Skip to content

Appendix 311: Entities Behind Covert Gangstalking-Targeting-Torture-“Research”-“Information Liquidation” Ops: Testimonies From Targeted Individuals, Intelligence-Military-Private Security Agents, Scientists, & Others For Ad Hoc, De Facto Grand Jury (YOU!!!)

Dr. Eric T. Karlstrom, Emeritus Professor of Geography, CSUS
October 1, 2025

Behold, I cry out of wrong (violence), but I am not heard: I cry for help, but there is no justice.

Job 19:7

….  among other things, the targeting program facilitates torturous public executions for the benefit and entertainment of the Freemason satanists who run the sick system.”

Mark M. Rich, author and TI

See: Laws of God and Man (US, States, UN, and International Treaties) Violated by Organized Stalking/Electronic “Information Operations” Against Civilians

Contents

I. Epigraph/Summary Quotes
II. Introduction
III. Testimonies of Targeted Individuals (TIs) and Other Experts On “The TI Program” and the Identity of “The Perpetrators”
 
A. Highlights from Testimonies of Highly-Credible Targeted Individuals (n=24)
    1) Dr. Rauni Kilde (MD), former Chief Medical Officer of Northern Finland, political insider, author of “Bright Light on Black Shadows” (2015)
    2) Mark M. Rich, author of “The Hidden Evil: The Financial Elite’s War Against Humanity” (2008) and “New World War: Revolutionary Methods for Political Control” (2011)
    3) Karen Melton Stewart, ex-NSA (National Security Agency) intelligence analyst, whistleblower, one of 18 plaintiffs in Targeted Justice, Inc.’s lawsuit against DOJ, DHS, FBI
    4) Gloria Naylor, Pulitzer-Prize winning author of “1996” (2005)
    5) Suzie Dawson, New Zealand journalist, political activist, politician, and mother
    6) “Skizzit Gesture,” independent researcher and film maker
    7) Dr. X Keyscore, security analyst
    8) Juliane McKinney, former intelligence officer, author of MICROWAVE HARASSMENT AND MIND-CONTROL EXPERIMENTATION, 1992 (The McKinney Report)
    9) Kay Griggs, ex-wife of Marine Corps Col. George Griggs, historian, political     insider, descendant of James Madison
    10) Camille Piona
    11) Jeffrey Madore, radio engineer
    12) Catherine Austin Fitts, former Assistant Director of HUD and CEO of the Solari Report, political insider
    13) Stephen O’Keefe, Canadian artist
    14) Bobby Fischer, American chess grandmaster, 11th World Chess Champion
    15) Charles C. Kartchner, realtor
    16) Ryan Mitchell, author of “Diary of a Modern Slave in the United States of America”
    17) Harlan Girard, veteran, businessman
    18) Ted Gunderson, ex-high ranking FBI Section Chief, whistleblower
    19) Dr. Robert Duncan, CIA neuroscientist, whistleblower, author
    20) Targeted Justice, Inc., as represented by Richard Lighthouse, Ana Toledo, and $1.3 billion 2023 lawsuit against AG, FBI, DOJ, and DHS
    21) Elizabeth Mueller, “Occupy Wallstreet” activist in Virginia
    22) Robert Naeslund, Swedish TI
    23) John Akwei St. Claire; Plaintiff in 1992 lawsuit against NSA
 
B. Journalists, Authors, Lawyers, Independent Researchers (n=6)
    24) Elisabeth Thornburgh JD, Human Rights Defender
    25) Alison McDowell, independent researcher
    26) Marshall Thomas, author of “Monarch: the New Phoenix Program” (2007)
    27) Whitney Webb, independent researcher and journalist
    28) Rahul Manchanda, Esq. (Professor and International Attorney)
    29) Arkin, W.M. (journalist, author, ex-military)
 
C. High-Level Perpetrators, military psychologists/neuroscientists, defense contractors, and others (n=6)
    30) Preston James, Ph.D., veteran, researcher and writer for Veterans Today
    31) Dr. James Giordano, Georgetown University neuroscientist, neuroweaponologist, and “neuro-ethicist,” and DARPA/DoD consultant
    32) Dr. James Canton, CEO of Global Futures, Inc., military subcontractor, advisor to governments, Joint Chiefs of Staff, and US military
    33) Col. Richard Szafranski (RAND Corporation), intelligence analyst
    34) Ben Norton, author of “Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries”
    35) Steven J. Smith, author of “The National Security Agency – Citadel Of Evil/A Prison For the Mind/Collateral Damage
IV. Results: Summary of Findings
V. Discussion
VI. Conclusions
VII. References and Resources

I. Epigraph/Summary Quotes:

a) “(The TI Program is) a “very cleverly disguised program of torture and murder.”

Mark M. Rich, (#2 TI below), author of “The Hidden Evil: The Financial Elite’s War Against Humanity” (2008) and “New World War: Revolutionary Methods for Political Control” (2011)

b) “I dared to challenge them and they sent an army after me…. The “New World Order boys,” I call them the “Junior High Boys.” They recruit them out of Special Forces (aka USSOCOM- US Special Operations Command)…. Gangstalking is a self-harm term for what is really a secret, government, no-touch torture, eugenics program.”

Ted Gunderson, (#18 TI below), ex-high ranking FBI Section Chief and whistleblower

c) “I used to work for the National Security Agency, the NSA. Post-9/11 laws are being purposefully misinterpreted to say that since we, the USA, reserve the right to kill terrorists anywhere anytime, that if we lower the criteria to less than probable cause in regard to the Terrorist Watch List, which was done in 2013, then thousands of random people can be put on the TWL (Terrorist Watch List), no questions asked. DHS (Department of Homeland Security) has made a separate, for-profit DHS entity (National Fusion Center Association) and is selling “kill contracts” on innocent people to buddies in the military-industrial complex to torture and kill to test on humans weapons like gases, poisons, directed energy weapons, nano-particles, sec3174retive medical chips, and even networks of chips that according to the Pentagon comes in torture protocol 1 through 5, at least.

Another protocol being used is to order law enforcement to write off anybody who complains of stalking harassment and being tortured as crazy and they are forbidden to help the person denied constitutional rights. InfraGard vigilantes under the auspices of the FBI and the Fusion Centers are paid to stalk and harass the victims so that the harassment mimicks what one-dimensional psychologists immediately assume is schizophrenia, delusions, paranoia, when it is not. This constant harassment was perfected by the former East German communist secret police, the Stasi, as psychological warfare to destroy dissidents. Since there are millions of dollars to be made using non-consensual human experimentation even to lethality, this program is viciously covered up with an intricate network of paid conspirators.”

Karen Stewart, (#3 TI below), ex-NSA intelligence analyst, whistleblower, one of 18 plaintiffs in Targeted Justice, Inc.’s lawsuit against DOJ, DHS, FBI

d) “The anti-terrorism architecture put in place under the “War on Terror” is now being deployed against political dissidents.

the global transnational ruling elite has no choice but to keep pushing for global technocracy, and the rest of humanity has no choice but to fight back…. Knowing since 1968 at least that this moment was coming, the former has developed the CIA’s “information liquidation model” used in Indonesia and Vietnam in the 1960s into a global digital surveillance dragnet.

(Georgetown University “neuroweaponologist” and DARPA consultant, Dr. James) Giordano (2018) tells West Point recruits: “The brain is, and will be, the twenty-first century battlescape.” Clearly, by this point, neuroscience and neurotechnology had entered military operational use. Weaponized neurotechnology, Giordano (2017) teaches, can be used to control subjective experience and behaviors and to leave a target sick, disabled, or dead. The way it works is to “put minimal-sized electrodes in a network within a brain through only minimal intervention to be able to read and write into the brain function, in real time, remotely (Giordano, 2018).”

Dr. David A. Hughes, “Covid-19,” Psychological Operations, and the War For Technocracy: Volume 1″ (2024)

e) “Michael W. Wynne, 21st Secretary of the Air Force (2005-2008), said, “We have to use it (the Cognitive Warfare (CW)/psychotronic warfare/neuroweapons system) on our own citizens before we will use it on the battlefield.” That’s the way they think. He got fired for that comment… Every time the military gets a bigger budget, like after 9/11, you have more targets come on line, and they all have the same date when they came on line.”

Since the 2001 September 11 attacks and Bush’s so-called “war on terror,” there was a soar in the number of Targeted Individuals reporting covert assaults by black operatives, thugs, extremist cells, “stalkers.” Some TIs are reporting assaults with remotely applied, military grade, lethal weaponry. These reports have been from both overseas and U.S. self-identified targets. In early August, 2010, Sharon Weinberger explained in “Black Ops: Secret Military Technology in the Age of Terrorism” the reason for the escalated reports:

After the attacks of September 11, the Pentagon began a shift away from its Cold War-era “two war strategy,” premised on maintaining the ability to conduct two major military operations simultaneously, and began focusing instead on “irregular warfare against individuals and groups.”

The most profound crime a government can do to an individual is peer into their minds without consent. The intelligence agencies have become a virus, a cancer, on all of humanity. We have been trying to concentrate evil as humans understand it to create weaponry that attacks the information systems of the brain and body…. I didn’t know what we were fully doing at the time I served. I regret what I did.”

Dr. Robert Duncan, (#19 TI below), ex-CIA neuroscientist, author of “Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed” (2010), and Targeted Individual

f) “It’s mind boggling how many people are involved in targeting one person. It’s quite terrifying actually. It’s like a full-scale military operation. There is somebody directing these operations. They can be psychological operations. It can be smearing people, stalking their mail, and physically breaking in. They want to be always learning more and more about you. It’s called “The Collect:” they want to collect information about how to control you. They disseminate the information back to the team. And they keep running missions. It can be constant. Targets will have people doing these ops against them all day long. If they break into your house, they report back.”

Elizabeth Mueller, (#21 TI below) “Occupy Wall Street” Activist from Virginia (See: Elizabeth Mueller: American Targeted Activist (April 24, 2018 video))

g) “A skeptic might well ask why, if the United States has such equipment, it is being used to torture innocents and not Saddam Hussein. The answer is the cowardice factor.

What good is it to earn big bucks if your life is put at risk? Patriotism? Forget about it. Torturing a man through a cinder block wall is the ultimate act of cowardice. The mere invention is a reflection of the complete moral and physical corruption of American society. But America is also an intellectually corrupt country. Once the Central Intelligence Agency had discovered the Fountain of Death, it didn’t know how to use it. The best idea they could come up with was to resurrect the protocols of the infamous Dr. Ewen Cameron, substituting the new technology for the low tech equipment he had employed (in his CIA MKULTRA mind-erasing (‘de-patterning’) and re-programming (‘psychic driving’)) experiments in Canada.”

Harlan Girard, (#17 TI below), veteran, businessman

h) “HVT – Acronym: High Value Target. These individuals include politicians, influential journalists, business executives, entrepreneurs, popular entertainers, innovative educators, scientists, etc.”

“The American government, ostensibly engaged in protecting the lives and property of American citizens, is simultaneously (and covertly) stripping those very same citizens of their wealth, security, and freedom. To be blunt, the American government is using NSA-controlled psychics in a secret war against its own citizenry. The ultimate goal being to turn every single man, woman, and child living in America, into a government controlled slave laborer. It has taken 50+ years, but the transformation of America from a bastion of freedom and democracy, into a vast slave labor camp spanning an entire continent, is almost complete. Slavery does not require guards with guns, or cells with bars, or even awareness of enslavement. If you can build a prison for the mind…”

Steven J. Smith, (#32 below), author of The National Security Agency – Citadel Of Evil/A Prison For the Mind/Collateral Damage (Parts 1-3) by Steven J. Smith

i) “What we are experiencing is a coup. The current secret, central governance system is harvesting this planet for enormous amounts of resources. The Central Banking/Warfare System controls everything through people, one by one, person by person. Unbeknown to most of us, we have a Covert Social Credit System with three primary lines of control: 1) financial carrots and sticks, 2) surveillance and mind control, 3) covert ops, including covert physical intervention. The control system is phenomenally wasteful. They have AI and software. The more money the taxpayer pays for this system to operate, the more money “Mr. Global” makes. So there is no amount of money “they” won’t spend on the control grid….” This system pre-dates the signing of the U.S. Constitutional Convention (1787).”

Catherine Austin Fitts, (#12 TI below) former Deputy Director of HUD (Housing and Urban Development), financial and political insider, TI for 12 years

j) “This (Targeted Individual program aka organized stalking-electronic harassment, cognitive warfare, and geoslavery) is the main policy of the US government.”

Dr. Rauni Kilde, (#1 TI below), former Chief Medical Officer of northern Finland, author, and Targeted Individual

k) “How do you know, both from history and from today, that a “democracy” has failed completely? The answer is always the same, the government is killing its own citizens/civilians to maintain dissentless, dissidentless “law and order” with no justice of any kind.

Democide is a term proposed by R. J. Rummel, who defined it as “the intentional killing of an unarmed or disarmed person by government agents acting in their authoritative capacity and pursuant to government policy or high command”. According to Rummel, this definition covers a wide range of deaths, including forced labor and concentration camp victims; killings by “unofficial” private groups; extrajudicial summary killings; and mass deaths due to the governmental acts of criminal omission and neglect, such as in deliberate famines, as well as killings by de facto governments, i.e. civil war killings. This definition covers any murder of any number of persons by any government. (from wikipedia). Rummel estimates that governments killed about 212 of their own citizens during the 20th century.

According to the National Crime Information Center (NCIC), 355,243 women were reported missing in 2010 compared to 337,660 men (for a total of 692,903). If you round off 692,903 to 693,000 and multiply by a decade, 6.93 million American men and women go missing every 10 years. Some people are frightened or put off by big numbers. If 6.3 people go “missing” every day in the 3,006 U.S. Counties, in 10 years it adds up to about 6.93 million “missing persons cases.” Would you notice 6-7 people disappearing in your county, per day? Only if they were your friends or family.

For a government to conduct murder, torture, human e-torture, they need a Judeo-“News”-smokescreen, aka the “News Jews”. As long as the Government exempts Jews from NSA/DHS/DoJ Gangstalking, the Jews will be silent accomplices to thousands of U.S. Gentile high-tech corpseless murders and the human e-torture.

There is also the small matter that Reuters, AP, CNN, NBC, Fox, et al have not noticed 6.93 million missing persons per decade. Somehow, they “just ignore” 6.93 million persons of “the disappeared”… The same with the FBI, the DoJ, the NSA, Police, Sheriffs, State Police, etc., somehow, they just don’t have any time or energy to notice 6.93 million missing people.

From: 6.93 Million Disappeared American Civilian Citizens Murdered by U.S. Government Death Squads ~ Blacklisted News February 10, 2019 ~ Tracy Turner

l) “….But when a long train of abuses and usurpations, pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security…”

Declaration of Independence, Thomas Jefferson, adopted by Congressional Congress, July 4, 1776

II. Introduction: In 2013, two years after retiring from a thirty-year career as a university geography professor, I realized I was being targeted. I was a “targeted individual” (TI). I may owe my survival to the fact that I was already aware of this “black” government program (aka Unacknowledged Special Access Project or USAP) because I had read Marshall Thomas’s “Monarch: The New Phoenix Program” (2011). Soon thereafter, I expanded my understanding of “the TI program” by reading books by other TIs, including Dr. Rauni Kilde’s “Bright Light on Black Shadows” (2015), Mark M. Rich’s “The Hidden Evil: The Financial Elite’s Covert War Against the Civilian Population” and “New World War: Revolutionary Methods for Political Control” (2008 and 2011), and Gloria Naylor’s “1996” (2005). Meanwhile, even as my civil liberties had been secretly stripped away through the DHS/FBI Fusion Center system, the TI program, then as now, was and is officially denied. An enormous cover-up of these crimes against humanity is ongoing. Hence, understanding “the program” means survival for TIs. Information is power.

The TI program is the ultimate, secret “de-platforming” and “de-personing” system. TIs are stripped of their civil liberties, right to due process, the right to face their accusers, access to legal redress of grievances, the rule of law itself, and subject to nearly continuous “cruel and unusual punishment” as if they were inmates in an electronic concentration camp. To expose these nefarious war crimes and to help other TIs better understand the targeting (“man-hunting”/stalking by proxy) system, I began doing radio and podcast interviews on this topic in 2014 and started this website (ganstalkingmindcontrolcults.com) in 2016, even while being gangstalked, harassed, tracked and targeted wherever I went. During the past 11 years, I have been contacted via mail, email, and in person by many hundreds of other TIs whose lives were also being destroyed in like manner. As ex-CIA neuroscientist, whistleblower and TI, the late Dr. Robert Duncan (#19 below) stated:

“If you know someone (being targeted), educate them because the “shock and awe” of becoming a target, not knowing how it all works and what to expect, is horrifying.”

As of today (Sept. 30, 2025), I have assembled some 2,591 posts on this website, including TI testimonies, articles, and video presentations of hundreds of targeted individuals, as well as intelligence operatives, high-level military and private-sector perpetrators, political insiders, and a host of others. I have learned through this research that the time period over which targeted individuals in America have been “gangstalked,” harassed, electronically abused, etc., spans at least the past 80 years. Notwithstanding my best efforts and the efforts of hundreds to thousands of other TIs, however, this vicious, sadistic, and unconstitutional no-touch torture-murder program continues unabated and it is still being denied and covered up by authorities. As in other crimes, the cover-up is as serious a crime as the crime itself and should be regarded as part of the TI program. Official denials that “the program” exists is a “gaslighting” technique, one of hundreds and possibly thousands of PsyOps techniques and other forms of abuse deployed against citizens by governments and their subcontractors in order to discredit and destroy the lives of TIs. A major component of the “cover-up” includes infiltration and sabotage of TI groups and individual TIs’ lives by agentur (citizen-based agents) who pose as TIs themselves. The mission of these “fake TIs” is to spy on TIs and sabotage any progress that TI groups or individual TIs may make.

My goal in compiling these testimonies here is to:

1) expose and explain the scope and scale of these illegal operations, and
2) expose the identities of the primary perpetrators behind them.

Towards these ends, I assemble here an ad hoc panel of experts whose testimonies may comprise a data base for a de facto “Grand Jury” of citizens throughout America and the world to:

1) assess the truth,
2) assign legal punishments to individuals and groups perpetrating these ongoing state-sponsored terror/torture crimes, and
3) assign appropriate financial restitution to targeted individuals who have been wrongfully damaged by governments, private contractors, and civilian organizations.

Reasonable estimates of the number of Targeted Individuals in the US today range from 280,000 to about 4 million. I estimate there must be at least 10 times that number of TIs worldwide and that the US government is the primary driver of this culling/human disposal system.

Please note that:

1) up until now, targeted individuals have generally not been successful in the court systems of the US and world, and
2) in the two lawsuits included in this report, the named defendants (perpetrators) include: a) the National Security Agency (NSA; in Akwei V. NSA, 1992), and b) the FBI, Attorney General (AG), Department of Justice (DOJ), and Department of Homeland Security (DHS) personnel in TargetedJustice,Inc. V. Merrick Garland et al. (2023).

This post is the product of 12 years of my research and experience as a TI and draws on the data base I have assembled in the 2,591 posts on my gangstalkingmindcontrolcults.com website. Herein, I present testimonies of 36 exceptionally qualified “experts,” whom I regard as highly credible. Most of these experts hold advanced degrees. This ad hoc panel includes:

– 24 targeted individuals (TIs)
– 13 authors/journalists
– 5 medical doctors/scientists/engineers
– 5 intelligence/security analysts
– 3 high-level political insiders
– 4 veterans/military personnel
– 4 historians
– 3 artists/filmmakers
– 3 lawyers
– 3 businessmen, including CEO of corporation and advisors to military/politicians/governments
– 2 DARPA/CIA/DoD neuroscientists
– 1 member of RAND Corporation Board of Directors
– realtor
– 1 World Chess Grandmaster- often considered greatest chess player in history

Please note that the following testimonies, for most part, comprise mere “snapshots” or snippets of the generally much more extensive body of information they present in books, scholarly articles, etc. I am featuring the insights of these particular “experts” because, based on my research and experience, I believe their testimonies best describe the Targeted Individual Program and accurately identify those responsible for carrying it out. I encourage others to utilize this post as a template for similar research. The conclusions of this survey can thereby be tested and confirmed, modified, or rejected based on radically expanded data sets.

