because the target himself cannot  see that. Yet, the handlers know exactly what the target is doing in real time.  They can often tell him the brand of shampoo he is using because the target  subconsciously noted the brand name and the handlers read that thought. More  trickery.

I suggest that if a target is sensitive about the  voyeurs watching him in the bathroom, he may want to use only a plug-in night  light instead of the overhead light when he bathes and does his bodily  functions. If you believe that the handlers can see through your own eyes, avoid  looking at your private parts. If your eyes do not see them, the handlers’ eyes  most certainly will not be able to see them unless there is a hidden camera in  your bathroom. That, of course, is a very different issue.

I am beginning to doubt that the handlers can see  what a target sees through the latter’s eyes. That capability certainly seems to  exist, but it may depend on how a target is “hooked,” whether the handlers have  that particular software, and whether the handlers are trained to use it. In my  case, the handlers have a parallel computer that acts as my computer.  Technicians might call it a “shared” or a “ghost” computer. I believe that they  also have a parallel, or shared, satellite system that acts as my TV.

Using the same satellite TV provider that I do, the  handlers use their TV as if it were mine. When I watch TV, my brain registers  what channel I am turning to, so the handlers turn to that same channel. Thus,  they can see and hear what I see and hear. I doubt, however, that they are  viewing the TV from my eyes, for one night when I turned off the TV, I could  still hear the audio part of the program that I had been watching. The handlers  must have left their TV on and my hearing picked it up.

Here is another reason that I doubt that they see  through my eyes. In 2009, the handlers set about destroying much of my eyesight.  Before they started attacking my eyes with pin pricks, I could read the TV  captions perfectly. Now the captions are largely blurred and I have difficulty  reading them. Whenever I read the captions and get a word wrong, the handlers  correct that word. Use logic. If they saw the captions through my eyesight, they  would see only the same blur that I see and would be unable to correct the words  that I read incorrectly.

The handlers have the capability of blanking out  words and substituting other words. For example, a friend of mind once told me  something about her boyfriend, calling him Tim. I later referred to Tim, and she  corrected me. It was Steve. Now, there is little resemblance between the word  Tim and Steve. The handlers were trying to give my friend the perception that I  could not remember his name and that I was perhaps losing my memory. On a TV  program one night, an Afro-American character commented that they were no other  whites around. He was the only Afro-American there, so the handlers caused me to  hear “white” instead of “black.”

Synthetic telepathy to a target’s subconscious also  engages in trickery by getting the target accustomed to obeying the handlers’ commands. Here is how it works. Whenever I defecate, for example, my handlers  always tell me to wash my hands. They know, of course, that I never fail to wash  my hands after bowel movements. I use a large amount of black pepper on my food,  so the handlers always tell me to add black pepper. Those commands concerning a  target’s routine actions are Psychology 101 material, meant to accustom the  target to obeying the handlers’ instructions.

Every thought, perception, idea, feelings, emotion,  what one senses, and even his ambulatory ability and other physical functions  emanate in the brain. The scientists who developed the device(s) used in  electronic stalking and mind control and the scientists who wrote the trainer  manual for using the device(s) and/or methods were acutely aware that the brain  controls everything that we do. That knowledge drives a large part of the  torture that targets are subjected to, much of which is purely psychological in  origin. And that very deeply implicates psychiatrists and psychologists in the  torture matrix.

Anxiety, One of the Handlers’ Main  Objectives

Anxiety is one of the handlers’ most formidable  weapons. Targets should be aware that anxiety is an altogether induced symptom,  created by the handlers’ whispering and playing loop play tapes to the victim’s  subconscious.

I define anxiety as a high state of nervousness, a  feeling of un-wellbeing, and a sense of unsettledness in a person. It places one  on edge, full of fright but not knowing what is frightening him. It robs the  victim of sleep, for he is even afraid to sleep. It keeps him from eating  because he thinks that the food will choke him to death or it does the opposite,  causes him to stuff himself with food when he does not want or need it. He is  apprehensive, depressed, defensive, disoriented, disgruntled, and unfocused. He  is unable to concentrate. He cannot make plans, and even if he can, he cannot  executive them. In my opinion, anxiety is the worst possible condition short of  death itself. One must experience it to know what I am talking  about.

The handlers know a victim’s most vulnerable  emotional moments, which are usually the result of some traumatic negative  action like a divorce, a house foreclosure, the loss of a job, or the death of a  loved one. They play up that loss with the hidden voices, causing the victim  extreme anxiety. Indeed, he often does go over the edge into full panic, for the  anxiety will eventually become panic, which drives a victim to a psychiatrist,  gets him committed to a psychiatric clinic, or causes him to take some other  drastic action such as suicide.

I have always been a very positive, upbeat,  optimistic person. Nevertheless, not knowing about the handlers’ subconscious  communication at the time, I became a victim of anxiety in the summer of 1999,  not long after my mother died. One day I was sitting in the patio when I  suddenly panicked. I had never experienced panic attacks. The anxiety worsened  over several months. The psychological panics occurred daily. I woke up in the  morning from almost sleepless nights dreading for another nightfall to come, for  the panics were even more severe at night.

I developed a fear of water, although I shower daily  and sometimes even two or three times in hot weather. That did not keep me from  bathing; however, I dreaded to see it rain, and could not stand the thought of  getting wet in the rain. I could not eat a filling meal, as it triggered still  more anxiety. I began losing weight and looking haggard. Finally, I asked my  nephew’s wife, who was a nurse, to make me an appointment with a psychiatrist to  find out what was going on.

I saw the psychiatrist twice and took two  prescriptions of Prozac. Then, a greater force took over, and I gradually rose  above that problem. The psychiatrist dismissed me after two visits, telling me  that I did not need him. That turned out to be very true. In a few months, I  quit the drugs completely and have not taken them since then. And I shall never  take prescription drugs again, certainly not for anxiety.

After that bout with anxiety, the handlers later  attempted at other times to induce anxiety, usually when a good friend or loved  one died. They went to great effort to cause anxiety when an aunt, the last of  ten aunts and uncles, died. It did not work because I had already learned what  they were doing. Then, they tried again when one of my oldest friends died. That  did not work, either. Now that I know that my anxiety was caused by the  handlers’ subconscious talking over loop play tapes, I will never again allow  the handlers to induce panic attacks. I was supposed to commit suicide back in  1999; instead, I cheated them out of that objective.

Despite their failures, the handlers still  continually attempt to cause anxiety. One of their favorite techniques to induce  anxiety is to cause the target to remember people in his past of whom he was  very fond, people who through the years have either died or become lost to the  target. Then, they whisper their names to the target and cause him to lament  their deaths or disappearances from his life. Remembering those losses incites  panic in the target.

The handlers also use physical effects caused by  their computer software to create anxiety. For example, they create a heavy  pressure on the bridge of my nose that is supposed to induce anxiety. However,  targets should be aware that the hidden second layer voices to a victim’s  subconscious are the main cause of anxiety in targeted individuals.

Targets and Their Looks

What only a few targets realize is that their  handlers not only want them to appear mentally disturbed but also physically  unappealing. I can only imagine that the handlers receive much sick pleasure out  of doing that. However, another reason for wanting targets unattractive is to  socially isolate them. Here again psychology plays a role, as a target becomes  very self-conscious about his/her looks and stays home alone to avoid people.  Here are some of the ways that the handlers accomplish that objective.

  • Cause targets either to gain an enormous amount of  weight or lose enough weight to look emaciated. They prefer to make targets gain  weight. They do this by playing loop play tapes to the victim’s subconscious,  making suggestions about food and about the victim being hungry. They can even  cause the victim’s stomach to feel empty when it is not. Loop play tapes played  to targets’ brains constantly urge targets to eat sweets and greasy  un-nutritious foods. The handlers even show the targets pictures of food in  their minds. Moreover, they manipulate the targets’ senses of taste and smell to  choose unhealthy foods over healthy ones. All of this is done  neurologically.
  • Cause burn marks and sores on a target’s face and  arms, the most visible parts of his/her body. This type of electronic harassment  suggests some type of laser. I know of several cases in which the faces and arms  of very attractive women became scarred and damaged through that process.
  • Reshape a target’s nose by making it longer and  wider. Yes, that is what I said. By applying continual pressure on the bridge of  the nose with facets of their device, the handlers can actually cause a victim’s  nose to become both longer and wider. The principle is much the same as that of  braces on teeth: the continual pressure on the teeth, actually move the teeth.  Likewise, continual pressure on the cartilage of the nose, moves the cartilage  forward and outward. The handlers often place that type of pressure on my nose.  I laugh at them and tell them that thanks to them, I’ll have a very British  nose!
  • Cause a target, usually a male, hair loss. The  handlers can kill the hair roots on the scalp using their device, causing the  loss of hair and preventing its re-growth.
  • Cause a target unsightly psoriasis, usually on very  conspicuous places on the body, especially the face and arms. This is different  from the burn marks and sores previously mentioned, for psoriasis covers a much  larger area and gives an appearance of leprosy or some other equally ugly skin  disease. Psoriasis is one of the handlers’ favorite induced conditions. This is  done physically by whatever the device might be that the handlers employ aided  by psychological suggestion through the second layer voices.
  • Cause the target to look worn and haggard. This is  done through both physical and neurological suggestions that deprive the target  of sleep. Dark circles underneath the eyes, wrinkles and frown lines, and pursed  lips are all signs of sleep deprivation and make the target unappealing and  personally uninviting.
  • Cause targets to believe that their bodies exude  offensive odors. One target from the United Kingdom wrote that he was ashamed to  go around people, for he smelled very bad. He probably had no body odor. Yet,  the handlers made him believe that he stank through neurological suggestions to  his mind.
  • Cause a target to lose much of his/her eyesight and  thus force him/her to wear glasses. The handlers can damage targets’ eyes  through aiming pin pricks (again perhaps fine lasers) into particular sections  of the targets’ eyes. With pinpoint precision, the handlers can cause a target  nearsightedness or farsightedness or an astigmatism in only a matter of days or  weeks.
  • Cause targets to walk in a strange manner by  striking pain in targets’ spinal columns. The pain causes targets to stoop as  they walk or to assume very bad posture in sitting.
  • Cause targets to neglect their personal hygiene. The  handlers make targets believe that they are seen in the shower, when they are  using the bathroom, and wherever else they might be. Targets are reluctant to  disrobe because they believe that the voyeurs are watching them; thus, they stop  bathing. The handlers can also cause targets not to bathe by making targets  actually fear water. I enjoy my frequent showers, telling the handlers to watch  me all that they wish. After all, they can’t disclose what they see to anybody  except another sicko. I defy them in every possible manner.
  • Cause targets to appear odd by appearing in ball  caps lined with foil and several layers of clothes, even in warm weather, to  attempt to shield themselves from the electronic effects.

The handlers bolster this capability by continually  telling the target how ugly and stupid he or she is, damaging their self-esteem.  After all, probably over ninety per cent of what the handlers do is  psychological.

The reader may give little importance to the above  information about targets’ appearances. Nevertheless, appearances are very  important, as they affect a target’s sense of self-worth and his psychological  outlook. The handlers do not attempt to make targets’ unattractive simply for  the fun of it. They know that if a target is made to look or feel unattractive,  that target becomes insecure and anxiety prone. Their objective is purely  psychological – to isolate the target from others and increase anxiety. However,  what targets should realize is that other people really do not care much at all  about a target’s looks as long as the target is clean and dressed in a normal  manner.

The Essence of Mind  Control

As already stated, if a target receives  remote-operated electronic effects, he probably also receives the hidden voices  and thus mind manipulation. However, he may not at first hear those voices. Some  targets never hear the voices. Nevertheless, they are there.

Handlers “hook” targets’ minds and hear their  thoughts for years before they start the actual mind manipulation. In addition  to “mining” the targets’ thoughts and watching their activities, the  perpetrators interview people who know the targets, their family members, and  their friends. The object is to reconstruct the target’s entire life, identify  all relatives, friends, and acquaintances of the target, and learn any smut and  dishonesty connected to the target to later make him feel guilt. Finally, armed  with all of the data that they have retrieved from the targets’ own minds, along  with the targets’ files and records obtained from various sources, the handlers  begin their assault.

Friends and relatives of the targets often  unwittingly divulge information about the targets through “friendly” conversations with the perpetrators’ accomplices. In addition, sometimes the  accomplices pose as law enforcement officers and private detectives to  intimidate people into telling all they know about targets. Actual law  enforcement officers also doubtlessly cooperate in some cases. Only with the  total of this knowledge about the target can mind control be used effectively.

Mind control follows a well established plan, based  far more on psychology than on electronic assault. There are three phases to  that plan.

(1) First, is the intelligence gathering stage  mentioned above. (2) Next, the handlers condition, or sensitize, the victim by  assaulting him with the various symptoms and conditions caused by their directed  energy weapons. It is during this phase that the victim is conditioned to  respond to the various codes introduced probably through hypnotism. (3) And  finally the handlers start their telepathic interrogations, induced dreams,  scripted scenarios, and other mind manipulation methods.

In the last phase, the handlers often pepper the  targets with the “audible” voices (V2K), which only the target hears. Their aim  is to neutralize the victim by (1) rendering him incapable of functioning in  society, (2) causing him to commit suicide, or (3) murdering him in planned  accidents or through induced diseases such as cancer

Mind control is achieved through a combination of  psychological trickery and electronic effects. The electronic effects are  largely utilized to re-enforce the psychological aspects of mind control.  Although the electronic effects are painful and sometimes even debilitating,  they are usually bearable. As long as people have control of their minds, they  can normally handle pain. On the other hand, mind control seeks to dominate both  the mind and the body of targets, to gain absolute control over those persons  and manipulate their every thought and action.

Make no mistake about it; handlers are highly trained  in both psychology and computer/electronics. Their backgrounds may not have been  psychology; yet, they have been taught how to apply it. They are probably far  more adept at applying and understanding the electronics than the psychology.  However, whoever wrote the ultra-secret training manual, probably a team of  psychiatrists and intelligence interrogators, were masters in psychological  application.

Mind control seeks to disenfranchise the target of  his ability to function through a series of clever psychological tactics. We  have already mentioned several of those. Here are some others.

(1) Knowledge of surveillance. After a long period of  observation and “mining” the targets’ thoughts, the handlers let targets know  that they are objects of electronic surveillance. They reveal that they know  intimate details of the targets. The total loss of privacy of thought unnerves  the targets and makes them still more vulnerable to other psychological and  electronic attacks.

(2) Loss of control of thought. Not only do handlers  know the targets’ thoughts but they also plant thoughts in those targets.  Targets find themselves thinking of subjects and performing acts that they  ordinarily would not think or do. Those thoughts occur at strange times. Certain  thoughts and reactions occur time after time. Many of them are sexual in nature.  Targets may at first believe that those thoughts and actions are their own and  they may be somewhat puzzled by them; however, they eventually learn that those  thoughts and actions stem from subconscious suggestions made to the targets’ mind through V2K.

(3) Making the target appear crazy. Through  subliminal whispering, handlers make targets very forgetful. They forget names  of people whom they know well. They forget where they place objects. They forget  to do things on their list of things-to-do. By projecting voices, handlers  convince targets that others are talking about them. All of that makes targets  think that they are losing their minds or developing Alzheimer’s. Those same  actions suggest to observers the same message. All true TIs are acutely aware of  that mind control objective.

(4) Assigning guilt. The handlers’ computer can cause  targets to hear certain words entered into the handlers’ computer whenever they  watch TV or converse with others. The words triggered usually deal with sex,  violence, and other negative topics. Targets start believing that they are  actually thinking those words. That causes them guilt, which aids the handlers  in instilling and re-enforcing that very guilt.

Mind reading and subliminal talking programs leading  to mind manipulation are perfected, in full usage, and being carried out on a  massive scale both in the United States and abroad. Nevertheless, many areas of  the targets’ mind still remain to be probed and studied. Involuntary brain  mapping and neurological experiments concerning those areas doubtlessly  continue.

Searching for Remedies

After one discovers that he has become “hooked,” he  naturally grasps at ways to ward off the electronic and psychological abuse and  neutralize the source. Targets calls that “shielding.” That effort becomes  costly. Most targets are simply plain, low- to mid-income people, and dealing  with electronic assault and mind control places a great strain on their  financial resources. The handlers know this and encourage targets to spend their  money on useless gadgets and remedies.

The actions that I took to find a way to detect and  neutralize whatever causes the electronic effects and voices (mind control) are  too numerous to describe in detail. I will only summarize some of those  actions.

– Services. (1) Paid $300 to a private detective to  look for a bug in my vehicle and (2) $750 to another P.I. to provide information  about a person I had reason to suspect. (3) Had about $3,000 of dental work  performed to re-do that which had been done abroad. (4) Had x-rays and a CT Scan  made. This totaled well over $5,000. (5) Paid $1,200 for analysis of DVR  recordings.

– Gadgets. (1) Installed an NCH Tone Generator  program in my computer. (2) Bought and wore a small stone medallion that was  said to afford some kind of protection. (3) Purchased a Walkman-type device  called the Jammer, which was useless. (4) Bought a Spy Audio Jammer that  produced static supposed to keep outsiders from listening to telephone  conversations. (5) Purchased a dozen small objects composed of metal shavings  and crystals held together with heavy glue called Orgone Blasters. (6) Ordered  and used a small device called the BIOPRO “Home Harmonizer,” whose manufacturer  should be jailed for fraud. (7) Bought and used two devices, the RF Bug Detector  and the Zap Checker, Model ZC185, to detect and measure electromagnetism. (8)  Bought an expensive radio scanner that I thought might interfere with the  handlers’ frequencies. (9) Bought and used neodymium magnets. (10) Bought a  2-way mirror to keep in front of PC monitor. (1) Many other objects, programs,  and devices. I spent several thousand dollars on those items and materials. (11)  Tried wearing a “cap” invented by a TI, which was supposed to lessen the V2K.  That invention was provided free of charge for testing. (12) Bought a  TV-advertised remedy for tinnitus at $160 (at this writing, the treatment has  not arrived). (13) Tried a free trial version of a “cap” composed of small metal  discs believed to counter the ESMC. It did not. (14) Bought a product called  Quietus, which is supposed to eliminate tinnitus. It cost $179 and did nothing.  (15) Purchased a small digital voice recorder to record the environment around  me, $118, and a LessEMF generator that is supposed to reduce electromagnetism,  $190.

– Experiments. (1) Walked the outside perimeter of  my house with small radio. If it lost its station and started buzzing, it was  supposed to mean that my attack was land based. The stations remained clear. (2)  Used ear plugs. (3) Exchanged a mattress with springs for one without them. (4)  Encased head with aluminum foil at night and wore a ball cap lined with foil.  (5) Turned several radios on at the same time tuned to different frequencies.  (6) Coated a cotton cloth with peanut butter, wrapped it in plastic, and wore it  over my head at night. (7) Took massive amounts of recommended vitamins and  minerals. (8) Took for about nine months a chelating substance called Detoxamin,  which cost over $1,000. (9) Constructed a Faraday Cage of chicken wire with an  outside copper grounding rod. (10) Made and used a blanket made of heavy  aluminum foil to sleep underneath. (11) Placed aluminum foil over the bedroom  windows. (12) Used two 3 volt watch batteries, the positive side taped to one  ear and the negative side, to the other ear, at night. (13) Deliberately exposed  myself to lightning during electrical storms. (14) Tried recommended isometric  exercises. (15) Turned off the main breaker at night, cutting off all  electricity within the house. (16) Placed ceramic tiles underneath my mattress.  (17) Used Dramamine tablets daily. (18) Bought Orgone blasters. (19) Bought  copper Brillo pads, unwound them, and wore the copper mesh under a cap. It  accomplished nothing.

Those efforts and expenditures yielded little  or no result. My advice to other targets is “save your time and money.” Several  web sites advertise electronic and other objects and machines that are supposed  to neutralize the electronic effects and mind control assault. In large part,  those sellers are opportunists who are making a load of money scamming desperate  victims.

Instead, I have learned to use my mind to  counter the electronic effects. I urge all targets to experiment with using  their own minds against their attackers attempting to capture their minds.  Scientists tell us that humans use only about ten per cent of their brains.  Targets must learn to develop parts of the remaining ninety per cent. Although  the electronic harassment no longer bothers me, the subliminal voices endure. I  have not yet found any satisfactory way of neutralizing those voices.  Nevertheless, they bother me less every day.

After reading about targets rushing to the emergency  room time after time because of the handlers’ electronic torture, I determined  early in my harassment situation that I would not follow that path. Instead, I  deal with the electronic assault and mind control and defy the attackers. My  guiding principle is “Whatever happens happens.” Be sure that a breakthrough  will occur that exposes how electronic stalking and mind control operates and  the evil persons behind them. As I often telepathically tell my handlers, “The  secret will come out, you bastards. Nothing lasts forever. And time is on my  side.”

Targets and Non-targets

Shortly after starting my journal, I began  researching the topic of ESMC and communicating with many other victims. Almost  invariably those victims, like I, had ignored signs of electronic stalking and  had not realized for a very long time that they were targeted. That is one of  the techniques that the stalkers use. The electronic torture and mind control  activities are “progressive.” Electronic and mind control stalkers begin very  slowly and gradually increase the intensity of the electronic and mind control  effects until finally they are too obvious for targets to ignore. Although many  of the effects are similar, they do vary from target to target. Many of the  targets, for example, do not hear the voices. Nevertheless, the voices are  there. (More about voices later.)

Targets include all races, ethnicities, both genders  as well as both same-gender sex preferences, ages, physical conditions, all  sizes and weights, religions and beliefs about religions, social backgrounds,  educational backgrounds, levels of I.Q., all types of philosophies and schools  of thought, both liberals and conservatives, occupations and professions, all  incomes or degrees of wealth (excluding the very wealthy), political thought,  all attitudes toward the government, all attitudes about war and peace, veterans  and non-veterans, and others.

I have studied many cases of TIs, looking for  commonalities among the targets. Here are several possible commonalities among  targets. There may be others.

  • Physically-invasive medical actions. All targets  have had some type of surgical procedure (either minor or major or routine),  shots and inoculations, or dental work. That may be indicative of complicity of  the medicine profession in the conspiracy of silent torture by remote.
  • Diversity. Some TIs believe that inventors and  researchers working under the auspices of the U. S. military and intelligence  establishment selected them for experiments carried out to test various  neurological and perhaps biological warfare patents and hypotheses. That belief  is not farfetched. Thus, the many differences that I find among the targets may  be purposeful. If those experiments are indeed being conducted on the American  population, the experimenters will want a diverse sampling of the entire U. S.  population. Diversity and variation are required for the validity of the  testing. The results of the experiments must reflect and rest upon tests  covering elements of the entire population.
  • Adopted targets. Quite a few targets who I know or  with whom I’ve communicated are adopted. There appears to be some  experimentation being conducted on adopted children versus natural children,  probably testing the environmental versus the hereditary theory.

Despite those possible commonalities named above, I  have found no one single common characteristic or condition among targets that  stands out. The absence of a principal commonality may be important, for it  either re-enforces the idea that a government uses the entire range of the  American population for experimentation or suggests that the attacks on targets  come from more than one single source.

Most of the targets are probably just ordinary  law-abiding citizens who mind their own business. However, other targets such as “whistle blowers,” dissidents, free thinkers, Survivalists, and others may be  considered threats to the system. There are probably even those targets who pose  genuine security threats. Other targets who in the past were not security  threats will become real security threats due to their torture as they are  driven unwittingly to commit crimes or commit them in  desperation.

Unfortunately, many ethics-deprived citizens,  particularly in the inner cities, have seen targeting as a way of making money  without working for it. Those people feign symptoms of targeting to be declared  mentally unstable. They are then provided state funding for the mentally  disabled. According to stories told by actual targets, those pretended targets  also sometimes become accomplices of the perpetrators.

There does indeed appear to be a national ESMC  program directed against homosexuals and lesbians in the United States, Canada,  and perhaps other countries. I believe that program is subterfuge, or deception,  on the part of the powerbrokers. The powerbrokers probably employ Radical Right  handlers to harass gays to confuse and distort the larger picture. The real  reason behind the ESMC is to wipe out any dissent against the powerbrokers, who  represent the U.S. Government, or the status quo. The principal targets are the  anti-government and the anti-Zionist elements of the population.

If experimentation is a secondary reason for  targeting, the powerbrokers perhaps choose targets who they believe might have  something to hide. They count on the skeletons in the closet to keep the targets  silent, a form of unspoken blackmail. A few targets have served time in prison  for non-violent crimes. Others have experimented with drugs. Many are closet  homosexuals. Those are not facts that targets likely want known. The handlers  count on that and instill further guilt to traumatize targets  psychologically.

Notwithstanding, I believe that the aim of the  powerbrokers is to “hook” the minds of the overwhelming portion of the American  population. Despite their minds being “hooked,” most Americans will not be  affected. Most of them will never be subjected to electronic torture and mind  control, for most Americans are compliant, non-thinking, pleasure and material  seekers. Nevertheless, being hooked means that they remain at the instant whim  of the powerbrokers. With the whole population placed under that system, the  powerbrokers can pick and choose targets as they please or as the situation  arises. That FEMA has established secret concentration camps throughout the  United States is no longer simply rumor. The occupants have probably already  been chosen.

ESMC is not peculiar to the United States. People in  countries all over the world are reporting electronic and neurological assaults.  Many Western targets live in Canada and the United Kingdom. In Asia thousands of  Chinese, Indian, and Australian targets are beginning to surface. Most African  countries appear to have few targets. Nevertheless, targets who travel to Africa  will probably continue to suffer the effect of their ESMC.

Strangely and perhaps suspiciously, the following  Americans appear exempt from electronic harassment and mind  control.

  • Congresspersons and high ranking U. S. Government  officials, including

ambassadors. Lower ranking employees and  ex-employees of government, however, are often targeted, especially “whistleblowers” and those discontented with the status quo.

  • Governors and other high ranking state-level  officials.
  • Clergy. However, members of Protestant  Fundamentalist, Roman Catholic, Jewish, and other churches often become targets.  Some of those victims complain that their churches may be involved in their  harassment.
  • Law enforcement officers. Although I have heard  obliquely of police officers being electronically assaulted, I have never  actually corresponded with or read a complaint by a law enforcement target. The  exclusion also applies to prison authorities, U. S. marshals, Border Patrol,  DEA, the entire U. S. intelligence community, including the Secret Service,  sheriffs, and sheriff’s deputies.
  • CEOs and very successful businesspersons.
  • High ranking military officials. On the other hand,  enlisted personnel are often targets.
  • The medical community. I have recently learned that  there are two doctors who claim to be targeted. I have spoken with one of them.  If they are genuine, they are indeed exceptions.
  • The wealthy. I have never known of a millionaire  having been victimized by ESMC. Most of the targets are middle-class workers,  small business owners, retirees, and sometimes financially- and  socially-marginal persons.
  • Judges and lawyers. The perpetrators know that  judges and lawyers possess credibility and also know the laws and would thus be  able to leverage law enforcement into action.
  • Persons with considerable expertise in radio and  electronics, who could perhaps eventually figure out what device is being used  and how.

There are two logical and plausible reasons why most  of those particular people are not targeted: (1) Those non-targets are a part of  the conspiracy, either directly or indirectly, and thus protected. (2) The  perpetrators know that those targeted groups would possess the intellectual  credibility and the power to command investigations of their attacks. Perhaps  some members of those groups are indeed targeted but have noticed no symptoms  that reveal that fact. If they are targeted, the handlers would make every  effort not to alert them to any tell-tale signs.

Foreign countries have attempted to influence U. S.  domestic and foreign policy for many years both directly and through domestic  political action committees (PACs). Several foreign countries now have the  capability to perform electronic stalking and mind control activities for that  purpose. Logically, those foreign countries will target the following Americans:  (1) the sitting president and possible candidates for the presidency; (2) key  members of Congress; (3) top U. S. military brass; (4) CEOs of large companies,  particularly those firms with defense contracts; (5) selected clergy; (6)  writers, producers, and media personnel; and (7) other influential persons. Can  there be any doubt, then, that our CIA-FBI and other intelligence services know  about electronic stalking and mind control and protect those probable targets  from that activity, especially those seen in Numbers 1-3?

Targeting Becomes A Way of  Life

An objective of the handlers is to cause targets to  focus on their targeting during every waking moment, either in thinking about,  researching it, or talking with other targets by phone and email about it. Such  is the all-consuming nature of the electronic and mind control assault that  targets mold their lives around it. Targets continually search for the  perpetrators, the methods used, and shielding that might protect them from the  ESMC. Doing so creates an obsession that permeates and dominates their entire  life. Indeed, their defense against ESMC becomes a way of life, a life style as  it were.

Target friends of mine wear padded clothing, aluminum  in their caps, and special socks and stockings. Most of them try to hide those  protective items; others wear them openly, thereby making them appear mentally  disturbed to unknowing viewers. They put up shielding devices in their abodes,  sometimes using metal sheeting, rubber coverings, and thick foam-filled objects.  They use a particular lighting system. They cover electrical outlets. They place  cardboard, insulated cloths, and other strange items over the floor. Some  targets use a special type of paint to cover their bedroom walls. No shielding  device to date has proved permanently effective against ESMC.

Many targets spend most of their waking hours writing  emails and messaging about their ESMC experiences and theories. I do not condemn  them for that, as they work zealously on trying to end their suffering from the  cowardly perpetrators. Nevertheless, that activity limits their ability to go on  with their lives and makes that endeavor the focal point of their lives,  practically isolating themselves, just as the perpetrators seek to do. Targets’ lives must maintain balance.

It’s often said that when schoolteachers get  together, they invariably talk about their academic life. The same truism  applies to targets of electronic and mind control assault. Whenever targets  visit each other, ESMC provides often the sole topic of conversation. That is  quite natural, for the only thing that many targets have in common is their  ESMC. In fact, ESMC brings together people who, were it not for that  commonality, would probably never meet.

It is impossible for targets to dismiss what is  occurring to them. However, they can control the extent to which they allow it  to affect their lives. Although I think about ESMC during all of my waking hours  and although I get the handlers’ V2K both when I’m awake and while I sleep, I  have determined not to let that outwardly affect my life. My house looks no  different from those of non-targeted people. I do not wear bizarre items either  at home or when I leave the house. I do not continually talk about ESMC even  with those few friends and family members who know about it. I continue with a  life style that is normal for me.

ESMC attacks often affect the target’s personal  hygiene. Many targets believe that the handlers can see them when they shower  and perform their bodily functions; thus, many targets will not disrobe  completely to bathe. My handlers tell me that they see me in the bathroom, which  automatically causes me to doubt that they actually can do so since they are  chronic liars. I laugh at them and tell them, “Well, hell yes you can see me,  you idiots. Anybody with eyes can see me. Here I stand in full view!”

Instead of spending the largest part of their lives  with developing or finding shielding and contemplating ESMC, targets might best  use that time (1) to strengthen family ties and bonds of friendship; (2) to  concentrate on their work, if they are employed; (3) to look for work if they  are not employed and are employable; (4) to engage in home improvement projects;  (5) to train their minds to concentrate on the positive elements of life, and  (6) to provide moral support to less fortunate targets. We targets must not  allow electronic stalking and mind control to become a way of life but rather  only one facet of our lives.

Triggers

Whether targets get only organized stalking or  electronic stalking and mind control, they all report the use of words, signs,  sights, smells, tastes, and other things that “trigger” certain emotions. The  handlers employ triggers as a part of their neurological scheme. For those  triggers to work, the targets first have to be sensitized, or pre-conditioned,  to them. Pre-conditioning to those triggers is probably accomplished through  hypnosis or the second layer of voices, the subconscious ones. Triggering is  purely psychological.

In my case, the handlers use names of people and  places to trigger emotions. They have also programmed particular locations  within the house to trigger those emotions. Those specific locations trigger  loop play tapes that are designed to evoke certain emotions, which normally  include suspicion of others, anger, doubt, sexual thoughts, and  others.

Some targets are triggered by colors, various forms  of lights, numbers, signs and gestures made by perp accomplices (and probably  innocently by other people), certain pictures and words on TV, car honking, and  a variety of other ways. To non-targets those triggers appear perfectly normal,  as they are unaware of the frequency and consistency of those triggers in  targets’ lives. Handlers consider triggering very important to their  psychological objectives by repeating the same themes. The Nazis used repetition  to condition the German people. The triggering reminds targets that they are  indeed targeted, that they are continually monitored, and that they are  powerless to prevent or stop the harassment.

Conditioning targets to notice and react to  triggering aids the handlers’ efforts to isolate the targets, for targets become  very sensitized to those triggers, making them suspicious of strangers and even  relatives and friends. Targets begin avoiding those people or act in very odd  ways around them. Thus, triggers play a psychological role in targets’ eventual  estrangement from society.

Some targets have had success in detriggering  triggers using the same psychology that the handlers employ. The targets  sometimes use the triggers intentionally very frequently to diminish the  emotional effect of them. Others use psychological “disassociation,” by telling  themselves repeatedly that there is no association between the triggers and what  the triggers are supposed to do.

The Perpetrators of ESMC

Many targets believe that the U.S. Government targets  U. S. citizens with electronic stalking and mind control for experimental  purposes. Although I do not doubt for a second that the government engages in  ESMC, either directly or indirectly, I do not believe that in my case it is  necessarily the U.S. Government. Here is why I say that. I have intentionally  conveyed radical and terrorist thoughts to my handlers that would have gotten me  arrested for questioning if they worked with the U.S. Government.

For example, I have “talked” (through synthetic  telepathy) to my handlers about blowing up cell towers, bridges, and other  infrastructure, about joining the Hezbollah or al Qaeda, about detonating a bomb  at a law enforcement convention, and many other alarming illegal and terrorist  activities. If my handlers were government agents, they would be obligated to  pass on that information, leading to my arrest under the Patriot Act. Yet, I  have never been approached by law enforcement or U. S. intelligence about those “plans.”

My research leads me to believe that my handlers work  for Israel, either directly or indirectly, though with the acquiescence of my  own government, for the handlers enjoy the protection of all levels of law  enforcement and government. The actual handlers may be a pro-Israel Christian  Fundamentalist group, a pro-Israel PAC or “benevolent society,” American agents  who willingly perform Israel’s missions in the United States, or other elements  of a Radical Right. Israeli agents and their accomplices operate within the  United States with almost complete freedom and impunity.

Targets often form an idea about who their  perpetrators by thinking back and “connecting the dots.” That is what I did.  Still, our opinions cannot be supported by fact, which is obviously the aim of  the handlers and their powerbrokers. In actuality, we have little proof about  the actual perpetrators of ESMC, or the perps, and how they operate. What we  think that we know is only conjecture before the courts. Nevertheless, logic,  research, and experience lead targets to their own conclusions. Here are  mine.

I believe that probably two different groups are  involved in “hooking” the minds of targets and carrying out the ESMC on those  targets. Those groups operate on two different levels.

(1) The first group represents national and perhaps  international leadership, or the powerbrokers. This group controls the device(s)  and methods used for that purpose and keep those devices and methods as a  closely guarded secret. That probably means that the high-tech and sophisticated “hooking” process belongs to the intelligence agencies and the military or to  those who are somehow connected with their operations.

The FBI knows about ESMC yet does nothing to stop it,  so it must necessarily be a part of the first group. The FBI field offices  doubtlessly form the nuclei for the fusion centers. Several cities and towns  fall within the region that comprises each fusion center. The FBI ensures that  the target is “hooked” and then turns him over to the nearest or most feasible  group of handlers along with the target’s files. The handlers are encouraged to  add to that information and use the totality of that data in their mind control  (V2K) activities. The head of each group of handlers answers to the field office  in whose jurisdiction his group falls. The handlers may be local or they may be  thousands of miles away.

The CIA is also doubtlessly involved in the first  group. On March 2, 2010, a story came out in the Washington Times that  suggests that the CIA is a loosely-run intelligence operations riddled with  corruption. In the article, a CIA communications-technology specialist named  Todd Brandon Fehrmann was trying to sell stolen high-tech CIA equipment to a  private individual. Those state-of-the-art items included “several handheld  spectrum analyzers — high-technology devices with military applications that can  measure and check cell-phone signals and equipment . . . .” The article quoted  Anritsu, the manufacturer of the devices, as explaining that “the analyzers have  several uses, including measuring cell phone base-station signals, mapping  signal strength to determine where to place antennas, base stations and signal  repeaters.” That type equipment could very obviously be used for electronic  stalking and mind control.

The members of the first group play only a leadership  role and are very few in number. The device(s) and methods used to “hook” targets’ brains to torture and exert mind control over those targets are a  closely guarded secret. Only high-level Federal officials in the intelligence  agencies, high executive branch officials, and the military would have knowledge  of and control over those device(s) and methods and be able to keep them secret  over a long period of time. Although most of the decision-making personnel and  many of the mid-level employees and lower level personnel in those organizations  know about the electronic and mind control devices and methods, they do not know  the precise instruments or how they work.

We do not yet know what devices and methods the  masterminds use to “hook” targets. In my case, the constant factor is the  tinnitus, which, since the inception of the current EMSC, has never faltered.  Although the tone occasionally changes, the ringing is always present. Thus, I  believe that there is a direct connection between the device that hooks – and  keeps the target hooked – and the tinnitus. Even the voices that I get 24/7 and  the jolts and vibrations and other physical effects are not continual; yet, the  tinnitus is.

However, after a target is “hooked,” he has to be  accessed somehow by the people who actually carry out the electronic and mind  control assault. The target probably possesses some object or substance in his  body peculiar to that person that allows the second group, or the handlers, to  locate him. That characteristic may be an identification number, much like  objects scanned in stores. Once hooked, the targets remain hooked. In fact, the  handlers probably cannot change the frequency and almost certainly cannot cut  off the frequency. Only the first group can do that.

Those persons who control the device(s) and methods  used in electronic and mind control assault are the “masterminds,” who probably  also select many of the targets found on the “hit list.” In addition to targets  that they place on the hit list, they probably add other targets recommended by  big business, “friendly” foreign countries, heads of religious groups,  high-ranking politicians, and other parties.  We know far less about the  masterminds than we do the second group, which actually employs the  ESMC.

However, make no mistake about it. The same person,  persons, organization, or government unit that have the power to hook a target  also have the finances and personnel to keep that target hooked for life. I know  of no target who has been freed from his ESMC torture. That continuity hints  that an organization rather than an individual calls the shots, as an  organization can carry out a sustained action over a very long period of time.  My handlers have told me, “We’ve spent a lot of money on you.”

(2) The second group consists of the rank-and-file  conspirators, including the actual handlers, who may be (a) ex-military and  military-connected personnel and (b) ex-law enforcement and their extra-oficio  employees on the state and local levels. The second group performs the actual  work on the targets once those targets are hooked. Their activity depends mainly  on the adroit use of computers and their software by the handlers as well as in  providing the V2K.

The second group makes few decisions. It is charged  with the responsibility of carrying out the electronic and mind control  activities. It employs the actual electronic effects and mind control assaults  on targets after the masterminds “hook” those targets. This group is very large  in number and varied in its make-up and modus operandi. Let us examine some of  those possible second groups, or handlers.

– Fusion Centers

In the last years of the Bush administration, the  Department of Homeland Security created “Fusion Centers” that “share information  and intelligence [with state and local organizations] within their jurisdictions  as well as with the federal government.” At this time (2009), there are about  sixty centers and plans to create still others. Those sixty centers probably  coincide with the sixty FBI field offices.

The heads of the field offices probably select the  sub-groups that serve as handlers. Those sub-groups then assign the actual  individual handlers. Only the heads of those groups have contact with the  authorities. The handlers themselves do not communicate with law enforcement and  intelligence agents.

The word “fusion” means melting together. The Centers  do indeed fuse units widely dispersed over the entire national territory of the  United States of America. Big Brother has you covered. DHS intelligence officers  operate in Fusion Centers in twenty-four states, including my state of  Louisiana, and also in the District of Columbia. Plans call for more than a  hundred federal professionals at those centers by the end of this year (2009).  Much of the communication between the DHS and the centers is classified “secret.”

– Infragard Units

Michael Rothschild’s article in the February issue of The Progressive called “FBI Deputizes Business” identifies businesses as  possible perpetrators of electronic torture and mind control. The article states  that the FBI formed a group of businesses called the Infragard in 1996 under the  Clinton administration (1992-2000) ostensibly to stem and PRE-EMPT any perceived  terrorist threat within the United States. The meaning of “terrorist threat” is  at best very vague and gives those essentially FBI-sponsored vigilante groups  the legal right to attack American citizens with absolute immunity. Law  enforcement not only permits those groups to operate but probably also assists  them.

A series of programs called “Conspiracy Theories” with Jesse Ventura aired over TruTV in December, 2009 and January, 2010 exposing  many shady dealings of the U. S. Government. One of those early January programs  dealt with the Infragard. Probably to offset much public criticism of that  organization due to the “Conspiracy Theories,” the Department of Justice started  a web page on the Infragard on January 14, 2010. As one might imagine, the  Infraguard operates under the FBI field offices as do the fusion centers. The  Infragard web site has a link that is supposed to pull up the locations of the  local chapters of the Infragard; however, when I tried to access those  locations, it would not allow me to pull up that page.

One of the pages of the Infragard Web site outlines  its Code of Ethics. Of the seven points made in the Code of Ethics, two of them  state that members will “not knowingly be a part of any illegal or improper  activities.” The last point reads: “Protect and respect the privacy  rights [underscoring is mine], civil rights, and physical and  intellectual property rights of others.” Thus, if Infragard members are involved  in electronic stalking and mind control activites, they clearly violate their  own code of ethics. Interestingly, there is no penalty, such as expulsion or  being legally charged with a crime, if members violate the code. Thus, the code  is meaningless.

I did some online research on the Infragard. Their  web page encouraged readers to contact them, so I did. Here is my  email.

Sirs: I have been a target of electronic  stalking and mind control activities carried out by unknown persons  by remote  for many years. Many fellow targets believe that members of Intragard may  participate in those  illegal activities although their code of ethics requires  them to respect the privacy and civil rights of other  citizens. Can you state  categorically that neither the Infragard nor its members conduct domestic spying  and electronic harassment on other American citizens? Thank you.

As the reader might imagine, I never heard back from  the Infragard.

Bush recognized the Infragard in his post-9/11 attack  on democracy as a key element in quelling any opposition or suspected opposition  to his regime within the United States. FBI Director Robert Mueller called those  civilian groups the “first line of defense.” It does not require a molecular  physicist to imagine the abuses that are certain to accompany any such para-law  enforcement program.

Many of those Infragard “businesses” are Fortune 500  firms, including companies that hold defense contracts with the U. S.  Government. Telecommunications providers such as AT&T, Verizon, and others,  the U. S. Postal Service, UPS, FedEx, and the satellite TV providers also are  often named by targets as perpetrator organizations. Other businesses are small  independently-owned companies.

The tentacles of the Infragard organizations reach  into the smallest towns and even into rural communities. In sparsely populated  areas such as many parts of the Deep South, Infragard probably depends on small  firms and businesses owned by ultra-conservatives and even “approved” individuals to spy on and exert mind control upon selected targets. The  Infragard’s weapons include monitoring targets’ computers and telephonic  communication, physically spying on and “investigating” those targets, stalking  them, interfering with their mail, monitoring the targets’ business and business  contacts, entering the targets’ homes in their absence, and vandalizing their  property.

The Infragard and the Fusion Centers count on local  groups and law enforcement to support the government’s increasing surveillance  of and interference with American citizens’ everyday activities. Those  organizations along with the FBI and other intelligence and law enforcement  operatives represent an overwhelming presence of Big Brother in the lives of all  Americans. Although surveillance alone does not constitute electronic and mind  control assault, it would be a simple matter to take constant surveillance to  the next step in parceling targets out to vigilante-type groups of trained  handlers for physical and neurological torture.

The FBI itself simply does not have to manpower to  provide agents as handlers. Moreover, the government has absolutely nothing to  gain from torturing people electronically. The FBI probably monitors only the  most serious “terrorist” threats and turns over other targets on the “watch  list” to its cooperating civilian groups. Psychological studies clearly prove  that many people welcome an opportunity to stalk and perform their evil on  helpless targets. Perhaps they get that opportunity through “helping” the FBI  and the intelligence community. Those citizen criminals doubtlessly get a “high” from their sudden empowerment to employ voyeurism, electronic torture, and mind  control on others by remote with complete anonymity and even protected by law  enforcement.

For the sake of argument, let us consider that the  FBI is NOT involved in electronic torture and mind control but knows about it.  If the FBI is unwilling to apprehend the criminals who perform the ESMC, they  might at least warn the American public about that activity as they often do  about identity theft and other crimes that are not nearly as serious. The fact  that they do not advise Americans of that criminal activity further clearly  indicates that the FBI has something to hide and is in fact deeply immersed in  that odious felony against American citizens on American soil.

– Department of Homeland Security

The DHS heads the fusion centers. It is probably also  deeply involved in the Infraguard program. It doubtlessly also uses FEMA for its  domestic spying.

The DHS organizational chart shows that it has a  military advisor, an Intelligence and Analysis section, a Science and Technology  section, and a National Cyber Security Center. The DHS thus contains all the  units that targets know figure somehow in our electronic stalking and mind  control.

Now for the part that should jolt awake every  American who cherishes his freedom of privacy, choice, and expression: One of  the mandates of the DHS is to develop and deploy “anti-terrorism technologies by  providing liability protections for providers.” In other words, the  scientists and other inventors and makers of equipment and know-how for carrying  out electronic and mind control activities cannot be sued or  prosecuted. How very convenient. Despite that presumed immunity, future  court cases will decide against it.

One need only look at the Department of Homeland  Security web site to learn their objectives and capabilities. Here are some  excerpts from that site in Homeland Security’s own words (the italics are  mine).

  • Homeland Security harnesses our nation’s scientific  and technological resources to provide Federal, state, and local  officials with the technology and capabilities to protect the homeland.
  • Research is designed to counter threats to the  homeland, both by evolutionary improvements to current capabilities and  development of revolutionary, new capabilities.
  • Homeland Security’s Advanced Research Project Agency “engages industry, academia, government, and other sectors in innovative  research and development, rapid prototyping, and technology transfer to meet  operational needs.”
  • The Department partners with universities to  bring together the nation’s best experts and focus its most talented researchers  on a variety of threats that include agricultural, chemical, biological, nuclear  and radiological, explosive and cyber terrorism, as well as the behavioral  aspects of terrorism. [This could mean the ESMC.]

Neighborhood Watch, Community Watch.

Those and similar local organizations have also been  increasingly used for gathering information about fellow Americans. Contrary to  their intended purposes, those groups sometimes operate as para-law enforcement  bodies to carry out their own interpretations of the laws. With the passage of  The Patriot Act, those sub-groups find it ever easy to stalk persons who do not  fit their ideas of the “norm.”

– Christian Fundamentalists

I am thoroughly convinced that Christian  Fundamentalists participate in electronic stalking and mind control. However, I  do not know whether those so-called Christians are acting alone or whether the  churches themselves are actually involved. I’ve corresponded with hundreds of  other targets, and in a great many of their cases, they mention a Christian  Fundamentalist preacher who they believe figures somehow in their ordeals. The  aim of that group appears to be a “social reconfiguration,” in which every  American is made to subscribe to their version of Judeo-Christian principles.

That so-called Christian element may also be involved  in my situation. Although ample evidence leads me to believe that the Israelis  and pro-Israeli Intelligence agents first targeted me, they have probably long  since turned me over to an extremist Right Wing group, probably religious nut  cases, for monitoring me with the full knowledge of pro-Israel FBI and perhaps  unwitting but compliant law enforcement. The Israelis are masters at getting  others to do their dirty work.

In recalling past events and connecting the dots  concerning my targeting, I remembered an incident in the fall of 2001 that could  connect the Fundamentalists to my present targeting. Here is the story. A former  high school classmate later became a “born again Christian” and a lay Baptist  preacher. Our high school group held a class reunion in 2000, and that classmate  began including me on a list of email recipients of a religious-oriented  newsletter that he sent out. A pharmacist, he had become financially successful  and he often traveled to Russia and other countries in his work as a  lay-preacher. The recipients of his newsletter were mainly very religious church  people, some of whom were well-off and well-connected.

At first I did not mind getting those round-robin  email messages. They usually dealt with the classmate’s trips abroad. Although  the content of his newsletter showed a very religious bias and, to me, indicated  a narrow-mindedness on the part of the writer, that did not particularly bother  me. Rather, I was pleased that the classmate had become financially comfortable  and had something in his life that he enjoyed doing.

The attacks on September 11, 2001 changed what  otherwise might have continued as simply a communications link between the  classmate and me. His next newsletter after that infamous event included an  inflammatory and extremely anti-Moslem diatribe from one of his sons condemning  the 9/11 attackers and Moslems in general. I felt compelled to answer that  statement, for not to answer suggested that I agreed with his beliefs.

Thus, for the first time after being included on the  list, I wrote back, saying that though I abhorred the deaths caused by the  attacks, I could understand the motive that drove the attackers. I explained  that the 9/11 attackers saw us as the enemy because of a shortsighted U.S.  foreign policy that always favored Israel against the Arabs. I stated further  that only Israel stood to gain from the 9/11 attacks, as it would cause us to go  to war against the Arabs and Moslems. That, of course, happened.

I received a vicious reply from that son in which he  practically equated me with Benedict Arnold. We engaged in two or three sharp  exchanges that were circulated to all of the names on the long mailing list.  Many of the addressees were well-known Christians, some of them with ties to  high-ranking office holders and other government officials. The writer’s father,  my old classmate, who obviously sided with his son’s views, accused me of using  his email newsletter to push my own agenda, while it appeared to me the  opposite. I reminded him that I had not asked to be placed on his list of  recipients but that as long as I was there I had to speak out against rhetoric  that was hateful, misleading, and uninformed. I asked him to remove my name from  his email addressees.

A short while after that I began noticing signs that  my computer had been hacked. I received an email over an additional email  account that I used from a person using a different given name but the same  family name. He left no doubt who he was. He wanted me to know that he had  illegal access to my computer. Yet, he was supposedly a devout Christian. Of  course, it is also possible that my real attackers made it appear that that  particular person was doing the hacking.

At any rate, my classmate and his family are “born  again” Christian Fundamentalists, who do not distinguish today’s Israelis from  the Old Testament Israelites. They identify very closely with Israel. Like other  Fundamentalist religious groups, they hold seminars in Israel at institutions  that they establish there, and they host group trips to the Holy Land. They  believe that the Israelis are God’s “chosen people.” The Church of Jesus Christ  of the Latter Day Saints is in the vanguard of those Protestants in its support  for Israel.

I do not mean to imply that the classmate and his  family may be my handlers, as I had already been targeted long before the 9/11  incident. However, that people of the Religious Right align themselves closely  with Israel means, in my opinion, that they could be used by that country for  its own purposes, even in the USA. Moreover, they are the type to report to the  FBI an email such as mine, which blamed 9/11 on the U.S.’s acquiescence to and  support of Israel’s schemes and policies against the Arabs.

Evangelist Pat Robertson is one of the best known  spokespersons for Israel and also one of Israel’s most devoted supporters. He  even made a trip to Israel when it invaded Lebanon in 2007 to provide  encouragement to the Israeli army. Readers may also recall that Robertson  suggested that President Hugo Chavez of Venezuela be assassinated. George W.  Bush is also a “born again Christian.” Many targets trace their ESMC to the  period 2000-2008, the Bush administration years.

Every facet of society in the United States of  America falls under the influence of Judeo-Christian theology. If you do not  believe that, watch programs such as Jeopardy on TV. References to events in the  Bible make up a large percentage of the questions asked the participants. Most  of our given names are of Biblical origin. Towns, counties, and churches take  their names from those found in the Bible. Much of our legal system is based on  Biblical law. Yet, we condemn Moslems for their theocracies. With an  overwhelming percentage of the population Christian, it is little wonder that  the powerbrokers take advantage of the Fundamentalists in furthering their  aims.

The Fundamentalists seemingly consider themselves  more patriotic than most American citizens. Although I had been monitored  probably by pro-Israeli government entities for years, my doubtful patriotism  and anti-Zionist views conveyed through my emails in the classmate’s newsletter  might have also triggered the inclusion of the Christian Fundamentalists in my  ESMC. As tools of Israel, they probably would not find targeting other Americans  for electronic and mind control assault inconsistent with their religious  beliefs.

Some researchers believe that the NSA’s aim is to “Christianize” the population through the voices conducted in ESMC. I believe  that conversion to Christianity is only a part of the overall plan to make all  Americans conformists and to wipe out non-conformists. Supposedly, Christians  will be more compliant with and less questioning of what the powerbrokers do and  the wars that they wage. Indeed, my handlers continually ply me with Christian  sayings and Bible references, scream at me that I am “going to hell,” tell me  that the Israelis are my friends, a real joke, and show me holographic images of  Jesus. That is either sickness or deception. It very well may be the latter, for  when I exasperate the handlers, which I often do, they lose their “Christian” demeanor to call me a “son-of-a-bitch” and curse and rant. I tell them that they  are about as Christian as an earthworm.

The Radical Right

Mary Mapes is a former CBS producer who broke the  story about the Abu Ghraib torture and other abuses. She was fired by CBS  because of the Far Right backlash after “60 Minutes” aired her story about  then-President George W. Bush’s draft dodging during the Vietnam War. As a  result of her expose, right wing Bush supporters – clearly an oxymoron – waged a  letter writing and internet blogging campaign probably unparalleled since the  advent of the internet. Mary called that group The Radical Right.

Such campaigns are not spontaneous; they are  orchestrated. I believe that Mary was correct about a Radical Right. However, I  also believe that it is used as a tool of the powerbrokers who seek to control  this country. The powerbrokers are probably unconcerned by many of the causes  that the Radical Right stand for. Yet, they meld those elements, some of which  are even at odds with other members of the group, into a formidable pressure  group for the powerbrokers’ ends.

Some, or perhaps even most of the various groups,  have legitimate purposes. Many, or perhaps most of them, may be well meaning.  However, they are duped or mislead into doing what they perceive is best for the  United States of America by the powerbrokers, who do not have the best interests  of the USA or its people at heart.

I believe that the Radical Right represents many  socio-economic and religious components, composed of the following: (1) many of  the Christian Fundamentalist churches, including the Latter Day Saints; (2)  Pro-Lifers, including many members of the Roman Catholic Church; (3) the  businesses that participate in the InfraGard, including the media and the  banking industry; (4) law enforcement on every level; (5) the intelligence  community, both domestic and foreign; (6) many PACs and civic organizations; and  (7) higher echelons of all three branches of government on the Federal, state,  and local levels, including the state attorneys general. That does not, of  course, mean that every member of those groups represents the Radical Right.  Although the membership includes Republicans, Democrats, Independents, and other  political parties, the guiding principles of the Republican Party probably  dominate.

An anomaly is the university system. Universities are  basically liberal in their philosophies. However, they submit to the  powerbrokers and the Radical Right due to the Federal funding that they usually  receive from one avenue or another. Moreover, many university science  laboratories work in conjunction with the powerbrokers in providing research  furthering biological and neurological warfare. More than eighty universities  and research institutes took part in the MKUltra program from the 1950s into the  1970s.

In my opinion, the Radical Right probably comprises  easily a fourth of the US population. Several characteristics of the Radical  Right give it power. First of all, it exercises control over the American  society through the influence of the executive, judicial, and legislative  processes. Secondly, it is highly organized. And thirdly, it reaches into the  farthest corners of the national territory. The aims of the powerbrokers may not  necessarily represent the aims of many groups of the Radical Right;  nevertheless, the powerbrokers largely call the shots.

The powerbrokers behind the Radical Right decide who  the friends and foes of the US are, and they also decide when, where, and how we  fight our almost continuous wars. They manipulate the stock market and control  the Federal Reserve Bank. They make our laws, including, for example, the  Patriot Act. They determine what we watch on TV and what we buy and  sell.

From a TI perspective, it appears that the overall  aim of the powerbrokers and their Radical Right is to fashion the US into its  own view of a Judeo-Christian society. That means eliminating all freethinkers,  whistle blowers, and liberal elements who pose a threat to those views.  Conformity is their final objective. There is to be no dissent.

However, since the US still supposedly operates under  a time-honored Constitution, the Radical Right has to pursue its goals in an  oblique manner not inconsistent with the written guarantees of that  Constitution; thus, the advent of organized stalking and electronic stalking and  mind control activities by unseen persons using unknown devices by remote that  increasing numbers of Americans endure and that others face.

A facet of that objective appears to be a type of “social cleansing.” In addition to those targets already named, other persons  engaging in family planning and abortion, in alternative life styles, in the  drug culture, in liberal causes, and ex-cons and those who are seen as  hopelessly disadvantaged, uneducated, and financially dependent are deemed “expendables.” I suspect that the entire American population is undergoing  systematic targeting by the powerbrokers to accomplish their objective. At their  whim and order, any citizen can find himself on the “expendable” list and  subjected to relentless electronic torture and mind control, the ultimate aim of  which is his complete neutralization, including death.

The Radical Right organizations appear to emphasize  the recruitment of members who are young, educated, and technically gifted. They  especially look for members who possess computer skills, a knowledge of  telephone and other communications, and a proficiency in electronics. Although  not requisites, members of the Radical Right are more likely than not  middle-class white males who are Christians or perhaps Jews. Others are not  necessarily excluded but probably find that they are subjected to greater  scrutiny than other members.

Four young men who recently (January, 2010) attempted  to compromise Senator Mary Landrieu’s communications system in her New Orleans  office probably typify the members who are recruited by the Radical Right  groups. The men, all in their mid-twenties, have close ties to powerful  Republicans, and two of them have connections with Israel. One of the young men,  who had performed ex-oficio services for the CIA, had spent time in Israel. The  four lawbreakers probably do not consider themselves either Rightists or  Radicals. Indeed, if asked about their political leanings, they would probably  call themselves Conservatives or Moderates.

In the Radical Right’s twisted concept of Utopian  society, the family unit is the basis. I believe that is one of the reasons why  the preponderance of ESMC targets, including many elderly people and divorcees,  are single. Moreover, single people and those living alone are more vulnerable  to the powerbrokers’ electronic and neurological weapons and probably more  easily managed.

Once those “undesirables” are hooked, the  powerbrokers seek to either brand them as mentally incapable or cause them to  commit suicide. In either case, they are neutralized. If either one or both of  those efforts fail, the victim, or target, will be hounded until he loses his  job or livelihood, becomes financially insolvent, and bereft of options  concerning his future. At that point, once prostrated, if the target is  considered recoverable and worth the effort, he will undergo a sustained “re-education” program through electronic stalking and mind control  methods.

The recent economic crash may not have been  altogether unforeseen, unplanned, and unpreventable. The crash plunged millions  of middle-class Americans suddenly into bankruptcy and financial ruin. Imagine  the opportunities presented to the powerbrokers either to neutralize or  re-educate many of those people who currently do not subscribe to the  Judeo-Christian concepts of the Radical Right.

My handlers often tell me subliminally, “That  hardheaded son-of-a-bitch does not understand what we’re doing.” I reply  subliminally, “Oh, yes I do understand what you’re trying to do, you sorry  bastards. I understand all too well. That is why I live to bring you sacks of  shit down.”

I intend to be one of those incorrigible subjects who  will not bend under any circumstances. The Great Spirit accepts me for who I am.  That is who I intend to remain – for as long as I live. I know that I am an  obstacle to their objective, and I am very proud of that fact.

I have already learned how to ward off the worst of  the handlers’ electronic attacks; I shall soon learn how to eliminate the V2K. I  want to be among those who finally expose the cowardly and evil electronic  stalking and mind control apparatus and bring it crashing down with a thunderous  thud on the heads of the handlers. That will most definitely happen. I often  tell the handlers, “Time is on MY side.”

A “Master Plan”

One morning in early 2010, the handlers said  something to me through their synthetic telepathy about a “master plan.” As  usual, I laughed at them and ridiculed them, telling them that I had no interest  in a master plan. One of the handlers whom I call Shitface insisted, “You don’t  understand. YOU are a part of that master plan.” I laughed again and replied, “I  also have a master plan, and you are NOT a part of it.”

The handlers were probably engaging in their usual  deception and lying when they talked about a master plan. On the other hand,  there may be a group or groups in the United States that seek to establish a  sick version of Utopia in which many people will be excluded. Electronic  stalking and mind control may be the vehicle for the genocide required to  establish that homogeneous society. If that is correct, the master plan will  almost certainly be a United States of America governed by the Radical Right’s  Judeo-Christian teachings.

Does that sound too right winged to be true? Not  really. I know Evangelicals who, I am sure, would welcome the creation of a  Fundamentalist Christian-type government theocracy in the United States similar  to those in the Islamic republics. You probably do, also. Is there a movement  afoot to put such a master plan into effect? If so, such a theocracy would  almost certainly exclude Moslems, Buddhists, atheists, agnostics, and perhaps  Roman Catholics and Orthodox Jews on religious pretexts. On the social level, it  would probably also exclude divorcees, lesbians, homosexuals, welfare  recipients, the very poor, social activists, and any other person who poses a  threat to their intended master plan.

Dual Electronic Stalking  Systems

I believe that the U. S. Government does target  Americans for experiments and other reasons. Indeed much existing and emerging  information supports that belief. However, after many years of victimizing  Americans through the military, intelligence community, the FBI and other  Federal agencies, perhaps the penal system, and probably approved research  institutes, the powerbrokers may have lost control of that secret means and  methods. Today those device(s) and methods have probably fallen into the hands  of other elements who pursue their own agendas. Thus, there is a dual, or  parallel, system of electronic stalking and mind control that pervades the USA,  on the one hand the U.S. Government and on the other hand, rogue elements of  various types.

Moreover, I believe that high officials in the U.S.  Government “approve” various people to be “sold” or let out to various groups,  companies, and even countries. This is not an official government action but one  made by top persons in the government privy to Top Secret projects. Those whose  names are on the secret list can be experimented upon, tortured, or otherwise  neutralized.

Use your reasoning ability. Why do the FBI and other  law enforcement and intelligence agencies refuse to investigate targets’ complaints of electronic stalking and mind control? I suggest that they cannot  investigate targets’ claims of ESMC without taking the risk of exposing their  own program of ESMC. Thus, the governmental powerbrokers  instruct law  enforcement, state attorneys-general, and others not to interfere. In the  meantime, the non-government forces’ use of electronic stalking and mind control  has proliferated. Today various non-government groups and organizations probably  cooperate loosely with each other to carry out their own objectives and to help  each other using the secret device(s) and methods.

The non-government groups are probably Far Rightists.  As U. S. demographics change and minorities become more visible, as gay rights  and abortion rights groups get increasing recognition and power, as generational  have-nots become more restive, as white collar and other criminals get more  daring, as the disparity between rich and poor grows wider, radical groups have  formed to seek to maintain the status quo. It is always the ultra-conservatives  and radical rightists who wish to slow down social, political, religious, and  economic change.

Despite the oratory skills and the liberal leanings  of the current president, it is an inescapable fact that the executive and upper  echelons of government represent the powerbrokers. In addition, the  non-governmental abusers of Americans’ rights also represent the powerbrokers.  Any way that a researcher views the situation, he will probably conclude that  the powerbrokers that represent one group or another sponsor both the government  ESMC program and the non-government rogue ESMC programs. This means that the  proliferation of electronic stalking and mind control can be viewed as a  conflict of social classes, with the shrinking middle class and the growing  lower income strata pitted against the powerbrokers and those whom they  approve.

The Executive Branch and the  Constitution

Every U. S. target of electronic stalking and mind  control and many non-targets know that American civil and human rights have  deteriorated in recent years. The erosion of those rights appears to be in  direct proportion to the growth of power of the executive branch. This paper  does not purport to provide a history of the evolution of our Constitutional  government; however, I believe that I can make the case that the Constitutional  checks and balances system contrived by our Founding Fathers no longer works.  Despite the best efforts of the founders of this nation to institute a  government composed of three equal branches, the executive branch by the  beginning of this century and this millennium had managed to achieve dominance  over the other two. There is no longer a balance of power.

Historically, the executive branch contains some  powerful elements that allow it to gain dominance over the remainder of the  government: The President heads the Armed Forces and through his appointees  supervises the intelligence and Federal law enforcement agencies, which include  offices that operate in secrecy with no supervision from Congress; he liaises  with heads of foreign governments, including the United Nations; and he  interacts directly with universities, research institutes, and manufacturers and  contractors for the government. He also is the boss of a plethora of unelected  personnel that run the government regardless of what party is in power (although  Civil Service discourages the patronage system, it also builds and perpetuates  power). In recent years, the President’s power to pardon has become a powerful  tool of that branch.

The size of the legislative and judicial branches and  their aides has remained relatively constant. On the other hand, the executive  branch has grown into an insatiable monster, employing millions of people,  either directly or indirectly, in scores of agencies, bureaus, and offices. The  executive branch is today one of the largest employers in the United States.

The takeover of the executive branch did not happen  overnight. The powerbrokers have very often used war or the threat of war as a  pretext that allowed that branch to rise above the remaining two branches and to  reduce or eliminate rights guaranteed to Americans under the Bill of Rights. The  attack on the Twin Towers caused Congress to give George W. Bush unprecedented  powers. Once again, this paper is not a primer on American rights. However, to  make my case that presidents have striven to strengthen the executive branch and  curtail American rights, I offer a few illustrative points about several chief  executives.

Woodrow Wilson (1912-1920)

  • Started a secret group called MI-8, or the Black  Chamber, the forerunner of the National Security Agency (NSA). That organization  spied on “friends and foes alike.”
  • During WWI, Congress passed the Espionage Act in  1917 and the Sedition Act in 1918 to discourage opposition to the war. In its  September 2006 internet edition, the UT [University of Texas at Austin] Watch  called those acts “the most serious attacks on the civil liberties of Americans  since the short-lived Alien and Sedition Acts of 1798.” UT further states:  Wilson tried to strengthen the Espionage Act with a provision giving broad  censorship powers directly to the president.
  • Wilson allowed his postmaster general to use “his  new censorship powers to suppress all mail that was socialist, anti-British,  pro-Irish, or that in any other way might, in his view, have threatened the war  effort.”
  • Wilson established The Creel Committee on Public  Information, which asked all Americans to “report the man who . . . cries for  peace, or belittles our efforts to win the war.” Send their names to the Justice  Department in Washington.”
  • A 1995 UT Watch report sums up the Wilson  administration’s American rights record: “After World War I, the Wilson  administration’s attacks on civil liberties increased, now with anticommunism as  the excuse. Neither before nor since these campaigns has the United States come  closer to being a police state.*That summation was written, of course,  before the events of September 11, 2001.

Franklin Roosevelt (1932-1945)

  • As early as 1939, Roosevelt allowed British agents  to wiretap Americans who were believed to be aiding the Nazi cause.” (The War  Years: Part 1, The Failure of the FBI)
  • Afraid that the U.S. would be drawn into the war in  Europe, Congress passed the Neutrality Act. Yet, despite the intentions of  Congress, FDR conspired with Winston Churchill to undermine the Congressional  act and restrict American rights.
        • Once the U.S. entered the conflict, Roosevelt issued  Executive Order 9066, which incarcerated Japanese citizens. The wording on that  order carefully avoided its real purpose, stating that the Armed Forces could  designate military zones “from which any or all persons may be excluded.”
  • Later, Roosevelt inspired the formation of the  National Committee for Religious Recovery, which allied business and religion  against the threat of Communism (thus, providing a precedent for President  Clinton’s Infragard).
  • Roosevelt’s Director of the FBI J. Edgar Hoover put  specified American citizens under surveillance and created secret files on many  citizens.
  • Approved the development of the Atomic Bomb, a  secret kept from even his vice president as well members of Congress.

Harry Truman (1945-1952)

  • Created the National Security Agency, believed by  many targets to be the government unit responsible for most of the electronic  stalking and mind control.

William J. Clinton (1992-2000)

  • Established the Infragard, using businesses and  other Americans to spy on Americans.

George W. Bush (2000-2008)

Little needs to be said about the usurpation of our  rights under Bush. Reeling from the surprise attacks of September 11, 2001, the  legislative branch, the Congress, capitulated to the executive branch when it  passed the Patriot Act, giving the President unprecedented and unrestrained  powers. The language of that act was vague enough to allow the President total  leeway in waging the so-called War on Terror. There was not one single  limitation on the President’s power in those statutes.

For almost five years, under the ubiquitous Patriot  Act, Bush’s team acted legally in carrying out their illegal activities. Then on  August 17, 2006, a lone and little-known United States District Court judge  challenged his power. Without going into the circumstances, I shall simply quote  from Judge Anna Diggs Taylor’s decision, as seen in Anthony D. Romero’s In  Defense of Our America: “It was never the intent of the framers [of the  Constitution] to give the president such unfettered control, particularly when  his actions blatantly disregard the parameters clearly enumerated in the Bill of  Rights. The three separate branches of government were developed as a check and  balance for one another.” Judge Taylor ruled that not only did wiretapping  violate the principle of the separation of powers but it also clearly conflicted  with Amendments I and IV.

The judge’s ruling was aimed at the presidency but it  applied to all areas of law enforcement on all levels of government. Several of  the Amendments of the Bill of Rights deal with violation of individual and  personal rights under the Patriot Act: I (freedom of speech), II (freedom from  unlawful search), IV (full faith and credit), V (due process of law), VI  (accused to be informed of the nature of his crime), VII (trial by jury under “the rules of common law”), VIII (cruel and unusual punishment), IX (other  rights not spelled out are not to be abridged). Among the latter would be the  freedom of privacy of thought, of which targets who receive the handlers’ mind  control effects have been totally deprived. The Supreme Court and other courts  have remained strangely mute in defense of our personal rights.

In December, 2005, Bush addressed the nation on that  issue, acknowledging that activity. Understandably, Attorney General Alberto  Gonzales vigorously defended the administration’s illegally spying on Americans.  Since then, little has changed. In effect, the executive branch stood down the  judicial branch and won. It is not that the Constitution has failed; it is that  it has been ignored and undermined by power-hungry factions both inside and  outside the Federal Government.

Judge Taylor’s decision had no effect on the excesses  of the Bush administration. Two years after Judge Taylor’s “cease and desist” order, Bush on July 17, 2007, signed an Executive Order that allows Federal  authorities to seize assets of dissenting citizens who “directly or indirectly”  hinder Bush’s Iraq War agenda. If Bush’s tactics against war protestors were not  a sufficient threat to American rights, on October 23, 2007, the House of  Representatives passed legislation called “The Homegrown Terrorism Prevention  Act,” which allows law enforcement to arrest individuals whom they suspect hold  radical ideas BEFORE they “turn violent.” With powers that broad, it is not  difficult to perceive that they also allow using high-tech surveillance and  neurological weaponry on those targets to determine whether they are violent or  about to turn violent.

Subsequent legislation such as the Cybersecurity Act  of 2009, which gives the executive branch the authority to spy on citizens’ email and other communication, has given Bush’s successor increasing power.  Under President Obama, the takeover of Americans’ personal rights is complete.  The executive branch is winner over the other two branches when it pertains to  the “protection” of American rights.

In civics class many years ago, I learned that the  executive branch only enforced the laws passed by the legislative branch and  interpreted by the judicial branch. Yet, many of our personal rights have been  curtailed merely by “executive orders.” Although I am not a Constitutional  lawyer, it appears that executive orders can only apply to the executive branch;  otherwise, they encroach upon the powers granted to the other two branches of  government. Yet, the president continues to churn out “executive orders” that  have comprehensive applications.

All Presidents apparently believe that the American  people should trust them in taking the necessary actions to protect them. We have trusted them. The result is that we have traded the protection of  our bodies for the loss of our rights. It is ironic that my handlers tell me  subliminally on a daily basis, “Trust us.” Yeah, sure.

The Actual Handlers

The handlers themselves are only trained hirelings,  perhaps ex-government employees and Far Righists. They do not know the  intricacies of how targets are hooked; they only know how to carry out the  techniques of electronic torture and mind control on the targets. If handlers  work under the aegis of the FBI, as many targets believe, they probably will  have security clearances and will be sworn to secrecy. That probably means that  if the perpetrators use civilians, those civilians are retired law enforcement  officers, ex-military, and ex- and retired local, state, and Federal and state  government employees. The civilians will probably be deputized as Federal  Marshals, Special Agents, or given some such title.

The handlers who think that they control my life have  told me subliminally that they are protected. Indeed, under the Patriot Act, those deputies would not be subject to prosecution. However, once tested  before the court, that provision of the Patriot Act will almost certainly be  struck down. People cannot be deputized to break the law before the fact on  peers who have not been charged with a crime. The test case will probably go to  the Federal District Court or even to the Supreme Court before it is finally  decided against the handlers. That may be the break that targets look for in  determining who is doing the ESMC and how.

Handling targeted individuals has actually become an  underground occupation. Handlers are selected on the basis of their proven  loyalty to the hierarchy (ex-military and ex-police), potential years of service  (although probably retired, the handlers must be young enough to produce for a  number of years), their various professional qualities and capabilities  (specialists in computers and electronics, agents with previous psychological  operations, or psyche ops, experience, and telecommunications engineers), and  their psychological profiles. In some cases, religious leaders may be selected  for their Right Wing views and then trained and sworn to  secrecy.

Moreover, the handlers do not work casually in their  off-hours; their work is full time. Why do I say that? Well, because each shift  of handlers has to advise the other shifts about what they did to the target and  what his actions and reactions were. That requires much coordination among the  shifts. The off-duty shifts must either listen to the recordings or watch the  videos of the preceding shifts so that no gap will occur in the continual  psychological harassment of the victims. Nevertheless, they will sometimes goof.

For example, knowing how close I am to my little  granddaughter – I babysat her the first year of her life — my handlers  continually tried for months to convince me through the V2K that my son, her  father, was molesting her. Then, months later, another shift of handlers told me  that my son was going to heaven but I was not! Some inconsistency! So, you see  their work is full of imperfections. Through our two-way subliminal  communication, I call the handlers “the f—k ups.” One of the handlers recently  told me that I had cost them “a lot of money.” I laughed and told them I was  only beginning, that I was not only going to break them but was also going to  bring them down.

Handlers for the most part are of only average  intelligence – and sometimes far below average – and largely uninformed. They  are recruited from Far Right groups that believe in their twisted manner of  thinking that they are somehow aiding the USA. Although they are paid for their  services, they perform their sadistic activities with fervor. Most of them have  probably been duped into believing that they are performing a public service in  carrying out their criminal activities.

In my particular case, the handlers are obviously of  Deep South origin and possess very limited intellectual capacity. If they are  not from my locality, they are from a very similar locality. Whenever I ridicule  them mercilessly, which is frequent, they very often retort in childish manners.  They cannot digest what I say and reply quickly and cleverly. Perhaps they  believe that since they are the unseen attackers, they have a decided advantage  over me. Indeed they do. However, I go about my life in the same way that I  always have without letting their electronic and neurological outwardly affect  my life.

When handlers are selected and hired, they are  advised that their job is for life. They take an oath, which includes swearing  not to divulge their operations at any date and giving their complete fidelity  to the “system.” They are permanent employees in the most literal sense. Thus,  some of the handlers who began their work decades ago will probably already be  in their seventies by now, perhaps even in their eighties. Since it is very  difficult for handlers to do their work without their spouses’ knowledge, the  spouses are also very often hired as handlers. In other words, there are almost  certainly many husband and wife teams of handlers. I believe that entire  dysfunctional families may be recruited as handlers.

The handlers’ earlier experience and their training  after their selection prepare them to carry out their work systematically and  perfunctorily without any touch of human emotions. Their work is work. Like  murder-for-hire killers, the handlers carry out their assignments. Allowing any  emotion or empathy for their targets to enter into their work would emasculate  their mission, which is to neutralize the target totally – one way or another.

My observations and journal notes suggest to me that  there may even be two groups of handlers who perform two different functions:  (1) One group may focus the electromagnetic device(s) upon and around the  targets while (2) another group performs the electronic effects and mind control  activities. The second group would provide the voices through the V2K that many  targets receive. The two groups would work together, probably using cell phones  for communication. The first group may be located very near the targets. Some of  the instruments capable of physically harming targets have ranges of up to a  mile and a half. The V2K from the second group could come from either many miles  away or from nearby.

The handlers must necessarily work in teams, and the  members of those teams will not change, for they depend on continuity to  capitalize on their knowledge of the target — his contacts, his business  affairs, his behavior pattern, and his thoughts. A team will consist of at least  six handlers working three eight-hour shifts. In rare cases, there may be only  one handler per shift using recorded tapes and other programs to make it appear  that there are many persons involved. In many cases, there are a larger total  number of handlers working shorter shifts of four to six hours each.

I now feel certain that the groups of handlers, at  least in my case, probably operate in shifts from several areas many miles  apart. One of those groups, probably a local one, has the major responsibility  for harassing me. All of the groups of handlers probably watch my activities and  communicate with each other perhaps by closed circuit TV, cell phone, or some  other means. The several groups of handlers are chosen to cover every phase of a  target’s life. Through interviews with people who know my family and from  extracting my memories, they have intimate knowledge of the rural community in  which I was raised, which is located in an adjoining parish, and they also know  about my entire family.

There is also at least one member of my handlers who  is Spanish speaking, as I speak, read, and write Spanish. The Spanish used in  that group is not translated Spanish but spoken Spanish. It would make sense in  my case for one group to know Spanish, for I lived for years in Latin America.  The handlers give each target an identification code name. Because of my  familiarity with Latin America, mine is “Estados Unidos” (United States). They  may also be trying to make me believe that my attackers are  Hispanics.

To cover all aspects of my life, which the handlers  have admirably done – I reluctantly give the evildoers that credit – would  require groups familiar with: the community in which I was born and spent the  first fourteen years of my life; with the Washington, DC metropolitan area; with  my university studies; with my career and the colleagues with whom I worked;  with my military record; and with the countries in which I had lived and the  languages used in those countries. The handlers with that knowledge could not  possibly be gathered into a single group. Therefore, I am reasonably sure that  several groups act in consonance by remote. The coverage provided by the  round-the-clock handler groups probably explains why I get no obvious  neighborhood stalking.

Using deception, the handlers will attempt to  convince the target that the ESMC network is far broader and more influential  than it actually is. Their voice simulations and recordings give targets the  perception that at least three or four handlers are present at all times;  whereas, oftentimes probably a single individual is manipulating the simulated  voices. Moreover, if the target receives the voice-to-skull (V2K) talking from  the handlers, the handlers will take credit for any negative event that happens  in the everyday life of the target though many of those actions are simply  natural occurrences. Using the computer software, the handlers will also try to  appear far more intelligent and informed than they actually are.

Rapid communication is indispensable to the handlers  and their accomplices. That probably means that they use cell phones or  walkie-talkies, which are very mobile. In addition, the handlers and their  helpers make heavy use of the internet for their criminal activities. A photo is  made of the target before or early in the harassment process, and that photo is  circulated in round-robin fashion over the internet by email. Everybody who uses  the internet knows how that works: Photos of the targets, including pictures of  his vehicle and house, are sent by accomplices to all of the addresses on their  email accounts. Those addressees in turn send the same message to their list of  addresses. It exponentially widens until literally thousands of people have  received the message with the photos. That internet network works marvelously  for the handlers, for wherever the target goes, he is recognized and  harassed.

There is a psychological impetus behind the group  effort to harass the target. Many of the participants, or secondary accomplices,  are persons just “having a little fun. Many people who often use the internet  and who have time on their hands seize the opportunity to participate in a  harassment scheme. It is exciting for them. It gives them power. To some  participants, such an action stimulates them sexually. They do not ponder the  effect that their actions might have on the target. Moreover, the handlers will  have disseminated scandalous rumors about the target along with the photos.  Enlisting unwitting accomplices in an internet harassment scheme is far easier  than most targets imagine.

My handlers have attempted through their 24/7 voices,  or V2K, to make me believe that they represent particular groups. First, they  pretended to be Christians. In addition, they have purported to be  extortionists, law enforcement, vigilantes, the military, various ethnic groups,  political groups, and other people and organizations. The handlers often tell  targets that they are CIA or FBI. If that happens, it is absolutely false. If  the CIA and FBI were involved in electronic stalking and mind control, they most  certainly would not divulge that to the targets.

Handlers utilize their mind control methods at  maximum efficiency at night once targets go to sleep. Thus, I believe that the  best-educated and most knowledgeable handlers and those who are most adroit at  using psychology probably operate on the night shift. The day-shift handlers are  probably much more proficient in dealing with matters involving the professions,  trades, and occupations, i.e., everyday activities of the target, than they are  at exercising mind control.

It is very important for all handlers to know  everything possible about the target. Thus, members of the handler team will  know each other well, and they will discuss the targets among themselves.  Handlers may even consist of husband and wife teams or several family members  working together. There is evidence that the handlers can operate from several  different locations in consonance with each other; however, if that is true, one  of the handlers in one of the locations must operate the super computer that  performs much of their electronic and mind control functions.

The handlers’ psychological harassment can be  effective only if they also know what family members and friends think about the  targets. Therefore, they may indeed also “hook” the minds of those people  surrounding the targets. If not, they will directly and indirectly devise ways  to talk with those family members and friends to pry information from them. I  have seen much evidence of that from things that the handlers have said.

One of the handlers who does the V2K on me is a  female whose voice sounds much farther away than the others. That, of course,  could be deception through sound distortion. Moreover, it may be a recording, as  the handlers very often play recordings. The handlers may not necessarily know  all of the accomplices who assist them in neighborhood stalking and other  activities. The accomplices are probably contacted by cell phones using codes to  advise them of the target’s location and to advise them of their  tasks.

The handlers’ operational sites will probably differ  from locality to locality, depending on the identity of the handlers. If  renegade or regular law enforcement are directly involved, secure departments of  police stations and sheriff’s offices may be utilized. As law enforcement  facilities operate 24/7, round-the-clock activities by handlers would go  unnoticed. If individuals outside of law enforcement work as handlers, their  operational sites may be located in safe sections of churches, businesses,  communications providers’ facilities, and private residences.

Every TI knows that his handlers are professionally  trained in the application of their electronic torture and mind control methods.  The entire electronic stalking and mind control scheme took years in the making  and involved experts in many fields. Handlers will be completely aware of the  importance of psychology in torturing the victim. It is abundantly clear that  psychologists and psychiatrists had a hand in developing those skills and  training those handlers. It is known that that group assisted the CIA and the US  military in developing interrogation and torture methods used against Guantánamo  detainees, a program approved by The American Psychological  Association.

Handlers are well trained in operating the various  mind control and electronic torture computer programs, in psychology and human  behavior, and in interrogation techniques. They are also briefed about the  targets and either provided written information about the targets or allowed to  take notes on them. Details used by handlers in mind control on the targets  would be impossible to remember without recording them in some manner.  Information revealed by handlers show clearly that they have access to  government and other files on the targets.

I’ve recently come to believe that at least one of  the handlers is either in the medical field or has been given some training in  physiology. I can feel some device (call it laser for the moment) probing  certain areas. The operator is looking for the sciatic nerve, various optic  nerves, the urethra of the penis, certain organs, particular muscles, and other  key areas on the body. That person probably uses a type of dial or pointer to  ferret out the exact spot on the target’s body that he wants to affect.