Since these testimonies provide the “data set” for this ad hoc, de facto Grand Jury of citizens (you), we must first ask the question: Is this data set reliable? Or could it be contaminated by testimonies of “fake TIs” or other disinformation artists/propagandists, etc.? While I do not believe these “data” are contaminated in this manner, it is possible that two or three of these experts are “fake TIs.” As a TI, I have been fooled many times. Indeed, I (and other TIs) are continually subjected to “lies, spies, set-ups, and PsyOps.” These military-grade psychological operations, carried out by professionals and their minions, are designed to deceive! As Chinese military genius, Sun Tzu, stated: “All warfare is based on deception.” This program is certainly a form of unconventional, hybrid warfare that deploys all manner of military technologies against targeted individuals. So, though I here acknowledge the powerful nature of the perpetrators and their weapons, I apologize for any possible errors herein resulting from these deceptions.

Due to their illegality, these covert targeting/civilian neutralization/human research/military operations proceed under a variety of names. (See: Cutting Through “Smokescreen Terminology:” 577 Names & Descriptions Reveal Truth Of Gangstalking/Civilian Targeting/”Dissident Hunting” War Crimes/Crimes Against Humanity). These operations serve multiple functions for the power structure. Indeed, the targeting of the brain through deployment of weaponized neuroscience and neurotech technologies is termed “Cognitive Warfare,” a sixth warfare domain that includes all the other five domains (land, sea, air, space, and cyberspace). These covert military and “medical” operations are also officially justified by terms such as “War on Terrorism,” “counterterrorism,” “national security,” “counter-intelligence,” “risk management,” “threat assessment,” “low-intensity warfare,” “conflict short of war,” “predictive policing,” and Community-Oriented Policing” (COPS), among others. In fact, based on the organizational structure and the military-grade weaponry deployed, these operations comprise 5th generation/unconventional/information/psychotronic/net-centric/cyber/neural warfare/low-intensity conflict waged internationally against individuals who have been secretly blacklisted through US government agencies, most importantly through FBI and DHS Fusion Centers, as well as their subcontractors, civilian groups, NGOs, and cooperating governments.

The “TI program” (aka “organized stalking-electronic torture,” “cognitive warfare,” and “cyber-terrorism”) comprises probably the most totalitarian, technocratic mind-behavioral control system in history and threatens to enslave all humans. My short definition of the TI program is:

Targeted Individual Program: Officially justified as “risk management,” “counterterrorism,” “national security,” “biomedical or military weapons research,” and “cognitive warfare,” the “TI program” (aka Organized Stalking-Electronic Harassment) is actually a vast, worldwide, illegal military-intelligence-policing operation carried out by police in concert with regular, irregular (civilian), special forces and virtually all aspects of society. These covert operations are designed to weaken, neutralize, and/or liquidate civilians who are secretly blacklisted as “enemies of the state” through the DHS/FBI Fusion Center system.

“Skizit Gesture” (#6 TI below) offers a more comprehensive and succinct summary of the TI program:

“Americans are being selected for disposal, no indictment, no trials, no jury. Go directly to torture and death sentence. Thousands of Americans are deliberately being murdered after being selected for “total access”. They are slandered out of their employment which leads to losing their homes, losing everything through a Nazi-like selection process. The death sentence is in these programs: Morgellons, Radiation and Gangstalking. “The “TI Program” consists of:

1) SEPARATE (electronic warfare and information collection),
2) ISOLATE (break the psychological and physical links to support),
3) INFLUENCE (Radiate) Biometric data collection devices and mapping human environment and patterns of life, Tracking medical records, Biometrically enabled intelligence collection, Tattletale Phonelines for good little villagers, Civil Record Databases (no privacy), Rewards Programs (paying civilians to identify “insurgents”/targeted individuals), forensic intelligence collection (phone tapping, cameras in your home, GPS on your car, radiation devices installed in electrics in home) and document and media exploitation and more. The same tactics developed over the years to control other countries and cultures in wars overseas, especially, Afghanistan, Iraq, Pakistan, (Webmaster: and in the Vietnam War’s Phoenix Program) are being used against Americans with deadly precision.

Controlling another person’s mind is very much like slavery so acquiring someone’s brain-specific code for the purpose of harming them must be done in secret. One way to get electronically-induced sounds in your brain is for your government to give you a free, mobile ELECTROENCEPHALOGRAM (EEG), recording and stealing the unique signature of electrical activity of the neurons in your brain without your knowledge or consent. They use a meter made specially for this purpose or they may use an app for phones which record your unique frequencies by pointing the device at the back of your head. Many people believe that this is impossible but the perpetrators rely on disbelief and lack of public education to keep this technology a secret.

TIs are connected to a 4G LTE Wifi Network with a Body Sensor Network-Implants that can be operated remotely by cell phones. GPS and 4G LTE connects TIs to internet. Your Body Area Network reads: 1) your EEG (brain/evoked potentials) 2) your vital signs 3) senses including sight and sound 4) Pain/Pleasure 5) RFID chip IP and MAC addresses 6) GPS (Global Positioning Satellite) 7) your position (sitting or standing) 8) Medical records 9) personal and family information, 10) your Terrorist/Blacklist information…

Entire populations can be enslaved with this technology. Your thoughts can be read and messages can be put into your mind so that your thoughts and actions are not your own. You become a slave. The 2003 article entitled “Geoslavery” by Jerome Dobson and Peter Fisher.. defines “geoslavery” as “a practice in which one entity, the master, coercively or surreptitiously monitors and exerts control over the physical location of another individual, the slave”…. With the conversion of a once meaningful life into an existence of human slavery, the individual sense of self-identity in human beings is eroded by the hopelessness of an emerging virtual death camp environment.

TIs are being used as Human Experiments to inaugurate this program. This program of implants will be applied to the whole human race so they can be totally controlled, surveilled, tracked, tortured, harassed and electronically punished.”

In my opinion, the TI program has everything to do with refining the technologies now being progressively rolled out under the technocratic, totalitarian, uberveillance military-police state generally referred to as “The Great Reset,” the Fourth Industrial Revolution, UN Agenda 2030, and New World Order. This could explain why the late TI, Dr. Rauni Kilde (MD) (#1 expert below), stated in a video interview that: “(“The TI Program”) is the most important policy of the US government.” If true, this means that the most important policy of the US government (and its owners and cooperating governments) is to technologically and technocratically enslave and genocide the entire human population! I vote nay, never, nix, naught, no way, negatory… forget it. The PERPETRAITORS of these programs must be identified, exposed, and brought to justice if truth and human freedom are to prevail. To this end, I enter the following testimonies into the public record for consideration of a Grand Jury comprised of all people.

III. Key Insights of Targeted Individuals (TIs) and Other Experts on the Nature of “The TI Program” and Identity of “The Perpetrators”

A. Highlights from Testimonies of Highly-Credible Targeted Individuals (n=24)

1) The late Dr. Rauni Kilde (MD), former Chief Medical Officer of Northern Finland, political insider, author, and Targeted Individual (TI) for 30 years, was married to Norway’s Ambassador to the United Nations. Upon learning that elites planned to reduce the global human population by two-thirds, she began exposing these plans. In retaliation, presumably, she was targeted, tracked, and tortured between 1985-2015 and finally murdered via induced cancer in 2015. She made the following two presentations at a military mind control conference in 2000 and 2001:

a) ELECTROMAGNETICNEUROTELECOMMUNICATION AND CYBERNETICS, PRESENTED AT 33rd INTERNATIONAL CONGRESS ON MILITARY MEDICINE, HELSINKI, FINLAND, 25-30, JUNE 30, 2000b) NEURO-ELECTROMAGNETIC TELECOMMUNICATION: Poster Presentation Abstract at a RCTIC Symposium on Mechanics of Memory and Memory Disorder: March 17-18, 200

Her book, “Bright Light on Black Shadows” (2015) is a wealth of information on these topics (See: Key Insights Into Global Organized Stalking-Mind Control System From Dr. Rauni Kilde (MD) book “Bright Light on Black Shadows” (2015))

Among Dr. Kilde’s important insights in this book are:

“We are living in an era where everything is controlled by the elite and intelligence agencies and those opposing their tyranny are eliminated by mind controlled, micro-chipped patsies, or false-flag suicide or accidents or induced illnesses.

The “Organization” that rules the world today behind the scenes is the “New World Order”, Illuminati with the Star of David, CIA, FBI, British Intelligence, and their local lackeys…. Their goal is the next generation as biological robots. And the middle class has to be eliminated.

Who controls the USA and UK? … (A) Global secret government organization rules the world behind the scenes. Many things point to Jewish sources. Banking, political figureheads, Hollywood movies, TV, radio, press ownerships internationally. Parts of armies and intelligence organizations are recruited to “secret government” with many high political figures from heads of state to big industry. They run the world with tens of thousands of recruits who are their errand boys all over the world. High-ranking officers, judges, politicians, members of Parliaments, EU, (and) some members of intelligence services, police, commerce and ministries work for this organization along with their daily duties. (The) Mafia is strongly involved, so is (the) drug industry from South and North America– that is how they get their money to run the show. Arms sales, antiques, and (the) art industry are among other money-making businesses.

…. “All the US military branches are involved in the development of “the technology,” in cooperation with civil institutions like the Department of Health, in what is known as the NEURAL NETWORK ASSOCIATION. At their 1991 conference, it was revealed that they submitted and endorsed over 1000 projects in brain-computer technology at 350 medical centers, universities, etc.

…The best way to control people without their knowledge is through mind control. According to the CIA Director in 1972, mind control means a world where every thought, emotion, observation, and need is controlled….. Cybernetics, full neurological control and communication, has been in use since the 1940s without the knowledge of the public… The objectives are behavior modification and influencing mental and bodily functions, processes, and emotions remotely through computer-satellite links….

…Directed Energy (DE) weapons, mostly EMF (electromagentic frequency) and acoustic weapons, act on the psyche and the body of human beings and all living creatures….

“… On July 21, 1994, the U.S. Department of Defense (DoD) proposed that “non-lethal” weapons be used against anyone engaged in activities that DoD opposed. That could include almost anyone. DoD’s potential enemies may be counter-cultural individuals, those with opposing political viewpoints, economic competitors, biological undesirables, etc. From my point of view, the uses of this new technology philosophically are comparable to and amount to the Biblical Fall of man, the eviction from paradise. The all-encompassing thought-reading and mind-influencing capacity (of this technology) divides man into two encampments: Those few “God-like” people, who are allowed to use these means, and all others, whose freedom and free will is being taken away.”

Despots of the world take note: If you categorize torture and murder as classified medical and scientific experimentation on “willing” human subjects, you too can justify crimes against humanity on the basis that they advance human knowledge.”

Electromagnetic neuro-telecommunications and cyberbetics” is a “weapon of mass destruction” that links the brains of people via implanted microchips to satellites controlled by ground-based computers to achieve total control of humans. The NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just as we have unique fingerprints. With electromagnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare.

Implanted human beings can be followed anywhere. Their brain functions can be remotely monitored by supercomputers and even altered through the changing of frequencies. Guinea pigs in secret experiments have included prisoners, soldiers, mental patients, handicapped children, deaf and blind people, homosexuals, single women, the elderly, school children, and any group of people considered “marginal” by the elite experimenters.

The computer- and satellite-steered, micro-chipped population are cyborgs, no more free human beings with their own thoughts and emotions and attitudes. They can manipulate human emotions, change one’s sexual behavior, break marriages, destroy friendships and family ties. They can erase your memory with EDOM, electronic dissolution of memory, and they can induce false memories with RHIC- radio-hypnotic intra-cerebral control!

All is done with specific electromagnetic frequencies with super technology. Patents exist – altering moods and stimulating our brainwaves to certain rhythms from satellites exist. How do you fight satellite surveillance? You cannot. The aim is total control, isolation and breaking the target individual’s support system and to control the whole world population through brain-satellite links to computer. They are far advanced technologies at use totally hidden from mediocratic academics and population. “

Today’s microchips operate by means of low-frequency radio waves that target them. With the help of satellites, the implanted person can be tracked anywhere on the globe. When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillimeters) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights, and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS (Remote Monitoring System), a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads.

Every thought, reaction, hearing, and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures, and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.

… This is the most important policy of the U.S. government.”

Primary Perpetrating Entities Named:

a) elites and intelligence agencies
b) The Organization (Global secret government organization)
c) Illuminati with the Star of David (Jews and Israel); (all controlled by) Jewish sources
d) CIA, FBI, Dept. of Defense (DoD), British Intelligence (MI6, GCHQ, etc.)
e) NSA Signals Intelligence
f) US and Israeli satellites
g) Complicity of the Psychiatry/psychology/neuro (cognitive) science professions
h) (CIA’s) MKULTRA mind control and implants
i) “street perps”/citizen-based agents
j) Mafia
k) Department of Defense (DoD) and all US military branches
l) The US government
m) Department of Health
n) police
o) judges
p) politicians
q) Hollywood
r) media
s) EU

2) Mark M. Rich (TI) is author of “The Hidden Evil: The Financial Elite’s War Against Humanity” (2008) and “New World War: Revolutionary Methods for Political Control” (2011), and a targeted individual (TI). See: Psychopath’s ‘New World War’ Against All Humanity; Comments by author, Mark M. Rich

Mark M. Rich: “(The TI Program is) a “very cleverly disguised program of torture and murder.

… In a January 2007 issue of the Washington Post, Dr. (Col. John B.) Alexander said that “nonlethal” weapons should be used to “electronically neuter” people. In his article, “New Weapons For a New World Order” (The Boston Globe, March, 1993), he wrote:

“The United States must be able to protect national interests and values, even in ambiguous circumstances.”

According to former intelligence officer, Julianne McKinney’s 1992 report, the pattern of directed-energy attacks and gang stalking is the same all over the world… this program is being used to silently neutralize all people that the New World Order believes will be troublesome to their rule. In particular, this includes intelligent, independent, freethinking, incorruptible, nonconformists.

The control mechanisms in the Soviet Union, which included the targeting of the civilian population, was only made possible by the citizens who stalked and harassed people in public. The KGB’s success, added McKinney, “depended on the extensive use of informant networks and agents provocateurs….” McKinney stated: “I think that once full control is established over a major percentage of the population, and enough of the population is silent and unwilling to stick their necks out, that we inevitably would be heading toward a holocaust.”

…. I’ve determined that, among other things, the targeting program facilitates torturous public executions for the benefit & entertainment of the Freemason satanists who run the sick system.”

Perpetrator Groups and Individuals identified by Mark M. Rich

a) New World Order
b) psychopaths
c) Col. John B. Alexander, major promoter of “non-lethal weapons”
d) US government
e) Freemason satanists who run the sick system

3) Karen Melton Stewart is an ex-NSA (National Security Agency) intelligence analyst, whistleblower, and TI.

A. Karen states in a video interview (See: Gangstalking-Electronic Torture = DHS “Kill Contracts:” Karen Melton Stewart, ex-NSA Whistleblower):

“I used to work for the National Security Agency, the NSA. Post-9/11 laws are being purposefully misinterpreted to say that since we, the USA, reserve the right to kill terrorists anywhere anytime, that if we lower the criteria to less than probable cause in regard to the Terrorist Watch List, which was done in 2013, then thousands of random people can be put on the TWL (Terrorist Watch List), no questions asked. DHS (Department of Homeland Security) has made a separate, for-profit DHS entity (National Fusion Center Association) and is selling “kill contracts” on innocent people to buddies in the military-industrial complex to torture and kill to test on humans weapons like gases, poisons, directed energy weapons, nano-particles, secretive medical chips, and even networks of chips that according to the Pentagon comes in torture protocol 1 through 5, at least.

Another protocol being used is to order law enforcement to write off anybody who complains of stalking harassment and being tortured as crazy and they are forbidden to help the person denied constitutional rights. InfraGard vigilantes under the auspices of the FBI and the Fusion Centers are paid to stalk and harass the victims so that the harassment mimicks what one-dimensional psychologists immediately assume is schizophrenia, delusions, paranoia, when it is not. This constant harassment was perfected by the former East German communist secret police, the Stasi, as psychological warfare to destroy dissidents. Since there are millions of dollars to be made using non-consensual human experimentation even to lethality, this program is viciously covered up with an intricate network of paid conspirators.”

B. See: Ex-NSA intelligence analyst whistleblows on FBI-DHS “vengeance for hire” (targeted individual) program: Karen Stewart Interview (2024) & 2019 Letter To Judge Albert V. Bryan

In an interview with Jeffrey Prather [08/2022], Stewart explains how the system works. She says, basically, that (DHS and FBI) Fusion Centers became a ‘revenge for hire’ business. Inconvenient people are put, without any legal process, in watchlists levels created specifically to evade accountability. From then on, the government will start an endless surveillance and harassment campaign, which includes creating false dossiers, character assassination and recruiting members of the community to sabotage and gaslight the target by various means.

Also – it is said classified microwave weapons (the same technology which causes ‘havana syndrome’, vehemently denied by the government) are being used in the campaigns, and the targets are being used as convenient guinea pigs for them, because they lost all their rights when put on the watchlists.

Other interesting things said:

a) Anyone with money and contacts can put you on the lists for no reason (19:33)
b) She had health records falsified to hide the results of the attacks (at 15:50).
c) A law enforcement official explicitly told her he was not allowed to help due to her presence in some kind of blacklist and had her rights voided (at 12:00).
d) Some people are added to the watchlists for the sole purpose of non consensual weapon experimentation (at 18:57)

C. Karen Stewart’s 2022 letter to Israeli Ambassador reads: (See: NSA Whistleblower Karen Stewart Exposes Israeli Betrayal and Duplicity, Israeli Mossad “Honeypot,” & Her Own Targeting, Torture, & “Slow-Kill Assassination”)

May 25, 2022
Embassy of Israel
3514 International Dr. NW
Washington DC 20008

Dear (Israeli) Ambassador,

I am an American citizen and my family were some of the original settlers in the 17th Century (1620). In fact, I count as relatives some pretty famous historic figures like George Washington (1st Cousin), Nathan Hale, Daniel Boone, etc. I come from a long line of Evangelical Christians who believed the Biblical saying that whoever blesses Israel is blessed and curses Israel is cursed. I cannot say I adhere to that anymore, though I do not curse you, I cannot support a country that would infiltrate my workplace (NSA), run a honeypot (Margarita “Rita” LaPointe) to sleep her way through upper management, starting in the NSA Weapons and Space Directorate, in order to sexually blackmail managers like Robert Gaiser, Drew McCarrier, Air Force Captain Todd Parks, etc. then get her “Johns” to manipulate the theft of credit of a six month series of Top Secret reports that I alone wrote – vouched for by supervisor AF Captain Sonya McMullen) and which the Pentagon confirmed had saved the lives of about 2,000 military men or more in Operation Iraqi Freedom (OIF), in order to steal the rare double promotion meant for me – according to promotion board member Lori Hamilton.

When I asked the then Inspector General George Ellard to investigate what I originally thought was a gross ethics breach, I found myself viciously targeted instead. I had witnesses lined up but found they were either ignored or threatened by the IG or NSA Security, quite contrary to their duty and purpose. Then I found myself ordered to take an out of routine polygraph by a man who screamed at me just before the polygraph in order to skew my results. Of course, after he screamed at me, I asked to come back another day when the polygraph tech had not breached protocol and purposely upset the subject, but he refused and threatened to have me arrested right then and there by the FBI and taken to jail in DC… because I did not want his screaming at me out of the blue to sabotage my polygraph! I said for the record, I had never had a problem on a polygraph but taking one after being abused would certainly skew the proper results. A week later, I was called by security to say I had not passed (the first time ever in 20+ years) and was scheduled to take a second in a month. I knew I had been set up because of my IG complaint. The second test was deemed indeterminate, the third three months later was a pass. That polygraph tech interviewed me two hours in regard to my situation and remarked how I had no record of job problems at all and had indeed never had a polygraph problem before this. She revealed at the end of the test that I had cleanly passed it and had actually passed the second as well, but they had wanted to confirm with a third test. You would think that would be the end, but no. The same people who lied to the promotion board had fabricated some secret allegation against me and NSA Security was on board with framing me to get me fired at least, if not falsely imprisoned, to shut me up. Could an ethics breach deserve such a psychotic and criminal over-reaction by those actually in charge of keeping ethics strong at the workplace?

The answer lay in the next set of people to get involved with criminal activity against me, SES (Senior Executive Service) manager Eric Hagemann, his close friends from Vietnam service, Jack Schabe and Drew French, all employed by NSA. Hagemann’s daughter was even married to an Israeli in your military. (Had Hagemann been recruited to spy for Israel? To run or protect a Mossad honeypot? It certainly seemed and still seems that way since I remain under attack and dangerous Directed Energy Weapons were added to the attacks in late 2015 til this day.) They had all served together in a radio battalion and pursued related subjects at NSA. Were they all Jews with divided loyalties? Were they part of a Mossad friendly cell inside NSA? Hagemann was a computer and electronics expert as they all seemed to be.

In August 2006, I witnessed Hagemann leaving my house on a Saturday after a break-in. At first my husband and I were puzzled as to why nothing seemed to be missing but within a few days we noticed extra house, car, and mailbox keys were gone. And our home phone and cable service showed signs of hacking. Later it became clear a passive burst bug had been placed in the home as well, likely in the duct system. Was it to “catch me doing something illegal”? No, it was to see what I knew about THEIR operation. That following Monday, Hagemann was in the server closet outside my office for several hours unaware I had seen him leaving my home. The entire time only my computer was off-line. All other computers in my office were fine and NSA IT service blew me off. My computer came back on line when Hagemann left. I am not a techie so I am not able to hack or get up to mischief with computers, they are a tool to me, nothing more. I have zero training, zero talent, zero interest in the inner workings of computers. However, it seems to me someone like Hagemann could set up a false trail to throw suspicion on me in order to set me up to be fired to cover up the Mossad honeypot operation, which seems to be what happened. A real investigation would have exonerated me from whatever false premise they were using but that was clearly not going to happen since the IG and NSA Security were “captured” and corrupted by Israel.

NSA Security’s attack dog psychologist, Dina Wiezcynski, who had a shady and immoral past, called me in to threaten me to shut up about my “stolen work credit and stolen double promotion or she would go back through all my previous routine psych evals and “FIND A PROBLEM.” She could not especially due to a 2005 evaluation by former head of NSA Psych Services, Paul Clavelle, who had assessed me as one of the strongest people emotionally and mentally whom he had ever met. Thus, NSA Security was forced to what we will call, plan B… send NSA low level security goons to stalk and harass me 24/7 on and off NSA property to force me into reporting them so that Security managers could quickly, without any investigation, pronounce me “paranoid” and fire me. But I successfully ignored them until 2009 when they poisoned to death a family dog (13 month old Newfoundland) with food laced with a neurotoxin and then started a coordinated, multi-person, aggressive driving campaign to try to injure or kill me on the road. At that point I did complain of a supposed investigation of me used to do nothing but viciously harass and defame me for nothing. Still ignoring the real issue, NSA Security without any investigation, stripped me of my clearance, so I reported the tag numbers of the NSA security personnel harassing me to local police. NSA again panicked, told police to stay out of it, and put me on admin leave to thwart my own evidence gathering.

While on admin leave, NSA went to the local Fusion Center to organize civilian stalking harassment to augment then replace NSA security goons since they all had a military look and stuck out like sore thumbs. Fusion Centers since their inception have organized civilians into a fascistic, militarized “neighborhood watch” and even pay them in gift cards that come from laundered tax money. These pin heads took over most of the in-your-face, 24/7 stalking harassment, led by a local psychologist contractor named Joyce Carol Warner-Burke who specialized in group think manipulation. I caught her connecting to information on where I lived and my address over and over and over on Zaba Search as if showing new stalkers their assignment daily. Once when my tire was slashed early in the morning, I found her kneeling in my driveway examining the tire. When she saw me, she jumped up, got in her car and sped off. But she did not live far away at all.

NSA told local police not only to ignore my complaints and not investigate crimes against me, but to go door to door in my neighborhood to warn people that I was a “crazy and dangerous employee”, which of course could panic stupid, gullible people and cause them to harm me. Another set-up. How do I know? I heard a police Lieutenant Williams saying that to a neighbor and crediting a Captain Coone with instructing him to warn people. I had come up behind him to ask him a question. When he saw me, he literally ran to his car and drove away.

At that point, NSA wanted desperately to make me panic and report the stalking harassment to police so they could “prove” I was paranoid and needed to be fired (2 years before I could retire after 28 years of service to my country). However, I just collected evidence and noted methodologies. In the Spring and Summer of 2009 I began calling around to get a labor law lawyer to sue NSA. One lawyer confirmed to me that as soon as I spoke to him (Kohn, Kohn, and Colapinto) no sooner than we had hung up, the NSA General Counsel called him and threatened him to not take my case, indicating NSA was illegally monitoring my phone calls and threatening lawyers whom I called. I finally had to get a Federal law firm out of the DC area to take it.

Since NSA’s false premise for firing me to cover that it was whistleblower retaliation was that I was suddenly paranoid and delusional after no mental illness my whole life, I got an independent psychological assessment that I was of course perfectly sane and thus was clearly illegal whistleblower abuse and retaliation. In fact, a second independent psychologist even wrote similar. Both evaluations were included in my lawsuit paperwork to NSA’s chagrin.

When I began getting out and talking to the Fusion Center civilian dupes and telling them the truth I caused ripples in the NSA Fusion Center well oiled machinery. In fact, police cars with sirens had to be called twice to their Phelps Luck Community Meeting House, down the street from me, which they were using for weekly indoctrination and control of the duped neighbors. People with whom I had spoken began demanding answers and twice arguments had gotten aggressive and spilled out into the parking lot and had to be quelled by police. After that, on July 12, 2009, the stalking harassment stopped dead.

It remained at bay until early 2015 when my lawyer asked the Equal Employment Opportunity Commission Judge (Laurence Gallagher) to order a subpoena formally identifying Eric Hagemann as an NSA SES manager and requiring his driver’s license to identify his name and photo as that of the man who had broken into my home in 2006 (and thereafter) and whose image I had drawn very accurately. This again panicked NSA and they started up the Fusion Center-led stalking harassment yet again. I had even temporarily moved (2015-2016) to another state nowhere near NSA, but noticed the exact same defamation and stalking harassment campaign carried on by another Fusion Center with the help of a military entity with ties to NSA. (All of this is still quite illegal). In fact, on occasion, the stalkers would send Hagemann look-a-likes to tell me why they were upset and clearly they did not want Hagemann identified in my case. He was a peculiar looking man, pug nose, almost dwarfish, but with a long flowing main of white hair and a full beard. Sometimes the stalkers would send cars with one or even two men to stalk me with such men (long white hair and beard) so I knew this was a sore point. They wanted his identity protected at all costs… but not enough to do the right thing by me! In late 2015, the 2nd Fusion Center (FDLE/Fusion Center) began removing their in-your-face civilian dupe stalkers, with nocturnal attacks by Fusion Center operatives and contractors using Directed Energy Weapons, which were so strong they killed my cat the third night. They not only endangered me but had no moral problem endangering my elderly parents (85 and almost 87) with whom I was staying, in order to kill me to shut me up to protect Mossad agent Eric Hagemann and those inside NSA whom he had turned to commit espionage. During those attacks I found that Fusion Centers are subservient to foreign interests such as Israel, and in the guise of Homeland Security, facilitate espionage, dupe law enforcement into protecting bad guys and ignoring or harming good guys, and aid and abet covert subversion and insurrection against the American people and our proper government. And the owner of the privately owned network of Fusion Centers acting as a Trojan Horse against America, just happens to be Jewish. Is he a dual-national? Are Hagemann, Schabe, and French dual-nationals or related to any? How many of the subverted NSA personnel facilitating espionage and my attempted murder are aligned with Israel above the USA?

Fusion Centers seem to be privately owned in order to, among other things, evade FREEDOM OF INFORMATION ACT requests for information that would show they are not what they claim to be and have killed innumerable good Americans and zero “terrorists” who supposedly mean us harm. It very much looks like Israel, through people like Hagemann, have set up a hostile, undeclared, insurgent army made up of traitors and fools, in plain clothes, among our population to take down America. We are of course seeing “Homeland Security” behind this deadly charade and seeing more and more regular Americans being declared “terrorist threats” for daring question injustices and overreach in their lives. Put that together with known historic Israeli espionage which has delivered American secrets to Communist China, it looks like I am to be one of the secret casualties in a secret war of betrayal by Israel against its best ally. I have in the last several years of attacks received sudden and unique injuries from the Directed Energy Weapons, which could at any time kill me despite my family’s genetic longevity and propensity for good health. In fact I never had any health problems until your affiliates began attacking me with Directed Energy Weapons such as RF, pulsed microwave, heterodyning, etc. Is your Mossad as out-of-control and degenerate as our CIA or are you, as a representative of your proper government, outraged by their crimes or in full support of them? Thanks to YOUR people, I am tagged as a “threat” to torture and slow-kill assassinate for being a patriot and good person. Does that set well with you or will you alert your own government as to the heinous betrayal of all Americans with such betrayal and sociopathic activity against us? This is also a betrayal of God by sons of Satan who chose evil over God’s will, spat on his blessings for them, and it will be dealt with. The question is, will you step up or hide your head in the sand?

Karen M. Stewart, NSA, Intelligence Analyst, 28 years, Victim of Israeli betrayal and duplicity

Primary perpetrators according to Karen Stewart:

a) NSA
b) Sons of Satan (Jews)
c) Israeli Mossad (national spy agency)
d) Department of Homeland Security (DHS) and FBI (JTTF; Joint Terrorism Task Force) Fusion Centers
e) Jew-owned National Fusion Center Association: DHS for-profit, private subsidiary entity
f) law enforcement
g) SES (Senior Executive Service) manager Eric Hagemann, his close friends from Vietnam service, Jack Schabe and Drew French, all employed by NSA
h) NSA General Counsel
i) Phelps Luck Community Meeting House for local police to organize stalking operations of vigilante civilian dupes
j) Infragard vigilantes
k) NSA Security’s attack dog psychologist, Dina Wiezcynski
l) Margarita “Rita” LaPointe (Mossad “honeypot”) (3)
m) NSA Inspector General George Ellard (3)
n) NSA low level security goons

4) Gloria Naylor, TI and Pulitzer-Prize winning author of “1996,” identifies the following groups and individuals behind her targeting/torture in this fictionalized account. (See/hear this podcast interview: Global Gestapo 12: Gloria Naylor and Stephen O’Keefe–The CounterIntelligence Zionist Superstate)

a) NSA
b) Mossad agents
c) ADL (Anti-Defamation League)
c) many, many Jewish civilian stalkers in stalking groups
d) local police

5) Suzie Dawson, New Zealand Targeted Individual (TI), journalist, activist, politician, and mother. Susie was a principal organizer of the “Occupy” movement in New Zealand. She was forced to flee New Zealand to Russia in about 2020 in order to protect her family. See: TIs: Meet Your Stalkers; Episode 2- Opening The Five Eyes: Exposing the Spies; Suzie Dawson (9/29/19); Transcription, Graphics, & Stalking Perps’ CVs

pastedGraphic.png

According to Susie Dawson’s analysis, “The Global Network” (aka “NSA Global Spy Network”) IS “the architecture of oppression” that rules and shapes the world. Drawing on her experience as a TI and a journalist-researcher, she exposes this “architecture of oppression” in her 10-part series: “Opening the Five Eyes: Exposing the Spies.” The system is comprised of covert SIGINT (Signals Intelligence) and HUMINT (Human Intelligence) ops carried out by the NSA, CIA, DOD, FBI, DHS, and NATO, etc., in the US, the UK Ministry of Defense GCHQ, JTRIG, MI6, MI5, etc., in Britain, the IDF, Unit 8200, Mossad, Shin Bet, etc., in Israel, and their equivalents in over 100 other nations. Cooperating private security and intelligence contractors and their hired thugs (aka “surveillance role players,” “counterterrorism specialists”) execute street level operations and psychological attacks. The Global Network secretly surveilles, targets, and destroys honest, incorruptible activists, journalists, “dissidents,” scientists, truth-tellers, and innumerable others who have been secretly watchlisted and flagged as “potential terrorist threats” or considered “enemies of the state,” “enemy non-combatants,” “extremists,” “radicals,” or “persons of interest,” etc.

This horrific, reprehensible, and criminal “social engineering” system perpetrated by the “The National Security Racketeering Network,” is a “growth industry.” It is the largest black and black-market op AND “Crime Against Humanity” in human history. It radically ramped up after 9/11 and continues to expand across the globe today as a for-profit enterprise.

In episodes 6 through 9, Dawson and guests analyze documents from JTRIG (Joint Threat Response Intelligence Group), a part of GCHQ (Government Communications Headquarters; the British equivalent of the NSA) and expose the manuals, psychological tricks, methodologies, and protocols deployed in these nefarious operations. My opinion is that these psychological warfare techniques derive mainly from government-military-intelligence agencies’ weaponization of psychology and other sciences conducted by Britain’s Tavistock Institute (1921 onward) and the US governments’ Macy Conferences-CIA MKULTRA+ mind control programs (1947 onward).

Suzie Dawson: “We are at the place where a transnational intelligence cabal supercedes government, the justice system, and law… where they can film you inside your house without a warrant and then use it to get a warrant… where they have a financial profit motive in expanding the number of people that they target.

… Every single bomb dropped or military operation undertaken is enabled by this transnational intelligence cabal. And the targeting of citizens in our home countries around the world uses that same military targeting process and systems against us…. Our ignorance has led to our own demise. It’s now everywhere. I remember President George Bush (II) saying that in the War on Terror “the whole world is the battlefield”… They weren’t joking. Their plan was to have the ability to target any person on the planet in real time. And that is what they have expanded their systems to have the capacity to do. And that is what they have been doing ever since. Every year the problem is getting worse and more widespread. They are now targeting all sectors of society.

We are being targeted and spied on by private intelligence agencies engaged by government departments and paid for with taxpayer dollars… At what point do we stop victim-blaming and start looking at those who are doing the targeting? Ultimately, this is about the people who are doing the targeting of dissidents, activists, journalists, child-abuse survivors, and earth-quake insurance claimants, etc. These are the same people facilitating the dropping of bombs in Syria, the destruction of Iraq, Afghanistan, Libya, and so on. Just like wars are fought for profits, so the covert targeting of civilians deploys the same systems that are run by the same people.”

The NSA Global Spy Network: Episode 1: Opening the Five Eyes: Exposing the Spies – Suzie Dawson (9/22/19); Transcription & Graphics

“Almost everything we are talking about comes under the umbrella of “counter-terrorism.” But they expand their definition of counter-terrorism to mean any threat to national security. Then they expand what a threat to national security is to include threats to “critical infrastructure,” which includes private corporations, banks, credit card companies, etc. So if you are a threat to critical infrastructure, like a bank, you become a threat to national security. Then all the apparatus of the state is used to target you.

Government departments justify spying on their own citizens as being part of “risk management.” We’ve seen the invoices of governments hiring private intelligence agencies to spy on “threats” (targets) on the ground. This is put on the general ledger as a security expense. Hence, the targeting of citizens around the world who oppose some government policy or activity; we are being deemed a risk either to the government or to the police and security state, or to corporate entities. And then these military Fusion Centers, are trading in our data and pushing them up through the military networks.

… The domestic police intelligence units and the government departments and corporate entities don’t like to do dirty work themselves, so they hire private intelligence and private security contractors. And those contractors are the ones that hire teams of people that go and stalk, target, interfere with, sabotage, and destroy the lives of whoever is deemed to be a risk to the state. They are literally billing the government. So the government is identifying who should be targeted and then these are the goons that are actually doing it.

The privatization of surveillance means they must have perpetual growth and expand the number of targeted individuals. As more and more people are being targeted, there will be greater and greater awareness that this is happening. If we don’t stop this, eventually it will be standard operating procedure that everybody is targeted. The expanding watch lists are a kind of ponzi scheme.”

Primary Perpetrating Entities Named by Suzie Dawson:

a) Global Spy Network (NSA Global Spy Network)
b) 5 Eyes (FVEY, US, UK, Canada, New Zealand, Australia and Israel), 7-14 Eyes, 41 Eyes, spying ops
c) transnational intelligence cabal
d) JTRIG (Joint Threat Response Intelligence Group), a part of GCHQ (Government Communications Headquarters; the British equivalent of the NSA)
e) covert SIGINT (Signals Intelligence) and HUMINT (Human Intelligence) ops carried out by the NSA, CIA, DOD, FBI, DHS, and NATO, etc., in the US, the UK Ministry of Defense GCHQ, JTRIG, MI6, MI5, etc., in Britain, the IDF, Unit 8200, Mossad, Shin Bet, etc., in Israel, and their equivalents in over 100 other nations. Cooperating private security and intelligence contractors and their hired thugs (aka “surveillance role players,” “counterterrorism specialists”) execute street level operations and psychological attacks. The Global Network secretly surveilles, targets, and destroys honest, incorruptible activists, journalists, “dissidents,” scientists, truth-tellers, and innumerable others who have been secretly watchlisted and flagged as “potential terrorist threats” or considered “enemies of the state,” “enemy non-combatants,” “extremists,” “radicals,” or “persons of interest,” etc.
f) hire private intelligence and private security contractors
g) Townsend and Clarke is named as the private security and intelligence contractor comprised of former law enforcement officers that targeted Suzie Dawson

6) “Skizzit Gesture” is a remarkably intelligent and brave TI who made a series of excellent video presentations around 2011 in which she captured and exposed real-life stalking operations being conducted against her on video camera. Some of these videos are amongst the best explanatory videos on the TI Program:

Slavery Via Brain Stimulation With Electromagnetic and Acoustic Frequencies by Skizit Gesture (2014)
Copstalked in Atlanta, Georgia
Torture in America: Morgellons, Radiation, Gangstalking

Highlights from above videos and Skizit Gesture’s Youtube Channel:

“Americans are being selected for disposal, no indictment, no trials, no jury. Go directly to torture and death sentence. Thousands of Americans are deliberately being murdered after being selected for “total access”. They are slandered out of their employment which leads to losing their homes, losing everything through a Nazi-like selection process. The death sentence is in these programs: Morgellons, Radiation and Gangstalking.

For a complete view of military terrorist tactics being used against Americans (DEWS, Gangstalking, Biomission), please see the most recent version of Insurgencies and Countering Insurgencies www.fas.org/irp/doddir/army/fm3-24.pdf. For Terrorist Psychological Operations being used on Americans, please see www.fas.org/irp/doddir/dod/jp3-13-2.pdf”

“Are you a target of Morgellons, Radiation and Gangstalking? These military operations select targets for “cleansing” or as NASA puts it, “SANITIZATION,” of the world’s population which is exactly the same process of Nazism. I am an advocate for the innocent people being tortured, sickened and killed, many of whom no longer have the capacity to help themselves. For more information on tactics being used on people who have been judged worthy of torture and death without a trial, see the Joint Publication 3-24 CounterInsurgency Manual 2018. Gangstalking, the Community Policing (COPS program) and the CounterInsurgency Manual (2005, revised 2014 and 2018) have the same tactics for Non-Kinetic (no-bullet) Warfare. Webmaster: Also see: Intelligence and Electronic Warfare Operations Manual; US Army (FM 34-1- 1983-2009)

What is a Targeted Individual? A Targeted Individual is a person who is an unwilling victim of illegal, covert terrorist operations which cause psychological harm through organized stalking or physical harm through biological weapons, implants, directed energy and acoustic weapons. The goal of this terrorism is to eliminate the TI through torture leading to a “final solution” – death. The terrorism is expanded to the TI’s family, including children. Families are being shocked, vibrated, and burned with Directed Energy Weapons (DEWs). The torture degrades a person physically and mentally to the point where they are hardly able to function. Their hope for personal success, happiness, and fulfillment are destroyed to the point where they have little hope for a viable future.