The handlers use a combination of specialized  computer software along with subliminal talking to accomplish the mind control  portion of ESMC. Neither the computer software nor the subliminal talking alone  can conduct mind control. First, the software programs must be employed for the  handlers to detect lying, force targets to tell the truth, register their  emotions, and “soften” the targets. Then, with the aid of the software, the  handlers interrogate and continually ply their vicious hateful drivel through  the voices, or V2K. Continuity is very important in carrying out mind control.  The idea is to give the targets no respite from those activities. Their aim is  to wear them down. They often do, and many of the targets commit suicide.

Once the targets’ conditioning has been achieved, the  handlers begin “mining” the victims’ thoughts and memories by asking questions,  staging holographic scenarios for the target to act out, projecting pictures and  images before the target to pick his thoughts about them, inducing dreams in  which the target interacts with known and unknown other people, listening to his  natural thoughts, and eavesdropping on his conversations with others. Through  local accomplices, the handlers will locate old friends and relatives of the  target and through guile and misrepresentation will extract information about  the target. No area or time period in the target’s life is left untouched by the  interrogators. The handlers will “mine” those thoughts and memories for the  slightest bit of information that will allow the handlers to manipulate that  individual. The handlers, or interrogators, are trained to apply psychology .

A paper on the NSA’s interrogation techniques gives  an example that explains the interrogation process and mind probing much better  than I.

The subliminal message delivered to you could be “Mr.  Jones, imagine that

the IRS were auditing your taxes. Think back to a  time you have cheated on

your taxes and that you are worried that the IRS  might find out in an audit. If

you have never cheated on your taxes and have nothing  to fear you will feel

an itch on your right-hand ear lobe that will go away  when you scratch it. If you

can be caught by an IRS audit, you will feel an itch  in the left nostril of your nose

that will disappear after you itch [sic] it twice.”  From your perspective, you have just had a fleeting thought about your past  tax returns and had an innocent itch

(thought label). To the NSA On-Duty Officer (ODO), or  interrogator, you have

just communicated to him whether you have ever: 1)  cheated on your taxes,

and 2) If the IRS could catch you in an  audit.

If the target’s thoughts indicate that he has cheated  on his taxes, the interrogator will delve more deeply into the matter to  determine the item, date, and amount. The next step is for the interrogators to  pass that information to a higher agent, who will advise higher-up officials in  the IRS. That official in turn will order the appropriate IRS office to audit  the target’s tax return for that year. As a result, the target is likely to be  heavily penalized and perhaps even imprisoned for tax evasion. That target has  then been discredited by having to pay a large sum to the IRS or being made a  felon. The target is effectively neutralized.

In applying their neurological methods, the handlers  will tell the targets stories about events in their early lives (which they  probably gather primarily from the targets’ own thoughts). They will know every  friend and acquaintance of the target, every relative, and every enemy. They  will know the target’s foibles and his virtues, his prejudices and his ideals,  his likes and dislikes, and his fears and strengths; his religious beliefs and  how strongly he holds those beliefs; how he feels about the government and the  government’s leaders; his income, his investments, his net worth, the banks that  he uses, his bank account balances down to the penny, his usual expenditures,  including his utility and other accounts, his credit card numbers and the card  balances and payments, and how he spends his money.

They will also have copies of the target’s FBI and  Army records, his education records from Kindergarten through high school, and  his college/university transcripts. They will know his sexual preference, his  sexual habits, his sexual hang-ups, his sexual potency or impotency, and any  sexual indiscretions. They will know what social clubs, political organizations,  bars, restaurants, and churches that the target attends. They will know the  people whom he visits and who visit him.

Handlers are not chosen at random. Although computers  can mimic accents to a certain extent, the effected speech will not be perfectly  authentic. Thus, the handlers chosen will have total familiarity with the  target’s area and will know the sayings, the expressions, and the vernacular of  that locality. My handlers speak with an exaggerated Deep South accent. That  handlers fit that mode does not necessarily mean that they will still live in  and operate from that area; their locations are yet to be  determined.

The backgrounds and educational levels of the  handlers will also often approximate those of the target. I come from a rural  background; thus, my handlers have a general knowledge of farming, crops, and  rural life. They also have knowledge of carpentry, plumbing, drywall  preparation, electricity, and other skills, as I am often engaged in home  improvement projects. However, the handlers will try to give the target the  impression that they know much more about his environment and work than they  actually do. Handlers operate in pairs or in small groups working in shifts to  complement each other in covering the entire spectrum of the target’s everyday  world.

Knowing that I appreciate politeness, the handlers  use politeness to persuade me to obey their commands. Sometimes to make me  remain in bed longer in the morning, the handlers play a synthetic telepathy  recording of a female saying, “Please do not get up. Please remain in bed a  while longer.” The recording sounds like an automated announcement on a public  transit, for example, “Please remain seated until the train comes to a complete  stop.” One of them also often says, “I’d appreciate it if you’d sleep late  tomorrow morning.”

The handlers can actually cause somatic illnesses in  targets through the power of suggestion. I woke early one morning to hear the  female handler repeating, “Chest cold. Chest cold. You’re going to have a chest  cold.” If a target is unaware of those voices, in all likelihood he will develop  a chest cold. However, being able to hear the handlers wards off those  psychologically-induced somatic illnesses. I did not get a chest  cold.

The people who carry out mind control through the  voices will attempt to convince the targets that they are far greater in number  than they actually are and more politically connected than they actually are. In  early 2010, the handlers told me that I was going to be served a warrant by the  local authorities. I told them that I had done nothing to receive a warrant, so  let them come.

On another occasion, they told me that they were  going to send the “Death Squad” later that night. I told them, “Send those  bastards on.” I made a joke out of it, telling them that I was going to leave  the outside doors unlocked that night because the members of the “Death Squad” would otherwise be too dumb to get inside. I did indeed leave the doors unlocked  and showed the handlers before I retired that they were unlocked. Then I went to  bed and slept well.

The handlers are psychopathic criminals who break  many laws. Here are some of those criminal acts for which someday they will  stand trial: (1) stalking with malicious intent, (2) physical and psychological  harassment, (3) coercion (in attempting to make the victim do things that he/she  does not want to do with their mind control methods), (4) psychological and  virtual rape, (5) breaking and entering (which they often do to intimidate the  victims by unlocking locked doors, turning back clocks, moving items in rooms,  hiding other items, etc.), (6) burglary and theft (which they commit when they  enter a victim’s home and take items to confuse and disorient the victim), (7)  recording a victim’s conversations without his/her consent, (8) voyeurism  (through their ability to view the victim), (9) assault and battery (by using  electric shock, etc. against the victims), (10) slander (by circulating rumors  and stories about their victims), (11) libel (when those rumors and stories are  put into print in the form of emails, etc), (12) computer hacking, (13) phone  tapping, (14) first degree murder (when a victim suffers a fatal car crash  because of sleep deprivation), and (15) attempted murder (when their plans do  not succeed), (16) in many cases, assisting a suicide, (17) torture, and (18)  acts of terrorism. In addition, the handlers break many FCC laws regulating  communication and the use of frequencies and the air ways.

When the secret of electronic stalking and mind  control is finally known and the criminals behind it brought to justice, the  powerbrokers will attempt to use the Patriot Act and other Executive Orders and  legislation to protect the handlers. They will not be successful. The courts  will find that no government employee, nobody working for the government, nor  any other individual, regardless of his job, can receive immunity from breaking  the laws. Former Nazi concentration camp guards have unsuccessfully made the  argument before the court that they were only acting under  orders.

Once the system that employs electronic stalking and  mind control comes crashing down, the handlers and their known accomplices will  become “the fall guys.” It will probably take several years to charge and  convict them. In the meantime, the powerbrokers will be making their plans.  Convicting the higher-ups will be much more difficult.

To Dialogue or Not to Dialogue (with  Your Handlers)

Many targets who receive the V2K, or the voices, and  have the ability to respond to the handlers do not do so. They believe that  communicating with the handlers somehow makes it easier for the handlers to  access their thoughts and manipulate those thoughts. That may be true; however,  no proof exists for that idea. Each target who gets the V2K must decide whether  he should dialogue with the handlers or not.

I do communicate with the handlers using synthetic  telepathy, as I want to encourage them to talk so that I can pick up clues about  their identity. In addition, I get a large amount of satisfaction in vilifying  the handlers in language that would embarrass Howard Stern. Although the  handlers employ continual deception, they still leave hints about their  locations and identities. I often record their remarks in my journal and study  them for clues to their identity and location.

By verbally sparring with the handlers, I have  gleaned much information by remembering and recording what they say and  analyzing it. I may have misinterpreted some of that information; nevertheless,  I feel that most of my conclusions are correct. I have learned that the  handlers

– are truly inherently evil;

– have Deep South roots, although I am not fooled by  their fake Gomer Pyle and Minnie Pearl accents;

– probably come from or are only one generation away  from rural USA;

– have a familiarity with the various  trades;

– are augmented by others on weekends (perhaps for  their entertainment);

– possess software that allows them to make one of  those persons appear to be talking at a distance (although that person is not distant);

–  use their V2K voices on both the conscious and  subconscious levels (I caveat this statement by admitting that some of the  subconscious voices may be pre-recorded and played from a  distance);

– seek to induce anxiety as a very high  priority;

– have access to my various personnel files,  including my military record;

– pretend to portray the U. S., Israel, and  Judeo-Christianity in the most favorable light;

– have been in contact with friends and relatives  that knew my family years ago or with accomplices who knew them;

– are funded and sponsored by an organization, most  probably from the Radical Right, that probably works for a foreign country. They  do NOT represent the United States Government although leaders in the government  appear to know about them and protect them by not investigating;

– use their physical harassment to trigger responses  and enhance their neurological objectives;

– must manipulate some type of device during their  physical harassment (for as they talk, they sound distracted, as if they are  adjusting or controlling some type of instrument);

– are not quick witted;

– work in shifts;

– work in teams of from one to three persons, using  prerecorded voices and loop-play tapes in addition to their own real-time  simulated voices;

– have received training in the application of  psychology although they perform poorly;

– follow an agenda that is probably political rather  than socio-religious and financial;

– have only very limited influence among the middle- and high-income strata of society;

– procure their accomplices primarily from the low  income and the very low income strata of society;

– have limited formal education and most of their  education is technical in nature;

– possess poorly developed verbal  skills;

– are mainly middle-aged although there are younger  and older members of the group and accomplices;

– know each other well and are perhaps in some cases  husband and wife teams;

– are not in the I. Q. range of molecular physicists  (smile);

– are highly frustrated by their inability to  exploit what they doubtlessly believe to be my vulnerable  points;

– are awed by my prowess in turning their elementary  psychology back on them;

– attempt to destroy my belief in and reliance on  The Great Spirit and instead make me conform to the Christians’ Jesus Christ and  their version of God;

– seek to achieve a sick version of behavior  modification;

– lie consistently about everything (even when they  know that I will soon find out the truth) to distract, deceive, and induce  anxiety.

Thus, although some targets disagree with me, I would  encourage targets to dialogue with their handlers. Targets have little to lose,  as the handlers know what they think anyway. Targets can play the same game that  the handlers play by drawing them into conversational topics that reveal  information about themselves. Yes, the handlers will attempt deception at every  turn, but they are only human. They often let down their guard and divulge  information unwittingly.

I not only dialogue with the handlers to gather clues  to their identity but I also use it to turn their use of basic psychology back  upon them. Here is an example. They often ask me how old I am. That question is  designed to make me very conscious of my age, seventy-three, which they believe  will remind me of my date with mortality. By doing so, they seek to induce  anxiety. It does not happen. Instead, I ask them the same question followed by a  statement such as, “At your ages, your shitty health conditions, and your  frustration at not being able to control me, you could have a fatal heart attack  or a debilitating stroke just any moment.” I continue with, “See what I mean?  Time is on my side. I get healthier, stronger, and keener minded every day while  you (censored) suffer every ailment known to sub-humans.”

My targeting has led me to develop a very colorful  vocabulary, which I use only with the handlers, whom I refer to as “the  perverts,” or “the pervs.” They sometimes tell me, “You didn’t used to use that  dirty language.” I reply, “I didn’t used to know you rotten sacks of s—t,  either.” They are correct. My language used to be gentlemanly. I was often  referred to as the true Southern gentleman. My new expanded vocabulary probably  comes as a result of (1) the handlers’ computerized neurological programs that  cause me to think in negative terms as well as (2) my conscious attempt to  express my utter contempt for the handlers and what they do.

In the English language, expressions such as “Leave  me alone” simply do not send the same message as, “F—k off, you pools of buzzard  puke.” Some targets may believe that in using such language I have allowed the  handlers to bring out the worst in me. On the contrary, I call it an effective  psychological defense mechanism. As I often tell the handlers, “I don’t know why  you m—– f——s have targeted me and it probably doesn’t matter. The Great  Spirit accepts me exactly the way I am – language, character defects, political  and social views, and all. So, f—k yourselves.”

I am the youngest of four children in my family. The  oldest child, my brother, died in 1997 at seventy-four. My older sister is  eighty-six and the younger sister, seventy-eight. The handlers continually  whisper that my eighty-six year old sister “wants” me. Naturally they are  suggesting sex. They also tell me that my son “wants” me. That could be nothing  but sexual in content. There is little defense against vile, warped, cowardly,  remote-delivered V2K whispers like those except retorts such as I have  mentioned.

The Use of Hypnotism

Hypnotic suggestions definitely play a role in the  mind control portion of ESMC. We know that hypnotism can be performed by  indirect means such as television and music and can also be administered while a  target sleeps. It is very likely that early in the surveillance stage the  handlers or somebody working with them perform hypnotism on the target that  causes the target to react in a predetermined manner to certain post-hypnotic  codes. The handlers then later use those codes through their subliminal talking  to the target’s subconscious that trigger the target’s post-hypnotic actions and  reactions.

Probably from 50% to 75% of the communication from  the handlers in my case involves some form of code. For code to function as  intended, the target has to have been instructed beforehand about how the code  is supposed to affect him. The post-hypnotic codes will be contained within  normal-sounding statements and words spoken through V2K to targets. In my case,  for example, the handlers through synthetic telepathy make code statements such  as “I see you,” which is intended to open up my mind to the handlers’ questions  and mind control activities.

Without hypnosis, or some similar hypnosis-type  method, the handlers’ functions and effectiveness would be greatly reduced, for  they could only listen to a target’s thoughts and not be able to “mine” those  thoughts. Certain “trigger” words and expressions represent post-hypnotic  commands to the target. When he hears those trigger words, he knows to cooperate  with the handlers’ questioning and interrogations. He had to have been  previously conditioned about the meanings of those trigger words; otherwise,  those command codes would fall meaningless on the target’s consciousness and  sub-consciousness.

Here is my idea about how hypnotism works. Early in a  victim’s targeting, a hypnotist will convince the target’s subconscious to make  him respond to the handlers’ questions in the future. The hypnotist will make up  a story that sounds plausible to the target’s psyche. For example, he will tell  the target that he is a storehouse of knowledge that could be used to save  mankind. The target believes himself to be the savior of the human species, and  he is convinced that he must impart that knowledge for the good of the world.  Thus, whenever a target hears a question, regardless of the nature of that  question, he responds as if his answer were critical for a waiting desperate  world.

The target will have been previously instructed  through hypnosis to answer truthfully to any questions asked by the handlers. He  will have also been told to visualize his thoughts. Thus, whenever he thinks of  a person, he visualizes that person’s face. The handlers then record that face  and ask the target, “Who’s that?” The target will normally answer with only a  given name, let us say, “Joe.” The handlers next ask him, “Joe who?” The target  answers, “Joe Jones.” Such is the tactic of the handler  interrogators.

Simply listening to a target’s thoughts may not  reveal the information that the handlers seek. However, using hypnosis, the  handlers are able to “mine” the target’s thoughts. Hypnotism is re-enforced by  computer software, normally used by intelligence agencies, that determines  whether a target is lying or being purposely vague, evasive, or  deceitful.

By asking the target questions, handlers not only  extract information about the target but also about people whom the target  knows. Intelligence officers use that technique on Moslem captives in the  so-called War of Terrorism. Expert interrogators can extract an astonishing  amount of information from a hypnotized target on his friends and acquaintances.  Water boarding is used as only a tool to frighten prisoners. Indeed today water  boarding is a useless torture method used by only the sadistic. The real  information comes from the interrogators’ neurological gadgets and  methods.

The handlers can not only extract information from  targets but they can also delete information in targets’ minds. My handlers  often do that. They will often steer my mind to a particular scenario in which  there are certain people whom I know. Yet, I cannot remember the name of one of  them. After I try for several seconds to recall the name, the handlers supply  the name. The idea is to establish a dependency on the handlers’ information. It  also re-enforces the concept that the handlers possess all of the power and that  the targets are helpless.

My handlers often play mind games for those purposes  and perhaps out of boredom–what could be more boring than monitoring somebody  in the same setting day after day? They recently took my mind to the geography  of Scandinavia. Geography is one of my favorite topics, and I know the countries  and their capitals. Yet, as I thought about the countries of Norway, Finland,  and Sweden, they blanked out the capital of Sweden. Then, they asked me the  capital. Later, by going through the alphabet, I remembered, that it was  Stockholm. The handlers tried to make me believe that they had provided me the  answer, which they will often do to attempt to establish your dependency on  their input.

Hypnotism is also used to make a target believe that  he cannot hear or see well. To cause a target to become hard of hearing, the  hypnotist will instruct the target that he will not hear certain common sounds,  such as the th sound, the sh sound, or the shun (tion,  cion, sion) sound. He will also tell the target’s mind that it will not hear a  particular vowel or that the vowel o will sound like the vowel a.  He will even command the target to hear certain “trigger” words or planted words  instead of the actual words. For example, “first” will sound like “dirt,”  “constitution” like “prostitution,” and “cyanide” like “suicide.” The words  substituted will normally have the same number of syllables.

Likewise, the hypnotist will instruct the target that  when he sees a lamp post light, it will look orange instead of white or that it  will have three concentric rings around it. This naturally interferes with the  target’s eyesight. It causes the victim to believe that he is losing his sight  or that he has an astigmatism or cataracts.

Coordination between the Powerbrokers  and the Handlers

No stalking activity, whether conventional or  electronic, can be carried out without a conspiracy. That conspiracy probably  includes the following elements: (1) The powerbrokers, or masterminds. (2)  Go-betweens, or liaison agents, representing the masterminds. Those go-betweens  are probably heads of the FBI field offices, who probably coordinate with the  Infragard and Fusion Centers. (3) Handlers, who actually carry out the  electronic and mind control activities. (4) Accomplices, who play only support  roles as ground stalkers and who may not even be aware of the electronic and  mind control functions. Some of them are opportunity accomplices who may make  certain signs and gestures to targets that they run into in stores. Others  actually follow the targets in vehicles and harass them in other ways. Few of  those accomplices are permanent members of the team. They come and go.

The relentless remote-operated electronic assault and  mind control activities, often accompanied and re-enforced by gang stalking, are  enormously labor intensive and costly. It is not likely that a company or a  business would spend those funds on a single individual. However, the company or  group may receive secret funding from the federal government that is not kept on  their regular books. Some PACs and religious groups, working under government  protection and with government funding would provide excellent cover for  state-sponsored domestic terrorism.

In addition to hooking the minds of the targets,  handlers also invade the minds of the targets’ family members and close friends.  Only the target is permanently monitored. The family members and friends are  only sporadically monitored to fill in information about the target. The major  organization, or the masterminds, probably allow the handler groups also to  identify additional targets.

Secondary Targets

In almost every case of targeting, members of the  target’s family will also be victimized. Very often, those secondary targets are  innocent children. In my case, my grown son has also been subjected to  electronic torture and mind control since no later than 2001 although he is  still unaware of it. Here are some of his symptoms, which targets will readily  recognize.

–   His hands often cramp so badly that he cannot  open his fist. Cramping is one of the favorite tools of the  handlers.

– He has developed psoriasis, which targets often  mention as an induced symptom. In 2001, his entire body was covered with  psoriasis sores.

–   He has itching spots on his feet, a very common  handler symptom though there is no evidence of a mosquito or other insect bite.  He has scratched those places so hard that they have bled and later formed  sores.

– He is distracted and does not hear certain sounds.

–  He has also developed an insatiable appetite that  has led to an out-of-control eating disorder due to the subconscious voices of  the handlers urging him to eat. That in turn has resulted in an enormous weight  gain.

– He has short-term memory loss. While performing  home improvement projects, he very often cannot remember the measures that he  has taken.

– He has sudden striking pains in his back that  appear to have no physical origin.

– He sometimes has to fight going to sleep as he  drives.

All of those symptoms are similar to those caused in  targets by the handlers. My handlers often make threats concerning my son and  attempt to make me believe things about him that I know are false. They have  also told me telepathically on many occasions that he is in the “hospital” or  the “emergency room.” Those terms are simply code employed by the handlers. I  have not yet determined the precise meanings of those particular codes unless  the handlers mean that he is under their surveillance and  control.

It is increasingly clear that the targeting covers  two or more generations of targets either simultaneously or in succession. In  looking back, I now also know that my aged mother was targeted. In addition, I  believe that my little eight year-old granddaughter has been a target for at  least the last three years. I visited my son and his family when she was about  five. I slept at night in a bedroom adjoining hers. One night I heard her  talking. I got up and peeked in the room several times when I heard her talking  to make sure that she was okay. I thought at first that perhaps she had been  talking in her sleep. Now I believe that she was talking with the perps through  their subliminal voices to her subconscious while she slept. Of course, her  talking could have been handler deception playing her prerecorded taIking into  my consciousness. However, if it is true that she is targeted, four generations  of my family have been targeted within a period of not longer than ten or  fifteen years. Many other targets have reported similar  situations.

Targets suffer from brutal physical and psychological  torture. Yet, they can get some small satisfaction out of the fact that the  handlers, who are obviously already seriously disturbed individuals, gradually  become more psychologically ill and socially maladjusted the longer they ply  their evil work. They are psychopaths in the strictest terms. The handlers  become consumed with the power that they think that they possess.

Over the years the torture and voyeurism that the  handlers employ weighs upon their degenerate minds. I enjoy telling my psycho  handlers that I have complete freedom of movement and action but, on the  contrary, they have to spend their time focusing on me! Although the handlers  obviously enjoy making people suffer and receive tangible rewards for their  efforts, they become victims of their own sick activities, and their evil  handiwork eventually leaves them as mentally affected as their targets. I often  tell my handlers, “I hope to hell that you bastards don’t have children and  grandchildren. If you do, they’re probably either in prison or the asylum or  will shortly be there.”

The Handlers’ Strategy

What happens when a victim is targeted for electronic  stalking and mind control? Logic and experience tell me that the person or  organization that orders the targeting will provide the handlers the target’s  FBI files, which include his military and employment records, and any other data  they may possess. The FBI and members of other agencies oftentimes will have “watched” that individual for years before he is officially targeted. They will  have generated a massive amount of data on the target. In addition to that data,  either the initiator of the targeting or the handlers will hire accomplices to  work up a personal background on the target.

Those accomplices will probably be professional  private investigators, ex-law enforcement officers, ex-military, or  ex-government employees. Sometimes they will pose as law enforcement officers  and other times as old friends of the family. Oftentimes they will manage to run  into people “accidentally” who know the victim or the victim’s family members,  particularly those who have known several generations of that family, to collect  anecdotes and stories about the victim and his family members. They probably  wear a hidden tape recorder when they talk with those persons.

At the same time, the handlers will begin “mining” the target’s thoughts and communications to obtain the names of people, places,  actions, and dates that figure in the target’s life, particularly searching for  foibles of the target upon which they later capitalize in their mind control  activities. Thus, a target’s memories contribute to the data that the handlers  amass. Finally, all the accumulated data on the target is gathered into a  comprehensive file on that person, computerized, and studied by a group composed  mainly of psychiatrists, psychologists, professional interrogators, computer and  media personnel, and propagandists.

The team members look for certain weaknesses in the  individual to form a suggested strategy for “handling” the target based on what  they know about the target. That is almost everything about that individual.  Effectively, that strategy seeks to eliminate the target as a functional human  being; elimination sometimes means death by slow torture or the suicide of the  target. Finally, a representative of the group will discuss the strategy with a  spokesperson of the handlers, and the handlers begin using that strategy in a  24/7 attack on the target’s body and brain.

The strategy will include the following actions. (1)  Attack the target’s reputation and credibility. The investigation into the  victim’s background by private investigators and persons posing as law  enforcement officials first arouses suspicions those friends and neighbors who  are interviewed. The handlers will appoint various accomplices to let drop  certain knowledge about the targets to his friends and family members. That will  be done in a very casual, natural-appearing manner. (2) Isolate the victim by  casting suspicions, spreading rumors, interfering with his postal and email  communications, causing problems between the target and his friends and family  members, and making him look crazy.

(3) Ruin the target financially by causing him to  make bad financial decisions, spend money on items to reduce the effects of the  ESMC, lose his job or business due to the ESMC, and by using other tactics. (4)  Create a level of frustration and helplessness that cause the target to become a  recluse or even commit suicide. The strategy is not considered finished until  the target is dead or incarcerated in a mental institution for the remainder of  his life. (5) Determine through experimentation what electronic torture methods  might be most effective in re-enforcing their mind control  methods.

Anxiety, the Ultimate Weapon of the  Attackers

As we targets know, many victims of organized  stalking, electronic stalking, and mind control commit suicide. That act does  not result from the physical electromagnetic harassment or even from the  neurological effects, including the synthetic telepathy voices. Any target can  endure the physical pain and the psychological harassment. Instead, the suicides  are caused by anxiety.

I shall repeat ad nauseam that every target who gets  the directed energy and electromagnetic attacks also gets the subconscious  voices. I believe that victims of gang stalking are probably also electronically  monitored and subjected to mind control. Most targets will not be able to hear  those second layer voices. However, I somehow learned to hear those voices. That  I can hear those voices on a deeper level may be accidental, a special gift, or  something sent to me by a Higher Power. Whatever the reason, I am very grateful  for that ability.

I have already mentioned that I was struck in the  mid-1970’s by something similar to anxiety and again in 1999 with extreme  anxiety. At the time, I had no idea that I had been targeted since the ‘70’s.  The second round of anxiety can best be called a panic attack, which was the  most horrible feeling that I have ever experienced in my life. It occurred  during a period in my life when I was most vulnerable: my mother had just died;  my remaining two siblings were angry with me over my executorship of the estate;  I was selling my home; and I was trying to figure out what to do and where to go  next. I asked a niece who is a nurse to recommend a psychiatrist. I made an  appointment with that psychiatrist, and when after two visits he told me that I  did not need him, I rose above the anxiety problem and went on with my life.  That was before I realized that psychiatrists were accomplices of the  powerbrokers. I do believe, however, that that particular psychiatrist was among  the few who had not sold out to the system or at least had not sold out  completely.

In the meantime, in late 2005 I learned that I was a  target. The handlers’ harassment program included electronic attacks and  synthetic telepathy voices. I got the V2K 24/7. Naturally, I was supposed to  hear those voices. Only much later did I learn to hear the voices of my handlers  that I was NOT supposed to hear. Those voices – I call them second layer voices – were too low in volume for my conscious to hear. They were aimed at my  subconscious to keep me from hearing them.

After I began to catch the second layer voices, which  were usually conducted by repetitious loop play tapes, I realized that the  handlers’ main objective was to cause anxiety. The handlers knew that my son and  I enjoyed a particularly close relationship, and they set out to wreck that  relationship while at the same time filling me with anxiety. They have failed in  both objectives. Yet, they continue to send voices to my subconscious about my  son and his family, for example, that my son had drowned, that he had lung  cancer, that he had been taken to the emergency room, that he was molesting his  little daughter, that he was going bankrupt, that he was involved in  prostitution, that my daughter-in-law had breast cancer, and anything else that  they think will induce anxiety.

But as the old expression goes, something happened on  the way to the forum. I am no longer the vulnerable target of the mid-1970’s and  1999. Now cognizant of what produced my previous anxiety and now able to hear  the voices used to induce it, I am now an expert on anxiety. I not only can  handle it but I can also anger and frustrate the handlers. I tell them, “There  is absolutely NOTHING that you can do to me physically or neurologically to  induce anxiety.” That pisses the handlers off, which give me a great deal of  satisfaction.

I am currently developing a free course for other  targets about anxiety, or panic attacks, what causes them (the subconscious  voices), how to deal with them, and how to go on with their lives. In addition,  I believe that I can teach other targets to hear the subconscious voices. My  purpose is to prevent targets from considering suicide as an option. Targets  cannot yet stop the remote electronic stalking and mind control attacks, but  they can learn to deal with those attacks.

Interference with Targets’ Communication  System

Rule Number One in the handlers’ user manual probably  reads – Isolate the target. By hacking the computer and tapping the phones, the  handlers are able to interfere with the target’s communication system and thus  harm his relationships with family members and friends. To a target, his  communications system can be a life line. Once a target’s communications are  compromised, the handlers find it far easier to perform their electronic and  mind control attacks on him.

I live in a rural area where it is difficult to  obtain fast speed internet service. When I found out that Hughes.net offered DSL  in rural settings, I subscribed to their service, and the fee was deducted  directly from my bank account. I was very pleased to be able to communicate with  other TIs using high speed internet. The handlers, however, set out to remove  that advantage.

After several months, the handlers began using  pop-ups with the Hughes.net logo telling me that there were problems with my  payment. At the time, I believed that the pop-ups did indeed come from  Hughes.net, and I finally became so annoyed that I canceled my service. Only  later did I learn that the handlers were manipulating my computer and using the  pop-ups with the Hughes.net logo. They knew that I would use the high speed  computer to work against them, and they set out to take that tool away from me.  They succeeded. I went back to using the much slower dial-up internet just what  the handlers wanted.

Hughes.net turned my account over to a collection  company. However, when I sent that company entries from my journals describing  the harassing pop-ups and my phone calls to the company, which did not resolve  the issue, they dropped their demand. I feel sure that the powerbrokers  instructed them to drop the matter, as they did not wantI have no way of knowing  whether personnel who work for Hughes.net were involved in the internet  interference. However, that they dropped their claims indicates that Hughes.net  is aware of such interference.

After canceling the Hughes.net contract, I obtained  dial-up internet service through a local provider. At first, although slow, it  functioned reasonably smoothly and efficiently. Then, the handlers began their  assault on my dial-up internet access, and it got increasingly slower. Everybody  has his own idea about what constitutes slowness, so let me explain that when I  say slow, I mean that it often takes from five to seven minutes to pull up a web  page, sometimes longer.

In addition, features that once functioned well began  malfunctioning: the “Reply” button on emails often delays for several minutes or  the reply space never appears; a pop-up often states, “Internet Explorer cannot  display the web page;” sometimes new emails end up embedded in old emails;  videos will not open or, if opened, will stop every few seconds and pause for a  couple of minutes; the Delete Browsing History does not function; “Sending” takes several minutes; the mouse clicks do not open the web pages; and my emails  often do not arrive to correspondents and vice versa.

I have spent hundreds of dollars on technicians to  correct the mal-functions. The installation of a more powerful modem helped only  minimally. My defragmenter and other programs seemingly do not help. Deleting  the browsing history does not improve the speed. The internet service becomes  increasingly slower. The handlers are determined to interfere with my  communication and make it difficult for me to use the internet. Their mission is  to isolate me, frustrate me, take much of my time, and cause me to spend money  on repairs.

Several people in my same locality use an AT&T 3G  satellite plug-in to speed up their internet communications. I ordered the small  device and hired a PC technician to install it correctly. Although he  successfully installed the program, he tried for hours to get it functioning and  failed. His services cost me almost five hundred dollars. A few months later, I  ordered the 3G device again and this time attempted to install it myself. Once  again the program installed itself perfectly, but after spending hours on the  phone with AT&T technicians, I could not get it to work. The device showed  that it was getting a very strong signal, which means that it should have  functioned correctly.

Once when I called my internet provider to ask if  they could improve the online performance, I mentioned that my PC had been  hacked. The technician with whom I was speaking remarked, “It’s impossible to  hack dial-up internet.” I did not know whether to laugh or try to convince him  about how wrong he was. I let it pass.

Hacking probably is not the correct term to call what  the handlers do with a target’s computer. They actually take possession of it.  They have somehow established a parallel, or shared, system whereby one of their  computers literally becomes my computer. Not only are they able to manipulate  the contents of my computer but they also have created “ghost” web sites for  those that I frequently visit and for my emails accounts.

Later, I contacted Hughes.net to explain about the  hacking. I was able to re-subscribe to Hughes.net, which improves my ability to  communicate with others. Although the handlers have tried to cause me once again  to cancel Hughes.net, I continue using that company as an internet  provider.

I recently discovered that the handlers are able to  intercept my emails and edit, substitute, or delete my attachments. I sent a  correspondent an attachment that contained two hundred pages. He wrote back that  he had read all seventy pages. The handlers had intercepted my email and had  deleted over a hundred pages of the attachment. Since discovering that handler  capability, I have checked with correspondents about what they received from me.

The handlers also interfere with my land line phone  and cell phone. The first ring on both phones has a different tone from the  following rings. Apparently the handlers’ listening device picks up after the  first ring. I have many “wrong numbers.” When I advise them that they have the  wrong number, instead of hanging up, they remain on the line, an old telephone  trick that allows the caller to tap the phone if the answerer hangs up first.  When I curtly ask them to hang up, I get a click, as if they have hung up, but  get no dial tone, another old telephone trick. When I finally get ugly with the  caller, he at last hangs up and I get a dial tone. The callers are apparently  only accomplices wanting to get in on the handlers’ action.

On the phone, the handlers often cause my voice to  echo so that I can hardly hear the other person. Of course, the echo can only be  heard on my end. The handlers also cause very noisy static and other strange  noises. They have even interjected their voices, which probably only I can hear.  On occasion, they have redirected my calls so that the call will be answered by  their accomplices, just as they obviously did when I thought that I was talking  with Hughes.net personnel. Very often they make it difficult to make and receive  calls.

Interference with the target’s PC and telephone is  designed not just to annoy the target but to isolate him socially and impose  difficulty in conducting business. It also causes the target to question his  sanity, especially if he has not learned to hear the voices.

The social isolation, frustration, and doubts about a  target’s sanity lay the groundwork for the handlers’ neurological assaults and  the target’s anxiety.

My handlers used the telephone jack for some purpose  when I had my dial-up computer connected to that jack. While I use the PC, I  play a small radio to drown out the V2K. There is always much static, and the  radio will not pick up signals when facing certain directions, not always the  same directions. Whenever I finish using the computer, I disconnect it from the  telephone jack. The second I disconnect the cord, the radio station immediately  blares forth strong and clear.

Handlers also interfere with the regular mail sent to  and from post offices and through mail delivery companies. Targets’ ”snail” mail  often goes astray. If I have to use the post office, I pay a higher fee to  obtain proof of mailing or delivery confirmation. Packages from UPS and FedEx  often do not arrive.

The Use of Sex as a Mind Control  Tool

Out of the hundreds of targets with whom I have  communicated who can “hear” the voices (and many of those who do not), I do not  recall a single one whose electronic and neurological torture had not included  sex in some manner. That is for good reason, for sexuality is one of the most  easily exploited human characteristics. Although targets may not have  well-formed political, social, religious, and other ideas, they all have  longstanding and ever-present sexual ideas. The psychiatrists and psychologists  who helped write the user manual knew that well, and the manual exploits that  human feature. Remember the graphic sexual photos of Arab prisoners in Abu  Garaib who were humiliated in that manner? Being stripped of their clothing and  forced to pose in lewd ways was very purposeful.

Sex is big business. If you do not think so, watch  the frequency of Cialis, Viagra, birth control medicine and devices, and condom  ads on TV. Moreover, notice that many ads show scantily-clad, good-looking young  men and women when their presence has little or nothing to do with the item  being advertized. Many of the stand-up comedians use sex jokes and make  innuendos about sex as parts of their acts.

Thus, sexual thoughts, libido, and sexual activities  are important reasons to pursue brain mapping, which means huge profits for  pharmaceutical companies and researchers. Even more important to the  powerbrokers, the information derived provides the intelligence community  another weapon in its neurological warfare arsenal, as sex has been used for  hundreds of years in espionage. It has brought down many powerful people,  including many Congresspersons, Governors, and other public figures. It is also  used as blackmail to force compliance from those individuals.

Handlers find out a target’s sexual thoughts and  preferences, and they fully exploit that knowledge. However, although they are  born voyeurs and get much pleasure out of harassing a target with induced sexual  thoughts and images, sex is not their real objective. They know that their  intimate knowledge of a target’s sexual thoughts shatters a target’s  self-esteem, instills guilt, and forces him into silence and compliance. They  use that as a tool to induce anxiety, confusion, fright, frustration, and  humiliation in the target.

A common thread often used by the handlers,  particularly those who are obsessed with sex, suggests that the handlers are  engaging in a sick version of behavior modification. What behavior can be more  vile, harmful, and unlawful than that of the handlers? I have not heard from one  single target whose behavior has been modified to the extent that he has been  freed from his electronic and mind control assault. Moreover, if the handlers  are supposed to be the models that targets become through behavior modification,  that theme is a ridiculously treacherous, twisted, warped deception.

Sexual thought wafts through the target’s ideas on  politics, religion, social problems, economics, and every other phase of human  life. That is what makes sex a very important part of the handlers’ neurological  assault protocol. Loop play tapes making sexual suggestions to a target’s  subconscious and sexual stimulation of the target by using computer software  greatly influence the target’s sexual thoughts. In my case, the “You’re horny” loop play tape is supposed to heighten any sexual thought. I have no idea how  long that tape has played to my subconscious, but it has doubtlessly affected my  sexual thoughts for years. Those actions are carefully and cleverly manipulated  for their affects on the target.

The perpetrators sometimes go to amazing lengths to  ensnare their victims, sometimes even sending paid predators to seduce those  victims. Many targets trace their targeting back to brief romantic encounters.  Some targets claim that the people who became their spouses were sent by the  perpetrators. Although their allegations cannot be proved, espionage has been  conducted during trysts and feigned romantic liaisons for hundreds, probably  thousands of years.

Handlers instruct the target subliminally through  hypnotic pre-suggestions that when he hears certain trigger words and phrases,  he is to experience an arousal. In my case, the handlers use corny code words  and expressions such as “crazy,” “barbeque,” “go git ‘im,” and “please don’t do  that to me” to induce erections. Those trigger words and phrases are often used  in conjunction with slight vibrations on the sexual organ to cause an arousal.  The vibrations may also be almost solely psychological.

The evil nut cases who hear and psychologically  initiate a target’s sexual thoughts are classic degenerate voyeurs. I often tell  my handlers through our form of synthetic telepathy communication system, “Learn  some f—king psychology, you turds, to know why you psychos are sitting there  feeling like s—t while doing the warped crap that you’re doing.”

Sexuality is still the focus of many experiments. I  believe that many of the cases of sexual attacks on minors and infants are  caused by handlers whose intentions are both to experiment on and to inflict  harm on the target. In addition, it also appears that the experimenters are  interested in transgender phenomena. In recent years, many people have undergone  transgender transformations. Although some of those cases are probably natural,  I believe that others are the influence of handlers who have convinced them  subliminally that they are “in the wrong body.” Farfetched? Hardly.  Experimenters have carried out truly barbaric and inhuman sexual experiments on  targets and captives, particularly since WWII.

Recently (March, 2010), in one of the online  communication venues for targeted individuals, targets discussed whether or not  their handlers could see them in the bathroom when they bathed and performed  their bodily functions. Whether it is true or not, handlers convince targets  that they can be seen while bathing and showering. They use that tool to  humiliate the target and keep him from bathing regularly. Once again, sexuality  enters the picture.

The handlers use sex as a tool to isolate the target.  They seek out the people with whom the target is closest and then use sexual  innuendo and blatant lies to estrange the target from those persons. In my case,  they often tell me that my son is molesting his daughter. I tended my little  granddaughter the first year of her life while her mother finished her college  studies, and thus there is a very strong bond between us. The handlers know  that. They hoped that I would tell my son about their accusations and that that  action would strain our relationship. I tell the handlers daily that they have  failed miserably to convince me of their evil lies. As the handlers hammer away  at my family relationships, I work just as hard to strengthen them.

Humiliation of targets using sex causes a feeling of  helplessness in targets. Male targets experience involuntary erections and  female targets, artificially-induced orgasms. Both males and females are  sodomized. Again, this is accomplished through a combination of psychology and  electronic manipulation. Here is an example: I began experiencing a partial  erection throughout the day and night, and I knew that that was not natural.  Then, one day while washing my hair I brushed the small hairs at the entrance of  the ear canal, and each time I did I heard, “You’re horny.” The subliminal  voices were toned so low in volume that my conscious could not pick them up.

While watching TV, I often feel the sensation of  half-erection during programs and ads.

That induced sensation appears to have no particular  trigger and thus it could be pre-programmed to occur at certain times. Moreover,  the images that are portrayed when the urges commence are varied and not even  always suggestive topics and scenes. Whenever I feel those artificial urges, I  also hear the handlers whispering the names of family members and friends. They  are trying to associate those people with sex and thus embarrass me into  avoiding them or acting strangely while around them. Their elementary psychology  does not work!

The continual repetitions of their loop play tape “You’re horny” were contrived to make my brain believe that suggestion. In  addition to the neurological suggestions, one day while sitting watching TV I  also felt a very subtle vibration in my groin area, which was supposed to aid  the subliminal suggestions that I was horny. That told me that the handlers used  both physical and neurological methods to achieve that condition.

In addition, handlers tell targets through their V2K  to the subconscious that targets have to defecate or urinate. This causes them  to lose control of their bowels and bladders. That condition, along with the  partial erections, is clearly intended to humiliate the target.

In addition to using induced erections and orgasms as  weapons, handlers also cause impotence in male targets. They accomplish that  through the second layer synthetic telepathy, whispering to the targets that  they cannot achieve an erection, that the object of his affection is diseased  and ugly, that she is his sister or mother, and a variety of other statements  that causes a target not to be able to perform. Constant loop play tapes making  those same suggestions enhance the handlers’ objective. The induced impotency  causes frustration, humiliation, and anxiety in the target and leads to marital  problems that often end in divorce.

Many targeted correspondents tell me that their  electronic stalking and mind control began after a brief romantic relationship.  I believe that some type of device exists, perhaps a nano-microchip, that can be  introduced vaginally, anally, and perhaps through the male urethra. The  instances of sexual interaction and later targeting are too numerous to be  coincidental.

The psychologists and others who devised the  handlers’ user manual seized upon sex as a major tool in their neurological  program, for sex can somehow be applied to any person, place, or object. Sex  particularly lends itself to adaptation to the second layer of voices that  permeate the target’s thoughts. However, once a target knows about the sadistic  use of sex in his targeting, he can use the same psychology that the handlers  employ to weaken and sometimes completely offset its effects.

The Handlers’ Accomplices

Accomplices help the handlers in various ways.  Without the accomplices, the handlers would not be able to operate effectively.  They may not be able to operate at all. If we are to believe that much of the  electronic stalking and mind control is carried out through microchips implanted  in unknowing targets, those small devices would very likely have to be implanted  by medical personnel. There is much circumstantial evidence that doctors,  nurses, and others do indeed implant microchips. They are perhaps misled into  that crime by the powerbrokers, who explain that the microchips will only be  used to track the targets. Regardless of the reason why the medical community  cooperates, they are violating the Hippocratic Oath, various laws, and human  rights in doing so.

Other accomplices aid the handlers’ electronic and  mind control assault by physically stalking the targets. Targets who receive the  electronic and mind control effects also often complain of organized stalking in  their neighborhoods and other places. The accomplices are normally people of all  walks of life who have been enlisted by the handlers to participate in the ESMC  by harassing the targets. They are often volunteers who get an adrenalin rush  and a perverse sense of pleasure and power in being able to bother others. Some  accomplices who live near the targets and render their fulltime services to  harass them are paid salaries or receive other benefits from their help.

Handlers are permanent personnel. On the other hand,  accomplices are not necessarily permanent employees and they probably receive  only on-the-job training. They usually only provide on-site organized stalking,  and although they are often paid, they do not have any on-hands dealings with  the actual handler operations. The accomplices are intentionally kept out of the  tight operations circle, for the greater the number of people that knows about  the electronic and mind control operations, the greater the risk of discovery.

Electronic and mind control assailants also often  depend on local accomplices to help with their aims. I classify the accomplices  as active and passive. The first group (the actives) participates in street  theatrics, gaslighting, and gang stalking; the second group (the passives) knows  what is going on but keeps quiet. Unknown persons have entered my house in my  absence on several occasions and taken items and rearranged other items although  that does not happen often in my case. I get very little overt harassment from  organized stalkers.

In October of 2008 while I was away on a several-day  trip, someone entered my house and took from the center of my bed a round magnet  with which I always sleep that measures two inches in diameter by a half inch in  thickness. That magnet never leaves my bed and my house. When I change sheets,  it goes right back into the bed. I later found the magnet in January, 2009 in  the back of a little-used closet. Sometimes the intruders will enter again in  the target’s absence to replace the object in its original location to make him  think that he is losing his mind, one of their main objectives. Targets call  that tactic “gas lighting.”

Accomplices of the ESMC perpetrators perform the  actual foot work. Many of the accomplices work in legitimate businesses such as  delivery organizations. In my case, UPS has failed to deliver at least five  items that I ordered or that someone was sending to me. Two of the items were  returned to the senders without my being notified. Never once did a UPS driver  leave a notice on my door or in my mailbox that he had attempted to deliver  packages. Accomplices also work among law enforcement, in the postal system,  telecommunications companies, especially local internet providers, and other  legitimate businesses.

The local helpers of the ESMC assailants usually do  not forcefully enter houses of targets but use either a master key or an  electronic device that opens any locks. Likewise, they will never steal any item  of great value. After gaining entry, the accomplices will rearrange items in the  house or place them in locations where the target would never put them. Their  mission is: to make the victim think that he is going crazy (gas lighting); to  let the target know that they have the power to enter whenever they wish; to  remind the target that he is under constant watch; and to frighten or intimidate  the target.

Once, in my absence accomplices dropped a 9 volt  battery and six AA batteries into my garbage disposal, which I later discovered  when I turned on the disposal. The batteries had come from a night table drawer  where I keep them. That meant that the accomplices had inspected every area of  my house and had gone through all of my belongings. Covert entry does not often  happen in my case; however, it occurs frequently in the case of many other  targets.

Items taken will often consist of anything that they  believe might be helpful in their mind control efforts. For example, on one  occasion, intruders stole from my desk a roster of an  English-as-a-Second-Language class that I had taught. That theft probably  represented additional sleuthing into people whom I know, as they often mention  names when they talk to me through the V2K. Most of their information came from  the handlers’ mining my thoughts and memories.

Although the accomplices are not permanent employees  and often are not even paid (except perhaps in “favors” in fixing traffic  tickets, etc.), they play an important support role in electronic and mind  control assault. Without the goon squads who openly harass targets, burglarize  their houses, sabotage their electricity, water, and appliances, surreptitiously  enter their domiciles for “gas lighting,” strew rumors, collect extraneous  information about the targets’ lives, and interfere with the targets’ communications, the handlers’ work would be much harder, perhaps even  impossible.

Communications companies almost certainly cooperate  with the powerbrokers and their handler employees. We see that in the way  targets’ computers are manipulated by remote. Although the handlers include  computer experts, even those experts could not perform many of the things done  to the targets’ email and other computer material without going through the  targets’ internet providers. Likewise, the telephone companies doubtlessly allow  the handlers access to their facilities to accomplish many of their phone  tricks.

Deception

Deception characterizes the entire electronic  stalking and mind manipulation scheme. The biggest deception concerns the  rationale for choosing targets. The major targets are the politically incorrect  citizens, or non-conformists, who threaten the status quo, represented by the  powerbrokers. Those political liabilities include whistleblowers, political and  social activists, the militias, the survivalists, anti-government “subversives,” anti-government writers and journalists, and others who “rock the  boat.”

To deceive both targets and the public about the real  targets, the powerbrokers order the targeting of the whole profile of the  American population. Those “decoy” targets include all ages, genders, races,  colors, ethnicities, social strata, religions, philosophies, occupations and  professions, economic levels, and life styles. That subterfuge is designed to  throw researchers off track. And it does.

The hirelings of the powerbrokers who do the dirty  work do not know the true agenda of their bosses. The powerbrokers choose the  targets. The targets chosen may have angered higher-ups in their work places,  they could have been considered too religious or not religious enough in their  communities, they could have followed a life style that did not fit their  particular neighborhood or community, they could have been the wrong color or  ethnicity for the informant, or they may have had odd habits that called  attention to themselves. At any rate, the targets were not  conformists.

Most of those “decoy” targets are just plain  citizens, but among those citizens are certain groups. The targeting of  homosexuals, for example, is a result of the powerbrokers’ false target tactic.  That makes it look like homosexuals as a group are being targeted. The  hodge-podge of targets is cleverly intentional, as it keeps researchers from  identifying the real targets – the social, economic, religious, and political  iconoclasts.

The distinction between the real targets and the  decoy targets does not affect at all how the two groups are treated  electronically.  Both groups may be subjected to organized stalking and  electronic and neurological torture. Likewise, the fact that there are intended  targets and decoy targets does not preclude experimentation carried out on both  groups. The powerbrokers want to eliminate their intended targets while at the  same time get all of the valuable research results possible from both the  intended victims and the decoy victims.

Another huge deception concerns the timing of a  victim’s electronic stalking and mind manipulation program. The powerbrokers  seized upon September 11, 2001 and George W. Bush’s subsequent actions to  deceive targets into believing that their torture began after 2001. That is  colossal deception. The fact is that most of those victims who claim to have  been targeted in the period 2001-2010 were in actuality targeted years before  then. However, the perpetrators waited until then to let them know that they  were targeted, leading them to believe that they were only recently targeted.

The attackers, or handlers, also use deception to  thwart efforts to detect the assailants and their devices/methods. That  deception begins with the target’s physical harassment by remote. When a victim  is struck with ESMC, he first believes that the objective is to torture him  physically. Although the handlers gleefully apply those torture techniques,  their real and end objective is mind control. Experimentation figures greatly in  that objective.

One of the best examples of deception is seen in the  voice-to-skull (V2K) contact between handlers and targets. The handlers use  simulated voices and simulated accents. They also often change their voices and  employ recordings of other voices to convince the target that there are several  handlers present at all times. Computer programs that allow the handlers to  achieve that deception are widely available.

Handlers will also attempt to persuade the target  through deception that they represent various ethnic, religious, political,  racial, and other groups. They once told me that they were from south China.  They have also used stereotypical Deep South black accents and Hispanic accents.  I often get “wrong number” calls from black- and Latino-sounding people from  various area codes in the United States.

They very often pose as Christians and try to make  the target believe that they are practicing behavior modification. In many  cases, the handlers supposedly try to convert the targets into good “Christians,” which, considering the cruelty and unlawfulness of the criminals  using the devices, is a real joke. Nevertheless, those tactics sometimes work. A  few targets have even allowed themselves to become “converted” only to discover  that their conversions did not end the effects of the ESMC. Again, total  deception.

In my case, the handlers often show me holographic  pictures of a man in robes who is generally believed by Christians to be Jesus  and tell me that I am going to hell. Again, that is total deception. I taunt  them that the picture could not be authentic because it is not autographed. I  have learned to project back to the handlers holographic pictures, so I often  toss back their holographic picture of Christ showing him in drag, wearing spike  high-heel shoes, earrings, and lipstick. The handlers pretend to be very  affronted. That also is deception, for the handlers possess no shame, morals, or  decency – and certainly no religion. Moreover, the holographs themselves are  deceptions (read about holographs in another section of this paper).

The religious conversion ploy was noted by a  whistleblower who worked with the U.S. National Security Agency (NSA) under a  defense contract. That person wrote in an internet article: “. . . the subject  is unknowingly given hypnosis while the subject is completely awake and is  tortured and punished with this hypnosis into a predetermined behavior by the  National Security Agency; . . .  the behavior is usually extremely religious, is  called ‘reborn’ by the church, with the subject’s life-long goal of ‘a personal  relationship with Jesus Christ.’” The NSA uses this technology [electronic  stalking and mind control] to resocialize (brainwash) the US civilian . . .  population.”

There may indeed be a link between the U. S.  Government and Fundamentalist churches. It is worthwhile noting that many  Christian churches today receive government grants, an act once believed to  violate the principle of separation of church and state, which began in the  1970’s. Many so-called Christians are thinly disguised bigots. When I ask TIs to  describe their symptoms, when those symptoms began, and their general physical  environment, they very often mention that a hostile Fundamentalist minister  lives next door, across the street, or very nearby. A law enforcement officer  will also often live very close.

Despite the deception, every target knows that the  handlers themselves cannot possibly be true Christians and could not possibly be  truly religious in any fashion. Christians do not torture people, break up  families, cause people financial hardships, hack computers and tap phones,  intercept mail, stalk people, invade people’s minds, and attack people sexually.  Neither do good Moslems, Jews, Shintoists, Hindus, Buddhists, and others. If the  scumbags who handle targets are Christians of any type, the spiritual world of  Christianity has no validity.

The handlers also cleverly use deception in confusing  targets concerning shielding. They allow some types of shielding to be partially  effective for some targets and not effective for others. They also allow some  types of shielding to be effective for a few days only to disappoint the targets  by resuming the electronic and neurological attacks a few days later. Targets  argue over the shielding devices and methods. That is by design, its purpose  being to delude targets about shielding. To my knowledge, no type of shielding  has proven entirely protective for all targets.

The handlers have the capability of deceiving targets  through hacking their computers and tapping their phones. For example, when  handlers use AT&T to call from a non-existent area code using a non-existent  number, targets think that company cooperates with the handlers. I recently got  a call from 111-111-1111. The phone’s Caller I.D. showed, “Unknown name.” Some  of those communications providers probably do allow the use of their facilities  by the handlers at the request of the Government; however, whether they approve  or not, the handlers are able to use their communications systems.

Handlers can even hack into targets’ email accounts  to send messages that damage the reputation and credibility of those hapless  victims. Several targets have accidentally found some of those fake messages on  the internet while communicating with others. One of their favorite tricks is  planting kiddie porn in targets’ computers through attachments not readily  viewed. They can also intercept victims’ emails and edit, substitute, or delete  their attachments. That has happened in my case.

Extortion is another deception. My handlers have  mentioned various amounts of money to me for payment to them on several  occasions, suggesting that the payment would end the ESMC. That is absolute  deception. In the first place, the protocol that the hireling handlers must  follow probably prohibits that the handlers ask for or receive money from  targets. And secondly, the handlers do not have the authority to determine when,  if ever, a target is released from his torture. Only the powerbrokers who  control the handler hirelings can do so. The corollary to the extortion  deception is offering the victim rewards if he joins them. The handlers have  urged me on several occasions to join them. I laugh at them.

The handlers also deceive through playing “good  cop-bad cop.” My handlers always deride my work efforts and methods in their  subliminal talking as I carry out home improvement projects. They taunt and  belittle me as I work. Then, after a few minutes of blustering and disparaging  the activity, one of the perverts will make a very complimentary remark about  some aspect of the work. I am supposed to warm up to the “good cop” and then  cooperate with him in his mind control efforts. To an educated target, their  psychology is insultingly juvenile. I call it “pre-nursery school  psychology.”

They also deceive targets into believing that they  have been poisoned. Many targets complain that the food and beverage kept in the  refrigerator taste strange, and they think that their handlers have poisoned it.  The handlers often do toy with the target’s senses, making their taste buds play  tricks on them. Sometimes targets become ill after eating or drinking something  that had been previously opened and left in the fridge, re-enforcing their  belief that they have been poisoned.

The handlers do indeed have the capability of causing  severe indigestion and other gastric problems, and they can even induce  vomiting. They want targets to believe that somebody is entering their domicile  and poisoning the food and drink. That is part of their psychological bag of  tricks, and it is far too overt to fit into the handlers’ covert operations.  Rarely do handlers and their accomplices actually tamper with targets’ food.  More deception.

Handlers will often deceive targets into believing  that they are law enforcement officers and intelligence agents. If the handlers  were either, they certainly would not convey that to the targets. Whenever  handlers identify themselves through V2K as local law enforcement or the FBI or  CIA, targets can be sure that they are most definitely NOT.

Their deception even involves national politics. In  the 2008 Presidential Election, I supported Barrack Obama, and I was among only  a handful of white voters in my area to do so. The handlers vociferously  lambasted me subliminally for my views, instead lauding McCain and often  praising George Bush and Dick Cheney. They wanted me to believe that they were  pro-Bush elements. The objectives of the handlers cut across all political,  religion, and economic thought.

Many targets believe that cell phones are used as  weapons by their handlers and accomplices and that they are attacked from cell  towers. I confess that at one time I also believed that; however, after studying  the causes and effects, I believe that neither the cell phone nor the cell tower  can be used as weapons although they are used to aid the handlers’ communication  and perhaps their ability to locate us. There may even be a way for cell phone  users to press certain numbers and signals to cause some physical effect on  targets. If that is true, the cell phone itself does not actually do anything  but only communicates with the handlers’ device(s), which delivers the effect.  There is no doubt that the handlers use cell phones extensively, but as tools,  not as weapons. I believe that information widely disseminated on the web about  the role of the cell phone and cell towers in our ESMC is largely deliberate  misinformation and deception.

Lights are also often used to deceive targets.  Several correspondents believe that lights shining from their neighbors’ houses  are used on them as weapons. I suggest that that is intentional deception. The  neighbors are probably only accomplices who focus the lights on the targets at  the handlers’ bidding. The handlers then plant the idea in the target’s psyche  that his electronic and mind control effects stem from the lights. If the lights  were causing the targets’ ESMC, all they would have to do is change locations to  avoid those effects.

If a target gets the V2K, his handlers will make him  think that they do all of the talking that he hears in real time. That is  absolutely false and deceptive. If a target notices, much of the handlers’ talking is repetitive. That is for good reason, for the handlers often use  pre-recorded drivel while they sit there and occasionally intersperse that  material with their real time voices.

In addition to playing the pre-recorded material  interspersed with their real time voices, the handlers can also with the touch  of a key or symbol on their computer keyboard cause targets to hear pre-recorded  words, phrases, and sentences. In my case, they often play the sound of a shrill  female voice screaming at me. The voice, message, pitch, and cadence are always  the same, a very obvious recording.

Duplicity and deception are practiced in every form,  particularly with those targets who hear the synthetic telepathy. For some time,  my handlers have repeated my conscious thoughts back to me. In doing so, they  use a voice similar to mine to try to make me think that it is an echo of my  real voice. One day I intentionally relayed to them a thought but stopped  suddenly at the first syllable of a four- or five-syllable word. The handlers  did not realize my trick fast enough. The second voice finished that long word.  So much for the “echo!”

An exception to their repeating my exact words occurs  when I pray to The Great Spirit. Every time I use the word “day,” the handler  who is repeating my thoughts will say “damned day.” The word “damned” is code  and is symbolic of my being on their hit list, thus damned, or condemned. Does  that bother me? Not at all. Knowing the evil, sick nature of the handlers, I  feel pride at being included on their hit list. I often tell them, “Whatever you  nut cases stand for, I am against it. I’m on the opposite side.”

As already mentioned, the handlers have damaged my  eyesight so that images on TV and the captions appear blurred. I thought for a  long while that the damaged eyesight came from pin prick sensations that the  handlers caused to my eyeballs, particularly the left one. However, I later  realized that my failing eyesight is caused by either (1) a computer program  that controls one’s eyesight, perhaps a special microchip invented supposedly  for the seeing impaired or (2) neurological suggestions to my subconscious that  affect the eyesight. The handlers can accomplish the latter by instructing a  target’s subconscious for example that when it sees a number seven, it will look  like a number one. They can use variables of that neurological method to make  what a target sees to appear blurred and unintelligible. Remember that the name  of the game is mind control.

Deception is also used in organized stalking by  accomplices of the handlers. Here is an example: You are being interviewed for a  job and the interviewer is friendly and appears very interested in hiring you.  Then, the interviewer suddenly gets a phone call, and when he hangs up, his  demeanor changes. He icily informs you that he cannot hire you without giving  you any other explanation. He abruptly ends the Interview. This is pure  theatrics. The interviewer had been warned in advance to string you along and  then dash your hopes for the job. That is the way the perps operate.

Such is the nature and the planning of deception that  it may have even been used in convincing targets that microchips are the basis  of their electronic stalking and mind manipulation. A grand deception! The  powerbrokers may have spread misinformation about microchips for years, knowing  that finally targets were going to realize that their torture could have come  from other devices. By the time the truth emerged about capabilities of “hooking” targets without using microchips, the myth of microchips will have  become firmly established and difficult to dislodge.

The perps attempt to delude the targets, especially  those who receive the V2K, about their identity. That is, of course,  intentional, and it is done in an oblique manner. The handlers will very rarely  say that they are a specific group. If they do, they are lying. However, they  will make statements, use expressions, and make insinuations that lead targets  to believe that they belong to various groups and organizations. Here are some  of the ones they have tried to make me believe that they  represent.

– Mexicans or U. S. Hispanics. The powerbrokers do  indeed often use Latinos as accomplices; however, the powerbrokers are NOT  Latinos. In my case, the handlers sought to deceive me into thinking that my  assailants were Mexicans/Hispanics because of my strong stance on illegal  immigration.

– Local law enforcement. The handlers have never  stated that they are local police or sheriff’s deputies; however, they often  talk about an “investigation.” I tell them to investigate their asses  off.

– CIA/FBI. I intentionally goad the handlers. When I  think of the CIA, for example, I think, “Waterboard those bastards to death.” The handlers act incensed. Likewise, I often telepathically call the FBI “the  fuck-ups.” Again, the handlers pretend to be offended.

– Extortionists. On several occasions, the handlers  have demanded certain sums of money, promising on delivery that they would, “Let  me go.” I reply, “It’s not a matter of letting ME go. No, it’s I who’s not  letting you scudsballs off the hook.” I often add, “You cowardly pieces of s—t  don’t worry me at all; on the contrary, I worry the very hell out of  you!”

– U. S. veterans. I opposed both the 1991 and the  2003 Iraq wars. I also oppose our presence in Afghanistan. I often make  telepathic insulting remarks about American politicians who have endorsed those  wars and the officers who engage in them. One of the handlers once told me that  he had served in Vietnam. I told him (through synthetic telepathy), “You stupid  jerk, no wonder we lost the fucking war.”

– Foreigners. In addition to Mexicans, the handlers  have told me that they are Chinese living in south China.

– Local posse comitatus. The handlers have often  told me to leave the parish, that they were sending the “death squad,” and that  they were going to burn my house down. I tell them, “Bring it on, you cowardly  little turds.”

– Republicans. I was a Democrat for many years  before switching to Independent. However, I supported Barrack Obama in the last  election and I still support much of what his administration does. The handlers  often ridicule me for my belief in President Obama, wanting me to think that  they are Republicans and that they are anti-black.

– Evangelicals. One of the continual themes that the  handlers peddle is “born again” type Christianity. They often remark, “You’re  going to hell.” They make allusions to Jesus and other Christian symbols. I  retort with, “Yeah, you lovely, kind, upstanding, angelical Christians. What  would the world do without you?”

– Blacks. Like Hispanics, blacks often participate  as accomplices in organized stalking activities. The handlers often simulate  Southern-type blacks in “wrong number” calls, and they project voices to me when  I’m in the presence of blacks, trying to make me think that the voices are those  blacks.

– White supremacists. The handlers often make  remarks similar to KKK propaganda and berate me for friendships with blacks and  others.

– East Indians. East Indians are occasionally  accomplices. On several occasions, East Indians have entered the scene of my  stalking. However, although Indian scientists probably do have electronic and  mind control technology, the East Indians who figure in my stalking are probably  simply pawns.

– Zionists. As the reader already knows, I am  avowedly and fervently anti-Zionist. The handlers attempt to convince me that I  am wrong and that Zionists, and Christianity and Judaism, are the pillars that  hold up the world.

– Anti-gays. The handlers often allude to friends  who are gay, and they make fun of me when I correspond with gays.

– Behavioral modification experts. As already  mentioned, if one of the handlers’ objectives is behavior modification, it is a  sick modification. They often induce dreams depicting children and then, through  their software and neurological whisperings, attempt to cause erections, thus  associating the erections with the children. They also mention relatives of both  genders while attempting to cause the arousals. There is no doubt in my mind  that the handlers attempt to modify behavior, but they seek to develop a  depraved behavior doubtlessly to attempt to discredit the targets.

– Neighbors. The handlers have called my attention  to outside street lights at my neighbors and tried to make me believe that  somehow the lights were responsible for my electronic stalking. They have also  planted ideas in my mind that those same neighbors are plotting against  me.

– Former neighbors. The handlers enjoy recounting  anecdotes from my early life in the community where I grew up. They talk about  people whom I knew back then. Learning that information is very easy. If their  objective is to make me believe that former neighbors are part of the scheme,  they have failed.

– Patriots and “The Radical Right.” I often ridicule  anything that relates to the Far Right. I sing ridiculous words to the tune of  The Star Spangled Banner. The handlers pretend to be affronted.

– Former classmates. One of the handlers’ favorite  taunts is that they went to grammar school with me. Grammar school is what we  called today’s elementary school in the Deep South when I grew up. I ridicule  them when they tell me something about grammar school by remarking, “You  nitwits, everybody knows that you didn’t even go to grammar school. You couldn’t  have because you don’t know any f–king grammar.”  They say the same thing about  going to high school with me. The object is to make me suspicious of those  former classmates and perhaps even avoid them. It does not work.

The imbeciles do not stop to think that if they claim  to have attended either grammar school or high school with me, it automatically  eliminates them from being black or Hispanic or foreign. I went to segregated  all-white elementary and high schools, and in those days, there were no Indians,  Hispanics, or any other ethnic group in my area. It also eliminates my current  neighbors, for none of them went to school with me.

Moreover, I know the classmates who went into law  enforcement, the armed forces, and government work. There were very few who did  so. The handlers would never allow targets to pin them down to such a small  number of possibilities. As for the remainder of the deceptive groups, much of  the population in my area could easily be Evangelicals, Republicans, White  Supremacists, anti-gay, Zionists, and the types to participate in a posse  comitatus.

– Pro-Israel Jews and/or Israelis. Building upon  their perceived notion that I am anti-Semitic, the handlers often state in  whispered voices so low in volume that my conscious can scarcely distinguish  them, “(My son, whom they call by name) is a Jew.” I call that pre-nursery  school psychology on their part. Their reasoning is that if I hate Jews, by  associating my son with Jews, I will also hate him. Just another futile attempt  on their part to drive a wedge between my son and me. Their statement also  serves the reverse: if I love my son, I’ll also love Jews. The disingenuous  attempts by the handlers to use psychology are sometimes utterly amazing. My  attackers also state in the same low voices that usually only my subconscious  picks up, “Israel is your friend.” Yeah, sure. So are coral snakes, scorpions,  and man eating sharks.

– Experimentalists. Particularly in their mind  games, whenever I use my mind to thwart their efforts, a recorded voice will  repeat, “Good.” Although I know that the voice is a recording, I usually reply, “What would you sick bastards know about good?”

If readers get the microwave telepathy, the above  deceptions are probably all too familiar to them. Targets should not be confused  by what the handlers tell them, as they are chronic liars. Lying and deception  are a major part of the overall evil scheme.

Impostors and Disinformation  Agents

The powerbrokers employ an army of disinformation  agents who flood the internet with erroneous and misleading information on ESMC.  Every country has an intelligence agency with an operational section whose aim  is to spread false propaganda over the media. The United States of America is no  exception. The propaganda machine spreads misinformation over the internet  through several types of “plants.” Some examples follow.

  • Webmaster “plants.” Persons with web sites visited  by many people pretend that they were abducted by aliens, tormented by people  who look like lizards, and subjected to rituals performed by Reptilians. They  link ESMC with UFOs. One of the favorite lies is that a group of families called  the Illuminati or the Masons seek to control the world. More recently, the  misinformation agents have convinced many targets that they come from a  particular genetic strain or blood line and were thus targeted before or from  birth. Many of the TIs who actually believe those things are very well meaning  and have been convinced of those inaccurate concepts through voice-to-brain  emissions. That is exactly why we call that activity “mind control.”
  • Internet blogger “plants” intentionally strew  erroneous material in their online blogs.
  • Members of various TI internet forums write  pedantic, argumentative, and misrepresentative emails in the forums. In those  emails, they refer viewers to lies disseminated in bogus web sites and other  locations. Some of those TI “plants” relate convincing stories; however, usually  they trip over their many lies and astute TIs can often identify them as  impostors.
  • Authors publish lies and misleading information in  on-line articles, in magazines, and even in books about electronic assault and  mind control.

Not all of the information spread on the internet and  in articles and books is false by any means. Even many of the people who  disseminate misinformation and disinformation are very sincere. I do not pretend  to be expert in determining which information is false and which is true;  however, I have learned that much of it is utter deceptive. Electronic assault  and mind control itself is incredible enough without being compounded by  deliberate lies disseminated by the ESMC perpetrators.

Let me be perfectly clear. The perpetrators of mind  control are NOT aliens from outer space. NOT members of the so-called  Illuminati. NOT men who can change to reptiles and lizards and other paranormal  shapes. NOT ritualistic sex lords seeking sex slaves. NOT men seeking to wipe  out particular blood lines and genetic groups. NOT the Masonic Order although  some of them may be Masons. Targets who believe those deceptions have been  successfully manipulated by the perpetrators.

Even should the perpetrators be one or several of the  above, the government has to know about their electronic activities. Hundreds of  intelligence agents continually search the air waves for unrecognizable  electronic signals. They could not fail to locate the frequencies over which the  perps perform their electronic stalking and mind control. That proves to my  satisfaction that the perpetrators pursue an agenda approved by the government’s  powerbrokers.

The powerbrokers behind electronic torture and mind  control fear the targets’ networking over the internet. Web sites dealing with  ESMC are often subjected to internet intimidation by having their information  deleted or otherwise compromised. Some targets have had to change the names of  their sites several times because of that interference. The internet may well  become the catalyst that exposes the ESMC devices and methods and who lies  behind them.

Experiments and the  Government

In the Cold War that followed upon World War II, the  oligarchies that ruled the world’s governments saw the usefulness of mind  control as a weapon. Although leaders at first probably perceived mind control  as a neurological weapon to be used only on foreign populations, they also  recognized its value in quelling civil uprisings and controlling the domestic  population. In the United States of America, although the CIA and other  intelligence-gathering and law enforcement agencies have intentionally destroyed  most of the records that incriminate them, shreds of remaining evidence show  that the Government has conducted mind control experiments on U. S. citizens on  American soil since the 1940’s.

If the aim of the Federal Government is only  surveillance of possible terrorists, there would be absolutely no need for the  use of directed energy weaponry and mind control. Thus, there must be another  explanation for the electronic effects and mind control activities. That  explanation is doubtlessly experimentation. Some targets believe that the  government is past the experimentation stage and is now employing the results of  that experimentation. While the latter is probably true, there is no end to  experimentation. Experiments are ongoing and never ending, as they lead to still  more spin-off experiments.

The government has the keenest interest in two  principal areas, the genes and the brain. The former includes DNA studies. The  government finances countless projects in research institutes and university  labs to map every molecule of the human brain and determine its function. To do  so requires experimentation. Much of that experimentation must be performed on  unknowing and involuntary human subjects to be accurate.

The Government as a whole does not conduct  experiments. The U. S. Government consists of three branches: the executive, the  legislative, and the judicial. The latter two can be eliminated as experimenters  based on pure logic. Thus, if the Government is indeed involved in ESMC, it must  be through the executive branch, which includes the Department of Defense,  Department of Homeland Security, and all intelligence and law enforcement  organizations. Fusion Centers, Neighborhood Watches, Infraguard, and other  watchdog-type entities also fall under the executive branch of government. That  the electronic stalking and mind control activities might emanate from the  executive branch of the U. S. Government helps explain why the intelligence and  law enforcement offices under that branch refuse to take action on targets’ complaints.

That may also help to explain the experiments. The  DOD continually searches within the business/manufacturing complex, including  pharmaceutical companies, as well as academia for inventions that are applicable  or adaptable for use in neurological warfare. Thus, those inventions have become  very lucrative, as the DOD not only funds many of the research projects but also  buys the resulting devices and methods, paying millions of dollars for the  patents and copyrights or for the development of those patents and copyrights  under defense contractors. From the 1950’s to the 1970’s, more than eighty U. S.  institutions, both public and private, participated in developing devices and  methods for controlling the human mind using public funding. The irony is that  victims of electronic stalking and mind control are paying for their own  torture.

Each section of the brain and many tiny nuclei and  cells of the brain determine all of the person’s thoughts and bodily functions.  The U.S., Russia, China, Israel, and other countries compete with each other in  mapping the human brain. That purpose is not purely humanitarian but a  competition for neurological dominance over the remainder of the world.  Scientists work tirelessly toward that end, for knowing how the brain functions  and malfunctions provides the basis of mind control.

The study of intelligence  is important for brain mapping and thus mind control. An online article by  Amanda Gardner, a Healthday Reporter, on February 26, 2010, describes what  scientists have determined about “intelligence.” She quotes Jan Glascher, a  postdoctoral fellow in the department of humanities and social sciences at the  California Institute of Technology in Pasadena and lead author of a paper  appearing in that week’s issue of the Proceedings of the National Academy of  Sciences, as saying that their studies show that “general intelligence  relies on the connection between the frontal and the parietal [situated behind  the frontal] parts of the brain. Those are “connections between the gray matter,  or cell bodies, and the white matter, or connecting fibers between neurons. . .  .”

Paul Sanberg, professor of neurosurgery and director  of the University of South Florida Center for Aging and Brain Repair in Tampa,  states that studies such as those “. . . allows them to systemize [sic] and  pinpoint areas important to intelligence.” Learning those “pinpoints” is what  the experiments are all about.

To sell the software, devices, or methods to the U.  S. Government for its neurological warfare and domestic control programs, the  inventors must present credible evidence that they work. To do so requires that  every patent or copyright be tested and re-tested in experiments to be deemed  functional and useable. Those tests can only be carried out on human beings, and  for the tests to be valid, the test subjects must be completely unaware of the  testing. When proof of the successful testing is presented to the government,  the inventors have to reveal the names of those targets who are tested and  present a profile of those persons. Thus, some government agency probably  retains the names of those victims in its files.

Interest in brain mapping makes a good case that  experimentation is one of the causes of electronic stalking and mind control  assault. In addition to specific persons chosen for testing because they possess  some particular characteristic, other targets may simply be targets of  opportunity. Still others be selected because they are considered  anti-government, domestic terrorists, or likely to become domestic terrorists.  Others may be alcoholics, drug addicts, and other categories of “expendables” that law enforcement would approve removing through a twisted concept of social  cleansing.

Our remote attackers use the same devices and  techniques as those proven to be owned and used by the U. S. Government. If the  U. S. Government does not engage directly in the electronic stalking and mind  manipulation effects, it is certainly in collusion with those who do. I use the  word “collusion” because if a person or organization aids and abets an illegal  action, he or it is a “collaborateur.” That makes that person or organization  equally guilty.

A Rationale for Electronic Stalking and  Mind Control

Why would any person or organization spend so much  money, time, and effort in “hooking” a target and then blitzing him by remote  with continual and barbaric directed energy weapons, electromagnetism, and mind  control? Two reasons come to mind. The perpetrator(s) either wish to (1)  neutralize the target or (2) use him for experimentation.

The first reason, neutralization, comes in many  forms: ostracizing him, making him unemployable, breaking him financially,  causing him to commit suicide, or gradually murdering him with the accumulated  and sustained effects of the electronic stalking. It is probably safe to say  that all types of harassment, organized stalking as well as electronic stalking  and mind control, seek the neutralization of the target. The perpetrators decide  whether only to harry the victim or eliminate him entirely.

If units of the United States Government were  involved in the neutralization of a target, there would be absolutely no need  for the continual torture and mind control of the victim unless those units  first wished to extract information from the target. Even then, isolating the  victim and causing him much personal suffering appear far more drawn-out and  probably less cost-effective than would be necessary simply to retrieve  information from that target. Unless rogue elements of the government who wish  to inflict as much damage on the target as possible are involved, I believe that  the government would deal far more directly with the victim in neutralizing  him.

Thus, it is my opinion that the U. S. Government is  probably not interested in electronic stalking and mind control for only  neutralization purposes. The perpetrators are far more likely to be nut cases  representing the Radical Right, hate groups, perhaps certain Far Right rogue  groups from the executive branch, foreign governments who have axes to grind  with the particular targets, and vendetta cases involving the private (and  sometimes public) sector(s). Nevertheless, intelligence and law enforcement know  about those attacks and do nothing to prevent them.

The second reason, experimentation, may not preclude  eventual neutralization. However, the perpetrators are more interested, at least  initially, in using the target to test their electronic and mind control  theories. Mapping the brain is a high priority. They obviously view the target  as “expendable,” so if the victim dies or commits suicide as a result of the  experiments, they simply replace him with another target.

When we ask the question “Who would gain the greatest  benefit from experimentation?,” the U. S. Government now enters the picture. The  government stands to advance greatly its neurological and biological warfare  program through experimentation on involuntary targets. So do foreign powers  using American citizens as targets. In addition to the government(s), the  private sector and the public education sector also often require testing on  human subjects to perfect and market their products, especially those dealing  even remotely with mind control.

On the other hand, the Radical Right, hate groups,  Far Right rogue government groups, and those seeking vendettas, would have  little interest in experimentation. Their sole aim is to make life unbearable  for the target and eventually neutralize him. In attempting to determine the  identity of their perps, targets would do well to consider these points.

The Experimentation  Process

If indeed experimentation is one of the causes of  electronic stalking and mind control, it must be carried out through several  sequential steps.

– First of all, teams of psychiatrists,  psychologists, electrical and other engineers, radio experts, physicists,  medical personnel, propagandists, and others representing scientific equipment  manufacturers, research institutes, and universities must gather information on  and conduct research into the most efficient, quickest, and most cost-effective  form of neurological enslavement. The teams work independently on specific  segments of neurological forms of capturing the brain. The purpose is that few  scientists involved will know the entire process.

– Then, the many research results must be packaged  into a useable method for application by an ultra-secret group of professionals  in every field. Although the private sector has the means to perform the  research and produce the devices and other results of the research, only an  apparatus such as a government, with its wide range of authority, unlimited  financial resources, and cover of secrecy can turn those efforts into a combined  and viable product. That product is a mind control method for capturing the  minds of humans for their total manipulation and control.

The method had to first be spelled out in narrative,  probably in the form of a user-type manual, much like instructions for using a  machine or assembling an object. Those manuals are so highly classified and  protected that only the highest government officials can access them. Most  government officials do not know of their existence. The manual is probably  recorded on a thumb-drive type device that cannot be copied and probably fewer  than a half dozen of them exist.

– The product, or the neurological blueprint for  conquering human minds, however, is meaningless without a delivery system that  links the research results with the targets. Thus, a means must be developed to “hook” the human brain through some process. That process must be remote, as  targets will not voluntarily submit to mental castration, and it must be silent  and secret, so that targets will not realize that their minds have been “hooked.” We do not yet know what device or method is used to snare the human  mind but we shall in the future.

– Once the delivery system is in place and the  targets’ brains hooked, personnel must be trained to test the  device(s)/method(s). The original trainers had to have been the scientists and  others described in Number 2 above working directly under top governmental  authorities. Those trainers at first probably trained only a small group who  would serve as “handlers” to carry out the testing, or experiments, on human  targets. Once those handlers learned the techniques of mind control and the  device/method for applying them, they in turn trained others. The training was  carried out using no written instructions and thus leaving no evidence. Trained  handlers now doubtlessly number into the thousands or tens of  thousands.

– The results of the research and the delivery  system must then be tested. Every neurological objective must be tested on all  of the targets, who serve as experimental control groups for that purpose. The  mind control components tested represent thousands of individual experiments  ranging from simple to very complex. That testing began in the 1950’s, perhaps  still earlier, and continues today. The testing is carried out in prolonged and  ongoing experiments on selected targets and groups of targets. We shall discuss  those experiments in the following text.

– The data is collected and categorized, examined,  and graded on the extent of accomplishment of the desired neurological effects.  The overall effect is analyzed by experts. Data processing centers with super  computers are established to record all experimental results. The super  computers use a series of key words to extract all meaningful information,  categorize it under certain topics, provide racial, gender, and other  statistics, and otherwise refine and edit that information in useable form.

– The analyses lead to continual ongoing corrections  and readjustments of the neurological methods and the delivery system. Teams of  experts continually work on perfecting the system.

– Then, the methods and device(s) are retested,  which means that handlers must receive occasional on-site instruction from  representatives whose jobs are to update and retrain the handlers. The  instructors also doubtlessly communicate with the handlers continually through  secure email sites and telephone calls.

The neurological experimentation activities required  years of preparation. Many very intelligent people worked on the plan,  doubtlessly including psychiatrists and psychologists, behavioral scientists and  other scientists in all areas of research, very high level government  bureaucrats, representatives of the U. S. intelligence community, top level  military leaders, scientific and government liaison personnel employed by big  business, top medical brains, probably selected religious leaders, and perhaps  even representatives of selected foreign “allies.” At first, the planners worked  on the device(s) for carrying out mind control, what they wanted those devices  to accomplish, and the techniques and methods of plying the mind control  activities. The training and testing would come later.

Inventions of countless devices and techniques have  been patented, ostensibly for humane medical interventions; however, one needs  only little imagination to recognize that many of those inventions are suitable  for and probably actually intended for more sinister purposes. I shall not  attempt to discuss those inventions. One can search for those patents on the  internet. There are scores of them. Many of those items and methods were clearly  intended to be used for neurological warfare. Once those inventions could be  operated by remote, they were ready to be tested on human  subjects.

We still do not know the criteria that the  experimenters used in choosing their human guinea pigs. Nor do we know, once the  targets were identified, how their minds were seized for the experiments and the  results monitored and recorded. Did the Government provide a list of people, or  types of people, for experimentation that it considered “expendable?” Or did it  insist on approving the targets used for experimentation? The scientists who  conducted the experiments hid behind innocuous research titles and often argued  that their devices and methods could improve the lives of human beings. Yet, any  perceptive reader could read between the lines in imagining the military  applications of those neurological inventions.

Experimenters must meticulously record their  activities and show the results of those activities. The guinea pigs used in  those activities had to be identified through a name, number, and probably some  other symbol for purposes of documentation, discussion, and retesting. Thus, the  real names of the targets and their backgrounds and personal data must be  recorded in some classified files.