Targeted Individuals are targeted by the police and the gangstalkers they employ. They are never released from this program until they are dead. This is the El Salvadoran model of justice. (See “Salvatruchas.”) According to (Jewish University of Wisconsin professor), Herbert Goldstein, “For years people focused on the means of policing rather than its ends.” Herbert invented the concept of using torturous and illegal means to achieve what they want rather than using legal means. He called it “Problem-Oriented Policing” (POP). Problem-Oriented-Policing is a concept that ignores the Constitution and the right to maintain your own body in its original form because this program includes covert implants in the brain, chest, arms, abdomen, hips, legs and feet; really they take over a person’s entire body, including the central nervous system, with heat and vibration. (Jewish Attorney General) Janet Reno set this program in motion in 1994. It is called Community-Oriented Policing (COPS) and uses police, firemen, EVAC (EVOC?), veterans, and ordinary people to perform missions such as phone stalking, illegal surveillance, covert implants, radiation, and chemical poisoning. Targeted Individuals are also used for experimentation as if they had no more value than a rat.

HISTORIC MISSION: Target 1% of the population (deviants, independents, nonjoiners, artists) and punish them severely for little or nothing and the 99% will comply through fear or propaganda.

NEOCONSERVATIVES: The neocon aim is a New World Order based on Straussist and Christian delusions to achieve political domination (See: “Straussism: The Philosophy Directing The Age of Tyranny” by Jan Allen.). (Webmaster comment: Leo Strauss, Jewish-German philosophy professor at University of Chicago, is considered the godfather of the “neoconservatives,” a group of Jewish Trotskyite communist “intellectuals” who re-branded themselves as Republicans and have controlled US foreign and domestic policy for half a century. “Neocons” pre-scripted the 9/11 terror attacks carried out by the US government and Israel as the “war trigger event” to justify the perennial “Global War Of Terrorism” and associated foreign and domestic wars to create “Greater Israel” and usher in a universal police state (Great Reset/UN Agenda 2030/Luciferian/Antichrist Kingdom). Many TIs are targeted because they oppose this Zionazi World Order.)

GENOCIDE AND MASS MURDER: Propaganda is used to dehumanize the targeted individuals. Totalitianism suspends freedom. Fear and violence are preconditions of genocide.

The NO-TOUCH TORTURE program conducts extended surveillance on individuals and tortures them until they are dead. This requires a gang mentality involving retaliation, reputation, loyalty, and respect. This program uses radiation weapons to deteriorate the victim’s physical health and damage them psychologically. It neutralizes or kills people who oppose illegal government activities.

The new, PRO-ACTIVE, INTELLIGENCE-LED POLICING, which means information gathered from surveillance devices in your home and vehicle, from emails, phone calls, bank accounts, and online activity, allows (FBI & DHS) FUSION CENTERS* to direct GLOBAL LAW ENFORCEMENT GOALS, which means no expenses for trials, just harass and kill whoever you want, including the “REGULATION OF NON-CRIMINAL CONDUCT,” which means punishment with directed energy and acoustic weapons, and the PROVISION OF SERVICES, neighborhood watch gangstalkers called COHORTS or WATCHERS. The state is deciding who the “undesirables” are- literally who lives and who dies…. Stalkers think that this is funny.

The “TI Program” consists of:

1) SEPARATE (electronic warfare and information collection),
2) ISOLATE (break the psychological and physical links to support),
3) INFLUENCE (Radiate) Biometric data collection devices and mapping human environment and patterns of life, Tracking medical records, Biometrically enabled intelligence collection, Tattletale Phonelines for good little villagers, Civil Record Databases (no privacy), Rewards Programs (paying civilians to identify “insurgents”/targeted individuals), forensic intelligence collection (phone tapping, cameras in your home, GPS on your car, radiation devices installed in electrics in home) and document and media exploitation and more. The same tactics developed over the years to control other countries and cultures in wars overseas, especially, Afghanistan, Iraq, Pakistan, (Webmaster: and in the Vietnam War’s Phoenix Program) are being used against Americans with deadly precision.

Controlling another person’s mind is very much like slavery so acquiring someone’s brain-specific code for the purpose of harming them must be done in secret. One way to get electronically-induced sounds in your brain is for your government to give you a free, mobile ELECTROENCEPHALOGRAM (EEG), recording and stealing the unique signature of electrical activity of the neurons in your brain without your knowledge or consent. They use a meter made specially for this purpose or they may use an app for phones which record your unique frequencies by pointing the device at the back of your head. Many people believe that this is impossible but the perpetrators rely on disbelief and lack of public education to keep this technology a secret.

TIs are connected to a 4G LTE Wifi Network with a Body Sensor Network-Implants that can be operated remotely by cell phones. GPS and 4G LTE connects TIs to internet. Your Body Area Network reads: 1) your EEG (brain/evoked potentials) 2) your vital signs 3) senses including sight and sound 4) Pain/Pleasure 5) RFID chip IP and MAC addresses 6) GPS (Global Positioning Satellite) 7) your position (sitting or standing) 8) Medical records 9) personal and family information, 10) your Terrorist/Blacklist information…

Entire populations can be enslaved with this technology. Your thoughts can be read and messages can be put into your mind so that your thoughts and actions are not your own. You become a slave. The 2003 article entitled “Geoslavery” by Jerome Dobson and Peter Fisher.. defines “geoslavery” as “a practice in which one entity, the master, coercively or surreptitiously monitors and exerts control over the physical location of another individual, the slave”…. With the conversion of a once meaningful life into an existence of human slavery, the individual sense of self-identity in human beings is eroded by the hopelessness of an emerging virtual death camp environment.

TIs are being used as Human Experiments to inaugurate this program. This program of implants will be applied to the whole human race so they can be totally controlled, surveilled, tracked, tortured, harassed and electronically punished.”

pastedGraphic_1.png

Main Perpetrators of the Targeting Program According to Skizit Gesture

a) Jewish New World Order
b) neoconservatives (Jewish “intellectual movement”) who have controlled American policy since the 1980s.. for the benefit of Israel
c) police and the gangstalkers they employ
d) Community-Oriented Policing (COPS) program uses police, firemen, EVAC (EVOC?), veterans, and ordinary people to perform missions such as phone stalking, illegal surveillance, covert implants, radiation, and chemical poisoning of targeted individuals
e) NASA/Nazis
f) US Army’s “counterinsurgency warfare” and “non-kinetic warfare manuals
g) FBI & DHS FUSION CENTERS
h) Jewish University of Wisconsin professor, Herbert Goldstein
i) Jewish Attorney General, Janet Reno

7) Dr. X Keyscore “Dr. X Keyscore” holds Ph.D., M.A.S., M.A.. B.A. degrees, has a background in Security Studies and as a Mil/Intel-CI/CT Analyst, and is a Son of the American Revolution, Patriot, Whistle-blower, Global Nomad, and Deep State target.(See: FBI and NSA Outsource Soft-Kill Murder of Targeted Individuals and Watchlisted Individuals to Private Security Firms: The Privatization of Government-sponsored Cyber-stalking (Dr. X Keyscore) and “The Program” Is Domestic Terrorism Against And Torture Of “Political Targets:” 19 Videos and Summary Tweet By “Dr. X Keyscore”

….“The program” is the DHS and most likely DOD-funded extra-judicial, political targeting protocol coordinated, at least on the street level, through regional (FBI and DHS) threat-fusion centers

Regarding “The National Security Racketeering Network”… “the program” at its core is an extra-judicial, political targeting and elimination program. This is a soft-kill operation. The expected outcome is self-harm, financial disruption, social disruption (of “Targeted Individuals”). They want to get rid of you (the TI) via any means possible in a clandestine fashion and also have fun and generate revenue while doing it. This is a style of “parasitic crony capitalism” because Department of Justice, Department of Homeland Security, and possibly DOD, are farming out contracts on innocent Americans….. So it is both a political targeting operation as well as a revenue generation scheme that starts off within the deep state shadow government.

I’ve read that DOJ/DHS have contracts with corporate private prisons in which DOJ helps these prisons maintain a certain quota of prisoners. They’ve done the same thing with the private intelligence agencies which run the extra-judicial militias, or targeting crews, which DOJ refers to as “surveillance role players” or” live action role players.” (I.e., they guarantee delivery of “quotas” of “targeted individuals.”)

Who owns these private intelligence agencies? Retired federal law enforcement and intelligence personnel; FBI, NSA, DEA, JTTF, Homeland Security, ex-military officers…. there are over 1800 private intelligence agencies in the US that operate with zero oversight. This is a giant racketeering network…. probably the biggest, underground, black-market illegal business in the United States today.

Primary perpetrators of TI Program according to Dr. X Keyscore:

a) National Security Racketeering Network
b) Department of Justice
c) Department of Homeland Security
d) and possibly DOD
e) FBI/DHS Threat Fusion Centers
f) Deep State shadow government
g) private intelligence agencies comprised of retired federal law enforcement and intelligence personnel;
h) FBI
i) NSA
j) DEA
k) JTTF
l) ex-military officers….
m) over 1800 private intelligence agencies in the US that operate with zero oversight.
n) extra-judicial militias (targeting crews)

8) Juliane McKinney, former intelligence officer, author of MICROWAVE HARASSMENT AND MIND-CONTROL EXPERIMENTATION, 1994 (The McKinney Report) and targeted individual (TI):

Excerpts from McKinney Report:

“Reactivation of surveillance/harassment/mind-control operations in this country suggest that the KGB, as an institution, was never the real threat. A KGB “mentality,” which is underlying pragmatic contempt for civil liberties, appears, instead, to have been the driving force behind CIA’s MKULTRA, MHCHAOS and FBI’s COINTELPRO, and the (organized stalking-electronic harassment) operations now being reported to us.

PRELIMINARY FINDINGS

1. The technology exists for the types of harassment and experimentation reported to us (by many TIs).
2. About a dozen U.S. citizens have informed us of continuing experiments with effects which directed-energy weapons are designed to produce.
3. U.S. Government-sponsored research into the bioeffects of exposure to microwave radiation is extensive and continuing.
4. The U.S. Government has a past record of having engaged in mind-control experimentation; and various agencies of the Government have a record of circumventing legal restrictions upon their activities.
5. Neither Congress nor the courts appear willing to look closely into “black” intelligence and weapons procurement programs.
6. A number of U.S. Government agencies might have interest in testing directed-energy technologies on U.S. citizens under non-clinical/non-controlled circumstances — DoD, to test ranges and degrees of “non-lethality”; DoE, to explore “safety” limits; CIA, to test “mind-control” capabilities, and NSA, for technological refinement.

The individuals now in touch with the Project describe their circumstances as involving most, if not all, of the following overt forms of harassment:

1) Sudden, bizarrely-rude treatment, isolation and acts of harassment and vandalism by formerly-friendly neighbors.
2) Harassing telephone calls, which continue even after the targeted individual obtains new, unlisted telephone numbers.
3) Mail interception, theft and tampering.
4) Noise campaigns.
5) Entries into the individual’s residence, during late-night hours while he/she is sleeping, and/or during the day when the individual is elsewhere.
6) Rapidly deteriorating health, generally of a digestive nature.
7) Sleep disruption/deprivation
8) Vandalism of privately-owned vehicles.
9) Staged accidents.
10) Isolation of the individual from members of his/her family is virtually assured when highly focused forms of electronic harassment commence.
11) Progressive financial impoverishment, brought on by termination of the individual’s employment, and compounded by expenses associated with the harassment.

FAILURE OF “ESTABLISHMENT” SUPPORT SYSTEMS

Those individuals (TIs) who have tried to resolve their respective situations through resort to “establishment” channels have invariably encountered the following:

1) Apathy, indifference and/or professed helplessness on the part of members of Congress and state legislators.
2) Dismissal and/or attempted discrediting by psychiatrists who refuse to include the terms, “government harassment,” “mind-control experimentation” and “torture” in their vocabulary.
3) Lack of interest, courage and/or competency in legal circles.
4) Refusal and/or inability of local police to intervene.
5) Refusal of the FBI to intervene in any of the cases brought to our attention thus far.
6) Refusal or inability of the ACLU and Amnesty International to intervene.

RELATED COVERT METHODOLOGIES

The persons engaged in this harassment tend to become careless, possibly the result of arrogance born of an assumption that nobody can stop them. “Harassees” who have noted this carelessness have furnished us with the following insights into the covert side of these harassment activities.

1) Impersonation of military officers.
2) Use of concealment devices, and emitters detected to date.
3) Use of modified license plates and vehicle look-alikes.
4) Use of neighbors’ residences as bases of operation and training.
5) Use of informants/agents provocateurs, frequently members of the opposite sex.
6) Misuse of covert intelligence personnel (possible former case officers).
7) Use of psychotropic drugs by cooperative physicians.
8) Use of medical implant devices.

The individual’s “handlers” allegedly have also stated that their experiments on U.S. citizens are in pursuit of a variety of objectives; viz.,

(1) develop an effective means for creating a perfect, “robotized” soldier;
(2) alter individual sexual performances, such as by turning heterosexuals into homosexuals (they allegedly claim to be having “difficulties” reversing the process): and
(3) enhance and destroy levels of academic achievement, at will, such as by degrading the performance of otherwise brilliant students, and by drastically improving the performance of poor students.

HARASSMENT OBJECTIVES

In his book, “Psychiatry and the CIA: Victims of Mind Control,” Dr. Harvey Weinstein quotes the following passage from a book entitled, “A Battle for the Mind: A Physiology in Conversion and Brainwashing,” by William Sergeant (Greenwood Press, Westport, CT, 1957):

“By increasing the prolong stress in various ways, or inducing physical debilitation, a more thorough alteration of the person’s thinking process may be achieved. …If the stress or physical debilitation, or both, are carried one stage further, it may happen that patterns of thought and behavior, especially those of recent acquisition, become disrupted. New patterns can then be substituted, or suppressed patterns allowed to reassert themselves; or the subject might begin to think or act in ways precisely contradict his former ones.

“‘…If a complete sudden collapse can be produced by prolonging or intensifying emotional stress, the cortical slate may be wiped clean temporarily of its more recently implanted patterns of behavior, perhaps allowing others to be substituted more easily.’”

Dr. Weinstein then comments: “The parallel with [Dr. Ewen] Cameron’s theory of differential amnesia is striking, and the relationship to brainwashing is abundantly clear.”(11) Dr. Cameron, employed by McGill University’s Allan Memorial Institute in Montreal, Quebec, Canada, between 1943 and 1964, conducted brainwashing experiments upon select, non-volunteer psychiatric patients on behalf of the CIA. Dr. Weinstein’s father was one of Cameron’s victims.

The long-term objectives of these harassment and experimentation campaigns appear to be quite fundamental; viz.,

(1) induce a sense of perverted “loyalty” toward the very agencies engaged in the individual’s harassment, to confuse his or her priorities where the possibility of obtaining legal redress might be concerned;
(2) redirect the targeted individual’s feelings of hopelessness, anger and frustration toward racial and ethnic groups, and toward select, prominent political figures, to include the President of the United States; and
(3) force the individual to commit an act of violence, whether suicide or murder, under conditions which he can be plausibly denied by the government.

THE “STALKER” PHENOMENON

In recent weeks, considerable publicity has been given the trauma of the victim’s of “stalkers” (persons who obsessively surveil, harass and, in some cases, kill targeted individuals for assorted, unfathomable reasons). Movie stars that have been stalked recurrently make the news….”

Primary Perpetrators according to Juliane McKinney (1992):

a) US government
b) CIA
c) FBI
d) DOE (Dept. of Energy)
e) NSA
f) street stalkers

9) Kay Griggs, former wife of Marine Corps Col. George Griggs, historian, political insider, descendant of James Madison, and targeted individual:

From: Kay Griggs (Ex-Military Wife) Interviews: U.S. Military Is a Mind-Control Operation Run by Sexual Deviants (homo, bisexuals, pedophiles)

and: Full Kay Griggs 1998 interview: Kay Griggs: Satanism and Perversion in the US Military

The following is from 1998 and 2005 interviews of Ms. Kay Griggs. Ms. Griggs holds B.S. and M.A. degrees in history:

“My former husband of 11 years, Marine Corps Col. George Griggs, would get drunk and tell me everything.

My ex-husband was NATO intelligence wet operations/psychological operations guy.
George was the Chief of Staff for the
Marine Corps, for “Gray’s Boys,” the assassins, who were working with General Steiner, General Jim Joy, and General Chuck Krulak and they work in the Nelson Rockefeller group in the Republican Party. Actually, they were working both sides (Democrat and Republican) with people like Walt Rostow and …. They’re all… (presumably, Jews)

My husband was head of Special Operations. In Special Operations, all people are part of this “Firm.” Once they get (to be) Colonel, they get initiated—they get drunk, “dine in,” “shellback”, have anal sex, group sex.

If they are in Special Operations and they are Marines, they are all homosexuals. It’s kind of like the fast road to the top. (Navy) SEALS, etc. This is the norm. There were Israelis at these parties, intelligence people. Intelligence? There’s no intelligence there. There’s perversion. They’re all nudists. Makes it easier, you know.

My husband’s circle included Henry Kissinger, Crowe, General Alexander Haigh, Marine Corps and former National Security Advisor, Robert MacFarlane, Marine Lt. General, Victor Krulak. General Al Gray is the control guy….. (Generals) Al Gray and Jim Joy are the big guys…..”

There’s a group within the Marine Corps that has gone to Princeton and Annapolis, who are in the upper echelons of the Marine Corps. It has to do with which colleges they went to, the secret societies, eating clubs, etc. And their associations in Vietnam and their Sheik-Nato, Defense College in Rome experiences. They are very insecure.

This “brotherhood” that my husband was in feels they are totally above the law… they protect each other. And they are determined to destroy this country. It’s an international brotherhood and it is very much Freemasonic.

The people in charge of the men who were doing these (homosexual) things to my husband were Jewish people. Oppenheimer and those. The poor boys (recruited students at Princeton) didn’t hardly have time to go to class. They were under the Germans, the ones who have the “German disease,” homosexuality. I’m sure they did the same thing to John Nash, of “A Beautiful Mind.”

The Freemasons have a ladder and they are always climbing because they are very insecure. They give each other lots of medals. Rummy (Donald Rumsfeld) went to NATO when Nixon’s world was falling in – which saved him and protected him.

They are connected with the Joint Chiefs, NSA, and the White House. George told me that they wear different hats, and it doesn’t really matter which hat they wear. He had different passports with different names. I felt as though he might have even had a double. He was very insecure and robotic.

“Who’s behind all this? It’s Caspar Weinberger, Henry Kissinger, Nicholas Walt Whitman Rostow, Eugene Debs Rostow…. What’s going on here? These guys are not even born in America. They’re all Jews. They’re training mercenaries now to kill on an order. Not killing because people are breaking into their homes, not killing because they are bad. But just, we want to control this country. That’s what George told me. It’s political. The Marine Corps is the political arm of a group that wants to run everything. Control the drugs, sell the weapons… Keep the weapons and drug money flowing.

This “Brotherhood” is a very small group: George Griggs, Bob Edwards, Donald Rumsfeld, William Colby, George Schultz, Frank Carlucci, and Allen Dulles. Dulles I believe is the one responsible for bringing my husband, Carlucci and Rummy in. All of these were in Princeton’s Cap and Gown fraternity.

Princeton is/was the Mecca for Jewish/Zionist intelligence agents over here. All of the movie moguls started out in Princeton. The Psychological Operations crowd from the Nazis came to Princeton. And they spread out from there. This group includes Oppenheimer, (Albert Einstein) and others.

I began to connect dots… These are young men on scholarship, they don’t have parents, they’re poor, they have no careers, so they are really dependent on the political-military hoops and people to promote them. And Allen Dulles really pretty much oversaw their initial getting into political spheres of power.

When people go through initiations in the Masons, the shellbacks, the ceremonies that are really sort of gross…. They bond the boys. They’re drunk and it’s a memorable experience. It gave Leyman the courage to do what he did at Tailhook with all the Marines looking on. You know, it’s “we won’t tell.” Or if someone tells, they are disappeared, or neutralized, or ruined. So they’re afraid, but it’s also exciting. And they have affairs. They are doing homosexual/pedophilia/swinging and are all part of the group and nobody talks.