Why the U. S. Government Would Permit  Experiments on Americans

Why would the United States Government allow those  inventors and military contractors to experiment on Americans on American soil?  Think about it. Here are several plausible reasons:

  • Human resources to serve as experiment testers, or  handlers, are readily available in the United States to carry out the  experiments on selected human targets. Consider some of the possibilities for  handlers: active and retired military personnel, active and retired law  enforcement officers, highly trained technicians in labs, manufacturing  businesses, and other industries who have been laid off from work due to the  current economic conditions, recent college graduates looking for a job when few  jobs are available, and other personnel who do not work or who are retired. It  is little wonder then that the handlers know the regional accents and vernacular  to use with targets in particular locations in the country, for the handlers,  just like the targets, represent a profile of the American population. They are  from all parts of the country.
  • Targets in the United States abound. Naturally, the  power brokers who sponsor the experiments probably first looked for targets in  the more vulnerable people and among those citizens who might be considered by  many as “expendable.” These include older people, especially those in rest homes  and other institutions, single men and women who live alone, drug addicts and  pushers, those who have been diagnosed with mental conditions, and others.  However, eventually the powerbrokers saw the feasibility and the desirability of  targeting individuals who might somehow pose political and other threats to the  establishment. Thus, when guinea pigs live in the immediate surroundings, why go  halfway around the world to find the guinea pigs?
  • Targets for experimentation probably represent all  ethnic, racial, gender, socio-economic, political, and age groups, life styles,  philosophies, educational levels, trades and occupations, and many religious  groups. Should local handlers have a hand in selecting targets, those targets  may include co-workers whom the handlers do not like, neighbors with whom they  don’t get along, merchants or businesspersons with whom they have had  difficulties, and even family members from whom they are estranged. Most of  targets with whom I have communicated appear “typical” Americans that cut across  every stratum of society. Other correspondents are ex-convicts (non-violent  offenses) and past drug users.
  • Security is much better in the U. S. than it would  be abroad. With the protection and non-interference of law enforcement, the  cooperation of psychiatrists who label TIs schizophrenic, and the ability to tap  phones and hack computers, secrecy can be ensured in the United States much more  easily than it could abroad. Moreover, handlers in the United States will not be  subject to capture as spies, jailed, and forced to reveal the operations.  Detection of United States experiments in other countries and the exposure of  those secrets could seriously damage the development of U. S. neurological  warfare projects and set the research back for years, as most of the American  people would probably oppose those activities once they were known.
  • The United States population is extremely diverse  and includes almost every ethnic group in the world. Why go to China to target  Chinese when they can be targeted in the United States? I have corresponded with  targets in the United States who are Oriental, Caucasian, Negroid, and Native  American.

Just how targets are selected is not precisely known;  however, we can use logic in exploring that method. Emphasis is probably given  to what many people consider “expendable” elements of the population, i.e.,  prisoners and ex-cons; old people in rest homes; homosexuals and lesbians; gang  members; anti-government activists and suspected subversives; drug dealers and  addicts; political dissidents, and other “troublemakers.” Those people, however,  do not possess all the qualifications required for valid experiments. Thus, “non-expendable” citizens such as schoolteachers, small businesspeople,  scientists (including social scientists), students, and others may also be  targeted if they possess the characteristics that the experimenters seek.

  • English is the dominant language for all computers.  Thus, English is the preferred language for the handlers. The data base on the  experiments is kept in the English language although the computers can also  translate the data into other languages.  are also used by handlers and  translated simultaneously by computers for the data processing centers (more on  them later).
  • Logistics for managing teams, training personnel as  handlers, and maintaining and securing the data obtained are far easier within  the United States than they would be abroad; thus, the experimenters can  exercise greater control over the experiments in the United States.
  • Managers of the teams and data collected have to  operate in only four time zones in the United States, as opposed to operating  many hours away in foreign countries.
  • The experiments can be carried out much more easily  and economically in the United States. Imagine having to recruit handlers  covertly in a foreign country, ensure their loyalty and secrecy, provide them  the necessary equipment and training, and pay them (probably in hundreds of  off-shore foreign accounts in countries such as Switzerland and the Bahamas).  Although the government’s financing is limitless, it has to use its “secret” money (those funds that the American public does not know about) wisely.
  • The turn-around time between testing, analyzing, and  making corrections can be greatly reduced if the experiments are conducted in  the U. S.
  • U. S. military bases, the Pentagon, and other  well-guarded installations provide secret sites for use by trainers and data  collection and processing.
  • Many self-righteous United States leaders  undoubtedly espouse a sick philosophy that embraces “social cleansing.” In other  words, “expendable” elements of the population are deemed suitable for a Final  Solution. Does that ring familiar? The military-business establishment knows  that it will have no problem getting assistance from sickos who will participate  in that scheme.
  • At the same time, I believe that pro-Israel factions  in the government see in the experiments an opportunity to eliminate Israel’s  enemies within the United States. I have corresponded with several individuals  who believed that they had been targeted because of their views toward Israel  and Israel’s policies. What better way to dispose of your enemies than by  ensuring that they be selected as targets for experimentation, which often  effectively eliminates those people as functional beings? Other “friendly” countries may also be able to nominate targets within the United States.
  • Satellite imagery pinpoints every house and  temporary building, road or lane, and every stream in the United States. That as  well as the easier logistics and communications of operating within the  country’s borders, aids surveillance and neurological assault immensely. By  Googling, internet users can pull up images of their own dwellings. Oftentimes,  the occupants will be shown in the yards when the images were taken. If the  average citizen can do that, imagine what secret government technicians and  computer experts can do through satellites.

Some writers state that science has not yet reached a  point at which it can develop satellites capable of focusing on an individual in  his house and following that target. I totally disagree. Secret scientific  capabilities are eons ahead of known scientific capabilities. If scientists can  send unmanned rocket ships to the moon and mars, land those crafts, send out  smaller remote-operated vehicles to gather rock samples and other materials,  bring them back to the ship, and then return the space ship to earth, all by  remote, they can most certainly contrive a method for targets on planet earth to  be handled by satellite by remote. The use of satellites along with GPS appears  to me not only possible but very likely. If satellites do figure in the ESMC,  the range could be thousands of miles.

In my case, it is not highly likely that my  neurological assailants live very close, for I live in a very rural area with no  really close neighbors. That, of course, depends upon the range of the  neurological devices, which remains largely unknown. My nearest neighbor lives  about a quarter of a mile away. The next closest neighbor lives almost a mile  farther. Yet, others neighbors who live a short distance farther within the 360  degrees that radiate from my house and surrounding area could possibly be  handlers.

Moreover, when I visit family almost 200 miles away  and travel to other places, even abroad, I am subjected to the usual electronic  and mind control activities both while mobile on the road (usually voices only)  and at the destinations (electronic assault as well as voices and other mind  control activities). Unless the handlers, knowing my thoughts and my plans,  notify other local handlers of my travels and locations, the ESMC would have to  come from quite a distance. That argues that satellites may indeed be utilized  for that purpose.

We know that satellites using GPS can find locations  using geographical coordinates. However, satellites would be useless if they  could find a site and not be able to zero in on a target. All TIs know that they  are subjected to electronic torture and mind control regardless of their  geographic locations. Moreover, they can be singled out for torture in a crowd  or sitting with friends and family members.

Thus, logically targets must have something on or in  their bodies that allows some device or force to locate and focus on them. The  scope of this paper does not include a discussion of that method; however, I’ll  simply mention that possibilities include an implant (such as a microchip), an  injection (in the form of a shot or inoculation), by detecting targets’ voices  or their particular DNA found on their skin, and perhaps other  methods.

Readers can probably supply other reasons why the  United States government experiments in the United States on its own people.  Whether the testing is done in a religious, political, economic, or social  context makes no difference. They all have military and human mind enslavement  applications. Its end purpose represents maintaining the status quo that  revolves around the U. S. military-industrial machine.

Likely Experiments

I list below some hypotheses whose successful  experimentation might prove applicable in quelling a possible civil uprising,  rendering foreign enemy troops unfit for battle, and undermining foreign  governments. Most of the experiments would be psychological. Those hypotheses,  or premises, are stated in the form of questions. These represent only a small  number of possible experiments. Readers will be able to add many others.

– What type computer software works best with  certain targets in certain conditions to cause electronic and mind control  effects?

– Can computer programs be developed that will  interact with the targets’ thoughts without human involvement using the raw data  stored in super computer?

– Can a person be programmed to hate or react  negatively to names of persons, places, or things introduced into his  mind?

– What mind control techniques work best to alienate  a person from his family members and friends?

– Can a person be programmed to become disloyal to  his country and switch his allegiance to another country?

– What type targets responds best to the mind  control methods used and conversely what type targets can best resist those  methods?

– How does intelligence and the I.Q. level affect  electronic stalking and mind control?

  • Can synthetic telepathy be used to create dependency  on drugs, tobacco, or alcohol and conversely cause an aversion to those  items?

– Can a person be programmed to react in a  particular manner to post hypnotic code?

– Can loop play tapes to the target’s subconscious  make that person change his views about race, ethnicity, politics, religion,  sex, etc.?

– What target groups, based on factors such as  intelligence, age, gender, sexual orientation, physical condition, the physique,  education, color, language groups, ethnicity, and other qualities, are most  vulnerable to mind control?

– Can mind control be used to create multiple  personalities in a target?

– How long does it take for a tested victim to  capitulate to a particular mind control method?

– Can continual suggestions to a target’s  subconscious cause somatic disorders and sickness?

– What effect does prolonged V2K have on a target’s  body conditions and functions and his decision-making ability?

– Is ESMC more effective if used with organized  stalkers?

– Can a person be sensitized to hear certain words  in normal conversation or on TV/radio through previous hypnosis?

– Can the same mind control effects be carried out  on a large group of targets at the same time?

– Can targets contrive methods for shielding against  the effects of a neurological assault?

– Can a person be programmed to reveal his thoughts  when he receives certain signals, e.g., jolts and vibrations?

– How does social isolation caused by the handlers  affect a target’s ability to think and function in society?

– What effect do the various neurological methods  have on the targets and do they affect targets in the same manner and to the  same degree?

– What width of area and over what length of  distance can the neurological methods achieve the best results?

– What elements of mind control work best on various  types of persons?

– What is the best method for handlers to track  targets from place to place and from country to country?

– Can a person’s religious beliefs can be destroyed  (and perhaps replaced with other opposing beliefs)?

– Can persons be induced to turn against their own  country, their own family, their own church group, their own friends, their own  values, etc.?

– Can pin pricks by handlers on the target’s body  affect the body in the same manner as physical acupuncture?

– What is the optimum range for performing  neurological activities on targets?

– Are targets who live in rural situations affected  the same way as targets in urban areas?

– Can targets be besieged by insects (African bees  and fire ants, for example) by tuning in a certain frequency that attracts those  insects?

– Can a person be covertly psychologically  conditioned to think certain negative (or positive) things about certain types  of people based on ethnicity, color of skin, nationality, religion, social  level, education, political affiliation, personal philosophy,  etc.?

– Can constant subconscious whispers by handlers  conveying the same message eventually persuade the target to believe that  message?

– Can neurological suggestions influence physical  actions (or inactions) without the targets being aware of the cause(s) and if  so, to what extent?

– Can targets be made to perform certain acts  (perhaps unknowingly, as in sleepwalking) or think certain suggested  ideas?

– Can targets be made to develop what psychiatrists  term true schizophrenia, paranoia, or obsessive compulsive behavior?

– Can targets be forced to act out physically their  frustrations, hatreds, fears, etc. on others?

– Will targets’ induced conditions affect their  ability to operate as “normal” human beings?

– What conditions are most effective in rendering  targets incapable of operating as “normal” human beings?

– Can targets be made to overcome their revulsion to  various ideas and conversely see repulsive actions in a favorable light. For  example, can a Jew or Arab be made to eat pork or can a perfectly normal person  be made to commit incest?

– Are there drugs, particularly “mood swing” drugs  and anti-depressant drugs as well as certain vitamins and minerals that can  influence the outcome of particular mind control methods on  targets?

– Can handlers blank out permanently certain  thoughts in targets or eliminate certain words and areas in targets’ thoughts?

– Can the targets’ surroundings (location, house  construction materials, implements, electrical devices, etc), weather  conditions, time of year (moon, seasons, etc.), proximity to particular  installations (oil refineries, relay towers, etc.) enhance the effect of  neurological weapons on those targets?

– What foibles and vulnerabilities in targets can  best be exploited for psychological purposes and control of those  individuals?

– Which torture methods affect the targets the worst  psychologically?

– What is the most effective duration of a  particular physical or mind control effect on the target?

– Can a target be made impotent using outside  sources and conversely can his libido be dramatically increased?

– Can a target’s sexual orientation be changed  through mind control, i.e., heterosexual to homosexual and homosexual to  heterosexual, and is it easier to achieve in particular ethnic and racial  groups, genders, etc.?

– Can targets be made to say words out of context in  speaking with others?

– Can targets be made to view almost everything in  his daily life in a negative context?

– What physical stimulus and/or mind control method  can get the best results from the thought “mining” process?

– Can targets be hypnotized through the use of  certain pre-suggested words through the TV, radio, or in  conversation?

– How can post-hypnotic suggestions reinforce the  mind control methods?

– What is the best way to train handlers of  targets.

– What human characteristics should recruiters look  for in selecting trainers and handlers?

– What type of person makes the most effective  handlers?

– Can targets be made to believe absurd things that  do not happen or do not exist? For example, the U. S. intelligence community  convinced a young Moslem detainee at Guantanamo that he had lost both his hands  and legs. Although he could visually see that his arms and legs were there, he  still believed that they were not.

– What is the most effective interrogation technique  for handlers in the mind “mining” process, i.e., asking questions, showing  photos to the target, making half statements and allowing the target to finish,  staging scenarios in which the target is the principal actor,  etc.?

– Can mind control be used to cause insatiable  appetite and conversely anorexia in targets?

– To what extent can a target’s visual thoughts  expose information not revealed in the target’s narrative or his answers to  questions? (Examining those thoughts visually may reveal clues concerning a  particular strategic site or a particular weapon or an impending action or a  particular militarily- or politically-important person whom the target knows  whom the handlers may not have been aware of.)

– Can handlers gain the confidence of the target in  their telepathic conversations with him? (They do this by providing helpful  information to the target, warning him of various dangers, and telling him to “trust” them.)

– Can third parties be made to communicate  telepathically with the target without the knowledge of either one of them?

– Can ocular diseases such as cataracts be caused by  pinpointing laser beams to certain areas of the eye?

– What physical effects can be caused by  psychological suggestion and to what extent?

– What type target can best analyze what is  happening to him vis-a-vis mind control, based on their profession or  occupation, their educational level, their gender, sexual orientation,  ethnicity, etc.?

– Can a psychological profile be developed for  selecting both handlers and targets?

– Can targets be made to commit suicide through  whispering into their sub-conscious thoughts of self-destruction? How do  thoughts of suicide register concerning the target’s emotions, i.e. blood  pressure, heartbeat, anxiety level, nervousness, etc.?

– What is the best technique to test the efficacy of  interchanging or replacing handlers for targets, especially when those targets  move from country to country?

– What type target can most easily be persuaded  (either neurologically through whispers, etc. or by bribes and other forms of  compensation, etc.) to commit treason and perhaps assassinate important  figures?

– Can experimenters improve their propagandistic  capability to deceive the public re the mind control experiments (disseminating  misinformation through the internet, psychiatrists, the media, law enforcement,  etc.) as targets become more open and their numbers become more threatening?

– How can handlers work more effectively with their “allies” in mind control operations?

– What emotions and mind control techniques are most  likely to cause combat troops to surrender?

– What can be learned by showing targets holographic  images and recording their reactions to those images?

– How can handlers improve induced “dreams” to fish  for information?

– How can information from recording targets’ levels  of frustration, anxiety, irritation, and other emotions under particular kinds  and stages of stress be used to advantage?

– Can targets’ be conditioned to react to certain  smells, sounds, and tastes, and can handlers change those  senses?

– How will damage or alteration of the targets’ eyesight (making them see double, removing their “side vision,” causing them to  see in various colors or not see certain colors or images) affect the targets’ ability to function?

– How can physical effects such as the pin pricks be  used to best advantage and at what point should they be used?

– Can the handlers’ equipment cause cancer and/or  other internal and external diseases?

– Can handlers cause amnesia in targets?

– Can the handlers’ computer software make targets  hear particular words entered into the computer by the handlers in place of  particular regular words on TV and on the radio?

– What type of target will most likely learn to “trust” the handlers?

– Can handlers cause aberrant sexual thoughts and  behavior in targets?

– Can targets be made to consider dishonest actions  when the targets are perfectly honest?

– Can handlers condition targets to perform actions  outside of their regular routine using sub-conscious communication?

– Can handlers cause the target confusion in his  geographical orientation and movements?

– Can aggressive, combative persons be made docile  by remote mind control? This is applicable with militant Jihadists and  others.

– Can hypnotic suggestions cause artificial  erections, etc?

– Can those erections and other sexual effects be  utilized to cause in the target a sense of frustration and anxiety or perhaps a  misdirected sexual urge?

– Can targets be made to perform an action that he  will no longer remember afterward?

– Can targets be estranged from close family members  by subliminal suggestions about those loved ones?

– Can hypnosis be used effectively once handlers “hook” the target’s brain?

– Can targets be conditioned to respond to certain  code words and act out a response desired by the handlers?

– What visual damage will bother the target the most  and to what extent will it affect his ability to function?

– Can targets be hypnotized through music,  particular sounds, or at the sight of particular objects, persons, or  pictures?

– Can targets’ pets be made to react to certain  sounds or frequencies and to ignore other sounds?

– Can handlers cause certain diseases in targets  through their actions or the power of suggestion, i.e., Alzheimer’s, asthma,  prostate problems?

– Is there a particular hour of the day or night  during which targets’ minds are more vulnerable to “mining” by the  handlers?

– How do targets’ body functions react to thoughts  of suicide: blood pressure, heartbeat, etc?

– Can hypnotic suggestions affect sexual thoughts  and activities?

– Can a target be completely immobilized by lethargy  and fatigue through whispered suggestions?

– Can a target be made to feel very hot or very cold  by hypnotic suggestion?

– Can physical effects such as electrical-like jolts  and vibrations condition targets to release or reveal thoughts and, if so, to  what extent?

– Do rain and other atmospheric conditions affect  the ability of handler to perform mind control methods?

– Are physical and psychological conditions caused  in targets by the ESMC reversible?

– Can persons whom the targets know or do not know  be interjected into targets’ “dreams” by names mentioned by the handlers to the  targets’ subconscious?

One can use his imagination about the number of  spin-offs those experiments might spawn. Each one lends itself to several  variations using that same experiment. All of the experiments have the potential  of use by the military and the intelligence community.

The Angry Flies Experiment

One day in the late fall of 2009, I took a load of  pine straw into the fruit orchard to place around the tree trunks against the  approaching winter cold. I had hardly begun work when a huge flying insect began  attacking me. I use the word “attack” because that was exactly what it was, an  attack. I recognized the insect to be what we locally refer to as a horse fly.  However, it was by far the largest one I had ever seen. No other flying insects  were out, as it was late in the year for insects.

The horse fly circled and attacked me tenaciously.  Although I flailed and fanned my arms to shoo it away, no action on my part  daunted it. It had the uncanny ability to attack in my least defensible area,  always on the upper back just below my neck and between the shoulder blades,  where I could not reach. It bit me hard time after time. The attack lasted  probably a full five minutes before the fly finally flew away, probably satiated  by the blood it had drawn.

As a longtime victim of electronic stalking and mind  control, few things surprise me. Because of the savagely aggressive nature of  the horse fly, I immediately thought that it was somehow the work of the  handlers. I reasoned that the fly had perhaps been trained to search out  particular frequencies or perhaps to hone in on my particular frequency. Over  the next several weeks, I occasionally remembered the vicious attack and  pondered just how the handlers might have performed that trick.

Then, on Saturday, January 16, 2010, I found a  feature story in the Yahoo News entitled “Angry Flies May Help Explain Human  Aggression” written by Marlene Cimons of the National Science Foundation (NSF).  That article proved very revealing. The writer explained that biologist David  Anderson, a scientist with the Howard Hughes Medical Institute of Caltech, an  institution partially supported by the NSF, had “set out to learn whether  [fruit] flies, like bees, can get angry — part of a broader effort to study how  animal behavior relates to genetics.”

In the experiment, fruit flies were trained to become  extremely aggressive by using puffs of air to anger them. Anderson and his  colleagues showed that under stress the flies produced a chemical known as  pheromone, which is linked to “specific neurons” in the fly’s brain. The fruit  fly’s brain consists of approximately 20,000 neurons, which are “considered a  valuable system with which to study the genetic basis of learning, courtship,  memory and circadian rhythms.” The writer went on to say that fruit fly research  has “been a powerful tool with which to study emotions,” . . . for “most of the  genes in the fruit fly are also in humans, including neurons that produce brain  chemicals associated with several psychiatric disorders.” Enough  said.

That particular NSF experiment doubtlessly had  nothing to do with the aggressive horse fly that attacked me. Nevertheless, the  article makes very clear that scientists are interested in using flying insects  in studying emotions in similar situations. The next step is to carry out those  experiments on humans. I suspect that when scientists look for volunteers, they  will find very few willing subjects. What, then, will happen? Will the  scientists simply drop their experiments? Hardly.

Other Experiments

Other experiments spin off the foregoing experiments.  The list of possible neurological experiments is endless. Perhaps that is why  the number of targets does not diminish but instead grows ever larger, for as  neurological research increases, the need for guinea pigs also increases.  Likewise, to be considered valid, the experiments require continuity, which  means that the same targets must be used throughout the entire experiment. That  explains why once targets are “hooked,” they remain hooked. We are seeing only  the beginning of these evil and inhuman neurological  experiments.

In addition to preparing for neurological warfare,  the government undoubtedly is also preparing to prevent civil disobedience from  occurring. That is probably the reason why very liberal political, civic, and  union activists, radical organizations, particularly those considered  anti-government, environmental activists, whistleblowers, free thinkers,  Survivalists, extremists, nonconformists, independent cult-like religious  groups, and avowed socialists and anarchists are often targeted for  experimentation.

The Creation of Multiple  Personalities

Scientists have been interested in multiple  personalities for many years. Now they seemingly wish to create multiple  personalities. The creation of multiple personalities lends itself to the  handlers’ objective of total mind control. I believe that they convince targets  through the clever use of psychology to believe that they have the additional  personality of a bad person within them that causes them to commit acts that  they would not otherwise perform, such as murder. If a target believes that he  possesses an additional and mean personality, he much more readily accepts the  conditioning of the handlers to do something that he would not ordinarily do. In  the known alleged cases of multiple personalities, there is always an evil,  calculating, deceitful personality versus a much less evil one.

Readers have already read that I accidentally  discovered ways to hear the continual loop play tapes played to targets’ subconscious by their handlers.  One day in late 2009, I rubbed my ears to hear  what the loop play tapes were saying.  In one ear, I heard a handler’s voice  saying over the continuous loop play taped message, “You’re (the name of a  person).” In the other ear, the same recorded voice was repeating, “You’re (the  name of a different person).” In the first case, the person was one of my oldest  friends; in the second case, the person was a distant cousin. To counter the  obvious intentions of the handlers, I often tell them, “I am NOT (name), and I  am NOT (name). I am ONLY Max Harrison Williams, always have been, always will  be, and nobody else.”

I have corresponded with only one other TI who has  mentioned the multiple personalities theme; nevertheless, I suspect that it is  very often used on unsuspecting targets. It does not require a super active  imagination to think of the possible uses of multiple personalities in carrying  out intelligence and military actions in both domestic and foreign situations.  Ex-contractors. “killer-for-hire” types, for the military occasionally remember  that their other personalities were made to accomplish a mission and they  were supposed not to remember it. In my case, I have no idea what my other  personality was supposed to do, but I do know that my mind will never allow that  other personality to develop. Despite the attempts to control my mind, I still  possess most of it.

Victims of  Experimentation

Two dates loom very significant in the lives of  targets: (1) the date when they first became aware that they were targeted, and  (2) the date that they believe, by “connecting the dots,” that they were first  targeted. Often there are several years between the two dates. It is far easier  to date the discovery of one’s targeting than to date the actual beginning of  it. In my case, for example, I was targeted as early as 1973, perhaps even  earlier, but did not realize it until 2005, thirty-two years later. In other  cases, targets seemingly discovered that they were targeted shortly after it  probably occurred.

A small number of targets believe that they were  targeted as infants or in very early childhood for lifelong experimentation. If  that is true, the current ages of those targets suggest that their targeting may  have begun in the late 1940’s or the 1950’s. That would be consistent with the  known facts. The FBI’s COINTELPRO project is said to have officially begun in  the early 1950s; it undoubtedly began earlier.

Documents found in the late 1960’s and the 1970’s  reveal that the U. S. Government began performing experiments on its citizens  almost immediately following the end of World War Two. Most of those experiments  dealt with learning how the human mind works and how it can be altered. The  experiments took various code names: MKUltra (MK stands for “mind control”), Monarch, Bluebird (later renamed Artichoke), Montauk, and others. Those  activities have been well researched, and the information is found in many  websites online; thus, I will not delve further into them here.

Almost two hundred public and private entities  participated in those experiments, including public and private universities,  public institutions such as the National Institute of Health, defense  manufacturers and contractors, pharmaceutical companies, and independent  researchers and scientists. Various U. S. Government agencies, notably the CIA,  were responsible for coordinating the results of those experiments and working  on the military applications of their data and inventions. Most of the  experimentation was contracted out.

In the late 1960’s when some of those experiments  were brought to light, the CIA destroyed most of its incriminating  documentation. Nevertheless, a Congressional investigation ensued in the  mid-1970s, and the U. S. intelligence community was enjoined from sponsoring the  experiments. We know today that they did not stop the experiments; they only  made them more secret. At this very moment, scientists work feverishly on brain  mapping in the U. S. and other countries. No intelligent person, much less a  targeted individual, believes that those efforts are purely humanitarian in  nature. Nor does he believe that the subjects of the brain mapping projects are  necessarily voluntary. Most of the experiments would have no validity if the  subject were willing and knew what was happening.

“Black” budgets, shrouded in secrecy and embedded in  regular Congressional allocations, finance the ongoing experiments. Few  government officials, including probably the President of the United States,  know the amount of money at the disposal of the secret operatives of the CIA and  the remainder of the intelligence organizations. Clandestine units within those  intelligence agencies seem to increase with each successive administration.

The “black” operatives apparently have no  Congressional oversight, and, I would guess, little executive branch oversight.  Likewise, the judicial branch does not become involved in those secret  operatives. After all, how can one challenge in court secret units and their  secret activities that do not officially exist?

I believe that electronic stalking and mind control  is both punitive and experimental. The dual purpose is particularly true in  vendetta-type assaults: get rid of your enemy and while doing so, learn all that  is possible about physical and neurological torture. Israel is the prime example  of the perpetrator that would derive the greatest benefit from dual purpose  electronic stalking and mind control. That action conveniently removes its  enemies and at the same time provides opportunities for greater neurological  research. Other countries and elements within the United States have the same  motives.

Psychiatrists, Enemies of  Targets

Until World War II, psychiatry as a medical science  was scarcely known by the general American population. However, in the 1950’s  people started turning to psychiatrists for their perceived problems. Law  enforcement began using psychiatrists to evaluate persons who either committed  crimes or were thought to be capable of committing crimes. Anti-depressants for  depression and other mental conditions became commonplace. Since then,  psychiatric medicine has become a huge business.

Strangely, the popularity of psychiatry evolved  collaterally in the last half of the twentieth century with the government’s  obsession with neurological warfare. Those responsible for the development and  employment of electronic stalking and mind control have not only fostered an  increasing reliance on psychiatry but have also made psychiatry a main facet of  their total neurological torture scheme.

Targets know that handlers manipulate them to react  in what is considered abnormal behavior. When they do so, targets are often  forced to undergo “psychiatric evaluations.” The psychiatrists who perform those  evaluations almost always diagnose targets as delusional, schizophrenic, or  paranoid and “treat” those victims with mind altering drugs. Their diagnosis,  says Wikipedia, “is based on observed behavior and the patient’s reported  experiences.” In other words, if a target admits to a psychiatrist that he hears  voices, he will be diagnosed as schizophrenic. Once evaluated and found mentally  disturbed, targets lose their credibility, and their complaints of electronic  stalking and mind control activities are considered delusional  ideas.

Most psychiatrists agree that if a person is  schizophrenic, his symptoms will be obvious by early adulthood; yet, most  targets are in their middle ages when their induced symptoms begin. The National  Institute of Mental Health online booklet on schizophrenia states that “most of  the time, people do not get schizophrenia after age 45.” I was well into my  sixties when my “schizophrenic delusions” developed.

Targets are victims not only of electronic assault  but also of medical misdiagnosis. When a patient visits a doctor and complains  of dermatitis or restless legs, neither of which is an ailment that can be seen,  he is taken seriously. However, if that same patient sees the same doctor and  complains of electrical jolts and hearing voices, which likewise cannot be seen  (or heard), he will be referred to a shrink. Such is the bias and prejudice – and ignorance — of medical practitioners.

Psychiatrists have never seriously studied  electronic stalking and mind control assault. Very few psychiatrists seem to  know much about organized stalking in general. Psychiatrists could be very  valuable allies to targets in identifying other victims of electronic stalking  and mind control and working with targets to find who is harassing them, how,  and why; instead, psychiatrists represent the enemy by cooperating with those  who sponsor the ESMC. Whether intentional or otherwise, they serve as  accomplices of the powerbrokers behind the ESMC.

Evidence that psychiatrists know about ESMC and  cooperate with the perpetrators in covering it up exists in abundance. Indeed,  psychiatrists almost have to support the powerbrokers behind ESMC to maintain  their professional credibility. Think about it. If psychiatrists admit that  symptoms of schizophrenia and paranoia can be induced from outside the human  mind and body by remote, it blows the whole rationale behind psychiatry as a  science and repudiates the tenets on which their profession rests, for induced  signs of schizophrenia and paranoia cannot be treated with traditional  psychological therapy and medicines.

Psychiatrists have aided the CIA and other  intelligence units since before World War II. In Psychiatry and the CIA:  Victims of Mind Control, Dr. Harvey M. Weinstein describes a form of mind  control practiced in the 1950s called “psychic driving,” developed by Dr. Ewen  Cameron. In that torturous practice, the subject was first psychologically and  physically beaten down almost to a state of vegetation and was then his mind  subjected to continuous loop play tapes. In the 1950s the tapes were played to  the subjects in laboratories on tape recorders, and those recorders were  visible. Today, the same loop play tapes are used wherever a target may be to  pommel a target’s mind using unseen remote equipment. In my case, I receive  dozens of subliminal loop play messages to my subconscious 24/7.

Targets who experience the V2K, or voices, know that  their handlers are schooled in psychology. The speakers play on the guilt and  foibles of the targets in a well researched plan of attack. The pattern is  always the same: the handlers find a target’s faults and consistently attack him  by pointing out those faults and psychologically badgering him. There can be no  doubt that psychologists and psychiatrists developed that plan.

Psychiatry as a legitimate branch of medicine is  falling under increasing scrutiny. Doctors and even psychiatrists are beginning  to question psychiatric practices. If regular medicine is not an exact science,  psychiatry is far less exact. Its science is not based on many centuries of  dissecting the human body to determine the cause of disease but on less than two  centuries of observations and largely inconclusive and conflicting experiments.  Notwithstanding, psychiatric “diseases,” or labels, have grown from fewer than a  dozen in the 1950s to over three hundred today. The count goes on.

Reporter Cheryl Wetzstein, in a March 2, 2010 story  in the Washington Times, writes that “The nation’s psychiatrists are considering  defining addictive acts such as overeating, gambling and compulsive sex as  medical disorders in their professional manual.” Dr. Allen Frances, former  chairperson of the Diagnostic and Statistical Manual of Mental Disorders, is  quoted as stating that “what we have most feared — the inclusion of many normal  variants under the rubric of mental illness . . . – [can result in] millions of  misidentified ‘patients’ and ‘massive overtreatment.’”

While conducting online research on psychiatry as a  discipline of medicine, I pulled up the review of a book named Pseudoscience  in Biological Psychiatry written by Douglas A. Smith. The book is  co-authored by Colin A. Ross, a psychiatrist, Alvin Pam, a psychologist, and  others. Although I did not read the book, I found Smith’s lengthy review very  informative.

Smith says that the authors of the book disagree  with the mainstream traditional psychiatrists who claim that psychological  symptoms stem from biological abnormalities, which suggests that genetics play a  major role in those conditions. He quotes Dr. Ross as saying, “at the present  time, there is no proof that biology causes schizophrenia, bipolar mood  disorder, or any other functional mental disorder.” Dr. Pam, a psychologist,  writes that “virtually all so-called psychiatric disorders are caused by life  experience rather than the theoretical biological abnormalities that  biologically oriented psychiatrists say are the causes.”

Psychiatrists particularly favor the label  schizophrenia when diagnosing targets of electronic stalking and mind control.  In the cited book, Harry Wiener, M.D., states that “The belief that  schizophrenia is a specific organic disease or a group of organic brain diseases  has never been confirmed.” Dr. Thomas Szasz, Professor Emeritus of Psychiatry at  the State University of New, York, Syracuse and author of Exposing Psychiatry  as a Pseudo-Science, states flatly, “No behavior or misbehavior is a disease  or can be a disease.” In relation to psychiatric treatment of children, he makes  the point that “Labeling a child as mentally ill is stigmatization, not  diagnosis. Giving a child a psychiatric drug is poisoning, not treatment.”

Dr. Ross observes that, “The dream of biological  psychiatrists is that an ‘objective’ laboratory test for one of the major mental  illnesses will be discovered.” His statement is an open admission that many  tests are continually being conducted to test and “prove” the psychiatric  labels. Many of those tests are probably financed by pharmaceutical companies or  probably by contractors in private research institutes working directly for the  DOD.

Psychiatrists “. . . have, for hundreds of year  [sic], used diagnostic terms, so-called diagnostic terms, to stigmatize and  control people.” Psychiatrists deal with controlling behavior. Today they “treat” patients with anti-depressants to control their thoughts and their  actions. Control over people is exactly what the government appears to wish to  accomplish through its development of neurological weaponry.

Ellen M. Borges, Ph.D., a sociologist and faculty  member at Goddard College in Plainfield, Vermont, talks about control in a  chapter in Pseudoscience. She states that “Biological psychiatry redefines  social deviance as a medical problem. By doing so, it transforms social norms,  which are subjective and political, into medical norms, presumed to be objective  and scientific. Medicalization of social deviance allows us a pretense of  humanitarianism” for coercive measures against people whose behavior “deviates  from expectations based on the dominant social class’s ideology and viewpoint.”  She says further, “Psychiatry redefines a great deal of normal human behavior as  medically deviant by pathologizing [sic] people who are socially marginal in any  way.”

Psychiatrists have never explored why ESMC victims  feel that they are targeted by remote electronic and mind control activities.  They not only fail to delve into the basis of patients’ complaints but they also  refuse to order x-rays, MRIs, and CT Scans to see whether there might be an  implanted object in the patients. If they order a scan at all, it will be  confined to only the brain. No target would likely have a device implanted  directly within the brain itself. Without orders for photographic searches of  their body, targets are left to guess and theorize what causes their ESMC.

Psychiatric practice is driven by the profit motive.  In a December 4, 1998 letter, psychiatrist Loren R. Mosher of San Diego resigned  from the American Psychiatric Association (APA) for that reason. In his letter,  he writes, “At this point in history, in my view, psychiatry has been almost  completely bought out by the drug companies. The APA could not continue without  the pharmaceutical company support of meetings, symposia, workshops, journal  advertising, grand rounds luncheons, unrestricted educational grants etc. etc.  Psychiatrists have become the minions of drug company promotions.”

With so much information on the internet about  electronic stalking and mind control, the APA has to know about that practice.  Psychiatrists also have to know about microchips, the effects of  electromagnetism, and the use of directed energy weapons (DEW). Nevertheless,  those topics do not arise at their meetings. Nor have they recommended any  studies of those realities. Psychiatrists still hue to the principle that if a  patient complains of symptoms caused by DEW, microchips, and electromagnetism,  he must be schizophrenic.

The Kansas Mental Health Alternatives Clearinghouse  spelled out some shortcomings in the field of psychiatry, including the  collusion between psychiatrists and the drug industry, in its internet web page.  Three of those criticisms bear mentioning. I either quote, partially quote, or  paraphrase them below.

  1. . “Psychoactive drugs have become legal and  commonplace, with physicians acting out a role little different from that of  drug pushers, pandering to those who seek short-cuts to an escape from painful  thoughts.” . . . “The widespread availability of such drugs which are often  dangerous and poorly tested is a public scandal.”
  2. . Psychiatric confinement and court-ordered  “medicating” of persons to prevent supposed future actions is “a massive  infringement of Constitutionally enshrined human rights. The law has the premise  you do not do the time before you’ve done the crime. Psychiatry stands this  principle on its head.”
  3. . “Blaming the so-called mentally ill for everything  wrong in society comes naturally from the corporate-owned media, who have ties  to the profiteering pharmaceutical industry. Every unpleasant quirk of the human  psyche is explained away as ‘mental illness’ or a ‘chemical imbalance’ . . . by  research [conducted] on barely or non-consenting human guinea pigs.”

Social control obviously defines the purpose for the  treatment of targets. Psychiatrists fill targets full of pills and subject them  to various largely unproved treatments, including modern versions of the old  shock treatment. I have yet to find a target forced to accept “treatment” who  ceased believing that he was a target due to the psychiatrist’s therapy and  medicines and thus “cured” of his supposed delusions.

Psychiatrist Peter Breggin says about the drugs being  used by psychiatrists: “Despite the current enthusiasm for Prozac, the  FDA studies underscored the drug’s lack of effectiveness, and recent analyses of  literature indicate that antidepressants in general are no better than a  placebo.” Karl Loren, in his paper on psychiatry, says that “Psychiatry and  psychiatric drugs do more harm than any other [medical] ‘practice’ on the face  of this planet.” Psychiatrist Susan S. Kemker, North Central Bronx Hospital, New  York City, sums up the skepticism concerning psychiatry when she says “our  understanding of our own field remains naïve.”

Carole Smith, author of “On the Need for New Criteria  of Diagnosis of Psychosis in the Light of Mind Invasive Technology,” Global  Researcher.ca, January 11, 2010, provides encouragement to victims of  electronic stalking and mind control made to submit to psychological  evaluations: “. . . if the victims at this point in the new history of this  mind-control, cannot yet prove their abuse, it must be asserted that, faced with  the available information about technological development – it is certainly not  possible for those seeking to evade such claims – to disprove them.” Indeed, the burden of proof rests with the medical profession to prove that ESMC  victims do NOT hear voices or experience remote-delivered electronic  effects

I rest my case. Psychiatry as a branch of medicine  and psychiatrists as practitioners of that field do much harm to targets of  electronic stalking and mind control. They most certainly single out targets of  ESMC for stigmatization, lending credence to the belief that its main purpose is  social control. It is little wonder that the powerbrokers and their hireling  handlers force targets to undergo psychiatric “evaluations” and treatment, for  they know that the examining psychiatrists will diagnose them as schizophrenic.  Psychiatrists serve as main accomplices of the powerbrokers who employ  electronic stalking and mind control by remote. Those same psychiatrists who  evaluate targets and often commit them to mental institutions for observation  are aware that “the risk of violence among people with schizophrenia,” according  to the National Institute of Mental Health, “is small.” They also know that  schizophrenics are far more likely to commit suicide or attempt suicide than to  harm others.

One might wonder how physicians become involved in an  action that clearly violates the Hippocratic oath that they took when they  received their degrees. I suspect that the powerbrokers convince those  physicians (1) that the patient will only be monitored and not otherwise harmed,  (2) that they are performing a patriotic duty, (3) that they would be helping  law enforcement catch a criminal, and (4) that their medical practice might be “targeted” if they do not cooperate. The powerbrokers would only have to hint at  the latter to achieve the cooperation of the psychiatrists. Then, there is also  the profit motive in treating “schizophrenics” and selling them their costly  medication.

In the spring of 2010, scientists announced that they  had succeeded in artificially creating a living cell. If science today has that  capability, why can psychiatrists not grasp that symptoms of schizophrenia and  paranoia can be induced by remote? Psychiatrists’ failure to recognize and admit  that possibility shows either a remarkable naivete or a widespread complicity on  their part.

In this paper, I have already recounted my visit to  the psychiatrist after making a report about intruders on my property to the  sheriff’s office. During the interview, I avoided telling him about the V2K for  very obvious reasons. Almost two years after the psychiatrist performed his  psychiatric assessment on me, I re-read his assessment and made notes on some of  his observations that I thought were misleading. I attached a copy of The Silent  Massacre and my notes to a cover letter, which follows.

Dear Dr. (name excluded):

When I underwent a psychiatric evaluation on March  10, 2008, I told you that I do not receive

any auditory effects — you referred to such sounds  as “hallucinations” — along with the

physical symptoms that I described to you. I lied  about the auditory effects for reasons that

you will read in the attached paper The Silent  Massacre, which I have written over the past

two years. I am a target of electronic stalking and  mind control.

I am writing to you now, almost two years after the  evaluation, for several reasons: (1) to set

the record straight; (2) to inform you and the world  that I will no longer seek to hide the neuro-

logical symptoms caused by an electronic assault on  my person by unknown means by

unknown criminals; and (3) to urge you to research  the topic of mind control and open your

mind to neurological phenomena that you probably have  not studied in a formal manner.

I hope that you will read the entire paper,  especially the part about the role of psychiatrists in

perpetuating the plight of targets of electronic  stalking and mind control. Many thousands of

victims around the world struggle daily with their  torture, many of them afraid to admit what

is happening to them for fear of being labeled  “psychotic,” or, more colloquially, “crazy.” Their

complaints ignored by the authorities, hundreds of  targets have organized in groups to interact

with others experiencing the same problems. That is  not mass psychosis. I belong to one such

organization called Freedom from Covert Harassment  and Surveillance (FFCHS). Naturally,

among the many targets, several alleged victims may  indeed be psychotic. However, the

overwhelming majority are (or were) perfectly  “normal” people although many of them have

adopted some strange habits to counter their  continual physical and neurological assault.

Your psychiatric evaluation of me contained some  misleading notations, which I point out in

the second attachment. You will probably forward  copies of this letter and my paper to the

local authorities. Although I am sure that they  already have copies, I welcome that action. You

also have my consent to share this material with your  colleagues in the medical field. Should

you wish to talk with me further concerning this  letter or the attached papers, you can reach

me at (phone number excluded) day or  night.

On a trip to Baton Rouge to visit with my son and  family, I took the package by the psychiatrist’s office to hand deliver it to  him. When his receptionist told me that I would have to make an appointment to  do so, I left the material with her. The doctor called me less than two hours  later.

He first asked me why I had left the material, and I  referred him to the cover letter. I told him point blank that I was a victim of  attempted mind control, and that I wish that I had told him so two years  earlier. He then asked me what I wanted him to do. I told him that I hoped that  he would take patients seriously from now on when they complain of voices, do  in-depth research on mind control, and change his attitude about a condition  that affects many thousands of people in the United States. I briefly talked  about the “Voice of God” V2K that the United States conducted on Iraqi troops  during the second Bush’s war on Iraq and also asked him to research other  neurological capabilities of intelligence and the military.

I mentioned the part of this paper that deals with  psychiatrists and told him that if he did not have time to read the entire text,  I hoped that he would read that portion. He wanted to talk with my son and did  so for perhaps ten minutes. Afterward, he talked with me again. He ended his  approximately twenty-five minute phone call by asking me if I intended to take  matters into my own hands. I reassured him that I did not. As he ended the  conversation, it was clear that the content of my letter to him had made an  impact. However, I do not expect any departure from his attitude toward the  voices.

I have no idea whether he read the entire paper or  whether he contacted the sheriff of the parish in which I live. However,  providing the psychiatrist that material gave me great satisfaction. Whether he  reads the paper or not, I have “set the record straight.” I DO hear voices, and  they are most certainly NOT the voice of God.

If I ever see a psychiatrist again – and it is not  very likely that I shall – and he questions my belief that I am electronically  and neurologically attacked, I shall turn the topic back on him using the  Socratic method. I shall ask him if he believes in God or a Higher Power. He  will almost certainly say yes. Then, I’ll ask him for proof that God exists. I’m  sure that he will get the point.

The Hate Factor

Regardless of who the powerbrokers are and regardless  of their objective(s), the people whom they procure, the handlers, to carry out  their sordid agenda are creatures of hate. They reek of hate and hate permeates  their daily physical and neurological attacks. Those despicable examples of  humanity are not selected at random. They are classical sociopaths chosen for  their work because of who they are. Common criminals posing as normal citizens,  they break dozens of laws regarding human, civil, and personal rights – and they  do so with anonymity and obvious pleasure. Yet, those criminals look just like  all Americans and could easily be your next-door neighbor.

Indeed, simple stalking itself is a hate crime.  However, electronic stalking and mind control carries that hate crime to its  greatest extreme. The handlers’ actions prove them to be evil nut cases as they  attempt to cause targets to commit suicide and cripple them with the electronic  effects, target innocent close relatives and friends of the victim, plant  degenerate sexual ideas, and even harm domestic pets.

Hate groups are not hard to find. Some of the  personnel who helped develop the devices and methods used in performing ESMC on  targets may have even been members of some of those hate groups. Imagine the  hundreds of personnel of large defense suppliers, research institutes,  pharmaceutical companies, and university labs, in addition to the personnel of  intelligence units involved, who helped develop electronic stalking and mind  control. There should be little doubt that many opportunities exist for those  people to purloin and peddle the devices and methods on the black market or to  pass those secrets to special agenda-driven hate groups.

From my correspondence, research, and personal  knowledge of ESMC, it seems that the handlers particularly target homosexuals  and lesbians as a group. My handlers also make it obvious by V2K remarks to me  that they are anti-black, very politically conservative, and religious bigots  although that may be deception. Young people experimenting with recreational  drugs and prison inmates have also often been targeted. In addition, it becomes  increasingly clear that people who “rock the boat” and those who do not  subscribe to mainline ideas often become targets.

That does not explain, however, the majority of the  targets who do not fit into those various categories. Targets represent every  conceivable stratum of American society. By far the greatest number of victims I  have met are average Americans. That suggests that the knowledge and power to  use ESMC may be available by organized crime, whose services are sold to those  who may wish to harass particular individuals, to groups of political and  religious extremists, and to foreign powers and those acting for them. The  proliferation of microchips and perhaps other means of electronically assaulting  victims by remote as well as perhaps the increasing availability of those  devices and methods pose a threat today for every American citizen.

Regardless of who a target might be, how he is  selected, and why he is selected, he becomes a plaything for his handlers. To  relentlessly torture targets, whom they may not even know, with electronic and  mind control devices by remote and watch them suffer, commit suicide, and die  from those effects requires unbridled hatred and lack of conscience on the part  of the psychopaths who ply that torture. Targets are condemned in absentia by  some person or group, provided no trial, and then summarily executed slowly by  remote. All of that equals hate in its most marked extremity. Although the  handlers are doubtlessly well paid for their efforts, they are driven by their  own demons.

The evil nature of the handlers and their hate comes  across clearly. My handlers, using their synthetic telepathy, laugh and taunt as  I pray for friends and family with serious physical problems. One of those  persons is a ninety-one year-old man and a former professor of mine who has  suffered with cancer and heart problems for years and who is legally blind. He  and his wife, who is only a year younger than he, are two of the kindest, most  gentle people I have ever known.

Another subject of my prayers whom the handlers  ridicule is a little now four year-old great-great niece who because of a  congenital heart defect wears a pacemaker and a feeding tube. She was first  operated on at two weeks of age to attempt to correct the heart problem. They  also demonstrated their hate and evil in taunting as an elderly aunt, the last  of twelve uncles and aunts, lay dying. The handlers were well aware of those  peoples’ conditions; yet, they poked fun at them as I prayed. Such evil is  unfathomable.

Another example of hate in my case concerns one of my  pastimes and interests, conducting research on my family history. I have  collected genealogical material on my ancestors for over fifty years, and that  material is entered into my computer under the various family names in  individual folders. Recently when I went into two of those family folders, the  handlers had corrupted the material. Much of it had been deleted. When I loaded  the back-up copies into the computer, the back-up folders were also corrupted.  That loss represents hundreds of hours of work. Hate, simply hate on the part of  the handlers.

Can anyone doubt that hate is a factor in electronic  stalking and mind control when the handlers cause targets to be constipated for  days or when they cause frequent bowel movements that immobilize them? When the  handlers damage organs and eyesight? When they cause psoriasis and sores on  targets’ faces and bodies? When they deprive targets of sleep night after night?  When they cause targets to vomit uncontrollably? When they make targets scream  with pain from cramps? When they goad a target into committing suicide?

I communicate with my handlers through V2K, which in  our case works both ways. They continually tell me one moment that they love me  and the next, that they hate me. In second instance, I laugh at them and reply  that I would hate them, too, except I have not yet learned how to hate s–t.  Targets can always find a bit of humor in their targeting. In my case, I laugh  aloud whenever the criminals, after all the unpardonable criminal things that  they have said and done to my body and mind, beg me to “trust” them. How very  funny!

I would like to see domestic terrorists who torture  others with electronic stalking and mind control attacks added to the list of  hate groups. I would also advocate that persons found guilty of electronic  stalking and mind control receive an automatic death penalty because of the  heinous nature of that activity. Outright murder does not come close to the  cruel and villainous nature of electronic stalking and mind control.

The Real Domestic  Terrorists

Much publicity is focused on alleged domestic  terrorists by the controlled media. I suggest that the people who engage in,  promote, and protect electronic stalking and mind control are the best example  of domestic terrorists. Why have electronic stalkers and mind control artists  and their accomplices not been caught? They will be. It is only a matter of  time, perhaps a short time. However, their evil has long gone undetected and  unpunished for the following reasons.

– They operate in total secrecy; therefore, their  locations are unknown. The handlers probably take an oath of secrecy. Otherwise,  one of the handlers tells a relative who tells a friend and soon the truth is  out.

– They employ a method or methods of electronic  harassment and mind control not yet fully understood. There are those  researchers who believe that handlers use, in addition to microchips, other  means to communicate with the victims’ brains. Whatever method is used, it will  require some type of transmitter/receiver, although those instruments may  function slightly differently.

– Their electronic stalking and mind control  activities leaves little or no evidence. A part of the whole scheme is to  operate in a manner that leaves no trace of evidence that could lead  investigators to the perpetrators. The handlers count on victims not having  tangible evidence to submit with their complaints of ESMC. Without proof of  assault, of course, law enforcement has either the pretext not to investigate or  finds

little cause to investigate.

– Victims are reluctant to make complaints, as they  have no proof of assault and cannot identity the assailants and do not want to  appear foolish.

– Psychiatrists, doctors, and others in the medical  community do not recognize the existence of ESMC. Indeed, if they acknowledge  that patients who suffer ESMC are not paranoid schizophrenic, they then find  themselves unable to treat those symptoms in the traditional psychiatric  manner.

– Law enforcement has been almost completely  uncooperative.

The cowardly perpetrators of ESMC are textbook cases  of domestic terrorists. In addition to committing terrorism, the stalkers are  guilty of (1) stalking, (2) harassing with malicious intent, (3) coercion (in  attempting to make the victim do things that he/she does not want to do with  their mind control methods), (4) psychological and virtual rape, (5) breaking  and entering (which they often do to intimidate the victims by unlocking locked  doors, turning back clocks, moving items in rooms, hiding other items, etc.),  (6) burglary and theft (which they commit when they enter a victim’s home and  take items to confuse and disorient the victim), (7) recording a victim’s  conversations without his/her consent, (8) peeping tom-ism (through their  ability to view the victim), (9) assault and battery (by using electric shock,  etc. against the victims), (10) slander (by circulating false rumors and stories  that lack proof about the victim), (11) libel (when those rumors and stories are  put into print in the from of emails, etc), (12) computer hacking and phone  tapping, (13) conspiracy, (14) in some cases, blackmail and extortion, (15)  first degree murder (when a victim suffers a fatal car crash because of sleep  deprivation), and (16) attempted murder (when their plans do not succeed). Their  list of crimes will put them away for the remainder of their evil  lives.

In addition, the domestic terrorists violate FCC and  other laws regarding the illegal use of electronic equipment. However, they will  NOT engage in credit card fraud, identity theft, extortion, blackmail, or any  other activity that will force them to communicate in writing or that will be  traceable. Should that happen, the FBI and local law enforcement would be forced  to look into those crimes and record them as crimes.

Keep in mind that electronic assault and mind control  contains two elements: (1) electronic harassment and (2) mind control. The first  element is often conducted from close range by persons using homemade or easily  purchased electronic devices. Those criminals may live next door or in an  adjoining apartment. The target will often have a good idea of the perpetrator’s  identity and may even also in rare cases be able to gather sufficient evidence  to bring suit against that individual or individuals. Electronic harassment is  very often linked to gang, or neighborhood, stalking. Those acts can oftentimes  be recorded on videotape and presented as evidence although the victim probably  cannot count on the authorities for much assistance. Electronic harassment is  also conducted by remote.

On the other hand, mind control, which also  invariably includes electronic assault, leaves no evidence and the perpetrators  are unknown. The perpetrators operate by remote, perhaps over very long  distances, and leave no trace of their work. I have not yet communicated with  any mind control target who has been victimized in a traceable and prosecutorial  manner.

There appears to be an increasing incidence of “home  grown” terrorism in the United States. I suggest that we should shift our  emphasis from searching out possible home grown terrorist to studying what  causes domestic terrorism. Sooner or later the growing number of victims of  electronic stalking and mind control will contribute to “home grown terrorism” by creating dissidents.

U. S. Intelligence and  ESMC

Does the U. S. intelligence community know about ESMC  and how it works? A resounding yes. A journalist in a July 2008 Yahoo news  article wrote about visiting Guantanamo and interviewing some of the detainees.  One of them was Omar Khadr, an Islamic Canadian who was only fifteen years old  when he was captured in Afghanistan in 2002 and brought there. Omar told the  interviewer tearfully that he had lost both arms and both legs; yet, the boy was  in perfectly sound physical condition. Interrogators and brain control experts  from the CIA, DOD, and other U. S. intelligence agencies had taken control of  his mind and had convinced him that he had no arms or legs. As I write, Gitmo  prisoners are being allowed trials by Federal judges. However, Khadr’s lawyer  warned that he is almost a basket case. His prison torturers doubtlessly erased  any memory in his mind of his neurological torture.

In my overseas work, I knew many CIA/MIA/DIA types,  who posed as businessmen, employees of international voluntary agencies,  teachers in American overseas schools, missionaries and other clergy, sometimes  foreign nationals who worked under contract for the CIA, and other  non-governmental persons. In addition, each embassy and its official appendages  provide cover for CIA agents among their employees. The people whom I knew were  agents normally had far more human defects than virtues. Some of them were  virtual sleazebags. Only a very few honorable and good men and women in that  line of work stand out in my mind.

I praise President Obama for condemning torture by  those elements. There is absolutely no need nowadays for torture, for as  targeted individuals can attest, the government has long had the capability to  obtain involuntary information from persons by remote mind control. Thus, the  torture of detainees, using the pretext of extracting crucial information,  represents only a sadistic excuse by torturers with otherwise little authority  and decision-making power to carry out the evil in their twisted minds.  Waterboarding is an example of that Inquisition period torture. I suggest that  when the perpetrators are finally caught—and they will be–they be waterboarded  to death. Let them experience the fruit of their work.

The mind control handlers operate by remote. Thus,  some type of instrument or receiver/transmitter must be used to make contact  with the victim’s brain. That instrument may be a scanner, ham radio, or a  clandestine radio station guided by GPS. Regardless of the type of device, it  must operate along a particular frequency, a frequency that can pick up the  electromagnetic pulses of the human brain. If a radio is used, that frequency  must necessarily be blocked. If not, any listener could happen upon that  frequency and hear the whisperings and other mind control operations of the  handlers, blowing the entire operations. If it is indeed a blocked frequency,  the local law enforcement, the FBI, and the FCC have to know about and approve  it, additional proof that law enforcement has to know about ESMC.

Since 9/11 the Federal Government has monitored all  radio frequencies to prevent terrorists from communicating with each other.  Intelligence agents routinely scan the air waves for suspicious activity. It is  an inescapable fact then that the Federal government has to know about  electronic stalking and mind control. If the Federal, state, and local law  enforcement are not involved directly in ESMC, their unwillingness to  investigate makes them knowing accomplices.

The FBI

I live in a rural area in Ouachita Parish (county) in  north central Louisiana. In late 2006, not trusting the local authorities, I  made a trip to the nearby city of Shreveport to seek out the FBI to make a  complaint about the electronic stalking and mind control activities. I outlined  verbally to one of the agents what was happening. I also gave the agent a CD  with parts of my journal and my thoughts about those effects.

In fairness to the agent, I must reveal that I also  showed him several items from my house that my handlers had caused me to believe  were bugged. I no longer fall for those handlers’ tricks. (The agent did not  examine those items but pretended to make a note about them.) Later, I realized  that the “bugs” were simply part of the handlers’ mind control games; however,  the agent did not actually know that the items were NOT bugged.

The agent asked me only two questions: was I  homosexual and was I being blackmailed? Those questions strongly suggest to me  that that particular group is being targeted with ESMC for purposes of  blackmail, extortion, and perhaps annihilation and that the FBI is well aware of  that exploitation. He probably wanted to know whether the handlers were trying  to cash in on their operations by extorting money from targets in addition to  receiving their salaries. At the end of the short meeting, the agent did not  tell me that he would contact me after reviewing the material. And he did not.  He also did not make any recommendations to me about how to deal with the  electronic attacks or make any comment about them.

When I visited the FBI, I was convinced that I had  been implanted with a microchip, and naturally I wanted that object removed. I  asked the FBI agent which local hospital or clinic he and other FBI agents used  that could be trusted. He gave me the name of a nearby hospital.

After leaving his office, I went to the out-patient  room of the hospital that he recommended intending to feign a symptom that would  result in a doctor’s order for an MRI that would perhaps show any foreign object  in my body. I waited for hours in the hospital waiting room. Other drop-in  patients, some of whom had arrived long after I did, were able to see doctors,  and they came and went; yet, my name was not called. Finally, I waited alone in  the large empty waiting room.

After hours of waiting, I was at last attended by an  Oriental male intern who had very obviously been informed of my mission. His  demeanor was condescending and he appeared to smirk as he asked me questions. At  the time, I believed that I had a microchip implanted in a tooth, thus I  complained of severe headaches to obtain an order for an MRI. During the  examination, he disappeared for long periods seemingly for no reason. As I  waited for his return, other interns would appear in the doorway to peer at me  as if I were some very strange object of curiosity. Their appearance was  obviously intentional. The examiner had very obviously told them about the “crazy man” whom he was examining. I felt that their presence was contrived to  make me feel uncomfortable. I did. The FBI agent with whom I had spoken had  probably also briefed the young intern about how he should treat me.

Finally, when the intern seemed reluctant to order  further testing, I revealed to him my purpose for wanting the MRI, i.e., the  electronic stalking and mind control. He looked at me in a manner that clearly  said that he had known all along my intentions and told me in a mocking tone  that he didn’t get into anything like that. By then, I realized that the FBI  agent with whom I talked had tipped off the hospital to expect a crazy man to  show up seeking an MRI. I left there feeling rejected and helpless, apparently  what the handlers as well as the FBI agent wanted. Naturally, I heard nothing  else from the FBI after that meeting. I visited that office a second time early  in 2007 and again got no help or advice.

The refusal of the FBI to listen seriously to  complainants and to investigate their claims indicts that agency. An electronic  stalking victim whom I later met in person had also recurred to the FBI to  complain. The victim told me that the agent to whom she made her complaint said  with a grin: “Makes you feel like you’ve got nowhere to turn, huh?” She stated  that “He was quite aware of what I was experiencing.” That victim, a grandmother  and a very soft spoken, almost timid person, had worked for a single  telecommunications company for thirty-five years before she retired. Like most  victims, she lived alone. A policeman lived next door and a Fundamentalist  preacher lived across the street.

For the sake of argument, let us consider that the  FBI and local law enforcement just may be using electronic stalking and mind  control, although illegal and inhuman, to attempt to combat crime. If there is  any element of truth in that conjecture, it is not supported by statistics.  Crime continues to grow at an alarming rate. Moreover, our government is based  on the principle of “due process of law” and justice for all, including drug  smugglers, murderers, rapists, and others. An indictment of crime and a trial by  jury are the cornerstones of our democracy. When law enforcement becomes the  judge, jury, and executioner by using covert electronic torture on targets, they  trample on and make a mockery of those democratic principles.

I searched the internet for statistics concerning the  categories of FBI investigations. The FBI has about 60 field offices and over  12,000 agents. There are departments whose only job is to surf the web for  information on high-tech crimes and information relating to terrorism. The  internet is literally full of references to electronic stalking and mind  control, much of it in relation to terrorism. Yet, I did not find a single  reference to the FBI’s having investigated a single case of electronic stalking  and mind control activities.

The FBI continually monitors and even infiltrates  known organizations that engage in domestic terrorism. It is ridiculous to  consider that the FBI does not know about high-tech electronic harassment, the  instruments used, and how the instruments work. Moreover, the FBI, Secret  Service, NSA, the DOD, and other government entities share the responsibility  for the overall protection of the President, Vice President, cabinet members,  Supreme Court justices, and Congresspersons. It is absurd to think that those  intelligence agencies do not know about electronic stalking and mind control,  how to prevent it, and, if discovered, how to neutralize it.

The subject of electronic stalking and mind control  remains taboo. The controlled media will not touch that topic, which hints that  the media is a co-conspirator with the government. Only on the internet, where  data is still largely uncontrolled by the power brokers, can one find  information on ESMC. In performing my research, I found on the internet multiple  accounts by and about victims of ESMC, and I corresponded with scores of those  targeted individuals. Most of those correspondents appeared to be regular people  whom one would expect to live next door. Many of them had braved the stigma of  being labeled schizophrenic to complain to the FBI and their local law  enforcement. Not a single case had led to an investigation.

There appears to be a high level sub-culture within  the law enforcement and intelligence communities that endures regardless of  which political party is in power and who might be the president. While other  high-ranking members and heads of law enforcement and intelligence come and go,  those employees remain. It is possible that those people, or some of those  people, have learned to employ electronic torture and mind control and have lent  that method to various groups for their own purposes.

On the premise that certain rogue factions of the  FBI, and not the entire FBI, were involved in the electronic torture and mind  control on Americans, on April 14, 2009, I wrote to the FBI. Here is the  letter.

Public Relations & Information

Federal Bureau of Investigation 935 Pennsylvania  Ave, NW Washington, DC 20535

Subject: Electronic Stalking and Mind Control  Activities Performed on Americans

Dear Sirs:

Attached is an article on the above subject that I  wrote under a pseudonym for online readers. In that paper, I pointedly state  that the FBI and other U. S. intelligence services must necessarily know about  electronic assault and mind control, yet they do nothing to halt that practice.  Further, I write that FBI failure to take action against those domestic  terrorists logically leads one to believe that the Bureau condones and perhaps  even collaborates with those criminals.

I would appreciate receiving the FBI’s responses to  the following questions.

– Does the FBI officially acknowledge that  electronic stalking and mind control, particularly the latter, are carried out  by remote on selected targets in the United States of America?

– If so, does the FBI know how those electronic and  mind control effects are carried out on those victims?

– If so, what action is the FBI pursuing to locate  and apprehend the perpetrators?

– If so, why does the FBI not inform local and state  law enforcement and the general public of electronic assault and mind control  being conducted on citizens and residents of the United States?

Thank you.

I sent the above letter by USPS Priority Mail on  April 14, 2009, attaching the paper that you are reading to it. I asked for a  delivery confirmation receipt. The collection site for mail leaving Monroe is  Shreveport, Louisiana. The collection sites are conveniently located in the same  cities as the FBI field offices. When I checked the delivery status online, it  showed that the package arrived in Shreveport on January 2, 2002, or seven years earlier.  January 2 was my mother’s birthday. The year 2002 probably also has some  significance. It was about that time that my son became covered with painful and  unsightly psoriasis sores.

Apparently the FBI field office or somebody working  with the post office in Shreveport intercepted the package and would not  acknowledge the date, as they needed time to examine its contents. According to  the tracking advisory, the letter was supposedly picked up in Washington, DC on  April 20, almost a week later. Priority mail guarantees a three or four day  delivery period. I doubt that the package ever actually arrived at FBI  headquarters. At any rate, I never received a reply from my  letter.

Through their capability of knowing my thoughts, the  handlers already knew that I was sending the letter. If the letter was delivered  at all, the Shreveport FBI field office intercepted the letter to add to or  alter material intended for the FBI in Washington, DC. The obvious intent was to  discredit me and make me appear to be mentally unsound. At any rate, I never  heard from FBI headquarters.

What does a citizen do when the FBI and local law  enforcement refuse to listen to his complaints about electronic and mind control  assault, let alone investigate those complaints? Most complaints of ESMC never  make it to the prosecutorial level because law enforcement refuses to attempt to  identify and arrest the assailants. Such actions of the part of the executive  branch’s law enforcement, instituted to uphold laws and protect the citizenry,  represent a failure of the government.

Every target must become an activist. Not doing so  subjects him for the remainder of his life to unending and increasingly violent  treatment by remote by a yet unknown device/method conducted by unknown  criminals. Local law enforcement already knows about the plight of targets – and  does nothing. The FBI and other national intelligence agencies already know  about the plight of targets – and do nothing. Thus, targets must act bravely and  defiantly to expose the evil of electronic assault and mind control to the  general American public. Targets whose lives have been ruined by ESMC have  little to lose by taking the offensive.

In March, 2009, I put my own advice on activism into  action by preparing, printing, and distributing a flier about electronic  assault. I intentionally did not mention the mind control portion, as readers in  my area simply would not understand at this point. I also printed copies of the  FFCHS flier and distributed it. Here is my flier.

SPEAK OUT AGAINST ORGANIZED  STALKING

Most people get the idea that stalking is  performed by a lone individual on another lone individual. While that is often  true, stalking is also carried out by organized groups or gangs against  individuals. That criminal activity is being practiced in Louisiana and right  here in Ouachita Parish with complete immunity.

Stalkers consist of several or many accomplices  who band together to harass an individual through spreading vicious rumors or  giving out personal information, making wrong number telephone calls and  actually tapping the victim’s phone, hacking his computer, vandalizing his  property, illegally entering his house in his absence, sabotaging his vehicle  and equipment, and even causing vehicular and other accidents. Those attackers  are careful to conceal their identities.

Today’s technology has lent organized  stalkers the use of remote-operated equipment to strike the victim from afar.  The perpetrators can now use those devices to cause these symptoms:  electrical-like jolts; chronic fatigue; sleep deprivation; cramping (usually the  calves of the legs); violent tremors; burns, sores, and abrasions on the skin;  pin-like pricks on any area of the body; extreme itching; migraine headaches;  abnormally fast heart beat, ringing in the ears (tinnitus); and many others,  including cancer. Distance provides the attackers anonymity.

Local law enforcement is unresponsive to  complaints of electronic assault using remote instruments. Two deputies from the  Ouachita Parish Sheriff’s Office visited a citizen at his request to view  tangible proof of the effects of remote electronic attacks. The deputies gave  the evidence only a cursory examination, did not take it for forensic study, and  later refused to communicate with that person further. One of the deputies was  supposed to be the local expert in high-tech crime. Moreover, the sheriff’s  office never entered that complaint in its crime report that it sends to Baton  Rouge.

Electronic stalking happens to victims of every  gender, age, racial and ethnic group, color, political thought, philosophy,  religious persuasion, economic bracket, and occupation. A sixty-year old  mixed-race grandmother in New Orleans videotaped some actions of her organized  stalkers from her own property. Instead of arresting the harassers, the police  arrested the victim. She is awaiting sentencing at this moment (April,  2009).

Do your own research by “Googling” the  following key words and phrases: stalking (organized, gang, neighborhood);  directed energy weapons, uses of RFID, electromagnetic forces, directed sound,  targeted individuals, laser weapons, electronic assault, and microwave attacks.  Some websites dedicate themselves to the topic of remote electronic assault and  stalking.

Victims number into the tens of thousands. Some  experts place that number at well over two million. If you are not yet a victim, you could be next. Speak out against organized electronic stalking and  the criminals who employ it.

I also bought a dozen colorful pastel T-shirts with a  sign on the back reading: “I’m a defiant victim of electronic stalking, and – hey – I’m doing great!” I wear them daily.

Most targets by far are law abiding citizens who wish  to live their lives in peace while preserving their privacy; yet, when law  enforcement and the government fail them, it is time to consider other measures.  However, whatever you do, it must be done in a calm deliberate manner. Do not  lose your temper. Do not make threats. Do not appear to be a threat to anybody  or to yourself. Remember that your handlers want you to acquire a police record  or have you sent to a psychiatrist for an “evaluation.” Both go into your FBI  file.

In June, 2010, it was learned that the FBI was  directly involved with the arrest of Joran Van Der Sloot in his murder of a  young woman in Peru. Although their assistance is commendable, the FBI seemingly  cannot investigate the complaints of thousands of targets of electronic stalking  and mind control within the United States. What is wrong with American law  enforcement?

On May 2, 2011, after having captured on tape some of  the handlers’ talking, I wrote to the FBI field office in New Orleans, under  whose jurisdiction my area falls. In the letter, I told them about the  electronic attacks, gave them the frequencies that Todd Bates had identified,  and asked them to identify those frequencies. Although I sent the letter by  delivery confirmation, I never got any indication that the FBI had received the  letter. As usual, I asked them to reply in writing. Naturally, I have heard  nothing else from that office.

Local Law Enforcement

Like the FBI and other national law enforcement  agencies, local level law enforcement has also been unresponsive to victims.  There may be several reasons for that.

(1) Local law enforcement knows little if anything  about electronic stalking and neurological assault. Officers on the local level  very seldom receive training in high-tech crimes involving the human body. If  they have received training, that instruction probably covered only the  electronic effects and did not address the mind control element. In addition,  most law enforcement officers, as well as the general public, simply cannot  comprehend how twenty-first century technology can be utilized to invade the  human mind and affect the human body.

(2) Victims can normally produce no hard evidence  concerning their complaints, let alone identify their assailants. As law  enforcement rushes to point out, that gives them little to work with in pursuing  the assailants. It also provides them a very convenient excuse to do nothing.

(3) Victims are very reluctant to make complaints  concerning neurological attacks for fear that they will be considered crazy and  treated as such. Indeed, psychiatrists and others have convinced the world that  persons who complain of electronic stalking and mind control must be textbook  cases of paranoid-schizophrenia. I remained silent for three years after I knew  what was happening for that same reason. When I finally did brave the stigma of  being labeled crazy to present my complaints, surely enough the investigative  officers apparently thought or pretended to think that I was  crazy.

(4) Authorities are reluctant to publicize  information in the media concerning electronic and neurological attacks, as many  citizens would become alarmed for their safety. The difficulty in enforcing laws  making citizens safe from high tech assault causes law enforcement to maintain  silence. The assailants are quite aware of the authorities’ dilemma, and they  exploit that weakness.

(5) In some cases, law enforcement doubtlessly  knowingly permits and sometimes even abets and actively participates in those  stalking activities. If not, they may have very good ideas about people and  groups that might engage in electronic stalking without pursuing those ideas. It  is no secret that law enforcement officials in many places have “protected” certain criminal elements either for money or other benefits or out of sympathy  for those groups. Vigilante groups are known to enjoy police and other law  enforcement support and protection in some areas of the United States.

My experience with local law enforcement has been at  best disappointing. After several years of enduring electronic stalking and mind  control without having proof of it, I finally found that proof. Here is what  happened. I read on the internet a victim’s advice that aluminum foil could  ameliorate some of the effects of the ESMC. Thus, I placed heavy foil over the  three windows of my bedroom. At night I could hear what seemed like puffs of air  hitting against the foil, sounding much like rain drops falling on large leaves  of plants.

After several weeks, I entered the bedroom one day  without turning on the light, and I was astonished to see literally hundreds of  tiny holes in the foil. The holes can only be seen when the room is dark and  there is daylight outside showing through those holes. The holes ranged from pin  size to perhaps a forth of an inch diameter; the smaller holes seemed to be  perfectly round; some of the larger holes were somewhat jagged. Those windows on  that side of the house face south southwest. My satellite TV dish and satellite  internet dish stand right outside those windows to pick up the satellite signals  from the southern sky, a further hint that satellites may have something to do  with ESMC.

I prepared a written report about the holes in the  foil, being very careful not to mention the mind control element of electronic  stalking, as I knew that any mention of mind control would only make me look  like a crackpot. Before I had time to print out the complaint, the handlers, who  have ready access to my computer, changed the date of the complaint from January  14, 2008 to November 14, 2008 (11 months in the future) to make me look crazy.  Fortunately, in scanning the report before I submitted it, I caught that change  in the date and corrected it by hand.

I drove that same day to deliver the report to the  local sheriff’s office, When I arrived, I parked in front of the large  three-storied building, and the moment I stepped out of the truck I felt strong  vibrations. My dog in her portable kennel in the back of my pickup truck also  started to shake uncontrollably, just as she does when under attack from the  electronic stalkers. That suggests that the sheriff’s office either houses some  very sophisticated electronic equipment that is manned throughout the day or  there is an exceptionally strong electromagnetic force in that location. I later  learned that the current sheriff had turned the top floor of the building into a  high-tech area with very limited access.

I entered the building and found the criminal  investigation section. When the duty officer in that office asked the nature of  my complaint, I told him. Without blinking an eye, he told me matter-of-factly,  as if he were an electronics expert, that the only way stalkers could bother me  electronically was in touching me with something like a Taser. Instead of  telling him that he was full of s–t, as I was inclined to do, I kept quiet and  insisted on talking with an investigative officer.

The duty officer’s remark, though impertinent and  uninformed, was revealing. He had obviously been instructed by the sheriff to  make that policy statement to anybody complaining of electronic harassment. That  means that other citizens in Ouachita Parish, Louisiana had previously  complained about the same electronic harassment. I am still searching out those  persons.

I later confided in an older dentist whom I had seen  over the years about the possibility of a microchip having been implanted in one  of my molars. The dentist did not appear the least bit surprised by my  statement, which strongly implies that other patients had also told him similar  stories. He replied that if I had one it would more likely be located in the  soft tissue (the gums and the roof of the mouth) rather than the teeth,  suggesting that it may have been injected with a syringe. The dentist began  condemning various government actions and government surveillance. I do not know  whether he thought that he was patronizing a delusional patient or actually  believed that the government was covertly targeting many American  citizens.

The duty officer at the Sheriff’s Office assigned a  junior parole officer to take my complaint, and that officer promised to pass my  complaint to the investigative section. My complaint concerned only electronic  stalking. I mentioned nothing about mind control. A few days later an  investigative officer, with an assistant, did indeed arrive at my house.

The lead officer was supposed to be the resident  expert on high-tech crime. I showed the two officers the holes but did not offer  any explanation for them except that they came from some unknown outside energy  source. The officers showed little surprise and asked no questions. How strange!  If I had been the investigative officer, I would have asked the complainant what  he thought had perforated the holes and where it came from, whether he thought  that he had been affected in any way by whatever caused the holes, and whether  there was any other area affected by the mysterious source of  energy.

Instead, as their report later revealed, they were  more interested in seeing what type of firearms I had in my house. The  perforated foil provided forensic evidence; yet, the officer did not ask for a  sample for forensic examination. I never heard anything else from those  deputies. Still more strangely, the senior detective who visited me received a  promotion a few weeks later from sergeant to lieutenant. I did not obtain a copy  of his report until almost two years later. His report was never entered into  the crime statistics sent to the state police.

When I visited the sheriff’s office a second time, I  showed a different officer some notes that I had written on electronic stalking  (no mention of mind control at this point), which I wanted to give to an  investigative reporter for the local newspaper. My objective in publishing a  news story on ESMC was to flush out other victims in the area, as by then I was  convinced that there were several other targets in the parish. The officer  stated somewhat smugly that publishing the article would not be a good idea, as  (paraphrased) “investigative reporters have a habit of wanting to delve deeper  into the matter.” That was exactly what I wanted. I viewed his statement as  meaning that local law enforcement did not want the public to know anything  about electronic stalking. Once again, the officer’s statement suggested that  law enforcement knew that other targets in the area were experiencing the same  problem.

Once again, in February, 2008, I was harassed  non-electronically by persons riding four-wheelers at one o’clock in the morning  in front of my house and shouting. I live at the end of a long, obscure, private  dirt lane with a cotton field on one side and a pasture on the other side. It is  my property, and my house is the only residence on that long lane, which dead  ends at my house. So, there was no reason for them to be in that area. When the  harassers made a second pass by my house, I stood with my shotgun in the  shadows. When they got nearer, I shined a high-beam spotlight on them and  shouted that if they returned I was going to shoot them. The following morning I  prepared a complaint about that incident and took it to the sheriff’s office  later that same day.

A few days after presenting the second written  complaint, the sheriff’s office called my son at his work place. Although the  sheriff’s office could have called me, instead they called my son to tell him  that they wanted me to undergo a psychiatric evaluation. When they called, I was  actually on my way back home from visiting my son and his family. There was no  reason to call my son instead of calling me directly. Moreover, I had not given  them my son’s name, his place of work, or his telephone number. I interpreted  their action as a deliberate effort to intimidate me and to suggest to my son  and others that I was crazy.

I called the sheriff’s office and made an appointment  to see somebody the following day. When I visited the sheriff’s office the  following morning, I learned that an older female officer had been assigned the  case. The woman threatened to obtain a court order to force me to submit to a  psychiatric evaluation. Although I knew that they could not justify that action  and furthermore that I could refuse treatment, I agreed to the evaluation only  on my own terms, as I reasoned that the result could possibly strengthen my  case. I underwent the psychiatric evaluation as well as a good physical  examination in Baton Rouge a few months later.

After my going to much trouble and expense in getting  the examinations, the sheriff’s office consistently refused my requests for  meetings to review those findings. They did not have to, for the psychiatrist  doubtlessly mailed the sheriff a copy of his evaluation. That appears to be pro  forma in those cases, which practically proves that psychiatrists are a part of  the “system.” Yet, I, the patient, had to sign a consent form to obtain copies  of the psychiatrist’s evaluation for my son and myself.

Shortly after that meeting, I got a call one day from  an employee in the state-operated Elderly Protective Services, an office that I  had never heard of before then. The Sheriff’s Office had asked her to get in  touch with me and visit me – still another evaluation. I realized that her visit  might work to my advantage instead of the opposite, so I agreed to her  visit.

The moment she arrived and I greeted her I could see  that she was puzzled about why she had been asked to see me. I invited her  inside and we chatted for a few minutes. As she left, she told me candidly that  she was confused about the request to visit me, as I was more mentally and  physically fit than many younger people she knew. Yet, her visit was another  ploy by the authorities to make me appear mentally unstable. I am sure that her  visit went on my record. In addition, by sending the social worker, the  sheriff’s office also covered itself in case I later sued the office for failure  to act on my complaint.

After undergoing the psychiatric and physical exams  and still being unable to see anyone in the sheriff’s office, I sent a  delivery-confirmation letter to the state attorney general’s office on June 10,  2008, asking that office to investigate my complaints. By this time, I had  decided that regardless of the almost certain stigma, I was no longer going to  hide the fact that I was a victim of mind control. Thus, I attached a summary of  my experiences that included the mind control portion. I have both my  mailing receipt as well as the initialed delivery confirmation from that office.  I never heard from the attorney general’s office. I am quite certain, however,  that the letter was kept in some file to later attempt to declare me mentally  incompetent.

After more than two months had passed since writing  the letter to the state attorney general without getting an answer, I then wrote  to the Public Affairs Division of Louisiana State Police for statistics on  electronic stalking and mind control, defining clearly both terms. That office  answered tersely, “We do not have statistics on such incidents.” That meant that my complaint  and doubtlessly those by other targets in my parish had gone unreported by local  law enforcement in its monthly crime statistics report to the state office. No  surprise there.

Finally, on February 19, 2009, when another object  turned up missing in my house, I wrote to the Sheriff of Ouachita Parish,  summarizing three different intrusions into my house in my absence. I took the  letter to the sheriff’s office and his secretary stamped the date on my copy. I  never heard from that authority or any other officer. Again, no surprise  there.

In my correspondence with other victims, I learned  that in case after case they had sought out the FBI, state, and local law  enforcement for help and had received none. Some of those victims had even  stated that they believed that policemen and other law officers were a part of  their problem. It is well documented that in certain cases law enforcement has  been involved in stalking. In all of my communication, I never found a victim  whose complaint was seriously investigated.

In my case, although an investigator initially came  to view the proof of ESMC, that visit was simply a formality. For the record,  they could say that they “investigated” the incident. They probably came as much  out of curiosity as out of duty. Moreover, as the answer from Public Affairs  attests, the lead detective never filed an official report of his visit. I never  heard anything else from the Ouachita Parish Sheriff’s Office about the ESMC  case, and that officer and others refused to meet with me afterward.

Electronic stalking and assault (in this case, on  both the body and the mind) are crimes in any civilized society. That I could  not identify my assailants should not have been a factor. Many victims of crime  cannot identify their assailants. Watch the “who dunnit” programs on TV. In many  cases, victims are assaulted without seeing their attackers. Although naturally  that makes pursuing the assailants more difficult, law enforcement is  responsible for at least attempting to locate the criminals. In the case of  ESMC, the victim should only have to describe his attack. He should not have  to identify who did it or necessarily how it was done.

Let us review our seventh grade civics. On all three  levels of government – national, state, and local – there are three branches,  the executive, judiciary, and the legislative. Theoretically the legislative  branch passes the laws, the judiciary interprets them, and the executive  enforces them. Law enforcement belongs to the executive branch on all three  levels. Most of the higher officials in the executive branch, including law  enforcement on the state and local levels, are elected by the people. Thus, if  law enforcement is indeed a part of the ESMC conspiracy, they are elected public  servants using public funding to harass private citizens. In other words, the  taxpaying victims are not only unprotected by law enforcement but they are  financing their own electronic and mind control torture.

Targets know that law enforcement officers very often  harass people who have committed no crime. In one such case that occurred in  2004 in South Carolina, a victim of harassment reported “numerous instances of  trespassing and vandalism” to the police. The harassers had also shot and killed  the victim’s cats. The police ignored the complaint. One night the harassment  victim shot and killed a trespasser on his property who was carrying an assault  rifle. The trespasser turned out to be a police officer. An accomplice of the  officer, who was with that officer when he was shot, later admitted that the  officer had killed the victim’s cats. In other words, the officer’s actions were  purely harassment intended to look like actions of the victim’s neighbors or  other trespassers.

In that same case, the harassment victim was first  tried, convicted, and sentenced to thirty years. However, the Supreme Court of  South Carolina threw out that decision because of improper judicial proceedings.  The case again went to trial in January, 2010, and the victim was acquitted.  During the trial, the prosecution tried to persuade the jury that it was a case  of an upstanding officer of the law being killed over the death of some lowly  cats. However, the jury wisely recognized that the case was about a victim  defending himself and his property against harassment and stalking. In this  case, the dead stalker and the harasser was a police officer. Local law  enforcement had apparently been trying to involve the victim in an action that  would cause him to be declared mentally unstable. Sound familiar? In that  particular case, their attempt backfired.

A Brush with the Law

As stated previously, victims often do some strange  things as a result of his targeting. After learning that I was a target, I began  researching every possible article that shed light on the topic of ESMC. In  researching, I discovered articles on the possible use of ham radios and  clandestine radio stations in the ESMC process; thus, I started looking into  radio stations in the area that no longer operated. In a nearby city named  Bastrop, in an adjoining parish, I found one such station whose owner had had  his license revoked. That sounded like a good lead.