It’s a very small group that has been working together for a long time…. sort of like the Delta Team 1 in Italy, with a boss and so forth, and General Steiner was involved.

Interviewer Jeff Rense: But this group was preceded by another group and a group before that. This is nothing new.

Griggs. Yes, the (CIA Director, Allen) Dulles group. Paperclip was a huge operation. My grandfather Byrd was a high-level intelligence person during WWII, he was a doctor, he spoke German, he was a brilliant obstetrician. So I know a lot of what was going is on in Norfolk, Virginia, since WWI up through the 80’s. And I found out that the same thing goes on in other ports. And organized crime is totally involved in it, naturally.

There were German individuals, SS, who came into this country after World War II. I know because my grandfather was involved with that as a Naval intelligence officer/doctor during WWII. 100s of thousands came over. I knew George’s family were German. I realized what he was talking about was institutionalized. It is structural and vital to the system.

MAC-SOG. Is a code word for sending out platoons to kill people in Vietnam. SOG is Special Operations Group. If you know anything about the German high command, they are connected with the Opus Dei, they are kind of a business group that works within the Vatican.

Skull and Bones induction methods are now used in the Army. This goes back to the “German thing.” Not everyone does it. But the ones that do it are the “rising stars” and they get right to the top.

“It’s Training and Doctrine Command, it’s NATO, it’s SHAPE (Supreme Headquarters Allied Powers Europe), started by President Eisenhower (a Jew). It’s a totally independent corporation. Its main function is to sell weapons and launder money. It’s all being done by Army people who are now JOINT. The word JOINT is used to describe the people who came over illegally to escape Nazi Germany. They are cowards and bullies….

I know there’s a big Mason connection in the warfare-weapons selling group because the head Admiral in Norway is running the drug lord out of his prison. He is a friend of George’s. He has a house near where they have one of their underground bunkers. I know they are doing weapons shipments out of Norway.

Vietnam was really important because a lot of (mind control) experiments were done on boys who went over there.

JOINT mob-military partnership operations were conducted in Korea and Vietnam. At the highest levels of the Marine Corps and the Army in the Special Operations Forces, the individuals are all actually in the (Jewish) Brooklyn-New Jersey mob. My husband, General Al Gray, General Sheehan, Henry Kissinger, Caspar Weinberger… are part of a group of Zionists who came over from Germany. They do a lot of money laundering in the banks, cash transactions in the banks for the drugs they are bringing over. The military people are all involved once they retire. They go into drug and secondary weapons sales. It’s all about the “funny money.”

You see the organized crime, the Meyer Lansky, the Jewish Kabalist group (aka National Crime Syndicate), who don’t believe in God, believe they have to get rid of all the good people… and they get brownie points in their little cult for doing that. They really do this. They are killing good people on purpose… And all Jews are automatically in the Israeli military.”

(As a targeted individual, TI), “I was an operation. Sabotage her.”

Primary Perpetrators Identified by Kay Griggs, TI:

a) NATO intelligence and Marine Corps wet operations/psychological operations/Special Operations personnel who are homosexuals
b) Navy SEALS
c) Israeli intelligence (perversion) operatives
d) Freemasons, connected with:
e) Joint Chiefs of Staff
f) NSA
g) the White House
h) the “Brotherhood,” “Firm,” “Organization,” small group including George Griggs, Bob Edwards, Donald Rumsfeld, William Colby, George Schultz, Frank Carlucci, and Allen Dulles
i) Jewish (Brooklyn/New Jersey) mafia/Meyer Lansky National Crime Syndicate
j) Princeton University, where Nazi Psy-Ops people landed
k) Training and Doctrine Command
m) SHAPE (Supreme Headquarters Allied Powers Europe) started by President Eisenhower (Jewish) in the 1950s
n) JOINT mob-military partnership, Kabbalistic Jewish Zionists who came to America to escape Nazi Germany (including Col. George Griggs, Gen. Al Gray, General Sheehan, Henry Kissinger, Caspar Weinberger, Nicholas Walt Whitman Rostow, Eugene Debs Rostow, General Alexander Haigh, Marine Corps and former National Security Advisor, Robert MacFarlane, Marine Lt. General, Victor Krulak, General Jim Joy.)
o) 100s of thousands of Germans who came to America after World War II under the CIA’s Operation Paperclip
p) Col. George Griggs, General Steiner, General Jim Joy, and General Chuck Krulak who work in the Nelson Rockefeller group in the Republican Party

10) Camille Piona (TI); From Today’s COINTELPRO: The Deployment of Civilian-Military Information Operations Against Civilians (pdf by Camille Piona) W/ Relevant Laws Violated:

“Five components of CIA/military “information operations” comprise the protocol of the present gangstalking of millions of American whistleblowers, dissidents and other civilians. (These are) 1) PSYOPS (psychological operations), 2) MILDEC (military deception), 3) OPSEC (Operations Security), 4) CNO (Computer Network Operations), and 5 EW (electronic warfare).

pastedGraphic_2.png

(Regarding PSYOPS): Note the U.S. Army PSYOPS insignia above. PSYchological OPerationS accomplishes this by strategically conveying selected information about the targeted “enemy” to a target audience, to motivate the target audience to behave in a certain way toward the “enemy.” Of the three different types of PSYOPS—white, gray, and black—black operations are the ones being perpetrated on the targeted civilians deemed “enemies of the state,” the aim of which is to break up every relationship by getting everyone to fear and despise the “enemy,” thus systematically isolating the victim and removing all support.

The “M.O.” used to accomplish this is the disclosure of “sensitive material” about the “enemy” that contains a “credible threat” attributed to a private party. Ostensibly, it is being disclosed to “warn” the target audience for their “protection.” In reality, the “sensitive disclosure” has been specifically crafted to foment disaffection, discontent, and opposition within the “enemy’s” own circles, deconditioning any previous experience of the “enemy” as a pleasant person of sound mind, and conditioning a new perception of the “enemy” as severely disturbed, repulsive and noxious. The target audience, having been made to fear and despise the “enemy,” is further persuaded to distance themselves from the “enemy.” The source and originator of the operation, the US government, must deny their involvement and be perceived as a disinterested, benevolent party merely passing on reports of danger obtained from private individuals.

Prior to the operation, the black operatives extensively profile and assess the attitudes and vulnerabilities of their target audience and tailor the most effective approach. The lies crafted prey upon the specific fears of each target audience, depending on what the operatives would determine these specific fears to be. In every case, the “enemy” is portrayed as mentally ill and “unstable,” and as vengeful and posing a serious threat toward the person whom they have ostensibly come by to “warn.” Another name of PSYOPs is MISO (Military Information Support Operations).

They accomplish their “PERSUADE, INFLUENCE, CHANGE” strategy by concocting vilifying lies and weaving them skillfully into real factual and biographical information, fabricating “evidence” by taking words and actions out of context using spliced together audio, video, and confidential documents, and accentuating any “sins” they’ve been able to dig up. It all gets edited together in a defamatory manner designed to be as damaging as possible, the finished product then being used to break up all of the victim’s relationships, toward the goal of isolating the victim and removing all support.

Black operatives are, by definition, professional liars- their job is to tailor lies to achieve a covert goal. Thus, to an employer, they might portray the victim as a thief. To a new boyfriend, they might portray the victim as a prostitute with untreated venereal disease. Around children, they might portray the victim as a pedophile. As you can can imagine, such tactics very effectively prompt the “targeted audience” to cast the victim out of their lives.

Two characterizations are always given—the targeted individual is portrayed as BOTH criminally-minded AND as having a history of serious mental illness. You can always tell a black operation by this dual portrayal along with “the need to disclose sensitive confidential information” about the targeted individual to all of his or her relationships.

The nefarious art paints a “credible” picture of extraordinary severity that can be made of anyone. It is then presented to the victim’s employer, landlord, doctor, lawyer, pastor, family members—everyone in the victim’s life—each getting a tailored “warning” of a “serious threat” that the victim poses to them. The target audience has their perception radically “changed” as a result of the diabolically skillful presentation. It achieves its covert aim: to get everyone in the victim’s life to fear and despise the victim—and to get everyone to cast the victim out of their lives.

This eventually renders the targeted individuals friendless, jobless, homeless, penniless, isolated and indigent— soon forgotten by the friends and family who have cast them out, and shunned everywhere they turn for help. Only then can the final phase begin: the targeted individuals are “disappeared” in the middle of the night—either executed in cold blood, or accused of a spectacular crime and taken captive to a prison or psychiatric hospital.

Wake up, Christians—“one taken, one left behind” is NOT about a “rapture.”

Primary Perpetrators according to Camille Piona:

a) CIA/military “information operations”
b) US Army PSYOPS aka MISO (Military Information Support Operations).

11) Jeffrey Madore, radio engineer and targeted individual (See: Jeffrey Madore (TI and Electronics Expert) Explains Organized Gangstalking “Human Research” Torture-Murder Program; 2015-17 Video Transcriptions and Comments and Jeffrey Madore (TI and Electronics Expert) Explains Organized Gangstalking “Human Research” Torture-Murder Program (2); 2019 Video Transcriptions and Comments). Because Jeffrey Madore, a radio engineer and was assaulted by V2K (synthetic telepathy) weapons, learned to directly communicate with his assaulters. He has unique insights into their highly bizarre operating tactics.

“I’ve been followed for over 30 years by General Dynamics here in southeastern Connecticut. They do this for NSA and the Department of Defense and they use subcontractors to get it accomplished. And this is done all across the nation. I have talked to so many different targeted people that experience just what I do. …

I talk to targeted people around the nation, I hear a lot of the same stories. Emergency psychiatric committals, chronic health problems, local police involvement, etc. Just people having their lives torn down in many different ways and given lots of different symptoms like anxiety, depression, pain, attacks to the heart, attacks to the genitals, attacks to the teeth, all kinds of attacks that I’ve experienced and experience regularly. So I feel like it’s safe to say that what I’m experiencing here other targeted people are experiencing where they are. And it’s the same government agencies, the Department of Defense, specifically the NSA, that is doing this, and defense contractors carry it out for them…

This technology, the equipment they are using on me, is manufactured by a company called Tetra Systems and the transducers that are used to follow me are a Model C-104. You point it at a person, it receives their brainwaves and it converts those into the visual and audible information, speech, etc., subconscious thought process. It’s just very invasive. And it can also be used to put subliminal suggestions on a person’s mind. It can alter mood, and all kinds of things.

I know the equipment that follows me produces a digital packet radio signal on 157.740 MHz. If I go up to East Hartford, where my targeted friend Mary lives, that frequency is being emitted from a number of homes near hers. When I go up to Massachusetts where my friend Kate lives, that same packet radio signal. And earlier this year in January, I went to Canada for seven weeks. I was followed, stalked, and attacked in a very painful and difficult way. What was there the whole time was that digital packet radio signal on 157.740 MHz.

As I talk to other victims, I see a picture. I think these are human research programs. They like a person that is resourceful and motivated. They like to take a person and knock them down and watch them get back up and they record that data. And they knock them down again and they watch them get back up and they record that data. Ultimately, they get to a point where that person’s life is so torn down that they don’t get back up. At that point, they start yielding little to no useful data. It’s my understanding at that point they are often driven into suicide so that they won’t unwind and normalize again and maybe be able to tell the story. They call this forced suiciding of targets “taking them down hard.”

I would like to see these weapons classified as weapons.

The people that I have accused of doing this are Electric Boat, Inc. (a subsidiary of General Dynamics, a global weapons manufacturers) and Sonles (a subsidiary of Electric Boat). I made a formal accusation last fall when I found out the FBI was involved and they were investigating. I spoke with the Chief of Police in the town of Gratton, who also informed me that it was indeed Electric Boat that is involved.

“I’ve been targeted by the DOD for over 30 years. And in the last 5 years, the FBI has gotten involved. I’ve engaged my stalkers considerably. You see, in 2011, they started talking to me through V2K, which is a method of communication where someone with a remote device can put audible information on a person’s central nervous system, they can hear it, and they can extract information. So it really creates a two-way conversation. I have been trying to understand what these people are all about. What are their priorities in life.

I’ve assembled a list of 6 priorities that they have. I am really done engaging them. I don’t want to anyone. I’ve watched the process being used to take FBI personnel and make them stalkers, to give them their priorities, to give them the sadistic needs that I see in my stalkers.

The 6 priorities that they have are:

1) “Hurt him.” Those that stalk me, typically are single and have no family… their highest priority in life is “hurt him.” Their highest satisfaction is gained by hurting me. They are given an incredible positive reinforcement for hurting me. I’ve heard it said that just remembering hurting me gives them a rush.

2) “Worship him.” The people that stalk will often get together and I’ve heard them talking about me. Kind of building me up as if I’m really special. They want to follow me everywhere. They want to be involved in all aspects of my life. It appears when they are groomed for this… maybe what they used to care about, they don’t care about that any more. They don’t care about family, career, what’s really important is me. They talk like they are really depressed. If I go camping, they follow me, and they sit there in my car to watch me camping. and I hear them say, “I would never do that.” They sound very depressed toward all other areas except me. They remember every single thing about me. When I’m asleep, they are together discussing me. And when they brag to each other, they show each that they followed me longer. It’s hard to believe they are grown men. But they are. They act incredibly jealous. If I notice an attractive woman, they are yelling at me. They are upset with me. It happens consistently.

3) “Sexually assault him.” They have to be involved in perpetual sexual offense. It is part of their violence toward me. While they are being groomed for the position, the men are having sex with each other. It’s motivated by the electronics. It’s not about a relationship with each other, it’s more of an assault. That’s how it sounds. It’s really them assaulting one another and fantasizing about me. Toward that end, with the electronics, they to have attack my genitals all day long. So this compromises my testosterone. And I get osteoporosis. For a while I was breaking ribs and toes.

4) “Hurt one another.” (“Raise hell”) If one of them is upset over something, their workmate would be beaming and happy. These FBI agents are running interference between the DOD people, the NSA people, and law enforcement. (They are keeping law enforcement back). The transducer produces a microwave signal that couples up to the targets central nervous system. I could take the power of that transducer very high. I could drive it so high that anyone else in the vehicle that’s following me get burned. I’ve heard that some people have lost their eyesight because of this.

In 2017, Soundlist, who works for General Dynamics, were supplying people to help out. The FBI is kind of up front. I still believe NSA people are controlling things. And the Soundlist people were in a vehicle with that transducer and they would be following me. The FBI would use subliminals and V2K would talk the Soundlist people in very close behind me where they got burned all over on their bodies. Some lost their eyesight or got extreme eye damage. The FBI love hurting people. The eye damage that comes from microwave exposure, happens slowly over time. The FBI used the opportunity to hurt each other. Meanwhile, I was telling them to back off because they would get hurt. The mind control is very, very strong.

The next day, they’d get 2 new people from Soundlist to follow me. This went on day after day. Finally, I called the President of Soundlist, Andrew Torielle, and I accused them of having people following me and renting houses on my street so the FBI could use them. And immediately they pulled all their people out. But the agents were so excited about hurting people. They needed to hurt people and hurt me. It’s a psychological need that they have. And the more they enforce it the more sadistic they become.

Now, I call this one: “Raise hell.” Anywhere they can cause trouble they do. The result is that they don’t function as a team. It seems they are groomed to be a lone wolf. They get divorced. Following me is all they want to do. They just want to keep attacking me.

5) “Perpetuate this.” There can’t come an end to them stalking me. They can’t allow it. They knew where I was going. I was going home. I was less than 10 minutes from my home. They are set up there. They panicked. They are willing to put their careers, their health, their life on their line to perpetuate this.

6) “Simulate work.” This is really about perpetuation. They have to be looking like they are investigating something. So they have to call it an investigation. They have to make it look like their work. The way that they perpetuate is to continually simulate work.

The first four are more unique to DOD following me. Maybe the last two are more applicable to FBI. They seem to be driven by intense fear. Re: #1, they are scared that I’m having fun. If I just think, that I feel better or happier today (because they send constant emotional pain), they react by turning up the pain. They are scared of my pleasure.

If I do anything to relieve my pain, that scares them. They have to respond by giving me more. This is a powerful fear in them. Priority 2, they will put themselves at considerable risk to prevent losing me. They are afraid that if I lose the influence of that signal that I’ll feel better. Priority 3, they fear my sexual pleasure. Even glancing at an attractive woman upsets them. Their jealousy is the fear of losing the beloved.

The process that I’ve seen them put through… some are family men. If I’m reading the scriptures, some might know the scriptures, but that’s in the past. Everything is a black hole for them. The only bright spot for them is to hurt me, worship me, raise hell, this all helps them become lone wolf. They are groomed like a suicide gunman.

I tend to think that the DOD does not want these people unwinding. Because what has been done to them is pretty extreme and I believe it’s permanent. And when they hurt me, they are rewarded for it.

This equipment can cause incredible pain and it can cause incredible rewards, often sexual climaxes and all-over really good feeling. They will often, sometimes more than once a day, attack my colon, and I have to run to the bathroom. They all want to be part of that. They are sitting at a monitor at their display and attacking my colon, focusing on my rectum, and they are given sexual climaxes while they are doing it. I’ve listened to the whole thing. And they want to do it every day. This is the grooming process. So they are given a lot of positive reinforcement when they are hurting me. The things that we enjoy we want to do again. Very much like a sex offender. We label them predators. The men that do this have gotten an awful lot of positive reinforcement for hurting me. They are like a gang of bullies. They can’t get enough. It’s truly an addiction to violence, a sex addiction. Like any addiction, enough is never enough.

These men are groomed, mind controlled, and I believe it’s permanent. These are dangerous men to anyone. I would advocate for locking these people up and maybe studying them to determine what has happened to them.

I took in another targeted individual in my home for a while. They groomed her to attempt my murder. We need to study this and try understand what was done there. A lot of violent crime is being driven by this technology by the Dept. of Defense. Why are they manufacturing dangerous humans and why are they attacking us? There seem to be an awful lot of targeted people out there.

In recent weeks, I was staying with a friend who was targeted in East Hartford. And the FBI was following me and they said I went outside with a directional antenna and my transceiver tuned into 157.740 MHz and I picked up a digital packet signal coming from their equipment. And the signal was coming from all directions. And this is the Dept. of Defense. Why are they attacking us from within? And with the FBI up front doing the work, making these people dangerous and sending them out into society. They are taught that hurting people will make them feel good. I’ve listened to them do this to a lot of people. I think this is a public mental health emergency. Because these people are not just mentally ill, they are violently mentally ill. And they have been driven to this by electronics.”

II. Murder in the Hospital Feb 1, 2019

In this video I discuss murder and attempted murder of targeted people by sadistic agents of the FBI. In doing so, I’m attempting to prevent another tragedy.

Primary Perpetrators according to Jeffery Madore:

a) NSA
b) Department of Defense
c) DOD subcontractors, General Dynamics and their subsidiaries, Electric Boat and Sonles (Soundlist?)
d) FBI
e) FBI personnel who include groomed, mind controlled stalkers who are predators electronically addicted to violence, a sex addiction
f) local police
g) Tetra Systems
h) Andrew Torielle, President of Soundlist (subsidiary of Electric Boat and General Dynamics, Inc.)

12) Catherine Austin Fitts, former Assistant Director of HUD, political insider, TI for 12 years, and CEO of the Solari Report; From: Organized Stalking/Mind Control & “Covert Social Credit System” Are “Risk Management” In “Secret Global Government’s” “Control Grid” & Coup Against Humanity: Catherine Austin Fitts, 3 Interviews (Brilliant)- 1/28 and 2/13/22– 1/28 and 2/13/22 and Catherine Austin Fitts on “The Great Poisoning, Vaccines, Opioids, and Her Own Targeting as “Enemy of the State” (3/13/22):

… “If you’ve ever studied the “targeted individuals,” they (the banking elite) are installing what they need (in someone’s mind and body) so that if somebody doesn’t behave, they can make them sick or kill them. We are there now.

… What we are experiencing is a coup. The current secret, central governance system is harvesting this planet for enormous amounts of resources. The Central Banking/Warfare System controls everything through people, one by one, person by person… Unbeknown to most of us, we have a Covert Social Credit System with three primary lines of control: 1) financial carrots and sticks, 2) surveillance and mind control, 3) covert ops, including covert physical intervention. The control system is phenomenally wasteful. They have AI and software. The more money the taxpayer pays for this system to operate, the more money “Mr. Global” makes. So there is no amount of money “they” won’t spend on the control grid…..

Since the mid 1990’s, we’re looking at a long-term poisoning (of the population). The Covid-19 injections have poisoned millions of people. During my litigation (against the government), I was poisoned eight times. This is a much, more common, covert tactic than I ever realized.

We’re talking about a global network of infrastructure where if somebody is not doing what they’re told, they can be literally poisoned. When this “enemy of the state” thing started for me it was just wild; people are breaking into your house, they are leaving dead rats on the doorstep, you are being followed in the car and when you are walking, they are approaching and threatening your family. It’s wild, just like the movie “Enemy of the State.”

I tried to hire three different private intelligence companies to help me with security. And they would say, no, it’s too dangerous. (But one of them, a biological warfare expert, did tell me that) they are going to drill holes in my walls and introduce biological warfare and so I should buy some birds (to use as “canaries in the coal mine”). Then a process started where I would literally have a flu or cold all the time. Whenever it started to get better, bam, it started again. It felt very junky and synthetic. It didn’t feel natural. Then I noticed that holes had been drilled in the wall and the birds were dying. So I sold my house and moved.

I thought it would be so much cheaper to just kill me. I estimated by the time it was over that they spent $45 million torturing me and trying to make me weak or fail. I finally realized it’s a HUGE business. Taxpayers pay for people to be surveilled, harassed, litigated against, and they can make a lot more money keeping me alive than just killing me.

They needed me to look like I failed. So weakening somebody is infinitely better than killing them. I think a lot of this biological warfare, including low-grade biological warfare and the non-lethal weaponry… all of this stuff is designed to target and weaken your enemy but not kill your enemy… This system pre-dates the signing of the U.S. Constitutional Convention (1787).”

Primary Perpetrators according to Catherine Austin Fitts:

a) secret, central governance/Central Banking/Warfare System/“Mr. Global”
b) Covert Social Credit System has three primary lines of control: 1) financial carrots and sticks, 2) surveillance and mind control, 3) covert ops, including covert physical intervention
c) taxpayers pay for all this

13) Stephen O’Keefe, Canadian artist and targeted individual (TI): (See: ‘Mafia States’ Targeting Innocent Civilians; 1) “Deceive and Hide- Jewish Mob Stalking Culture”; 2) “TI” As Lone-Wolf Terrorists;” Op Catalyst Youtubes and text):

“This video profiles the surveillance proficiencies of jews, and their Nation of Israel, as Shin Bet, Mossad and their sayanim (helpers)- who profiled, mob stalked and ruined my personal and professional life- and have declared themselves “deceivers in hiding.”

Governments which target persons in the way that they have targeted me are Mafia States. Meaning the government operates in secret as a highly-evolved mafia. The way a mafia targets others is by surrounding targets mostly with others connected to, or owned by, the mafia state. Informants, government employees, snitches, lackeys…. and the reason for this is because you are of more value to the government than you are a physical threat.

I was targeted at a young age because of my artistic skills, observational skills and computer programming knowledge for what the Canadian and American governments have been testing on me, which is a highly sophisticated wireless surveillance and unbelievably advanced military and intelligence technology.

It goes under various names. I call it virtual telepathy or VT. It’s called “Remote Neural Monitoring and Prompting,” “brain re-patterning,” and “EEG fingerprinting.” Basically, it’s a way to wirelessly monitor anybody, using the body’s biometric displacement field and also computer-interfacing the target’s brain patterns. This transforms a target- that is, a responsive target- into a test subject for a super spy, soldier, and super policing program.

With so many jews involved with methods of deep psychological torment directed at me for so many years, it is impossible that these methods are not culturally jewish, known by all jews above a certain age….

This culturally jewish method of profiling and stalking someone to ruin would have existed before technology made it easy, perhaps explaining why jews have been exiled from so many lands.

The benefits to shadow governments are endless; spy operations, police stings, drug dealing, money laundering drops and black operation terror events where an asset or target are surrounded by nothing but layers of backup in a pre-scripted crowd simulation….

What gave away the core of this mob stalking method as culturally jewish was that Israelis always positioned themselves in the lead to appear as a victim, with their terrain cues consistently ordinary, per Mossad and Shin Bet’s mottos of deception and concealment as a strategy.

Original Mossad slogan: “By deception thou shalt do war.”/”Deceit is essential in warfare”
Shin Bet slogan: “Defender that shall not be seen”

Jewish mob stalking works like this: jews pass your photo and details around by mobile phone and conspicuously stalk you wherever you go. Once you start discussing it, or taking their photos, they complain to authorities that you’re insane and obsessed with jews, a Nazi, white supremacist or potential terrorist and that you must be watched very closely, and that jews will help.

“Helping” means setting you up for ruination which benefits the police state which protects Israeli interests- and that’s usually a white supremacist rally, violent outburst or terror event- where the mob stalking victim is absorbed into the jewish profiling.

The culturally jewish methods of deception and concealment are mafia tactics, as evidence by the similarity in criminal activities between the American jewish mafia and the Israeli mafia; the embedded Nation of Israel and Israel proper:

Jewish-American mafia criminal activities: Narcotics trafficking, racketeering, gambling, loan sharking, bookmaking, contract killing, diamond trafficking, extortion, weapons trafficking, fraud, prostitution & money laundering.

Israeli mafia criminal activities: Drug trafficking, diamond trafficking, racketeering, loan sharking, robbery, extortion, money laundering, highjacking, gambling, prostitution, bookmaking, weapons trafficking and human trafficking.”

So CSIS (Canadian Security Intelligence Service), the RCMP (Royal Canadian Mounted Police), the Toronto Police Service and the Nation of Israel embedded within Canada expanded my targeting to develop a GPS terrain surveillance and cueing system. This involves portable biometric gear in backpacks, duffle bags and luggage totes which redundantly biometrically position you amongst plain clothed police, spies and their assets and targets; fed to and through satellite GPS.

It’s designed to move the target into a scripted surveillance sequence where anything can happen to them, like a mock collision to take them out while appearing accidental, with all immediate witnesses in on the black operation.

If the target has been conditioned to EEG remote influencing, as I was, they can be led along a pre-scripted surveillance path like a marionette; directed, misdirected and delayed as needed using GPS-positioned cues and resists. The cueing system covertly developed around me uses any object or mark on the terrain, other people in the biometric field or even GPS-located aircraft in the sky.

Domestic terror black operations send government officials, police, intelligence and the military to Israel for counter-terrorism training. There, they can be covertly EEG-fingerprinted and their unique biometric signatures cultivated by Israeli intelligence.

Beyond detecting the International locations of plain clothed intelligence and police for Israeli-jewish operations using GPS cueing systems, important decision makers can be covertly mob stalked by jews for life- yielding unlimited political blackmail.

As jewish deception and hiding are further finessed to fabricated domestic terror patsies and the events to go with them, more persons seek Israel for the best counter-terrorism training… Jewish stalkers were so intent on always appearing to be a victim in anything I recorded, they gave themselves away as my core predators despite so many government agencies serving as their camouflage.”

Primary Perpetrators according to Stephen O’Keefe:

a) jews (sayanim, Nation of Israel embedded within Canada)
b) Jewish-American mafia
c) CSIS (Canadian Security Intelligence Service)
d) RCMP (Royal Canadian Mounted Police),
e) Toronto Police Service

14) Bobby Fischer, American chess grandmaster, 11th World Chess Champion, often considered the greatest chess player ever, of Jewish parentage (and probable TI):

“My basic thesis is that the Jews are a criminal people, and the Jews completely control the United States, and the Jews are using the United States as a vehicle to take over the World.”

“There is no United States as people think of it. It’s just a puppet in the Jews’ hands. It’s a plaything for the Jews… The US government and American Jewry are virtually interchangeable…

Jews are intensely selfish, intolerant and antisocial. They are full of hate, greed, malice. Naturally, other people, i.e. the non-Jews, don’t like being bulldozed aside, robbed and murdered by the Jews, and will sooner or later resist. That is where the lies and deceit of the Jews come into place. No lie is too big for a Jew, no lie is too small… Jews live by lying, and die with coming in contact with the truth.”

“Almost everyone who has been around me turned out to be a secret agent working for the Jews, working for the CIA… The Jews have planted so many of their Jew agents and CIA rats all around me. So many people… girlfriends, lawyers, everybody almost, turned out to be working for the CIA and the Jews. Unbelievable but true.”

Primary Perpetrators according to Bobby Fischer:

a) Jews
b) Jew agents
c) CIA
d) US government
e) American Jewry

15) Charles C. Kartchner, realtor and Targeted Individual. (See: TI Statement: Charles C. Kartchner, TI since 2005/2006 (email messages to webmaster, 4/17/2019, 3/30/21):

“My targeting (at the frenzied level of TI) began while I was working at a VERY Jewish real estate office, Coldwell Banker in Orinda, CA as a new agent and father. Working alongside a highly-educated Jewish (ethnicity, not religion) elite from NYC whom was my new agent “mentor” at the time. He made extraordinarily NON-real estate agent comments to me when this shock-and-awe campaign began such as “nobody can survive in a constantly negative environment”, “what are you going to do Charlie?… stand on the corner and shoot them all?”, “the thing I love best about our relationship is that neither of us comes to the table with any ulterior motives”, “this is my favorite comic strip ever — I like breaking big rocks into little rocks” and “the government is slow but relentless”.

I have definitely observed that MANY of the participants appear to be of Jewish ethnicity (from their “unique” facial features). I sometimes feel like I’m stuck in the mini-series “V” (Visitors) from the 1980’s. Once you see them – they appear to be EVERYWHERE. My personal experience had the added “pleasure” of being swarmed by hispanics (Mexicans) for the first 10 years of targeting, likely to try and conceal the true puppet-masters and add to my state of confusion and shock. This was due to being “steered” to a buy our house in a VERY Mexican neighborhood during the red-hot Bay Area real estate market of 2004 where some of “life’s circumstances” created the perfect storm to run this operation on myself and my family.”

Primary Perpetrators Identified by Charles C. Kartchner, TI:

a) VERY Jewish realtors at Coldwell Bank in Orina, CA
b) many Jewish gangstalkers
c) Jewish agent “mentor”
d) Mexican gangstalkers

16) Ryan Mitchell, See: Diary Of A Modern Day Slave CHS In America and DIARY OF A MODERN DAY SLAVE IN THE UNITED states OF AMERICA

COGNITIVE INVESTIGATIVE SERVICES PRESENTS Diaries OF A MODERN DAY SLAVE IN THE UNITED states OF AMERICA.

“Mind control PSY OPS Weapons program is utilizing DNA bio-sequenced resonance to individualize targets with frequency weapons. They torment, torture, condition, control, enslave, experiment, brainwash, coverup, kill and systematically drain us of all we are and love. From the beginning all I wanted was justice, my life back and to enjoy happiness with the love of my life. That ending is unlikely at this juncture. Over the past 30 years of U.S. government has unleashed a plague of non consensual violence upon humanity.

My name is Ryan Michell and this is my story. I’m A NON VOLUNTARY SLAVE C H S also known as a CONFIDENTIAL HUMAN SOURCE FOR THE U.S. GOVERNMENT. Specifically this obduction is used for gain of function research, intelligence, brain washing innocents into Manchurian candidate (assassins), theft of intellectual property and soul snaring. This is the grand design of the CIA, DARPA and U.S. Military operating secret HUMINT (Human Intelligence) PROGRAM. I can not escape the entrapment of this nightmare. I can not hide from the intrusion, find refuge from the pain or unplug from this decimation of my self. I am forced to compel and perform for these U.S. government operators against my free will on a daily basis.

In America I’m forced to defend myself against an invisible infiltration of my body, mind and soul with little defense against teams my own countrymen which have turned against we the people. I have no formal AGREEMENT, I’ve never consented to participate, I’m violated and assaulted by this invasion. I’m not compensated, only destroyed. I’m being erased and programmed a little more each and every day. I’m being forced to be part of a collective mind while they copy my neural signature and synapsis to others I do not know and erase their criminal acts against my will and choice.

There is no personal benefit for me or incentive beyond a reduction in daily pain, torture, torment or grooming tactics for myself, my significant other and my family. These U.S. Government R O D’s (Retired On Duty) and operators are attempting to frame me, steal my knowledge and abilities and turn me into a vegetable so I can no longer articulate what has happened to me and victims like myself. The only description I can offer is that of a slave servant to the U.S. government benefiting the few at the expense of the freedom of the masses. I am under constant intimidation, threat of retribution and malicious prosecution for doing nothing wrong personally. The R O D’s assigned to my neural signature constantly try to make me into something I am not.

I’m told to turn myself into authorities for crimes I have not committed. They accuse us of being everything from a murderer, to a rapist, to a fraudster and criminal mastermind to brainwash us and weigh on our vanity and guilt, to convince of things we are not but I’m merely a simple man. I’ve been told I’m the one, conduit, assisting the cartel amongst many other things.

The U.S. government is not legally entitled to inflict this cruel and unusual punishment upon me or the tens of millions of additional victims worldwide. They are attempting to cover up all I know, everything I’ve seen and that has happened to me and my significant other over the course of us being attacked, their intent and what is coming. These government operatives act against me with extreme prejudice, with extreme cruelty and undeniable malice remotely from U.S. communication centers. Deploying a weaponized form of remote neural monitoring known in war as voice of god integrated with some of the most advance technology known. The mind itself is much easier to highjack than people believe and our government does it all the time and very well.

They utilize our DNA to facilitate bio coded directed energy munition, nanotech along with psychological warfare upon Targeted Victims which are civilians. These weapons will be our undoing and will be the end of democratic civilization as we know it. My DNA is being used as an antenna for inbound and pass through communications along with nanotech that spreads all over our bodies resembling a translucent gel droplet and patch. Scalar waves also referred to as ELF or extremely low frequency waves are transmitted across the nation from a Scalar repository station in Michigan for which it is either distributed directly or transferred and redistributed to allow for cochlear heterodyning communications by frequency modulation, visual induction by amplitude modulation, emotional and mental state modifications, DNA disruption and harvesting of phonons which upon removal weaken the targeted victims wholistically and upon transplant benefits only the neural network output host to regenerate their telomers as believed and thought to be the fountain of youth.

HAARP’s three phase over the horizon radar is the distribution method used for ELF and scalar waves directionally worldwide refracting signals off the ionosphere to target a specific individual who is also a DNA bio resonance directed energy victim. RNM or remote neural monitoring keys on my neural signature much like a finger print and is used in these cases as the receiver to monitor, manipulate and modify the victims vitals, emotions, mental state, thought process and motor functions by satellite or remote means inducing electro magnetic for communications, environmental manipulation, electronic disturbance and bio field modification while infrared radiation is used to over excite the victims cells until literally exhausted. A plasma bio mesh laser implant is literally drilled into your head and acts also as an antenna directly into each brain portion.This nano mesh is used in the equivalent of a microchip implant on the skin or within the brain itself. They are self seeking in nature upon delivery to the bio coded victim and can be ingested or find their way into the targets the body.

This mesh can be toxic causing organ failure, cancers, blockages and variety of health problems including technical induced hallucinations of apprehension like ghosts, ancestors, aliens, friends, family, law enforcement etc. Which is used to stimulate, confuse, disorientate and disassociate the victim from their reality while they extract memory, information and change the victims perspective after separating their hemispheres. This nanotech assists in visual effects like floating holograms or projections with the a micro touch, texture and temperature additive that can literally explode, electrocute and burn victims. There are two kinds of nanotech used in this weapons operations.

The first resembled a plasma droplet, that feels like water droplet condensed upon the skin and the second is a mesh strip with a glucose circuit board as a patch at the right corner believed to work in conjunction. The integrated plasma, glucose nanites assist in the holograms, transceiver of messaging and control of motor function and neural stimulation much like a wireless transcranial magnetic stimulator or tms. These nanites are presumed to be specifically coded to your dna as they are attracted to the target victim. Images are projected through your occipital lobe upon being beamed in forming the image on the back of your eyelids or hand or upon the ground, wall or floating with assistance of the nanotech. it also works in cognition with the nanites to enhance the experience or deplete the victims ability to concentrate or complete relatively simple tasks.

Levitation of said holograms are achieved with kinetic energy applied collected through your skin and redistributed to enhance to 2D reality that is imperceivable to others unless they are coded to your neural network in the E B L cluster the government has entrapped you in. This nanotech is used as the delivery system for chs non consensual human capital extraction and victims are daisy chained together like slaves. This literally drains the victims of everything they have and including data, energy, cognitive ability, phonon extraction, intellectual property, neural synapsis duplication, extra sensory ability or when your brain has been segmented into pieces and delegated to government R O D’s that control of their bodies and minds. I’ve grown to know the only purpose of this weapon is complete and utter control of the victim benefiting the government slave holder not the victim themselves.

By enslavement of each victim and draining every asset they possess, confusing them to believe a farcical scenario to end them up in mental health services, spread their cerebral capacity over the elite then incapacitate them, use them as a capacitor and distribution source to force a community collective consciousness without consent, remove their neural intelligence, to control every aspect of their lives, disable them, use them as a conduit, utilize their extra sensory abilities, destroy them and complete the slow kill program. They then leave them with little trace evidence or general understanding without a degree in multiple engineering fields and the technology itself. This nanotech coupled with the U.S. comm center operators and induction of emf for both the physical electric shocks, hallucinations and another method of submitting the victim by means of physical torture to the will of the R O D’s utilizing the nanotech I have in my possession and throughout my body.

Every asset collected is stored by the U.S. government, CIA, DARPA and U.S. Military to be distributed to the self elected elite as the masses are systematically depleted and treated as peasant slaves in the former greatest nation in the world. This entire process depletes our natural human bio field bring together this complex neural weapon systems. This treats the victim as a cellular tower or satellite dish twenty four hours a day. This completes a complex communications system, loop and human modification biology neural weapon system designed to disorientate, disable, condition, isolate, groom and destroy the victim mentally, physically, emotionally and psychologically with little trace or attribution. The above all pertains to my personal situation as my neural synapses was mapped to include both hemispheres of my brain in which multiple teams of U.S. government operators work or R O D’s work in tandem with multiple weapons technologies to separate the my singularity, fracture my psyche create a blanket slate to impose their will upon me in attempt to alter my personality and make me someone I’m not to coverup the greatest systematic genocide in history by the U.S. government in conjunction with private industry.

This is done to control me, to silence my voice and the truths I offer victims worldwide, to distract and disorientate the me while they develop a coverup narrative as they have so many other victims over the past half century. I am forced via brain to brain interfaced linked without consent, permission or legal authority. I have also observed being communicated through referring to U.S. Patent 5889870 known also the ventriloquist effect, I am drained or yoked to cultivate human capital and inflict significant pain upon me, my person and life in general. I further observed the operators rewriting, manipulating and obscuring my neural signature file to suit their narrative.

This heinous scheme has destroyed my life along with so many lives without the assistance of my government as they are the imposers upon me. Multiple weapons systems are used to target, deplete, drain, destroy and kill U.S. Citizens everyday. Neural signatures are the essence of who we are and can dramatically change our lives for the worse when used without consent in pools and spread like livestock. This drastically reduces our countries natural ability as people only wish to live in peace and restrict us from reaching our full potential as a multitude of U.S. agencies treat us as less than human. The unelected royals of the united states are harvesting human resources, erasing violent crimes and dispensing out like commodities. We are being enslaved and some of us have lost just about everything for no reason beyond the greed of our nations leadership. Most victims like myself are input slaves of these neural networks are yoked with the only benefit to us being misery, pain and suffrage while the output end of the network enjoys our every benefit with impunity until true exposure and justice arrives as we are entitled by law. These human capital assets are used to train the military, to intel agencies, gather intelligence on the U.S. population and this information is spread across multiple agencies yet we are not employees, contractor or volunteers as we are non consenting slaves of a mad science experiment.