I went looking for that particular radio station. A  person in Bastrop whom I asked about the station, directed me to a location out  in the countryside. He either deliberately mislead me or he suffered from a very  bad memory. I later found out that the station had been located right downtown.  Subsequent research divulged the name of the former owner. There were several  people in Bastrop by that name. I finally narrowed it down to one. Then I  Googled that person’s address.

I bought a pair of binoculars, and with a Map Quest  map showing that person’s address, I went to find out what I could about that  person. As I entered the street on which the man’s house was located, two men on  bicycles sat talking with each other on the street near that house. I thought  nothing more about it.

I drove to the end of the street, a cul-de-sac, and  parked with the cab of my truck facing down the street toward the house. Using  my binoculars, I took down the number on the license plate of a car underneath  the carport of the house. I saw a male exit the house, go into the yard, and  then return to the house. When I started back down the street to leave the area,  the two men on the bikes blocked the street and hailed me. I should have  known!

My handlers, knowing my every thought, had obviously  forewarned the former station owner who had in turn asked two of his friends to  feign the tete-a-tete on the bikes to watch me. One of the two men made a call  to the sheriff’s office. Before long, three sheriff’s cars appeared with several  deputies. The irate owner of the house came out, and we talked a few minutes. I  tried to explain what I was doing without sounding like a madman. The head  deputy asked me to follow him to the sheriff’s office.

When we got there, they looked inside the cab of my  truck. In the truck, I carried a double-barreled .12 gauged shotgun, as at that  stage of my targeting, I believed that I might be attacked at some point. The  shotgun was not loaded; however, there were several shells on the floorboard. In  Louisiana, only concealed weapons are illegal. Shotguns in trucks are perfectly  legal and thousands of people routinely carry them. So, they could not charge me  with possessing and carrying a firearm.

The deputies took me inside to the office of a higher  authority who may have been either the sheriff or a chief deputy. He looked up,  apparently already apprised of the situation, and asked in a derisive and  intimidating manner, “What nut house did you escape from?” He took copies of my  driver license and other papers. I expected to be arrested. Instead, he told me  to leave the city and not to come back there again. Not intimidated, I have  returned there several times since then.

The sheriff had a perfect opportunity to arrest me  and make me look insane. Instead, he let me go with a warning. He had obviously  been instructed by a higher authority not to arrest me. Why? Because the  incident would have gone into the local newspaper and might have drawn attention  to my reason for being there in the first place. I would have had a perfect  reason to talk to reporters about why I was there. They knew that. The  powerbrokers and their accomplices go to great lengths to stifle any publicity  on the targets and their cause.

That incident taught me several lessons that targets  usually learn sometime during the early days of their discovery: That targets  must be very careful in sleuthing out what they believe may be leads to their  ESMC; that the handlers and the people behind them pull strings on every level  of government; that the local authorities are a part of the “system;” and that  law enforcement does not want anything brought before the public about  electronic stalking and mind control.

U. S. Intelligence and Law Enforcement  Examined

The stand-back, hands-off position of the FBI and  local law enforcement is understandable only if one considers that those  authorities themselves may be involved in electronic assault and mind control  activities. Ask yourself the following questions.

(01) Who would have the equipment to carry out  electronic assault?

(02) Who would have the knowledge about how to use  that equipment for ESMC?

(03) Who would have a ready opportunity to use the  equipment?

(04) Who can communicate through a network that  allows them national coverage?

(05) Who has the authority to investigate people and  obtain their personnel and military files?

(06) Who has the financial resources required to buy  the equipment, procure the handlers, train those people, and pay them for their  services 24/7?

(07) Who has the technical expertise to train  handlers in electronic stalking and mind control activities?

(08) Who has secure facilities where extra-legal  records on the targets and information gathered on the targets can be kept?

(09) Who has the authority and funding to send  hundreds of investigators into the field to conduct interviews with people who  know the targets and record those interviews.

(10)) Who has the connections to pursue victims from  city to city, state to state, and country to country as they seek to escape the  effects of ESMC?

(11) Who can best start rumor campaigns and spread  misinformation about the targets?

(12) Who can prevent investigations by law  enforcement into complaints of ESMC?

13) Who can encourage the medical and scientific  communities to maintain silence on ESMC and psychiatrists to label victims  paranoid-schizophrenic without looking further into the subject?

(14) Who can summon the assistance of telephone  companies, public utility companies, and internet providers in tapping phones  and hacking computers of victims?

(15) Who can command the cooperation of the post  office and the package delivery services into misdirecting and interfering in  other ways with the victims’ correspondence?

(16) Who has the human resources to fill the internet  with lies, misleading material, and deceptive information on electronic stalking  and mind control?

(17) Who has the equipment and the capability of  tracking a person within his home or any other structure and pinpointing any  place on that person’s body?

(18) Who has the means to encourage neighbors to  ostracize a victim in his own neighborhood?

(19) Who has the power to direct the resources of the  IRS, DEA, ATF, and other agencies on the targets?

(20) Who has the capability of gaining access to the  targets’ financial records and credit reports?

(21) Who has the clout to silence Congresspersons,  especially the Committee Chairpersons, from ordering a national inquiry into  widespread and increasing allegations of ESMC?

(22) Who has the capability to garner the cooperation  of elements of all ethnic groups against a target?

(23) Who can make certain that no ESMC complaint is  submitted on local law enforcement’s monthly crime report?

(24) Who has the influence to keep any mention of  ESMC out of local newspapers? (25) Who has the authority to issue policy  statements denying that electronic assault even exists?

(26) Who has unlimited human resources to use in this  manner?

(27) Who can legally allow or block out frequencies  over the air?

(28) Who can subsidize the rent of policemen and  other local law enforcement to rent an apartment or house next to  yours?

If you answered “the government,” or the  powerbrokers, to all twenty-eight of those questions, you are correct.

Electronic stalking and mind control simply cannot  exist without the knowledge of the FBI and other Federal intelligence gathering  agencies, period. That hints of a vast and widespread conspiracy that must  necessarily include local law enforcement. The conspiracy is secret, well  organized, and thoroughly implemented. It is highly possible that conspirators  may include legally constituted and outwardly legitimate groups. If that is  correct, the FBI, DIA, MIA, DOD, CIA, and other American intelligence units  would have to train those selected groups, provide them the equipment and  know-how to use it, and advise them.

In the event of a crime, a victim’s only recourse is  to inform law enforcement of the crime. Those authorities are expected to  investigate and assist the victim. If law enforcement is the perpetrator, to  whom else can a victim turn for help?

Electronic Stalking Versus Mind  Control

Four main points stand out: (1) Electronic stalking  and mind control pervades the United States of America, targeting victims that  represent the make-up of the entire population; (2) Conspiracy, deception, and  secrecy are key elements in those activities; (3) Perpetrators of that  electronic stalking and mind control conspiracy operate on national, state, and  local levels; (4) Many of those conspiracies operate with the acquiescence and  under the protection of law enforcement on all levels of  government.

Ordinary electronic stalking can be carried out by  many people and groups operating near the victims and using home-made or altered  devices and equipment that can be easily purchased. Mind control, on the other  hand, is quite another activity, which requires high-tech equipment, a great  deal of organization, intensive training, utter secrecy, and the ability to  operate by remote. Amateurs can carry out electronic stalking; however, only  highly trained technicians can carry out mind control.

The Role of Jails and Prisons in  Electronic Torture and Mind Control

Law enforcement has cooperated with ESMC on targets  for many years. Experiments with electronic torture and mind control in  so-called correctional facilities probably began back in the 1960’s and 1970’s.  David James Fratus, a prisoner in the Utah State Prison in Draper, Utah, wrote  of his experiences with ESMC in that facility in a 1988 letter. I include below  some excerpts from that very long and descriptive letter.

“I began to receive, or hear, high frequency tones in  my ears. Like the test pattern on a TV set. The volume or intensity of these  frequencies is adjustable and some are so high and piercing that they’ve  literally had me climbing the walls. You cannot imagine what it has been like  confined to a cell 24 hours a day for almost a rear [year] now, being brain  blasted by high frequency impulses–no respite, no place to hide, and having not  the lightest notion what was going on.

For the climax in this series of weird events, I  began to hear voices in my ears. Voices that change pitch and timbre in contrast  from being a cartoonish high and squeaky, descending through the octaves,  including everything from sinister Darth Vadorish to basically normal  characteristics. The reception of these voices into my inner ears is as vivid as  though I were listening to a set of stereo headphones, and they are able to mix,  match, and blend them in conjunction with the frequency tones creating a raucous  cacophony of audio discord that disheartens the soul.

Now for the clincher. The various effects of this  device have been progressively increased throughout this eleven-month onslaught,  finally arriving at full potential with the end result being that I am now  having my brain monitored by an omnipotent computerized mind reading or scanning  machine of some sort. No hoax, no illusion to what I’m experiencing. These  people have devised or acquired a specialized unit that reads absolutely  everything–physical as well as mental functions, and are able to cause severe  impairments and dysfunctions via this remote-control scanning device.

This scheme of sleep deprivation, headaches, and  audio torments is relentless and being used to break down my resistance and wear  me to a mental frazzle, permitting no mental privacy, berating and picking my  thoughts apart, and attacking my mind with an insidious tirade of sickening  innuendo and threats. They are going into my subconscious, or memory bank,  bringing forth unpleasant memories long ago forgotten, and I am being punished  for past as well as present indiscretions. I can think of anything from the  past– a friend or situation from 30 years ago for instance, and the voices will  provide names and particulars. I have repeatedly tested and attempted to trick  them on this. No way. They have better access to what’s in my head with this  nefarious invention than I do.

I can converse with my antagonists merely by thinking  what I wish to say…. and I welcome you to the Twilight Zone!! How the hell is  this being done?? They are using those frequency impulses to perpetrate some  very vicious maltreatment on me. With the apparent ease of manipulating a  keyboard, they can, with a flick of the switch, strip me of all energy and  motivation to where I’m forced to lie on my bunk and stare at the wall like a  zombie. I’ve been left in this state for weeks at a time–literally chained to  my bed without the actual use of physical restraints, having not the energy to  walk back and forth in my cell even a few times. For almost the entire eleven  months I have continuously been made to feel low down and chronically  depressed.

It is inconceivable to me that the technology of this  awesome device can be unique and possessed solely by the State of Utah, but I  may very well be wrong. When I first entered the prison in May, 1986, one of the  psychologists who conducted my initial classification interview inquired as to  whether I had ever heard “voices.” That seems to be the key word around here. .  . .The proficiency of the apparatus I’m dealing with is sophisticated far beyond  anything scientists had apparently imagined in use at that time. I have since  heard many references made to people hearing “voices” by both inmates and staff,  which would indicate that these people were in possession of, and employing this  technology at least that far back. This is what prompts me to wonder how they  could have had such an innovative piece of equipment in use, operating with  apparent perfection of technique, without the scientific and medical community  in general being aware of it. Quite a puzzle.

At least two inmates that I know of have been  badgered to the point of having attempted suicide as a result of this mental  torment, and something stinks to the high heavens here! All of the staff, as  well as a number of inmates, are aware of what is happening, so I can’t fathom  how it can remain, or even at this time, be a kept and closed secret human  nature being what it is. They [prison authorities and guards] are so very smug  and secure in the belief that they cannot be brought to account for these  blatantly illegal acts due to their well rehearsed methods of official denial,  isolation, and absence of witnesses, bogus psychiatric evaluations, and of  course, the fact that this mental torment is being accomplished by a faceless  machine, operated by anonymous antagonists from an unknown location and  distance.”

What happened to Fratus in the Utah prison represents  the most heinous crime against humanity. Keep in mind that Fratus wrote his  letter over twenty years ago. Imagine how much more sophisticated the equipment,  the software, and the mind control techniques have gotten in the last two  decades. And imagine how the spread of that evil has proliferated in the  meantime.

In a case aired on the TV program “48 Hours” on  August 16, 2008, the narrator told about Florida playboy Fred Kretsmer’s  spending eight months in a California prison and later hearing “voices.” Kretsmer later murdered a woman. Did the voices that he heard urge him to kill?  Several victims with whom I corresponded who also hear voices had served time in  prison. Thus, it appears that prisoners are routinely implanted with microchips  and often submitted to psychological torture in prisons.

A few of email ESMC correspondents have served jail  or prison time. All of them were subjected to electronic torture and mind  control in those facilities. They believe that they were also targeted while  they were there. In truth, they may have already been targeted long before they  were incarcerated.

Only the most naive, uninformed persons will believe  that state prisons exercise a monopoly over electronic torture devices and  methods and mind control. Other elements of law enforcement must know about  them. Moreover, how did those prisons acquire that technology in the first  place? Detention center personnel appear to be a party to the entire  intelligence community/law enforcement ESMC conspiracy.

The ESMC Operators  Manual

Something as sophisticated as mind control is  developed over a long period of time and involves many levels and steps. Thus,  its methods have to be spelled out in a type of trainers manual. That manual  establishes particular protocols for applying the ESMC. Those protocols differ  with the aims of the ESMC and the types of targets.

ESMC could not have been developed without input from  psychologists, psychiatrists, electronic and aerodynamic engineers, very highly  trained computer programmers and technicians, probably physicists, chemists, and  pharmacists, mind control and interrogation experts, i.e., the intelligence  community, and others. Nor could it have been developed without the knowledge of  the FBI or the blessings of the National Security Agency.

It is surprising that at least one of the scientists  or government officials involved in planning the original ESMC techniques has  not spoken out and revealed the sordid secret. However, the fact that  participating in ESMC makes them criminals and subject to imprisonment is  probably sufficient persuasion to keep them quiet. In addition, they probably  fear they will also become victims of fatal “accidents” and other mysterious  deaths if they talk to authorities or to the press.

One of the aims of the assailants is to discredit the  target by making him look crazy, and they do indeed cause anxiety and other  psychological problems in the target that drive him to a doctor. The regular  doctor will then refer the target to a psychiatrist. Unfortunately, the medical  community either knowingly supports the perpetrators or plays into their hands.  I believe that the powerbrokers who control the medical schools also control  what doctors are taught about paranoia and schizophrenia.

I understand that pre-graduation counseling of  medical students warns them about patients who think that they are targets of  electronic and mind control assault. In other words, doctors have been  thoroughly brainwashed not to think outside the traditional centuries-old  concept of mental diseases. That is why physicians usually are not targeted.  They are more useful to the powerbrokers who employ the perpetrators in making  targets look crazy with their diagnoses.

Do not believe for a second that psychiatrists do not  know about electronic stalking and mind control. About a year after I began  receiving the continual effects of ESMC, I visited the same psychiatrist whom I  had contacted years earlier when I suffered from anxiety induced by the  handlers. I left him a summary of my ESMC experiences and my thoughts about  them. He read that summary, and apparently the content did not at all surprise  him, nor did he suggest that I was delusional. Instead, he later encouraged me  to write a fictional book about those experiences. I told him that if I did  write a book, it most certainly would not be fictional.

Not all psychiatrists are involved in the ESMC  conspiracy; they are simply defending their field of study. Look at it from a  practical viewpoint. If a psychiatrist actually believes that a patient is a  victim of ESMC, he loses that patient, for a psychiatrist can only treat real  problems with the victim’s brain, not what the stalkers do to his brain. To keep  the patient, the psychiatrist is compelled to call the victim’s condition  paranoia, schizophrenia, or dementia and then prescribe mind-altering drugs,  which only compound the stalkers’ effects. Psychiatrists operate within the  narrow framework of their medical school teachings based mainly on nineteenth  century observations and experiments. Their treatment usually consists of  prescribing patients various forms of anti-depressants.

Often psychiatrists will recommend extended treatment  in a psychiatric facility for victims who “hear voices.” That treatment is  sometimes provided in the American Gulag, or the nearest insane asylum, for few  targets can afford private clinics. Several victims with whom I corresponded had  been involuntarily admitted to mental institutions because of their symptoms  despite not posing a threat to anyone or to themselves. They always came out of  those institutions worse than when they went in. Many facilities still employ  shock therapy, which has been totally discredited as a means of treatment for  mental illnesses.

In attempting to defend themselves from unseen and  unknown objects from an unseen force, targets do indeed often act in bizarre  manners. They develop faux phobias about going to doctors and dentists; they  fixate on objects disturbed or missing from their houses; they feel that TVs are  used to watch them; they place aluminum foil over their windows to ward off the  directed energy waves or whatever they may turn out to be; and they start  thinking that almost everybody is a perp. Those are reactions to their  electronic stalking and mind control assault, not signs of genuine mental  problems.

ESMC, Government, and  Democracy

I resisted for years the notion that my own  government might have anything to do with my becoming a victim of electronic  stalking and mind control; yet, overwhelming circumstantial evidence and logic  tell me that U. S. law enforcement on the Federal level may be directly involved  in electronic harassment and mind control. If not, they know the identity of the  assailants, protect them, and refuse to investigate them.

Many TI correspondents trace their ESMC to the early  2000s, which coincides with the Bush administration (2000-2008). The Patriot Act  not only gives U. S. law enforcement carte blanche to monitor American citizens  but also excludes those officers from prosecution for that activity. Moreover,  it authorizes law enforcement to use private citizens to spy on their peers.  Those domestic neighbor-spies normally have no training in law enforcement and  do not have to undergo a security check. In May, 2011, Congress approved the  ubiquitous Patriot Act without changes for another four years.

I used to be the type American whose eyes welled with  tears whenever he heard the Star Spangled Banner. I was raised to revere the  government. Moreover, I served in the U. S. Armed Forces Reserves and spent  years working with the government. My ancestors helped found the British  colonies, and my ancestors and kinsmen have fought in every conflict from  Colonial wars and the American Revolution to the present.

However, after my experiences with ESMC, I have  developed a very strong distrust of my government and the executive branch in  particular. I believe that it is patently clear that the FBI, the U. S.  intelligence community, and law enforcement on every level either take part in  electronic stalking and mind control operation, cooperate with the perpetrators,  or cover for the perpetrators.

I kept quiet for over two years after I discovered  that I was a target of electronic  harassment and mind control, as I knew that  most people would not only doubt my accounts of ESMC but also my sanity. Then I  realized that the perpetrators of that evil counted on my remaining silent. In  fact, targets’ reluctance to talk about what is happening to them has set back  for years our attempts to expose ESMC and the people behind it. Thus, I chose to  reveal to the world my experiences as a victim of electronic stalking and  particularly of mind control. I would urge other targets to do likewise,  regardless of the stigma that they will almost certainly encounter.

In the silent telepathic manner in which the perverts  and I communicate, I tell the handlers that nothing lasts forever, that times  are changing and that they are “going down.” The hirelings are convinced that  the establishment will continue to protect them. After all, they have engaged in  the sordid practice of ESMC for decades. Once, one of my handlers told me  subliminally, “I guarantee you that we are protected.”

Nevertheless, eventually the sheer growing numbers of  complainants will force law enforcement to follow the laws that they swore to  uphold and adhere to the principles of the Constitution that they swore to  defend. The general public is becoming more aware of and informed about ESMC,  and targets are beginning to emerge from hiding to insist on law enforcement  investigations. More victims are beginning to network on the internet. Until law  enforcement acts, I invite other victims of electronic stalking and mind control  and other concerned Americans to join me in the war against the demented, evil  ESMC torturers and sociopaths.

The stability of the American government lies in  grave danger. If the perpetrators of ESMC are from foreign countries and are  attempting to create American dissidents, they have succeeded. If the  perpetrators are rogue groups within the U. S. intelligence community and law  enforcement, they have succeeded. If the perpetrators are domestic terrorists or  vigilante groups, they have succeeded. Thousands of American targets of  electronic harassment and mind control today distrust their government and no  longer feel any patriotism toward that government.

As the reader has probably surmised, I am a longtime  critic of U. S. foreign policy. I stand against our waging war on a country  without a formal declaration of war naming that country, supporting particular  countries (Israel in particular) with abysmal human rights records, blockading  countries without declarations of war, using public funds to buy the  acquiescence and cooperation of corrupt dictators, establishing puppets in  smaller, weaker, poorer countries, stationing U. S. troops all over the world,  proliferating the use of atomic, neurological, and biological weaponry, and  banning travel in countries that do not comply with U.S. demands (Cuba, N.  Korea, and Libya).

I visited Cuba in the 1990’s to test the U. S.  Government’s curtailment of the right of Americans to travel to certain  countries with which we were not at war. I hoped that I would be arrested and  charged under the law forbidding travel with Cuba. It did not happen. Yet, I am  sure that my trip to Cuba was duly noted. I also intend to make a future trip to  Cuba to prepare a report for other targets on electronic stalking and mind  control effects or the absence of them in that country. I have no intention of  fleeing to that country. I shall live and die in my home in Louisiana. However,  if no ESMC is found in Cuba, many U. S. targets who look for respite from their  electronic torture may want to consider migrating there.

I am a social scientist with many years of experience  in performing research. When I analyze situations, I look for facts that support  scientific explanations. Yet, due to the secrecy involved, ESMC cannot be  explained scientifically. The remote-operated electronic and mind control  assault is designed to leave no evidence. Nevertheless, thousands of victims  with similar symptoms delivered by remote by unknown forces know the reality of  their circumstances. They await an explanation and a resolution.

The FISA Court

Under the Patriot Act and its subsequent supporting  acts, the U. S. Government can target certain Americans, try them in a secret  court called the Foreign Intelligence Surveillance Act (FISA) Court, and subject  them to a series of covert actions. On March 8, 2010, I directed a letter to  that secret court asking them to clarify under the Freedom of Information Act  (FOIA) whether I had been targeted. Here is my letter.

Foreign Intelligence Surveillance Act  (FISA) Court

Department of Justice

National Security Division

Office of Intelligence Policy and  Review

950 Pennsylvania Avenue, NW, Room  3305

Washington, D.C. 20530

Subject: Request for FISA  Disclosure

Dear Sirs:

I respectfully request that you advise me  whether I have been considered a terrorist suspect by the FISA Court. I am a  target of daily electronic torture and mind control activities performed by  remote by yet unidentified and unseen criminals, who I believe work with the  knowledge, acquiescence, and protection – and perhaps the assistance — of the  Government of the United States of America.

My remote assailants are most likely  Israel and its U. S. supporters, as I am pro-Palestinian, generally pro-Arab,  anti-Israel, and anti-Zionist. The U. S. intelligence community already knows  that I do not communicate with nor conspire with any foreign agent nor any  foreign country in support of my political beliefs and actions. Nor do I belong  to any radical or terrorist domestic groups. Thus, there is no valid reason for  my processing before a FISA court.

Additional personal information is  provided below to help further identify me. I affirm that I am in perfect  command of my mental faculties and that the totality of this information is true  under pain and penalty of perjury.

Sincerely  yours,

Max Harrison  Williams

That the court did not answer my letter came as no  surprise. What else is new! The secret FISA court is supposed to target only  those very few Americans with connections to known or suspected foreign  terrorists. The rules under which it operates do not require it to release the  names of targeted Americans. The court could merely tell me that it cannot  disclose that information or, more likely, ignore my request. As expected, it  was the latter.

The U. S. Government increasingly focuses on finding  and rooting out “home grown” terrorists. While finding the domestic terrorists  in the short-run may be helpful to the powerbrokers, it will not stop the  development of those so-called “home grown” terrorists. I suggest that the  solution to home grown terrorists lies in studying WHY they become terrorists.  The government’s use of electronic and neurological attacks on its own people  will almost certainly lead to “home grown” terrorists.

Identifying my Attackers

My stalking dates back to the mid-1970’s. By  connecting the dots, I can prove beyond a reasonable doubt that Israel and its  U. S. backers initiated my targeting. That does not necessarily mean that Israel  and its supporters are directly behind the electronic stalking and mind control  activities of all targets. They are only one of the powerbrokers who have that  capability.  Since my initial targeting, the program used against me has  gradually evolved from only simple surveillance and harassment to today’s  high-tech torture and mind control.

After reading my story, the reader can draw his own  conclusions. As usual, I make no effort to be politically correct nor any excuse  for not being politically correct. I shall start from the  beginning.

I was working for the U. S. Government in South  America when the 1973 Arab-Israeli War broke out. As a Ph.D. in history and also  a writer, I like to perform my own analyses of events instead of accepting the  controlled media’s views and the government’s versions; thus, I began looking  into the background of the conflict, including the two previous Arab-Israeli  Wars.

While conducting research, I became intrigued by  Israel’s air attack on the U.S.S. Liberty during the 1967 Arab-Israeli  War. In that attack, Israel used unmarked aircraft, supported by Israeli torpedo  boats, to strafe and bomb the Liberty, killing thirty-seven American  sailors. (In contrast, the attack on the U.S.S. Cole in 2000 by Arab  extremists killed only seventeen American sailors. Guess which incident the  media played up.) Subsequent investigations found that Israel knew that the  clearly-marked Liberty was American and sought to blame their attack on  Egypt; a tactic called a “false flag” operation, for which Israel is infamous.  Nevertheless, the United States powerbrokers accepted Israel’s claim that it was  an accident.

As a result of my research on Arab-Israeli relations,  I saw that Israel was not at all the poor beleaguered nation that U. S. media  portrayed but instead pursued internal and foreign policies that caused almost  all of the Middle East problems. I also realized for the first time that the  media in the United States skews information concerning Israel to place that  nation in the most favorable light. On the other hand, it rarely if ever says  anything positive about Arabs or Moslems. Dan Rather, a longtime news  correspondent with CBS, is currently (2009) suing that company because of its  censorship of the news due to powerful business and political pressure.

At the time, I was almost totally ignorant of Zionism  and its influence on U. S. domestic and foreign policy. My post-doctoral  education was just beginning. I learned quickly that criticizing Israel caught  the immediate attention of Israel’s far-reaching intelligence operations – as  well of those of the United States of America, which often acted in concert with  Israel’s Mossad.

Pro-Israel factions in the United States simply  cannot understand that the interests of the United States do not always coincide  with the interests of Israel. Nor do they want others to doubt that intertwined  relationship. Shortly after my “enlightenment,” pro-Israel Americans with whom I  worked started testing my views. Were it not for their attempts to intimidate  me, I may have become only moderately anti-Israel. As it was, I became  increasingly vocal in expressing my condemnation of Israel’s policies. I have  not ceased to do so.

In that same country, one day as I left from work and  was walking home, a swarthy, middle-aged, rather short man fell into step with  me on the crowded sidewalk. He sidled up closer to me as we walked and said in a  perfectly American-sounding accent, “The Jews control the United States.” Completely taken aback by his statement, I stammered my protests. Then, just as  suddenly as he had appeared, he disappeared into the crowd.

No inhabitant of that country would have had the  slightest interest in my feelings about Jews. The man was probably either  Israeli or a pro-Israel agent of United States intelligence. That encounter  strangely coincided with an official visit to that country by an American Jew  from the Department of State who had close ties to Israel.

After that incident, I was occasionally struck with a  sense of unnatural overwhelming gloom while in my bedroom at night before  retiring. I had always been an optimistic, outgoing person and had never had  feelings of that type. The sensation returned time after time. In retrospect, I  know that even back in the mid-1970’s devices and methods for affecting the mind  existed and were being used. Whatever the device was, it operated by remote. The  perpetrators were doubtlessly trying to induce anxiety. (More about that later.)  The underdeveloped country in which I was working had absolutely no reason or  the wherewithal to target me.

In 1978, I was assigned to a different South American  country. One of the national employees who worked in my section was a Jewish  woman who had worked with the Israeli Consulate before that office closed. One  day when I had a problem with a molar, I asked that person to recommend a  dentist. She referred me to an older German Jewish “dentist,” who supposedly did  a root canal on that tooth. An older woman, perhaps his wife, served as his  assistant in a stark room of their dark, unpleasant-looking residence that  served as a dental office.

After retirement in the 1990′s, I went to an American  dentist with problems with the same molar on which the South American dentist  had supposedly performed the root canal. The local dentist found in the tooth a  tiny cylindrical pin-like object less than a quarter of an inch long that he  thought perhaps was the point of a broken file. At the time, I thought little of  it. However, now in retrospect, I know that it had to be a tiny prototype of  today’s microchip. I did not have the foresight to save that small object.

The South American dentist had also wanted to place a  filling in-between my two front teeth, claiming that there was decay between the  teeth. Fortunately, I refused to allow him to do that, for MORE THAN THIRTY  YEARS LATER THOSE TWO FRONT TEETH STILL REMAIN PERFECTLY SOUND. Thus, the  dentist obviously wanted to use a fake filling to plant an almost microscopic  camera in that location, which would allow them to see as well as hear the  people with whom I talked. By WWII, the Axis as well as the Allies had developed  cameras so small that they could be cleverly concealed in pencil erasers, shirt  buttons, and other items. Documents on microfilm could be reduced in size to fit  underneath a typed punctuation period on a piece of paper. That was almost  seventy years ago!

I was fond of the employee who recommended the  dentist, and at the time I had no reason at all to doubt that she was just a  nice, friendly national employee who happened to be Jewish and who happened to  find work with the U. S. Government. Although I liked that particular employee,  her peers obviously did not. When other employees reported to me that she got to  the office early in the morning before I arrived to go through the papers in my  desk, I dismissed those charges as simply tales manufactured out of jealousy and  office rivalry.

I had given that employee excellent performance  evaluations and had even written Washington that as our presence in that country  diminished, we should retain her services as long as we could. Nevertheless,  after I left the country for another assignment, that employee lost her job. She  told others that I caused her to be fired. In actuality, I did not find out that  she had been dismissed until much later. In hind sight, I believe that her guilt  convinced her that I had found out about her duplicity and had gotten her fired.  Apparently that employee did not stop working with the Israelis when she took  the job with the U. S. Government.

In the 1970’s, Israeli Nazi hunters were still active  in South America, funded in large part by the U. S. Government. The “dentist” probably worked with them, and the employee in my office may have also  cooperated in the hunt. One of the contractors who worked with the American  Government and who alternated between Argentina and the country in which I was  assigned was known to be associated with that group. The “Nazis” doubtlessly  included anybody who opposed Israel and its pro-Israel factions in the United  States.

The minuscule device implanted by the dentist in  South America in the late 1970’s may have had only limited capability. That  small object embedded in a molar was undoubtedly used to listen to my  conversations through bone-to-instrument conduction as well as perhaps to track  my movements. Since that time, however, much more sophisticated, high-tech,  intelligence-gathering and mind control equipment and software have been  developed, tested, and put into operation.

Over the years, I have continued to speak out against  Israel’s foreign policy and our support for it. In the 1970’s, I defended the  Palestine Liberation Organization (PLO) when it was still considered a renegade  group, and in 1984 I became a member of the American Arab Anti-Discrimination  Committee (ADC) at a time when Americans were being led by the U. S. media down  the anti-Moslem path. I never occupied an important decision-making position in  the government; yet, to the Israelis, an enemy is an enemy, regardless of his  rank. I have an analytical and inquiring mind, and I articulate my thoughts. My  friends respect my opinions. Thus, I am a threat.

In the early to mid-1980’s, I served in Washington,  DC, where my anti-Israel views became widely known in my work venue. In that  city, I subscribed to a small obscure newspaper called The Spotlight,  which often published negative Israeli actions that would never have been  published in the controlled American media. Every subscriber to The  Spotlight, now defunct, got a place on the pro-Israel hit list. While in  Washington, the IRS, which represents a very powerful tool of the pro-Israel  powerbrokers, audited me twice consecutively. Never think that the IRS is not  political. It is an integral part of Zionist powerbrokers.

In 1981, the U. S. Government’s plan to sell AWAKs to  Saudi Arabia stalled in Congress because of Israel’s lobbyists. Israel has over  fifty PACs in the United States that work aggressively to promote its interests.  I wrote one of the senators from my home state: “. . . Israel always has been  and continues to be a liability to the United States, and our protection of that  nation is not now, and never was, in our national interest.” I went on to say  that our blind support of that country’s aims “has earned us the enmity and  distrust of traditionally friendly Arab and Moslem countries . . . .”

If I was not already on the Israeli hit list, other  points made in the same letter were sure to place me firmly on it. Here are  other excerpts from that letter.

  • “. . . the United States has prostrated itself in  Israel’s behalf and has received little, if anything, in return. In so doing,  our country has lost many real opportunities in other countries.”
  • “The smoldering situation in the Middle East is very  likely in the future to lead to a regional or perhaps global conflict in which  our country would be inextricably involved.”

–  “Mr. Begin’s statement (paraphrased) that ‘one  cannot be anti-Israel without also being anti-Jewish, because the two are  inseparable’ was a deliberate attempt to discourage criticism of that  country.”

– “I am fully aware of the countless subtle means of  retaliation to which I may be subjected for my views. Yet, I will no longer be  numbered among the ‘Silent Majority’ and watch my beloved country subvert itself  for the sake of a self-serving nation whose value to us and to mankind has yet  to be demonstrated.”

In 1985, I was reassigned to an African post. The  American ambassador in that country was a political appointee who was ardently  pro-Israel. He was also Jewish. Shortly after my arrival, he gathered several  newly arrived employees to brief them. During his talk, he told us point blank  that a part of our duty was to support Israel’s interests. I could hardly  believe my ears. His remark was clearly intended for me. Having been apprised of  my anti-Israel views, he may have been baiting me to challenge his orders and  thus give him reason to send me back to the United States. In retrospect, I wish  that I had challenged him.

That ambassador was a political appointee who had  bought his position through so-called “campaign contributions” to the president,  not a career diplomat. He left shortly after I arrived. His replacement was a  female career diplomat, who was very evenhanded concerning Israel’s interests in  that county. To her credit, she cut short the tour of an American Foreign  Service Officer, a Jew married to an Israeli woman, who often rode to local  events in an Israeli Embassy vehicle, for his obvious connection with another  foreign country. I liked both the man and his wife. I had worked previously with  that officer in Washington, and we had often chatted during work breaks about  various topics. He had remarked on one occasion that he had his bags packed for  an anti-Jewish, holocaust-type movement that was bound to happen, a comment that  made me question his loyalty to the United States.

In that same country several years later when it  looked like President George Bush (the elder) planned to attack Saddam Hussein,  I objected to that action, as I saw it as a convenient pretext for removing one  of Israel’s most implacable enemies. Taking advantage of a process known as the “dissent channel,” in which American government employees abroad may express  opposition to U. S. foreign policy, I sent several cables – that was before  electronic mail and cell phones – to the Secretary of State.

In those cables, I stated my opposition to the war  and charged that the principal reason for the U. S. attacking Hussein was not to  assist Kuwait but to fight a proxy war for Israel to maintain Israeli hegemony  in the Middle East. However, the media had already pumped up the American public  to support the so-called Gulf War. I was among only a handful of thoughtful  Americans who opposed that war, and my opposition became duly noted by  pro-Israel factions within U. S. intelligence as well as the Israelis.

My cables criticizing both the U. S. and Israel for  their Middle East policies may have triggered much more advanced electronic  surveillance. I believe that as a result of those cables criticizing George H.  W. Bush’s policies, the U. S. intelligence community joined Israel in placing me  on the “watch list,” and most probably the “hit list.” My hind-sight  observations tell me that probably in the early 1990’s pro-Israel elements  within the FBI took over my surveillance from the original perpetrators when I  retired and returned to the United States, probably on the pretended grounds  that I was a subversive and a suspected terrorist. Their mind control assault on  me probably began in earnest in the late 1980’s or early-1990’s and increased in  intensity over the last ten to fifteen years.

When I retired, I continued speaking out against  Israel in conversations with friends and in letters to editors of newspapers  although I knew that elements in U. S. intelligence loyal to Israel had placed  me on their hit list and that they were following my activities. During Israel’s  most recent invasion of Lebanon, I wrote to CNN to complain about Wolf Blitzer’s  obvious bias in his interpretation of the events concerning that invasion.  Blitzer had once worked for the Jerusalem Post. That he had previously  worked for an Israeli newspaper should not be surprising, for, as a well written  article in the March 16, 2011 issue of the online Pakalert Press states, 96% of  the world’s media is Zionist owned and/or operated.

After retiring, I continued to travel abroad  occasionally, usually to Central America, where I owned property. Once when I  returned to the Houston international airport from one of the trips, a rookie  immigration official processed my entry. A veteran officer stood nearby. When  the rookie scanned my passport and viewed his monitor, he looked perplexed. He  turned to an older officer and pointed to something on his monitor that he  obviously did not understand. The veteran officer took a quick look and said to  the rookie, “ADOD” (Advise Department of Defense).

My computer has been hacked and my phone tapped for  years. A recent accidental discovery strongly suggests that the hackers and  phone tappers are pro-Israel Federal agents or foreign agents working with the  permission of U. S. intelligence. Here is what happened. One day I entered my  email Sent file to copy a paragraph that I had written to a correspondent about  the tiny device having been implanted in a molar while living in South America  in 1978. I cut and pasted that paragraph and re-sent it. Because my computer is  monitored and my emails sometimes deleted or changed, I went back to the Sent  box to see if the message had actually gone out. When I opened the previously  sent email, I was astonished to see three words encased in blue-lined  rectangular boxes: ISRAEL, MIDDLE EAST, and SOUTH AMERICA.

As a former government employee, let me explain why  those three areas were highlighted. Intelligence organizations in every country  organize their offices into geographical sections, which include Israel, the  Middle East, and South America. Copies of my email went to those three offices  in some intelligence agency in some country. Every U. S. law intelligence  agency, including the Department of State and other agencies, has personnel  sections that deal with regional affairs. Whoever monitors my email spotted my  references to Israel, the Middle East, and South America and marked that email  for copies to be sent to those regional affairs offices. I suspect that copies  not only went to U. S. intelligence agencies but also to the Mossad.

The hackers never imagined that I would go back into  a previously sent letter to cut and paste. Finding the highlighted words was a  total accident, but a very fortunate one for me, for it told me that somebody  monitors my email correspondence and that he is not looking for kiddy porn, drug  and money laundering rings, and other unlawful activities but for material  dealing with political views. After passage of the so-called Patriot Act,  anybody working with the FBI can justify monitoring a citizen’s email and  tapping his phones without getting judicial approval.

Later, to make their flub-up appear to be a computer  glitch or a common internet action, the same monitors encircled other words on  several other letters; however, when they saw that I had not fallen for that  deception, they quit doing it. In view of the fraternal cooperation between the  FBI-CIA and the Mossad, the person who monitored my emails could be an agent of  the latter. What I do not know is the location of the person who monitors my  computer, as computers can be hacked from anywhere in the world, including  Monroe, Louisiana, where I live, New York City, or Tel Aviv. As a result of  internet providers turning over its information to U. S. intelligence in 2010,  it is commonplace now for words in emails to be highlighted.

Freedom of expression in the United States seemingly  comes at a price. Although I have never belonged to the Ku Klux Klan, the Aryan  Brotherhood, the Survivalists, or any other extremist organization, I have  openly and consistently condemned Israel. As an American, I thought that I had  the right to do so. Apparently I was wrong. One can publicly criticize England,  France, Mexico, or any other country in the world — except Israel.

That point was driven home by Israeli spokeswoman  Tzipora Menache, who was reported in a February 1, 2009 article as saying, “You  know very well, and the stupid Americans know equally well, that we [the  Israelis] control their government, irrespective of who sits in the White House  . . . . We control congress, we control the media, we control show biz, and we  control everything in America. IN AMERICA YOU CAN CRITICIZE GOD, BUT YOU CAN’T  CRITICIZE ISRAEL.” But I do, and I shall continue to do so in my small voice as  long as I am alive.

Unfortunately for Americans, the Israeli woman was  correct. Today in the United States one hears and reads in the media discussions  on abortion, the death penalty, the legalization of marijuana, U. S.  politicians’ personal relationships, illegal immigration, religious beliefs and  their leaders, sex of all descriptions, the Iraq War, autism and every type of  mental disorder, and other sometimes divisive and intimate topics. I defy the  reader to provide a reference to a meaningful debate on Israel’s actions and  policies in the United States during the last fifty years. The media, the  clergy, and especially politicians on every level carefully avoid any negative  criticism of Israel.

Moreover, one can verbally express doubt about  evolution, the divinity of Christ, the existence of God, the holiness of the  Pope, or the sanctity of the Bible, but he cannot doubt the Zionist version of  the WWII European “holocaust.” In Canada, Germany, and other countries, one can  be imprisoned for even questioning the holocaust. Zionist organizations have  successfully kept that topic from being scientifically studied by historians.  Arsonists set fire to and destroyed an institute in California whose aim was to  use extant documentation to write a true history of the holocaust. The Jewish  Defense League (JDL), the Anti-Defamation League (ADL), or B’nai B’rith was  suspected as the arsonist; however, investigators made little effort to  determine the identity of the arsonists.

The Israelis even target American and Israeli Jews  who oppose their Zionist aims. The target support organization that I belong to  was founded by a woman from Israel who did not always agree with Israeli foreign  policy. That woman believed that she had been targeted by Israel or its  surrogates in the United States.

Having always considered myself a fervently patriotic  citizen, I smolder at being made a surveillance target and now a target of  electronic torture and mind control because of my personal and political views.  If communication with radical and terrorist groups is the only object of my  surveillance, that surveillance would have concluded years ago that I am not a  domestic terrorist or a threat to the United States of America. That suggests  that I am perceived by either pro-Israel U. S. intelligence or Israeli  intelligence as a threat to Israel and thus the reason for my surveillance. The  aim of Israel and its pro-Israel American accomplices is to stifle any  opposition at all in the United States – and worldwide — to Israel, and  American intelligence appears only too ready to lend assistance toward that  objective.