This technology is also used to transfer memory, consciousness and take over the free will of another human being which erases their former self. How any Government official or contractor would be allowed to destroy the lives of fellow Americans and allow them to be blamed for the issue is a tragedy beyond comprehension. R O D’s misrepresent and misconstrued every detail of a human target to destroy and coverup their treason. May god bless us by exposing these traitors and holding them accountable with capital punishment and death sentences for their evil nature. This is by far the most disturbing intrusion of my civil right and liberties I could ever conceive. I have no privacy, no peace or pursuit of happiness. This is the most devastating weapon of mass destruction ever unleashed upon man in world history. It removes every and deprives victims of every dignity imaginable.

The use of voice of god style DNA sequenced bio resonance neurological weapons upon U.S. citizens has directly and indirectly killed more Americans than all combined wars fought for our freedom over 50 years of existence and deployment upon our citizens.”

Primary Perps according to Ryan Mitchell:

a) US Government
b) CIA
c) U.S. military
d) DARPA
e) US government RODs (Retired On Duty)
f) government slave holders
g) multiple teams of U.S. government operators
h) HAARP facility (High Active Frequency Auroral Research Project)

17) Harlan Girard, veteran, businessman, TI:

“I estimate that the cost of imprisoning a human being in his/her own body and applying unremitting torture is $5 to $10 million a year.”

Harlan Girard, TI (See: I. Bio-electromagnetic Weapons: The Ultimate Weapon (Harlan Girard, 2007); II. A Current US Program of Involuntary Human Experimentation (2005)

Paper presented by Harian E. Girard, Phliadelphia, NATO Advanced Research Workshop on Coherent and Emergent Phenomena in Biomolecular Systems, The University of Arizona, January 15-1991

Abstract The United States has developed communications equipment which can make the blind see, the deaf hear and the lame walk. It can relieve the terminally ill of all pain, without the use of any drugs. A man might retain the use of all his faculties up until the day of his death.

This communications equipment depends on a new way of looking at the human brain and neuromuscular system, and gigahertz radiation pulsed at ultra-low frequencies.

Some of this equipment is now operational within the Central Intelligence Agency and the Federal Bureau of Investigation. It will never be used to make the blind see and the deaf hear and the lame walk because its use is central to the domestic political agenda and foreign policy of James A. Baker and George Herbert Walker Bush.

Domestically, the new communications equipment is being used to torture and murder persons who match profiles imagined to be able to screen a given population for terrorists, to torture and murder citizens who belong to organizations which promote peace and development in Central America, to torture and murder citizens who belong to organizations opposed to the deployment and use of nuclear weapons, and to create a race of slaves called Automatons or what is popularly called the Manchurian Candidate.

Overseas, experimentation is taking place on hostages held by the United States in Canada, Great Britain, Australia, Germany, Finland and France. In addition, there has been a long series of bizarre suicides among British computer scientists, all of whom had some connection to the United States Navy.

Considering how recklessly, wantonly and indiscriminately America’s new weapons have been used, physicians attending the dead and dying should consider the patients known political views and associations before making a diagnosis or conducting an autopsy.

INTRODUCTION

In 1988 the Office of Technology Assessment of the Congress of the United States published a special report titled. Criminal Justice: New Technologies and the Constitution. The report surveys the new technologies used in the investigation, apprehension, and confinement of criminals and addresses that delicate balance to be maintained between the national interest and individual rights.

As welcome as this report is to those of us who are interested in a government of law rather than of men, it manages to omit any discussion of the use of directed energy weapons from the section on less than lethal weapons. For instance, a weapon has been developed to paralyze a person at a distance, through a brick wall, if necessary. This weapon was developed during 1983-4 for use in situations where hostages are being held. A variation of this weapon has been purchased by the Marine Corps, for confusing and disorienting the enemy.

American weapons research has centered on pulsed radiation in the gigahertz frequency band for a very interesting reason. In 1972, the Department of the Army researched Soviet and other foreign literature sources and discovered over 500 studies devoted to the biological effects of SHF – super-high frequency electromagnetic oscillations. (1)

SHF may have potential use as a technique for altering human behavior. …Lethal and non-lethal aspects have been shown to exist. In certain non-lethal exposures, definite behavioral changes have occurred. There also appears to be a change in mammals, when exposed to SHF, in sensitivity to sound, light, and olfactory stimuli.

The significance of this intelligence document in terms of the medical experiments commissioned by the Central Intelligence Agency since 1976 is that emphasis in this report is placed on influencing individuals as opposed to groups.

Secondly, this report is a trend study and therefore contains statements predicting Soviet knowledge and capabilities for influencing human behavior up to fifteen years ahead, or 1987. It foreshadows the enormous effort put into behavior control experiments employing the use of masers and microwave beam weapons on involuntary human subjects during the Reagan-Bush regime.

Thirdly, despite the report’s title. Controlled Offensive Behavior – USSR. it opens with a chapter describing the use of torture on Catholic prisoners in British jails in Northern Ireland. The inclusion of this chapter at all, and its position at the front of the report, clearly is intended to suggest that it is permissible for the United States to torture its own citizens because these methods are being used by our very civilized cousins in Britain, and not only barbarians in the Soviet Union.

Fourthly, the report states that, The purpose of mind altering techniques is to create one or more of several different possible states in the conscious or unconscious area of the brain. The ultimate goal of controlled offensive behavior might well be the total submission of one’s will to some outside force.

After discussing some of the possible states short of complete submission which may be the goal of Soviet research in behavior control, the author states, Since the desired end product of this type of research is some change in the human mind, only the non-lethal aspects are discussed in this report. It should be remembered, however, that some techniques have lethal thresholds.

In the current round of American behavior control experiments, no allowance is made for lethal thresholds. The use of involuntary human subjects provided by the Central Intelligence Agency precludes the necessity for researchers to consider lethal thresholds and legal consequences.

A curious situation has emerged in which torturers and murderers attend our meetings, address us on the failings of our own research, and misdirect us with papers on the benign effects of incubating eggs in 60-herz magnetic fields, in order to buy time for their own well paid and frequently lethal experiments on involuntary human subjects.

Another document which will be of interest to those wishing background information concerning the technology of political control is The Search for the Manchurian Candidate: The CIA and Mind Control by John Marks. It was published in 1977 but has recently (1,1988) been reprinted by Dell Publishing, with an introduction by Thomas Powers.

Of special interest are the.chapters concerning experiments with electrodes in the brain, which were the true forerunner of current experimentation involving invading the human brain and nervous system with gigahertz frequency masers and microwave beam weapons.

Of particular interest in the light of current developments are two paragraphs in the very last chapter which concern a Boston-based CIA front organization, the Scientific Engineering Institute, which still exists, not so incidentally. The SEI was initially established to do research on radar! In the 1960’s the SEI added a wing devoted to life sciences, and hired a group of behavioral and medical scientists.

Marks reports, One veteran recalls a colleague joking, If you could find the natural radio frequency of a person’s sphincter, you could make him run out of the room real fast. Turning serious, the veteran states the technique was plausible and he notes that many of the crazy ideas bandied about at lunch developed into concrete projects. Just how concrete that proposal to find the natural radio frequency of the human anal (and penile) sphincter became, Marks had no way of knowing at the lime he wrote his book.

Lastly, I would like to cite another Defense Intelligence Agency report also prepared by the US Army. It is titled. Biological Effects of Electromagnetic Radiation (Radiowaves and Microwaves) Eurasian Communist Countries. It was published by the Defense Intelligence Agency in March, 1976.

The importance of this report rests not on its content, much of which seems to remain classified, but in its acknowledgement of a shift in focus, in less than four years from a wide range of behavior control interests to just one, electromagnetic radiation.

The date of this report is also significant; it was published just as George Herbert Walker Bush became Director of Central Intelligence. Experiments on involuntary human subjects were rapidly authorized by the new Director, but outside of the United States because of the wrath of Congress at that time.

An experiment was begun in Edmonton, Alberta. Canada, under the aegis of an American oil company with which the DCI was on friendly terms. It consisted initially of blasting a man’s brain with the microwave analog of sound waves for 2-3 hours a day. This has the effect of producing auditory hallucinations.

For an explanation of how audible voices are broadcast directly into the brain, see _Microwave Auditory Effects and Applications_, James C. Lin, Ph.D., Thomas Springfield, ll, 1978. For audible voices and their uses in intelligence operations also see _The Body Electric; Electromagnetism and the Foundation of Life_, Robert D. Becker, M.D. and Gary Selden, Morrow, N.Y., 1985, particularly pages 317 et seq.”

TECHNOLOGY & METHODS

A further discussion of events leading up the present series of mind control experiments will have to await another occasion, in favor of a discussion of the technology of which the United States is now possessed.

As I have already indicated, one of the principal features of the weapon system is its ability to produce auditory effects, or hallucinations. Using these effects to broadcast defeat into the minds of the enemy was a particular dream of Lt. Gen. Leonard Perroots, U.S.A.F. He hired droves of consultants to tell him how to use a microwave beam to implant ideas in the mind of the enemy, and to be perfectly fair, to urge on his own troops to superhuman deeds of valor.

One consultant I have spoken with advised Perroots that it is no more possible to implant ideas in the brain with microwaves than it is possible to implant ideas in a computer with microwaves. He pointed out the impossibility of knowing where any particular bit of information is stored.

The effect this had on Perroots was really quite predictable, considering the hubris of the man, and his access to unlimited amounts of money through the bloated, American defense budget. He kept on hiring consultants until he found one who promised him results, knowing that he, Perroots, would be long retired before anyone could safely say his fair- haired boy was a charlatan.

The smug complacency of the former consultant I spoke with was equally predictable. When I confronted him with the fact that medical atrocities are being committed on innocent human beings, he refused to discuss the subject with me until I could describe the process to him. Subsequently, I stumbled across Lin’s book on microwave auditory effects.

I called the former consultant back again, and again implored him to step forward and be counted. This time, confronted with the process being used, he told me that I had to explain to him the mechanism by which microwaves produce auditory effects! Changing tack, I told him that the mechanism is irrelevant; the process is being used on slave labor in efforts to create the Manchurian Candidate.

His reaction was just as predictable as Perroots’, given the isolation and arrogance of academia. He assured me that such experiments couldn’t be going on because HE had Forestalled that happening. HE had told Lt. Gen. Perroots that it couldn’t be done, so Perroots had gone out to fly a kite and forgotten about it.

Actually, that is what should have happened. Instead, Perroots turned to a man who promised him results. This man remembered the microwave analog audiograms used by Dr. Joseph Sharp to beam auditory hallucinations into his own head at the Walter Reed Army Institute of Research in 1973. He promised Perroots that he would talk a human being to death if he was furnished with the equipment Sharp had used at Walter Reed, a slave, and personal security.

This was the origin of the medical atrocities which begin in Edmonton, Alberta in 1976, under the protection of the Central Intelligence Agency, and continue to this day.

By the fall of 1983, experiments had produced some communications equipment which far exceeded the simple dream of broadcasting defeat into the minds of the enemy. It is not only capable of producing auditory hallucinations, but visual hallucinations as well. The visual hallucinations have been described to me by a German artist, on whom this equipment is being used involuntarily, as having the quality of 35mm color slides.

Besides these sensory hallucinations, the same equipment can be used to block all sensation. It is being used to distort and even completely block all senses. With it the ultimate in sensory deprivation experiments can be performed. There’s no peaking under the electromagnetic blindfold this equipment creates.

I should mention in this context, that the Central Intelligence Agency now has at its disposal the most evil, the most cunning torture devised by any government in all of human history. It is truly satanic in its moral and ethical implications. It is a torture which is commensurate with the degeneracy of a nation which is prepared and well on its way to polluting all life on earth into extinction.

The torture I am writing of I can only describe as thought deprivation. It is used in conjunction with sensory deprivation but it is in fact sensory deprivation times 10^(10).

We are all familiar with the sensation of being exposed to very loud noises. They are irritating, and we try to remove ourselves from them. We might say, It’s so noisy in here, I can’t hear myself think.

Human beings perceive thought as audible sound. It is something which we hear. We listen to ourselves think. This quality of listening to ourselves think, of hearing our own thoughts, can be extinguished by this device, so that it is not possible to hear oneself think.

I have no idea how this effect is produced. It may be accomplished by playing a signal into the auditory nerve at such a high power that it does in fact drown out the sound of all thought, but I do not believe that is how it is being done. I do not know enough about the physiology of the brain to explain how it might be done, but the Central Intelligence Agency can do it with the mind control technology at its disposal.

That is the bad news. The good news is that one continues to think even if one cannot hear oneself think. Do not panic. There is nothing to fear.

On the other hand, our thought process is what distinguishes man from other forms of life. Cogito ergo sum. But cogito is no longer necessarily possible. Where does this leave sum?

Furthermore, this communications equipment is able to produce pain, enormous amounts of pain. Pain is only another nerve signal, and pain is applied in great quantities in the torture regimen.

Sometimes the pain is specific and describable, more often it is general and indescribable. It is very much like being immersed in water, only it isn’t water it is pain The pain surges and laps at one. like water.

I have also described this pain as being very much like having an electric current passing through one’s body. It is like having one’s finger held in an electric socket and being unable to turn the current off. Except, this torture is used for years on end.

A skeptic might well ask why, if the United States has such equipment, it is being used to torture innocents and not Saddam Hussein. The answer is the cowardice factor.

It is quite one thing to torture innocents for a few hours a day, a few days a week, and then retire to a nearby hotel to soak your liver in beer served from frosty mugs. It is quite another to spend your afternoons and evenings in Baghdad, confined to a room commensurate with your cover story, because you don’t speak Arabic, wondering how soon you will be betrayed.

This is the cowardice factor. What good is it to earn big bucks if your life is put at risk? Paitriotism? Forget about it. Torturing a man through a cinder block wall is the ultimate act of cowardice. The mere invention is a reflection of the complete moral and physical corruption of American society.

But America is also an intellectually corrupt country. Once the Central Intelligence Agency had discovered the Fountain of Death, it didn’t know how to use it. The best idea they could come up with was to resurrect the protocols of the infamous Dr. Ewen Cameron, substituting the new technology for the low tech equipment he had employed.

Readers who are interested in the protocols of the deranged Dr. Cameron may consult John Marks’ book, cited earlier. There have recently been several books published on the subject of Cameron, as well. This new interest resulted from survivors of his medical atrocities suing the CIA for compensation.

Among the books recently published, I would recommend Journey Into Madness by Gordon Thomas. The American edition came out in May, 1990.

A skeptic might also ask how it is possible to apply the Cameron brainwashing technique, called depatterning, to an American citizen in the privacy of his own home. This is in fact the $64 dollar question, with no obvious answer to rational men and women.

Firstly, every effort is made to incarcerate the victim in a friendly hospital where his or her mind can be crushed at the leisure of the CIA- Failing this it is usually possible to at least get a false diagnosis from a corrupt physician that the victim has a potential psychiatric problem which may require institutionalization at some future date.

The effort to incarcerate the victim requires the cooperation of someone in the victim’s family or work environment. The Central Intelligence Agency uses the term authority figure to describe this player, because he or she is an authority on the victim, and will step forward at the appropriate moment and demand that the victim be incarcerated or agree with the physician that the victim should be incarnated.

Failing the presence of an authority, the victim may simply be kidnapped and placed in confinement, or the CIA may use unlawfu1 restraint to hold the victim in confinement temporarily. It’s not a pretty picture.

If all attempts at incarceration fail. or when the victim must be released, then the victim is tortured in the privacy of his own home- This is possible because the effects are produced by electromagnetic radiation, which passes freely through seemingly solid walls.

The brainwashing begins by picking victims who are isolated in the first place, preferably living alone, by soliciting the cooperation of the victim’s friends and acquaintances. In other societies these people wouldn’t be called friends, they would be called informers.

The Central Intelligence Agency then attempts to isolate the individual from people whom they plan to corrupt — the victim’s support network. This is done by making the victim difficult to be with. At the same time, every effort is made to make the victim suspicious of his friends and colleagues so he will avoid them of his own, free will.

To augment this process, members of the victims support network may simply be purchased to spread rumors concerning the victim, with the intention of further isolating him or her. This aspect of the process may be and is, carried to the extreme of simply murdering members of the victims support network.

The process of discrediting the victim, isolating the victim, is a continuous one, and isolating the victim from members of the opposite sex, particularly potential sex partners, is a central feature of this process.

This is the background. The foreground is the adaptation of the Cameron depatterning technique. The central feature of this is to use microwave auditory effects in place of the tapeplayer and headset which Cameron used in a part of the process called psychic driving.

The microwave auditory effects are used to humiliate and ridicule the victim, and to express the torturers contempt for the victim, which is also expressed through the application of copious amounts of pain.

Contempt is also expressed by breaking and entering the victim’s home and burglarizing it on a daily basis. The victim is allowed no privacy whatsoever. His every action is commented on disparagingly. This is accomplished by bugging the victim’s home with an array of devices, including video and sound sensors.

The quality of the bugging equipment available to the CIA today is beyond the imagination of the average man. These sensors have been miniaturized to the point where no visual inspection will every discover them. And they are sensitive beyond belief. The bugging devices themselves could be the subject of a separate paper.

CONCLUSION

The Manchurian Candidate 1990 is quite a different fellow than his 1956 counterpart. He is no longer an hypnotically preprogrammed assassin; his behavior is programmed and fed into a computer, which biomechanically drives him to his predetermined and destructive destiny, just like the cruise missiles manufactured by General Electric Aerospace.

When I pick up a copy of Biomedica1 Engineering I am struck by the fact that all of the research in it is unnecessary, duplicates research accomplished five to 15 years ago by the Central Intelligence Agency. The difference between our research and theirs is that scientists employed by the CIA work on involuntary human subjects, slaves if you will, furnished to them by their employer. They do not have to be concerned with lethal thresholds.

The process which the microwave weapon employs is described in a paper titled, The Electromagnetic Spectrum in Low-Intensity Conflict, by Cap. Paul E. Tyler, Medical Command, United States Navy. His paper, presented at least a year after the murder which leaves no traces had already been perfected, sets forth the conceptual basis from which the development of the microwave beam weaponry began. It is worth reading.

Captain Tyler’s paper was presented at a workshop conducted by Air University Center for Aerospace Doctrine, Research, and Education in March, 1984. His paper is included in a collection titled, Low-Intensity Conflict and Modern Technology, edited by Lt. Col. David J. Dean, United States Air Force, and published by Air University Press, Maxwell Air Force Base, Alabama in June, 1986. The book is available from the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402.

If there are skeptics among you, and I hope that there are, the benign results of the Central Intelligence Agency’s research can be seen on television nearly every night. Take a film clip of George Herbert Walker Bush at the end of the Malta summit with President Gorbachev and compare it with a film clip of George Bush campaigning for the Republican nomination in 1988. The pitch of his voice has been significantly lowered, he speaks in complete sentences and no longer in sentence fragments, and his gestures are appropriate to the oratorical point he is making rather than empty and fluttery gesticulations.

I have no problem with the CIA’s enhancing George Bush’s public image. After all, he is former Director of Central Intelligence, and authorized experiments on involuntary human subjects with maser and microwave beam weapons in February, 1976.

I have more trouble with the use of this equipment to neutralize Michael Dukakis’ campaign for President in 1988, by making his public image wooden and plodding.

I have even more trouble with the use of this equipment to bring Kitty Dukakis to the brink of suicide, in order to enhance the prospects of George Bush’s choice of political opponent in 1992 Jesse Jackson. Now that the Supreme Court has been neutralized as an instrument for social justice, neutralizing the Congress has become the Central Intelligence Agency’s principal objective. A Jackson nomination is most likely to divide and crush the Democratic Party.

Think about what I have written. Perhaps it will help to explain classified work which is going on in a laboratory near you. Perhaps it will even help to explain work which you have been asked to do.

What do you know about research aimed at the computer control of human beings through masers aimed at acupuncture points, or muscle groups?

What do you know about the torture and rape and murder of persons of both sexes using masers and microwave beam weapons designed to be used in combat training and simulation systems?

What do you know about a magnetic beam weapon, meant to temporarily disable any device employing an electric motor, or transistors, without permanently damaging it?

What do you know about the development of a tactile intelligence exploitation system designed to maintain control of political activists as they travel, anywhere in the world?

If you have such information, have a few words with me before the end of the Workshop, or speak out on this subject in a forum of your own choosing. The more who speak out, the less likely it is that any one of us will be victimized for what we say.