That Israel sees any anti-Zionist views as dangerous  and attempts to silence those views is obvious. That pro-Israel organizations in  the U. S. such as the JDL, the ADL, and the Americans for Israel PAC (AIPAC)  perform unlawful acts to advance Israel’s agenda is a matter of record. That  Israel and its U. S. backers have reason to want me and others silenced is  readily evident. They are masters, however, in using misinformation, staging “false flag” operations, and developing schemes to get others to perform their  dirty work while they sit and watch several layers removed from the action. They  discover the target’s vulnerabilities and then farm them out to pro-Israel PACs,  Christian Fundamentalist Zionists, and plain hirelings, who, without ideals and  agendas, simply work for the money.

Such is the control by Israel and its supporters over  the U. S. Government that today we do not have a U. S. Middle East foreign  policy. Instead, our Middle East policy is Israel’s Middle East policy. Every  serious candidate for U. S. president today must extol Israel’s position as the “Middle East’s only democracy,” and our foremost ally.

Those candidates even have to make a symbolic trip to  Israel to seek the blessing of its prime minister for his/her candidacy before  the U. S. election. We do not know what concessions now-President Obama promised  when he made the traditional pre-election trip to Israel. He probably reassured  the Israelis that his top advisors would have strong traditional ties to Israel  and that the U. S. would not interfere with Israel’s Palestinian policy. Indeed,  Obama has done just that. No person with unfriendly views toward Israel can  expect to get a job with any administration in the White House or a top job in  the government despite his brilliance and impressive education and job  qualifications.

This paper is not about Israel; nevertheless, I feel  compelled to make several observations about Israel, as Americans will never see  anything critical of Israel in the controlled mainline U. S.  media.

(1) Israel often “creates” its enemies to justify its  agenda, knowing full well that the United States will back it. Despite the media  hype, the facts show that Israel has made no genuine effort to make peace with  its neighbors. On the contrary, through its actions it has ensured continued  Arab and Moslem hostility.

(2) Israel purposefully engenders the belief that it  is surrounded by hostile forces, as it unites the Western world in its support  and opens pocketbooks on its behalf. Indeed, the U. S. provides billions of  dollars a year for no-strings budget support for Israel that far exceeds the  entire budgets of most developing countries.

(3) Israel spies on and steals secrets from the  United States. Jonathan Jay Pollard, an American Jew and a civilian analyst with  the Navy Intelligence Service (NIS), spied for the Israelis in the 1980’s. He  was eventually caught and sentenced in 1986 to life in prison. Today he is  incarcerated in the same prison with Bernard Madoff, recently sentenced to 150  years for a multi-billion dollar Ponzi scheme rip-off. Ron Olive, chief of  counterintelligence for NIS at the time, stated in a later book that Pollard’s  treachery constituted “one of the most devastating cases of espionage in U.S.  history” Olive claimed that Pollard passed to Israel over a million classified  documents. One of those stolen documents is of particular interest to targeted  individuals: a ten-volume manual called Radio-Signal Notations, which  describes in detail the U. S.’s “global electronic surveillance  network.”

(4) Israel uses its  pro-Israel supporters in the United States, not all Jews by any means, to  promote its plans for Middle East domination using American resources. We have  already fought two proxy wars for Israel (the Gulf War and the Iraq War) and  intervened in Somalia, Sudan, Libya, Yemen, Lebanon, and other Middle Eastern  and African countries in support of Israel’s foreign policy. In addition, we  have lost scores of American soldiers when Islamic bombers blew up barracks in  two Arab countries (Lebanon and Saudi Arabia) and attacked the U.S.S. Cole near  Yemen because of our unswerving support for Israel.

(5) Israel is one of the biggest exporters of small  arms and assault weapons, many of which end up in the hands of gang members on  American streets and along the Mexican border as well as those of despotic  regimes in Africa and Asia. It has armed the Kurds in Iraq for many years, even  during the Saddam Hussein regime. Today while American soldiers die supposedly  in a war against terror and as the Iraq government tries to pacify the country,  Israel continues providing arms to the Kurdish separatists. Moreover, for  decades Israel has used internationally outlawed cluster bombs and built up an  arsenal of atomic bombs; yet, the United States has done nothing to discourage  Israel from those activities. On the other hand, the U. S. condemns Iran and  North Korea for developing atomic weapons.

(6) Israel has the worst human rights record of any  other country in the entire world, a fact carefully concealed by the pro-Israel  U. S. media. Only the repeated veto of the

U. S. has kept condemnations of those violations from  being registered and acted upon in the United Nations Security Council.

(7) The 9/11 attack on the twin towers is a direct  result of the United States’ subservience to Israel and their continued efforts  to halt the formation of a Palestinian state. Moslem nations see the U.S. as  Israel’s chief backer–which indeed it is–and an obstacle to Palestinian  statehood. The controlled U.S. press never touches upon the reason behind that  attack and others: Arab revenge for United States’ unswerving loyalty to Israel.

I have sent letters to several U. S. national  lawmakers, including both of Louisiana’s senators, and I have not received a  reply from any one of them. As I attached a copy of The Silent Massacre to those  letters, I can only imagine that the recipients did not want to get on the wrong  side of Israel and its backers by responding to my mail. They had rather lose  one vote than risk losing the financial support of pro-Israel  backers.

I believe that both the United States and Israel  systematically target and conduct electronic stalking and mind control on  dissidents and other opponents of the regimes. There is apparently an unwritten  agreement between the two countries that they can target persons in each other’s  territory. That agreement favors Israel, as the United States has little reason  to target Israelis. Once again, the Israelis outsmarted the naïve U. S.  leadership or U. S. politicians made the agreement knowing that it would benefit  only Israel.

In March, 2010, Vice President Biden made a trip to  Israel to urge a peace settlement between Israel and the Palestinians, and  during his visit, Israel announced that it would expand its settlements in the  disputed city of Jerusalem. Israeli leaders apparently believed that it could  defy world opinion and continue to harvest Jewish and Zionist support for its  land grabs. That tactic proved to have the opposite effect. Fortunately, some  insightful and thoughtful American Jews in Israel, the United States, and other  countries as well as Christians who once supported Israel unswervingly are  beginning to question Israel’s foreign and domestic policies concerning the  Palestinians and other Moslems.

As a longtime student of Middle East history, I  believe that Israel’s ultimate plan is world domination. Israel fully  understands that it does not have the capability of accomplishing that objective  militarily, so its aim is to do so economically and politically. By influencing  leaders, controlling the media, and taking over both legitimate and underground  business activity, encouraging the concept of “God’s chosen people,” manipulating the stock market, and getting control of major international  industries, Israel and its supporters do not have to fire a shot and do not have  to occupy countries militarily. They have succeeded to an astonishing degree  during the last half century.

Iraq was once Israel’s biggest threat. The U. S. took  care of that threat at a colossal cost. Iran now stands as the obstacle to  Israel’s Middle East domination. Once again, Israel is lobbying behind the  scenes in the United States urging the Obama administration to attack Iran and  destroy its nuclear facilities. That attack would doubtlessly involve the U. S.  in still a third war in that region because of Israel.

Israel’s master plan, however, has run into a  worrisome snag – the internet. For the first time, Israel, its minion officials  in the United States, and the pro-Israel Jews and Zionists are running scared as  increasing numbers of opponents connect electronically to oppose Israel’s evil  regime and human rights abuses. Even young people, who have been fed pro-Israel  propaganda since birth, have begun to awaken to Israel’s true  aims.

The Masons, the Illuminati, law enforcement, and the  FBI/CIA would have little reason to inflict physical and psychological torture  on my body and mind. Even if “Big Brother” were monitoring me as a suspected  terrorist, it would only covertly have to track and record my activities, not  assault me with electronic and mind manipulation devices. Only one logical  source for my electronic stalking and mind manipulation is left standing, and  overwhelming evidence points to Israel and its supporters. Israel has the  capability, the motive, and apparently the opportunity to do so. However, its  work is probably carried out today by the Radical Right, American PACs working  for Israel, and perhaps even by international ethnic groups known for selling  their talents to the highest bidder.

The services of astute hit men, or mercenaries, are  not difficult to find. A former free-lance soldier of fortune who calls himself  Carl Clark of Norfolk, England, recently quit his sordid activities after  working over twenty years for the CIA, the Mossad and the ADL. Much of his work  involved surreptitious entries into the domiciles of his targets, where he  planted material on their computers dealing with child pornography or how to  make a home-made bomb.

In addition to their electronic and neurological  attacks, my assailants also very obviously are experimenting on my mind. Israel  has been very involved in brain mapping activities and developing mind control  devices and methods for many years. Does my own government know that this is  happening on American soil? Of course it does. At least the key players in the  government know about it. Those key persons are probably not the political  appointees, who come and go, but are civil servants whose jobs are secure when  the political party changes.

For greater insight into how Israel works to strew  deception, manipulate public opinion, and silence dissent, read the following  books: By Way of Deception by Victor Ostrovsky (former Mossad officer); Man in the Shadows by Efraim Halevy; Gideon’s Spies by Gordon  Thomas; Every Spy a Prince by Dan Raviv; and Israel’s Secret Wars  by Ian Black.

Now, substitute the word Venezuela, Iran, Cuba, or  North Korea for the word Israel and substitute the word Moslem for Jew in the  preceding paragraphs, and my narrative appears perfectly in keeping with what  the controlled U. S. media lead Americans to believe. Yet, many Christian  Fundamentalists and Jewish supporters of Israel, along with the majority of well  meaning but thoroughly brainwashed Americans, will call the content of what I  have just written hate and anti-Semitic propaganda. Israel and its pro-Israel  allies in the United States have successfully used accusations of anti-Semitism  for decades to squelch vocal opposition to Israel and its objectives. That  tactic does not stop me.

Israel and its Zionist supporters have conditioned  Americans not only to look upon Israel as their main ally and friend but also to  fear to criticize Israel and Jews. Today Americans are afraid to speak out,  fearing the stigma and the consequences of being labeled anti-Semitic. I have  even had alleged targets criticize me for my anti-Israel views, as if I should  change ideas about my targeting to be “politically correct.” Fortunately I am  not bothered by people’s opinions of my views.

The Silent Massacre,

When four demonstrating students at Kent State, Ohio  were killed and nine wounded by National Guard troops on May 4, 1970, that  incident created such international outrage that an incident like that will  never happen again in the United States. Nevertheless, today a much more  cowardly, widespread, and inhuman massacre occurs every day to a growing number  of victims in an electronic and neurological onslaught. The Kent State students  could at least see and face the troops’ weapons; victims today stand helpless  against a lethal unseen force cloaked in secrecy and delivered by remote.

Likewise, victims of today’s silent massacre do not  have an opportunity either to prosecute their attackers or face a court of law  in which they might be able to defend themselves. They simply die a very slow  death at the hand of unseen executioners. Most targets are plain middle-class  Americans of all races, ethnicities, colors, genders, religious and political  beliefs, philosophies, and life styles. Many of them, however, have somehow  bucked the system or have refused or failed to fit into the  socio-economic-Judeo-Christian structure.

An immigrant from a former Communist country recently  wrote me about her electronic torture and mind control ordeal in the United  States. Here is what she says in her own words: “It makes me mad, especially,  because I came from the former communist country and didn’t expect such things  going on in here.  This is a very, very big disappointment.  Now I do not  believe in democracy any more, and, as you, I guess that the government is  involved in that too.  I do know my abusers: they are my neighbours; There is  also, a coordinator, as a former law enforcement officer living just opposite of  my house.  It is exactly as you wrote in your paper.”

Although my surveillance dates back many years, the  electronic and mind control torture did not surface until 2005. In my case, the  date coincides with Michael Chernoff’s appointment as Secretary of Homeland  Security. Chernoff, son of a rabbi, has very strong connections to Israel,  pro-Israel PACs, and pro-Israel so-called Christian Fundamentalists in the  United States. Senator Joe Lieberman (I-CT), also an ardent supporter of Israel  with close ties to that country, heads the Senate Homeland Security Committee.

Today, instead of shooting its citizens, elements  protected by the government slowly tortures them to death by remote with  directed energy and neurological weaponry that conveniently remains both unknown  and unseen. In 1989, the United States Government reacted strongly to China’s  attack on unarmed dissidents in Tiananmen Square. Yet, the United States’ silent  massacre eclipses a thousand-fold the Tiananmen Square shootings, and it is  carried out daily with complete national and international impunity.

The Future of Electronic and Mind  Control Assault

Unless ESMC is stopped very soon, it will proliferate  and we will see an alarming rise in the misuse of the technology used for  electronic torture and mind control in other areas: racial and ethnic groups  targeting persons in other racial and ethnic groups; religious groups targeting  those in opposing religious groups or atheists and agnostics; rightist nuts  targeting homosexuals, lesbians, and others following alternative life styles;  the wealthy targeting people whom they single out, perhaps for the sport of it  and the voyeurism involved; gangs targeting those in rival gangs; mobsters  targeting young women and boys for prostitution; drug lords targeting people to  turn them into drug addicts; politicians targeting political enemies; social  purist psychos targeting for extinction the handicapped and others who do not  conform to their concept of societal perfection; and world leaders targeting  other world leaders. The more the practice of electronic torture and mind  control proliferates, the more out of control it becomes. It promises to become  the Armageddon that many people believe will eventually occur.

I suspect that in years to come we will discover that  many mass murderers and parents who kill their children are victims of mind  control. Two such murderers have made news in the last few years: Andrea Yates,  who drowned all five of her children, and Leanna Laney, who killed two of her  young sons and left a third one incapacitated for life. Both women were believed  to be good, caring, and devoted mothers. Both women heard inner voices  commanding them to commit infanticide. One of the women said the voice was that  of the devil; the other one, that it was the voice of God. The husband of one of  the women worked with NASA. I believe that the voices were devils, but human  devils. In addition, killers like the D.C. snipers, John Allen Mohammed and Lee  Boyd Malvo, show markings of people under the influence of mind control  perverts. In addition, the various school massacres may have been caused by  perverted handlers whispering instructions into the student assailants’ brains.

I foresee the day when groups of professional  extortionists, blackmailers, and swindlers learn the secret of ESMC and turn it  into a money-making scheme. They will do that by selecting targets who lead  comfortable life styles, torturing them with their electronic and mind control  techniques, and then making deals with the targets to stop the ESMC. They will  also make money by offering their services to people who want to harm somebody  whom they do not like. For a price, the high-tech criminals will “hook” that  person, torture him, and provide the payer with videos to prove  it.

Moreover, they can later approach the victim and ask  for a large sum of money to “release” him. Thus, the assailants will make money  playing both sides. My handlers have demanded from me $10,000 one time, $15,000  another time, and $30,000 still another time. Of course, this is plain  deception. I tell them, “You can publish anything that you know about me in the Washington Post or the Miami Herald and put it on national  TV.”

The perpetrators will also render the justice system  completely invalid. How? They will manipulate the minds of witnesses and  authorities to cause them to lie under oath, probably truly believing that they  are telling the truth. They will also skew the minds of judges, prosecutors, and  defense lawyers. In many cases, this will result in the guilty going free and  the innocent being sent to prison.

Handlers learn from targets the combinations to  safes, telephone numbers of many people, financial records of others, the  weaknesses and vices of others, and much other information that, in the wrong  hands, could result in great personal losses not only for the targets but also  for people with whom they associate. With their knowledge, the assailants have  the means to blackmail targets or sell other people information about the  targets.

A Conspiracy of Silence

Many years ago a cabal of the controlled media  decided that it would not disseminate news that might give publicity to  anti-Zionists, Survivalists, KKK, the John Birch Society, and other groups. The  media blackout seriously damages those groups’ propaganda efforts, which largely  depend upon media coverage. However, the responsibility of the media is to keep  the public informed, and it intentionally fails to do so. The media’s control of  the news concerning certain organizations amounts to a conspiracy of silence.

Nobody knows that conspiracy of silence better than  targets of electronic stalking and mind control. In my case, I have written to  the President, members of Congress, including my two senators from Louisiana and  the representative for my voting district, the FBI, the state attorney general,  and the local sheriff about ESMC without receiving a single answer. My letters  were not the ramblings of a delusional person but were concise, cogent, and  respectful letters. Since no recipient could possibly know my state of mind when  I wrote them, their failure to answer represents that conspiracy of silence.

Most of the hundreds of correspondents who write me  have recounted their efforts to communicate with politicians and others. They  received the same silent treatment. Those politicians apparently had rather lose  a vote than to buck the powerbrokers, especially, as in my case, if the  powerbroker is Israel.

A target from Texas advised me in early 2010 that he  had succeeded in convincing an aide to a Congressman to look into his claims of  electronic stalking and mind control. Upon finding out about the aide’s  cooperation, however, the Congressman fired the assistant. That Congressman  could have attempted to placate a constituent even if he considered him  psychotic. Instead, he perpetuated the conspiracy of silence. It becomes  increasingly clear that members of Congress know about ESMC, know who is doing  it, and know not to interfere.

That conspiracy of silence also pertains to crime  statistics and police reports. I have already recounted my writing the Public  Affairs Division of Louisiana State Police for statistics on electronic stalking  and mind control and receiving a letter saying “We do not have statistics on  such incidents.”Although I had complained twice about ESMC to the local sheriff’s office, it had  not reported those attacks in its monthly crime statistics report to the state  police. The conspiracy of silence is institutionalized and national in scope. If  there is no crime report, no crime was committed.

What Targets Can Do

All targeted individuals are subjected to a barrage  of criminal acts, some of which they may not be fully aware. If targets are true  TIs, their phones WILL be tapped, their computers WILL be hacked, and their mail  WILL be monitored. What can victims do to defend themselves, halt electronic  stalking and mind control activities, apprehend the cowardly perverts who carry  it out, and punish them and their accomplices?

– Remember that the perpetrators of your ESMC are  the criminals, not you. Certainly, the total loss of privacy, even in the case  of your most intimate thoughts, is frustrating. That common criminals whom you  probably do not know have knowledge of your thoughts that even family members  and friends do not know is

unconscionable. However, keep in mind that  whatever the criminals know about you and your thoughts, they cannot publish  them in the New York Times. I continually laugh at my perverted handlers  and tell them that I really don’t care what they see, hear, know, or think that  they know, or do. I tell them through our synthetic telepathy to publish those  thoughts in the newspapers and expose them on national TV. It does not matter to  me.

– Remain positive. Despite the unsettling nature of  the ESMC activities, targets must make a special effort to maintain a positive  attitude, especially when around others. Remember that the perpetrators of ESMC  are trying to ruin your lives. Do not let them. I start each day by stating to  myself how great the day is, whether it is rainy or sunny or cold or hot.

– Resist depression. One of the handlers’ ploys is  to cause a target to commit suicide. Keep your life bright. Surround yourself  with uplifting and cheerful décor. Let plenty of light into your house. Targets  have a tendency to keep their houses dark, with the windows perpetually covered.  A dark house encourages depression. Open those windows. I do not even have  curtains on my windows. And also use your good mind. Tell yourself how fortunate  you are despite your electronic and mind control assault. Think about things  that make you happy and that calm your mind.

–  Maintain your physical health. This is very  important, as the perpetrators of the ESMC seek to make you a couch potato. They  will whisper to your subconscious to binge eat, to watch more TV than usual, and  to eat the wrong kinds of food. They will also whisper to you that you have no  energy, that you feel extremely tired, and that you must rest.

Take vitamins and eat correct foods. Force yourself  to get exercise and be active. They will discourage you from making improvements  in and around your home. Despite your listless feelings, go about your  activities and make a point of getting plenty of exercise. A clear correlation  exists between physical health and mental health. Defy the handlers. Make a  concentrated effort not only to maintain your health but even to strengthen  it.

– Be receptive to making new friends. Many targets  have suffered so many frustrations and disappointments because of their ESMC  that they have become suspicious of everybody. That appears to psychiatrists as  paranoia. Moreover, that is exactly what your handlers want, as it further  isolates you from society. Do NOT think that every person you meet is an  accomplice of the handlers. There are still many uncorrupted people with whom  you can become friends. However, remember that to have a friend, you must be a  friend.

– Do not engage private investigators. They are  often a part of the problem. Private investigators cannot ply their trade  without the assistance of law enforcement. First, they have to register and get  permission to operate from a state law enforcement office, usually the attorney  general. Then, they have to be tied into the state police and other law  enforcement agencies’ data systems to look up license numbers and auto license  tags, search backgrounds, and even look for missing persons.

Moreover, many of the private investigators are shady  characters who operate just inside the law, and they often even cross over that  line. I believe that private investigators are part of the law enforcement  network that probably participates in actual electronic stalking and mind  control. Getting private investigators to look for a bug in your car is like  sending the fox to the hen house. Even if they discover a bug, they will not  inform you, for they would believe that it was placed there by law enforcement.  In fact, they will have probably already been informed by law enforcement of the  bug.

– Do not discuss your ESMC harassment with every  friend, family member, and acquaintance. They simply do not understand and  cannot understand. However, if you have a perceptive, intelligent, trusted  friend or family member who is open minded enough to believe hard-to-believe  circumstances, let that person know what is happening. A confidant who truly  believes you can be very supportive.

– Do NOT visit a psychiatrist. The ESMC assailants  want targets to go to psychiatrists, knowing that the doctors will diagnose  targets as schizophrenic or paranoid. Once targets see a psychiatrist, their  credibility is compromised.

The evil perverted assailants will do everything  to convince targets that they are mentally incompetent, including continually  whispering to their subconscious “you are crazy.” Indeed, the handlers’ activities will often cause targets to exhibit the very symptoms that  psychiatrists associate with schizophrenic and paranoia in attempting to defend  themselves against forces that they cannot see and do not understand. However,  the general public is increasingly becoming aware of ESMC, and friends and  family members of targets who have been designated “demented” are beginning to  see that those targets are not truly mentally unstable. In only a few more  years, the psychiatric community will have to redefine schizophrenia, paranoia,  and other mental disorders because of the unnatural electronic and mind control  assaults that cause those symptoms. This will not occur, however, without a  great deal of pressure from the outside, as psychiatrists have no way of  treating remote-induced symptoms of schizophrenia and paranoia resulting from  ESMC.

Resist any effort on the part of law enforcement  to make you submit to a psychiatric evaluation. In our system of justice,  targets should not have to prove that they are sane. Indeed, the burden of proof  falls on law enforcement to prove that targets are mentally deranged. That is  why authorities want to send you to a psychiatrist whom they customarily use and  can depend on to render a verdict that is in keeping with their accusations. If  you are forcefully made to see a psychiatrist, remember that it is your right to  refuse treatment.

Know that mental incompetence cannot be proved by  your words and actions alone, and that the state and local law enforcement have  no power to act unless your actions have the potential of harming yourself and  others. If authorities do insist on your seeing a shrink, demand that the  psychiatrist also possess knowledge of directed energy, electrical and radio  theory, high tech communications, organized stalking, and even electronic  stalking and mind control. That will, of course, limit the possibilities to only  a few psychiatrists. Notwithstanding, targets should make every effort NOT to  look insane by falling into the handlers’ well laid traps. Despite your  frustrations and the handlers’ drivel through V2K, do not act  irrationally.

– Remember that if you are made to undergo a  psychiatric evaluation, you have the right to refuse treatment. As early as  1973, the American Hospital Association established patients’ rights. Of those  twelve rights of the AHA, the fourth one gives the patient the right to refuse  treatment. Today Federal and state laws reaffirm that right.

– De-emphasize “self.” Many targets become obsessed  with what the handlers do to their minds and bodies. That is quite natural and  understandable. However, targets should train their minds to think beyond  themselves and instead reach out to their pastimes, hobbies, and to others.  Reducing the attention to “self” is a very important defense tool for targets.

– Make special efforts to stay in contact with  family members and friends, for the handlers concentrate on isolating you from  society. Maintaining contact will not be easy. The handlers will fill your minds  with negative thoughts about those people. Moreover, the handlers will have  hacked your computer and tapped your phone lines. I recently got a call on my  cell phone that showed the phone number of good friends, a man and woman couple.  The person who called pretended to be the woman; however, the female speaker  spoke with an accent and the voice was most certainly not that of my friend.  Moreover, she ended with an exaggerated “good-byeeeeee,” which would have been  totally out of character for my friend. That meant that the caller had used my  friends’ telephone service provider to be able to make the call through my  friends’ account; otherwise, the real number of the impostor would have appeared  on my phone. The caller probably wanted me to say something later to my friends  about the call to make me appear crazy. I did not mention the call to  them.

The handlers will cause problems with your  computer and will intercept your emails to others and also those that come from  others. They will also suddenly cut off phone conversations, create static that  makes talking impossible, cause your voice to echo (only you will be able to  hear those echoes), and sometimes divert the calls so that their accomplices  answer. Manipulation of your communications system is ultra important to the  perverts’ plan to isolate and frustrate you.

– Record the handlers’ actions and your thoughts  about them in a diary, or journal. Those thoughts will change over time as you  learn increasingly more about your handlers. Their ESMC tactics will also  change, becoming increasingly more complex as they go through their repertory of  capabilities. It is very important for you to describe the handlers’ electronic  and mind control actions accurately and to record in great detail the sensations  that you feel and your reactions to those actions. Record the day, date, and  hour that particular actions occur. You may see a pattern in the timing. Their  actions will normally occur in the evening while you sleep, as you present an  immobile target for them and there is less electromagnetic atmospheric  interference. Keep a flashlight, watch, notepad, and pen underneath your pillow  or nearby to record those actions.

– Be observant. The handlers, of course, count on  your not having proof of their electronic stalk and mind control activities.  Watch people, places, and objects carefully. Record your reactions when you see  anything that looks even slightly odd. Videotape anything that happens out of  the ordinary: blinking lights, anomalies in your emails, etc. Record any unusual  sounds: loud noises that occur in or around the house, etc. However, do not let  yourself develop paranoia over those events. Also, check out the law in your  state. Some states make videotaping others a crime.

– Remember precedents. Think back over previous  events and actions. You had to have been targeted at some point in time. By  recalling people, occasions, and incidents, you will probably get a very good  idea about when, by whom, and even how you were targeted. Particularly think  about any medical procedures, shots, and inoculations that you had prior to your  electronic stalking and mind control experiences.

– Thwart the efforts of the handlers and defy them.  As time goes on, you will see that certain actions on your part affect the  capabilities of the handlers. You will also learn things that annoy the  handlers. I enjoy singing monotonous ditties and repeating a phrase or a  sentence for hours at a time (silently, through thought) as I work and putter.  Laugh at your handlers and try to make their lives as miserable and difficult as  they attempt to make yours. It works. Remember that behind the ESMC lie humans  (I call them sub-humans). As vile, evil, and hard as they might be, those humans  can be affected by your thoughts and actions against them.

– Stay alert. The handlers will attempt to make you  do irrational things by whispering instructions and suggestions into your  brains. Know this. Give much thought to your actions because of that. Remember  that one of the major objectives of the handlers is to make you look crazy. Be  very careful of their deception.

– Work to change the narrow mindset of the medical  community about ESMC. I am quite certain that at least some psychiatrists  recognize the reality of ESMC without admitting it.

– Submit written complaints to local law  enforcement. Get the complete name of the officer to whom you submit your  report. It is very important that the reports be presented in writing so that  YOU can word the complaint like you wish. Otherwise, the person with whom you  are talking will write it the way he wants to, probably noting that you are  nuts. Ask the officer to whom you submit your complaint to sign it. Others have  done this and the officers have refused. If the officer refuses to sign, record  that in your notes and let him see you doing it. Your complaints will probably  never be entered by law enforcement in their crime statistics. Mine were not and  neither were those of other targets with whom I have corresponded. Law  enforcement wants no record of your complaints about ESMC.

– Contact your Representatives and Senators in  writing. Petitions are meaningless. Write individual letters. It is important  that your correspondence be done in writing (emails or letters), as their  employees may include an accomplice “plant” who will not record and advise  higher-up authorities of telephone calls. This will of course reveal your real  name. It is time for victims to stop hiding and let the public know what is  actually going on in this country. Our reluctance to do so has allowed  electronic torture and mind control to go unchallenged probably for decades.

In addition, send copies of your letters to local  and state officials, particularly the sheriff’s office and the attorney  general’s office. Do not expect answers or acknowledgements of receipt. Unless  overwhelming pressure is laid on the backs of leadership, nothing will be done.  Congresspersons, themselves being protected, are probably blithely unaware of  electronic stalking and mind control and the possibility of national and local  law enforcement in that activity. However, they cannot ignore thousands of  letters of complaint. There is strength in numbers, and the number of victims is  growing every day.

–   Seek out other victims of ESMC and network with  those victims in comparing your symptoms, your thoughts, and information that  you have found on ESMC. That organization can also become a meaningful support  system for you. In the United States, Derrick C. Robinson, a TI and also a U. S.  Armed Forces veteran, heads a pro-active organization called Freedom from Covert  Harassment and Surveillance (FFCHS) whose address is [email protected]. There  are other similar organizations worth joining.

– Maintain the life style that is normal to you to  the extent possible. Targets often let their targeting become their way of life.  They relocate from place to place. They continually look for and experiment with  shielding. They spend every waking moment on the computer communicating with  other targets and writing to forums, phoning other targets, and thinking about  their particular problem. They come to believe that every person and every  action somehow relates to their targeting. When targets’ allow their situations  to consume their total time, they sacrifice family and friend relationships,  give up their hobbies and pastimes, and often neglect their appearance and their  health. Indeed, no target asks for the electronic stalking and mind control  activities that he receives. Yet, targets must try to balance their life to  include activities other than those related to ESMC. Remember that every person  with whom you are in contact is not a perp. There are still wonderful people out  there.

–   Do not consider suicide an option. Your  handlers, through sleep deprivation, electronic torture, mind control, social  isolation, induced anxiety, and other ways will attempt to make you take your  own life. That is a part of the script. Do not oblige them. The FFCHS has  recently begun collecting notarized statements from members who swear that they  will never take their own lives. We call it a No-Suicide-Ever pact. This was  considered necessary because some targets die under very mysterious  circumstances that are recorded as suicides. Many targets are certain that some  of those suicides are murders staged to look like suicide.

–   Do NOT allow the handlers to force you to move.  They will often try to force targets

to leave their houses and even their  hometowns. I have never known a target who

improved his situation by moving. Targets who  do move will normally end up drifting

from location to location, getting out of touch  with friends and relatives along the

way, and ending up alone in shelters or on the  street. Stand your ground.

Defying the handlers

I am very defiant of the handlers, and I go on with  my life despite their electronic and mind control effects and the resulting  annoyances and inconveniences. The handlers recognize that although they can  bother me, they cannot beat me down. On two occasions, the handlers have invited  me to join them. I laughed, called them a few choice names, and told them, “Not  in 500,000,000 years!!!!” Whether their offers are real or more deception, the  handlers know that I will NEVER sell out to them.

Over the last few months, the handlers have focused  some feature of their device on the outside of my right nostril. I can feel a  distinct tingling in that location that is anything but natural. First a very  sensitive brown spot appeared there and then a small indentation. More recently,  I have noticed a white spot about a quarter of an inch in diameter on my chin,  where the tingling also occurs. Like my nose and ears, that spot becomes covered  with a film, except that instead of feeling crusty, it feels soft. The hairs of  my beard are thicker and much more numerous in that small area. The handlers may  be trying to cause skin cancer or melanoma. The handlers know that I use  smokeless tobacco, and they want the cancer to appear to be  tobacco-related.

I visited a Monroe dermatologist in the summer of  2009 to have a record of that induced malady. The doctor did biopsies on the two  spots and found the one on my nostril was basal cell carcinoma. He wanted to set  up an appointment with a plastic surgeon to remove the cancerous growth, and he  was dismayed when I told him that I would not seek nor accept treatment. I  candidly explained that the spot was induced and that the attackers could and  probably would only cause cancer in additional places. I gave him a copy of this  same paper to read. I do not know whether he read it or not.

Electronic torture and mind control have been  employed for decades. Why have they not been curtailed? Here is why: (1) Targets  have suffered in silence. Only with the advent of the internet have targets  begun to perform research and reach out to other victims. Most of that  communication has transpired during the last ten years or less. The internet is  the last bastion of communication freedom. The powerbrokers have not yet  contrived a way to limit and control its use. (2) Targets have wasted too much  time in complaining to each other and have gotten bogged down in self-pity. That  does not at all mean that we should stop supporting and communicating with each  other; yet, that should not be an end in itself. Targets should become activists  instead of habitual complainers.

(3) Targets have depended on law enforcement,  national government, and international bodies to “investigate” and stop the  electronic torture and mind control. They are correct is doing so; however, only  those agencies of the government that are most likely to engage in ESMC or aid  the perpetrators or allow them free rein in operating have the necessary  expertise to “investigate.” (4) Targets have remained anonymous. Most targets  are reluctant to use their real names for fear that it will alienate family  members and friends and make the targets appear crazy. I first wrote this paper  under a pseudonym. However, when I realized that that did not serve the interest  of the targeted community, I changed the name of the author to my real name.

Taking Our Country Back

As a longtime victim of electronic and mind control  assault, I am now also a dissident American. My handlers sometimes tell me  telepathically that I am an extremist and un-American. I reply that I am now  indeed extremist and that if THEY are Americans, I am now most definitely  UN-American. For the last time in this article, I repeat that electronic assault  and mind control CANNOT be carried out without high-up government knowledge,  cooperation, and protection.

Certain members of the national executive branch of  the government have to pull the ESMC strings. Government leaders who sponsor  this type of sick socio-politico operative can never succeed. Instead, they  create many dissidents and malcontents who will eventually weaken this  government and bring it down. If targets have violated the law, let them be  formally accused and be able to defend themselves before their accusers. That is  the American way — or it used to be.

The Declaration of Independence rests on the  principles of “unalienable Rights, that among these are Life, Liberty and the  pursuit of Happiness,” It further enjoins that “whenever any Form of Government  becomes destructive of these ends, it is the Right of the People to alter or  abolish it . . . .” No target of electronic and mind control assault possesses a  meaningful life, and he most certainly finds it difficult to pursue liberty and  happiness. Targets of ESMC who cannot find protection under any of the three  levels of government — national, state, and local — have every right to seek  the end of that non-responsive government.

The so-called Patriot Act of 2001 took away most of  the individual rights of Americans. (Don’t you love the names given to those  laws that usurp our freedom?) We are supposedly fighting “extremists” in  Afghanistan, Pakistan, Iraq, Somalia, and other countries who supposedly want to  take away those freedoms. Guess what. The American Government has beaten them to  it.

Every target—and every citizen–I know probably would  rather take his chances with the terrorists than to surrender his personal  rights and submit to relentless and continuous electronic and mind control  torture. Protection from terrorists, the pretended purpose of the Patriot Act,  cannot be compared with the preservation of our American rights. Voting out the  self-serving leadership and replacing them with others equally unaccountable to  the American people cannot be the solution to the current problem. Every  administration represents only a regime change with the status quo remaining  static.

During my targeting, the handlers have been pushing  me increasingly farther to the left. Perhaps their aim was to make me  increasingly anti-government so that I was do something irrational. Perhaps  their plan was that I go crazy, run out with an AK-47, and murder people,  perhaps those whom the handlers had convinced me through subliminal messages  were part of the plot. That will not happen. Knowing that, their next move is  probably to arrest me for on charges of domestic terrorism or perhaps murder me  and make it look like a home invasion or a street robbery.

Some targeted activists have died under very  mysterious and suspicious circumstances: a car or other accident; a victim of a  random shooting or a mugging; a “suicide” when the target was not at all  suicidal. Because of suspicion of “staged” suicides, the FFCHS urges its  membership to sign onto a No-Suicide-Ever Pact. Signers of that pact state that  they have no intention of ever taking their own lives and that in the case of  their deaths, their representatives should ask for an autopsy and an inquiry.

Regardless of the consequences, I shall continue my  objective of bringing down the powerbrokers, along with their cronies and foot  servants, and seeing them punished, establishing a government in which citizens’ full rights are restored, setting up clinics and instituting systems for “deprogramming” targets, and eliminating the possibility of American citizens  EVER becoming victims again of electronic stalking and mind control.

My personal goal is to bring down the Federal  Government, which no longer represents the interests of the American people, and  re-establish our Constitutional rights under another government or another form  of government. I will work day and night to bring that about. If good fortune  smiles upon me, I have probably another quarter of a century left to accomplish  that, working with others of like minds.

Summary

This paper is long. Let me summarize in few words the  above material. A target is targeted for life; sometimes that is many years.  Only governments and their power brokers (using taxpayer money) have the power,  finances, manpower, and other resources required to invent, employ, and sustain  in total secrecy the devices and methods used for electronic assault and mind  control and continue those efforts against targets sometimes for decades.

It appears that the objective of the powerbrokers who  control the USA is to have the capability to monitor the entire population. Many  of those monitored will be singled out as targets of perpetual electronic and  mind control assault. Others will be monitored at random or on a need-be basis.  Countries such as the United States, Israel, Russia, probably China, and others  have long experimented with directed energy weapons and mind control.

Conspiratorial-type talk is making the circles now  concerning the government’s aim to cause a domestic conflict that will give them  an excuse to intervene militarily. The military is supposed to have orders to  herd much of the population into concentration camps on or near military posts  and bases. What happens to those people incarcerated can only be guessed at.  What better way to rid the powerbrokers of the “troublesome” and expendable  elements of the population?

Only the government and the power brokers who control  the government can direct the intelligence community and law enforcement on  every level of government either to engage in ESMC or refuse to investigate it – perhaps both. OVERWHELMING EVIDENCE SHOUTS THAT ESMC MUST NECESSARILY INVOLVE  THE FEDERAL GOVERNMENT and very probably government on the state and local  levels.

Secrets of the atomic bomb, space craft, stealth air  planes, and other cutting-edge, high-tech objects remained very closely guarded  for years; yet, eventually those secrets leaked out. Much attention is being  focused on electronic and mind control assault and a massive amount of  information is being disseminated concerning its origin. Some of that  information is probably right on target; other “planted” misinformation probably  only confuses the issue. The point is that one day, probably in the very near  future, the secrets of electronic torture and mind control by remote will also  be revealed.

In the meantime, productive and intelligent American  citizens daily fall victim of electronic and mind control assault. Their lives  are ruined, and many of them lose their lives to that silent death or commit  suicide. Most of those victims have already lost all faith in their government  to protect them and have even lost their belief in democracy. I invite readers  to study the cases of victims of electronic torture and mind control in the  United States and then argue that those victims would be worse off under Chinese  Communist, Iranian, or Russian rule than under so-called American democracy. If  such electronic torture and mind control can take place in the cradle of  democracy, why should targets support that democracy?

Knowledgeable researchers on the subject of  electronic stalking and mind control believe that the minds of many millions of  Americans have already been “hooked” and that the powerbrokers can focus on  those minds at will. Some of those researchers also believe that the  powerbrokers’ objective is to hook the majority of American citizens, including  those who oppose big government and big business and those who think for  themselves, to head off any civil uprising or revolution. Ten years ago I would  have dismissed that idea as a conspiracy theory. Today I believe that the  researchers’ words are prophetic.

I hope that by the time the reader arrives at this  point he will have been sensitized to what the American citizenry faces in the  twenty-first century. An American can get little satisfaction from not being a  target when he knows that he can be enslaved at a second’s notice by people  using unknown and unseen devices by remote. Remember that under the ESMC system,  a target, without being charged with any crime and without being given a trial,  is sentenced to an eventual death by unseen and unknown persons. It can happen  to any American.

The irony of the high-tech knowledge used by the U.  S. Government for electronic stalking and mind control on its citizens is not  lost on informed American citizens. According to an April 2010 CNN survey, four  out of five Americans distrust their government.  While the evil practice of  ESMC is being conducted on this country’s citizens, the U. S.’s ranking with  other industrialized countries in production output, literacy, mortality, and  education drops increasingly lower.

At the same time, the U. S. is engaged in war on two  separate fronts in Islamic countries without declarations of war, its  unemployment rate has surged above a ten per cent average, much of its industry  has shut down permanently, its deficit is frightening, its banking institution  has collapsed and remains in shambles, millions of Americans have lost their  homes, disparity between rich and poor widens, crime continues to increase,  unemployment and welfare rolls continue to expand, and Congress has sunk to the  lowest no-confidence status ever registered in our history. A recent Yahoo  survey found that four out of five Americans distrust their government. That is  eighty per cent. How long can this government endure?

The government of the United States of America of the  twenty-first century glorifies endless warfare, tramples the rights of its  people, allows oligarchies to monopolize the wealth, tolerates unbridled  corruption of its politicians and public service organizations, and gives free  rein to a military/industry complex. Its bureaucracy, one of the largest  employers in the nation, and its outreach organizations, many of them secretly  funded by U. S. intelligence, are out of control. Sooner or later the  powerbrokers must assert complete control over the citizenry to maintain the  status quo. That appears to be in 2010 the direction in which the leaders of the  United States of America are heading. The powerbrokers, using their high-tech  remote capabilities and a legal system that run counter to the Constitution, are  probably close to their goal of achieving complete control.

If the Government of the United States of America is  not involved in electronic stalking and mind control, it should be acutely  concerned about that activity, for the handlers who employ the V2K often  identify themselves as CIA and FBI agents and police officers. In other words,  the handlers are impersonating law enforcement officers, which, of course, is  illegal. But compared with the magnitude of electronic stalking and mind  control, the crime of impersonating an officer of the law is hardly worthy of  notice.

The United States of America is sinking into an abyss  of high-tech crime, much of it generated and protected by the very forces sworn  to uphold the law. Electronic stalking and mind manipulation are examples. Even  when the forces behind this crime are exposed – and they will be – it is very  likely that nothing will change for targeted individuals. The technology is  already out there for anyone powerful enough to acquire and utilize it.

[This paper is based on my own experiences, a very  long and lucid memory, my journal entries, in-depth and ongoing research, logic  and reasoning, and correspondence with hundreds of other targets. The opinions  formed from those sources are my own. Should you wish to contact me, my email  address is [email protected].]

Written by rudy2

Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top