In any case, only the illusion of Constitutional government remains in the United States. Do not be afraid. The worst is yet to come.”

Primary Perpetrators according to Harlan Girard:

a) CIA
b) FBI
c) U.S. Air Force
d) US Navy
e) US Marine Corps
d) Defense Intelligence Agency (DIA)
e) James A. Baker
f) George Herbert Walker Bush, CIA Director and President
g) Lt. Gen. Leonard Perroots, U.S.A.F.
h) Canada
i) Great Britain
j) Australia
k) Germany
l) Finland
m) France
n) Reagan-Bush Regime
o) employers of targeted individuals “furnish them” to CIA/FBI targeting system
p) Boston-based CIA front organization, the Scientific Engineering Institute

18) Ted Gunderson, ex-high ranking FBI Section Chief, whistleblower, and TI. In: Former FBI Section Chief and TI, Ted Gunderson: ‘Targeted Individual Program’ Is ‘Satanic (Illuminati*), Illegal, US Government Rogue, Criminal Enterprise” (lecture video w/ my notes)

“I dared to challenge them and they sent an army after me…. The “New World Order boys,” I call them the “Junior High Boys.” They recruit them out of Special Forces (aka USSOCOM- US Special Operations Command)…. Gangstalking is a self-harm term for what is really a secret, government, no-touch torture, eugenics program.”

Primary Perpetrators according to Ted Gunderson:

a) New World Order boys (“Junior High Boys”)
b) Special Forces (aka USSOCOM- US Special Operations Command)
c) US government

19) Dr. Robert Duncan, CIA-DARPA neuroscientist, whistleblower, targeted individual, and author of “Project Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed” (2010). See: CIA/DoD Brain Scientists Explain U.S. Govt’s Secret, No-Touch Torture Experimentation-Murder-Genocide Of Innocent, Nonconsenting American and World Citizens (Targeted Individuals)

“Michael W. Wynne, 21st Secretary of the Air Force (2005-2008), said, “We have to use it (the Cognitive Warfare (CW)/psychotronic warfare/neuroweapons system) on our own citizens before we will use it on the battlefield.” That’s the way they think. He got fired for that comment… Every time the military gets a bigger budget, like after 9/11, you have more targets come on line, and they all have the same date when they came on line.”

(Webmaster comment: Michael W. Wynne was previously VP of General Dynamics and also former employee of Lockheed Martin. He was fired as Secretary of the Air Force by CIA-Director Robert Gates in 2008, which demonstrates the government pecking order on these crimes.)

… “The most profound crime a government can do to an individual is peer into their minds without consent. The intelligence agencies have become a virus, a cancer, on all of humanity. We have been trying to concentrate evil as humans understand it to create weaponry that attacks the information systems of the brain and body….

It’s making a weapons system. And that’s what we’ve always done. We have to be ahead of everybody else. And you have to remember how many times the CIA and the military have been caught experimenting on our own citizens. And they use to use the downtrodden, you know, the black community mostly. Inmates, anybody no one would care about. But it seems they’ve expanded this program to include people from all walks of life. Rich, poor, educated. And from every language. So it’s gone global. Because this is the ultimate weapon. Total totalitarian state. That you don’t even have control of your own mind and you believe your thoughts are your own. It’s better than subliminals, although they use those. But literally altering your brain states without your permission. A lot of it has to do with interrogation. The CIA claims torture works. No touch torture is a whole new category. You can be tortured in your own home. No one will believe you. This is torture, destruction of life, and destruction through misery.”

From: Dr. Robert Duncan, Video A: Voice of God Weapons Used on American Civilians- Targeted Individuals

“We have been trying to concentrate evil as humans understand it to create weaponry that attacks the information systems of the brain and body. I didn’t know what we were fully doing at the time I served. I regret what I did.”

Since the 2001 September 11 attacks and Bush’s so-called “war on terror,” there was a soar in the number of Targeted Individuals reporting covert assaults by black operatives, thugs, extremist cells, “stalkers.” Some TIs are reporting assaults with remotely applied, military grade, lethal weaponry. These reports have been from both overseas and U.S. self-identified targets. In early August, 2010, Sharon Weinberger explained the reason for the escalated reports:

“After the attacks of September 11, the Pentagon began a shift away from its Cold War-era “two war strategy,” premised on maintaining the ability to conduct two major military operations simultaneously, and began focusing instead on “irregular warfare against individuals and groups.”

Weinberger, S. 2010, “Black Ops: Secret Military Technology in the Age of Terrorism;” quoted in “Covert Technological Murder; Big Brother Approved” by Renee Pittman M. (2013)

And from: Dr. Robert Duncan on Cybernetic Warfare-Remote, Wireless, No-Touch Torture and Mind Control Technologies Used Against “Targeted Individuals” (3 youtubes and comments):

… “You can understand why this (program) is so top secret. The very concept of free will is destroyed. All of Western philosophy from crime and punishment to religion relies on this concept of free will. They can’t just announce it and say, oh by the way, we’ve been running torture experiments on people all around the world. There is a weapon system discussed in my book called SATAN, that stands for Silent Assassination Through Adaptive Networks….

(Here) You have a behavior modification tool-weapon. You can have dialed-in lethality simply by manipulating the humans themselves to hurt themselves. And it uses all the vast medical discoveries except in the negative…. This is the extreme example of the weaponization of the medical profession.

… This is the most important weapons system that the United States, and I assume that Russia and China, are developing. This is actually real ESP. This truly is the most sophisticated weapons system that humanity has ever created. It involves every aspect of science. It involves tactics that are unimaginable unless you just have a devious, criminal mind. And it destroys lives. It’s being used on innocent people. Remember in the Senate Report they said that 25% of the people they tortured happened to be innocent in the end. Every time the military gets a bigger budget, like after 9/11, you have more targets come on line, and they all have the same date when they came on line.

This is about brain hacking, mind hacking. I blame the CIA the most, but the military does it too. They were implanting people. Dr. Delgado bragged about how you could control all human behavior at 450 MHz. The technology has advanced very far. But I’m not a believer in the microchip theory. How do you read brain-waves from a distance. If you study MRI (magnetic resonance imaging). We are bathed in earth’s radiation. You can also use an Earth Gauss MRI. And there is (ESR) electronic spin resonance. It’s very complex.

What is the source of the energy? Gwen towers, satellites, and many others. There is no single source of the energy. They are testing the scalability of this weapons system. There was a famous military contractor, who did a famous psychic warfare activity… And he said “secrets began to slip.” Some secrets slip….. Under the exact right circumstances, you might be able to hear what they are thinking and smell what they are smelling. This is cloning.

A localized search for that particular target needs to be done. It would appear that initially, the person’s brain print, a particular energy signature, just like a thumbprint, needs to be collected before the long process of training the brain to listen to another brain or a computer. So a sensor system is required to record that person’s data. Over time, once the target’s energy signature signature is identified, then distance is irrelevant. Brain patterns correspond to particular thoughts. Imagine you have two neural networks and they are trying to learn each other. It learns with you. It’s also why these experiments are lifelong, generally, not always. They are trying to grasp all kinds of data… Can we make them kill each other to can we make them torture their cats? Create false correlation. This is called Offensive Information Warfare technology. It’s just like trying hack and crash a computer.

You are trying to crash that human being’s brain. You map all the motivations we have. They try to alter the target’s emotions. They are called emotional signature clusters. In terms of mind reading and brain reading, this takes it’s time. It takes a computer to do the transformation from one brain to another, that every word you say, and they have a set vocabulary and start testing the words out. Most people have a vocabulary of about 1000 to 5000 words. Once your vocabulary is mapped out, then they can put it automated mode, what are called chatterboxes, to keep the person talking in perpetuation to a machine thinking its a real human being. They do this to scale, automate a lot of the degradation and torture process, the breaking down of the will. And you need this to keep the lock on of the signal. If you break the signal, music can do this temporarily, but your brain always goes back to its natural patterns. So they got you.

We’ve re-wired the brain, so you actually have more inputs. But there’s a cost: you are taking away from your other senses. TIs will never be the same human beings again. Torture changes them forever. Their brains are fried. Under our government, there’s no such thing as torture (a lie). Through the trickery, they can make people harm themselves.

Once you understand how large of a sample set (of targeted individuals), how much human suffering they’ve allowed to put into developing this, the number of dollars, there’s no way they are going to give this up. This is here to stay. The people in control who are so seduced by its power would rather see the human race go away before this does.”

Primary Perpetrators according to Dr. Robert Duncan:

a) CIA
b) intelligence agencies
c) US Air Force
d) Michael W. Wynne, 21st Secretary of the Air Force (2005-2008)
e) President George W. Bush
f) Dept. of Defense (DoD)
g) DARPA (Defense Advanced Research Projects Agency)
h) black operatives, thugs, extremist cells, “stalkers.

20) Targeted Justice, Inc. (See targetedjustice.com and Targeted Justice’s $1.3 Billion lawsuit on Behalf of TIs (Targeted Individuals) against M. Garland (AG, DOJ), DHS, FBI, C. Wray (FBI Director), A. Mayorkas (Sec. DHS), C. Kable, Jr., (FBI TSC Director), K. Wainstein (DHS Sec. Intelligence and Analysis) w/ Bullet Point Summaries & Preliminary Injunction

A) Richard Lighthouse, Advisory Board Member of targetedjustice.com, ex-NASA engineer, TI: See: 
 THE HORRORS OF CONTRACT STALKING AND SATELLITE TORTURE – WHO ARE RESPONSIBLE? (Richard Lighthouse; targetedjustice.com- April, 2019)

“We have a great deal of evidence that suggests that the CIA’s domestic headquarters in Denver runs the entire (targeted individual-gangstalking) program and provides the funding for it. On the gangstalking side, they provide the funding through the black budget that feeds into the Director of National Intelligence (DNI) and that money and funding and programs make their way to the Terrorist Screening Center at the FBI and to the Department of Homeland Securitywhere the gangstalking operations are run. They also provide the billions of dollars that go into the sophisticated satellite systems that are operated out of Shriever Air Force Base. This is primarily a CIA program. On the political side, the Council of Foreign Relations (CFR.org). Their goal, unfortunately, is to get control of the United States and its population. It is closely related to the forming of the Federal Reserve in 1913 and the founding of the United Nations in 1945.”

According to Targeted Justice, Inc., the key people and groups leading the Targeted Individual program are:

1) David Rubenstein – CFR.org (Council On Foreign Relations)
2) Dick Cheney – USAP (Unacknowledged Special Access Programs; Black Projects), TI Program Director
3)David Cohen – CIA Operations (Central Intelligence Agency)
4) General John Raymond – US Space Force
5) Avril Haines – ODNI (Office of the Director of National Intelligence)
6) Merrick Garland – DOJ (Department of Justice)
7) General Scott Berrier – DIA (Defense Intelligence Agency)
8) Melissa Smislova – DHS Intelligence & Analysis (Department of Homeland Security)
9) Steve Vanech – NCTC (National Counterterrorism Center)
10) Jill Sanborn – FBI, National Security Branch (Federal Bureau of Investigation)
11) Charles Kable – FBI, Terrorist Screening Center (Federal Bureau of Investigation)
12) Stefanie Tompkins – DARPA (Defense Advanced Research Projects Agency)
13) Michael Lauer, MD – NIH Extramural Division (National Institutes of Health)
14) Mossad – Israeli Intelligence
15) Owners of the Federal Reserve

Targetedjustice.com diagrams

B) Ana Toledo, attorney for Targetedjustice.com, TI (See:

“On September 16, 2003, George W. Bush issued Homeland Security Presidential Directive 6 (HSPD-6), which was intended to collect information on individuals who “are or have been engaged in acts constituting, in preparation for, in support of, or associated with terrorism.” Based on this directive, a database was created that is still used by security agencies worldwide today: The Terrorist Screening Data Base (TSDB). Attorney Ana Toledo has filed a lawsuit on behalf of members of TargetedJustice, Inc., one of the largest Targeted Individuals groups in the world, challenging the use of this database. There is clear evidence that Targeted Individuals worldwide are listed in this database, even though the criteria specified in the Presidential Directive do not apply to them.”

Ana Toledo lawyer for TJ, in email to webmaster Friday, April 28, 2023:

Summary of the TJ lawsuit against Dept. of Justice (DOJ), Federal Bureau of Investigation (FBI), and Department of Homeland Security (DHS) re: Targeted Justice’s legal efforts to end the targeting of individuals:

–We filed a case in the United States District Court for the Southern District of Texas, 23-cv-1013.

–The main claim is to have declared unconstitutional the inclusion of non-terrorists in a terrorist database known as the Terrorist Screening Database (TSDB).

–Pursuant to US Department of Justice audit reports of the Terrorist Screening Center that prepares the TSDB, 97% of the people listed on it don’t meet the reasonable suspicion criteria to be classified as a terrorist,

–Former FBI Terrorist Screening Center director Timothy Groh admitted in a statement under penalty of perjury in a prior judicial case that there are many people in the TSDB that “don’t meet the terrorist criteria and are not screened as such” (when they travel) because they do not represent a terrorist threat.

–We discovered that the non-terrorist subcategory of the TSDB is the roster for the human experimentation “Program” of Targeted Individuals when one of our plaintiffs, Winter Calvert, was told by sheriffs that in his house lived a terrorist.

–USDOJ has known since its audit reports from 2005 that the Terrorist Screening Center is incurring in illegal practices, privacy and civil rights violations and has not done anything to curtail it.

–FBI field offices nominate people to the TSDB without having to comply with FBI regulations (Finding in 2008 USDOJ audit report of the TSC)

–Placement in the TSDB is secret but entails a life of torture, stalking, theft and suffering.

–This affects all Americans: people are capriciously nominated to this list by adversaries, competitors, upset former partners with access to corrupt law enforcement officials.

Enclosed please find the Motion for Preliminary Injunction that summarizes the uncontroverted material facts that buttress Targeted Justice’s claims. You can download the rest of the documents at TJ’s web page: www.targetedjustice.com.

Ana Toledo in interview with Dean Ryan and Dr. James Fetzer:

“Targeted individuals are tortured, some more than others, with invisible (directed energy) weapons for no-touch torture. But there are also the (DOJ, DHS, FBI, police) Fusion Center operations. My personal idea is that a lot of the illegals coming in at the border under DHS’ Alejandro Mayorkis is in part to increase the armies of gangstalkers.

People talk about the “watchlist.” The watchlist is comprised of Handling Codes 1 and 2, which are the known and suspected terrorists. But Handling Categories 3 and 4 are secret categories embedded within of the Terrorist Screening Data Base (TSDB) that people that are placed there who do not represent a terrorist threat or a threat to national security. These are innocent Americans, there are an estimated 400,000 of them, and they are not screened when they travel. Seventy five percent of the targeted individuals (TIs) are classified under Handling Code 4 of the Terrorist Screening Data Base. In ou lawsuit (of 1/11/22), we are demanding that people that are classified under Handling Categories 3 and 4 of the Terrorist data base be removed because they are there without reasonable suspicion and without representing a terrorist threat.

The deep state is very concerned about our (Targeted Justice’s) lawsuit. Because… the targeted individual program is the “crown jewel of the deep state” and this is a private-public enterprise, you know, collaboration, and there are just so many people profiting from it. It’s not just the defendant agencies (DHS, FBI, DOJ, etc.) coming down, it’s a lot of people that have profited from this…

Targeted Justice.com’s $1.3 billion lawsuit on behalf of TIs is here: Targeted Justice’s $1.3 Billion lawsuit on Behalf of TIs (Targeted Individuals) against M. Garland (AG, DOJ), DHS, FBI, C. Wray (FBI Director), A. Mayorkas (Sec. DHS), C. Kable, Jr., (FBI TSC Director), K. Wainstein (DHS Sec. Intelligence and Analysis) w/ Bullet Point Summaries & Preliminary Injunction


I. Preliminary Injunction (Feb. 5, 2023)

TJ-PreliminaryInjunction-5Feb2023

II. Bullet Points of Information Provided in Preliminary Injunction

1. Hundreds of thousands to millions of Americans and citizens worldwide, termed “targeted individuals” (TIs), are secretly and nonconsensually enrolled in an illegal, government-sponsored watchlist (blacklist) that results in irreparable damage to them. These “targeted individuals” are not notified of their inclusion on this list and have no mechanism to seek redress or get their name removed from the list. Hence, they are deprived of the due process of law and their Constitutional rights and subjected to nonconsensual human experimentation and torture.

2. On Sept. 16, 2001, immediately following the 9/11 false-flag state-sponsored, synthetic terrorist attacks (see my 911nwo.com website), two things happened:

First, then President George W. Bush signed Homeland Security Presidential Directive (HSPD) 6, creating a policy to obtain information on individuals engaged in terrorism.

Second, then Secretary of Homeland Security, Tom Ridge, Secretary of State, Colin Powell, FBI Director Robert Mueller, and Director of CIA, George Tenet, announced the creation of the Terrorist Screening Center (TSC) “to consolidate terrorist watchlists and provide 24/7 operational support for thousands of federal screeners across the country and the world.”

3. What actually evolved was the formation of an ever-growing list of individuals whose names appear on the Terrorist Screening Data Base (TSDB). Over 97% of the names on this list are termed Non-Investigative Subjects (NIS), or Handling Codes 3 and 4 (here termed, “the McCarthy Blacklist”), and are known NOT to be terrorists at all but rather, law abiding citizens!

4. The maintenance of this list by the FBI exceeds the authority given to it by HSPD 6.

5. The Terrorist Screening Center (TSC) is administered by the FBI in coordination with Department of Homeland Security (DHS), Department of State (DOS), Department of Justice (DOJ), and the Office of the Director of National Intelligence (DNI).

6. The TSC develops and maintains the Terrorist Screening Data Base (TSDB), aka “the Watchlist.” The only legal authority for this TSDB list is HSPD 6. However, the McCarthy Blacklist (aka NIS/Handling Code 3 and 4) is illegal because it exceeds the authority of HSPD 6. Most of these individuals are law-abiding citizens.

7. The FBI admits that the TSDB has not prevented a single terrorist incident.

8. The TSDB (The Watchlist) has two primary components: “The Selectee List” and the “No-Fly List.”

9. The secret inclusion of law-abiding citizens on this terrorist watchlist has caused them to be stripped of their Constitutional rights, right to due process of law, and resulted in their prolonged, sustained, and organized torture. These Constitutional violations have and are causing irreparable harm to these individuals, who are the plaintiffs in the lawsuit. These people are commonly referred to as “targeted individuals.”

10. The National Security Agency (NSA) confirmed that the FBI maintained 200,000 “targets” under warrantless surveillance. This amount comprises 3.6% of the NSA’s targets, or 5.5 million individuals in the TSDB.

11. There are 32 times more non-terrorists than “known and suspected terrorists” (KST) on the TSDB.

12. 2005 and 2007 audits on the TSDB carried out by US Department of Justice (DOJ) indicate only 0.29% are known and suspected terrorists (KST). Thus, the 2005 audit of the Office of the Inspector General found that 99.71% of individuals on the TSDB do NOT meet the criteria as terrorists.

13. Defendants in this case (FBI, DHS, DOJ, etc.) should be ordered to remove all NIS- Handling Code 3 and 4 (McCarthy Blacklist) names from the TSDB.

14. FBI acknowledged in Elhady V. Kable (2019 and 2021) that it shares the TSDB with 18,000 federal, state, and tribal law enforcement agencies, corporations, and individuals to whom the lists are circulated as well as 1441 non-government including private employment, background check and credit agencies.

15. Another illegality is that NIS/Handling Code 3 and 4 (McCarthy blacklisted) individuals, that is, “targeted individuals’” (TIs) names are never removed from the TSDB.

16. TIs (NIS) are not allowed to challenge or even know their status regarding the TSDB. Plaintiffs have no mechanism with which to challenge their eternal inclusion on the TSDB.

17. In 2017, Defendant FBI witness, Timothy Groh, estimated 1.1 million names on the TSDB. Based on previous litigation challenging the watchlist, there are over 6 million names on the watchlist. If US DOJ’s assessment that 99.71% of names are NOT terrorists is correct, this would translate to 5,982,600 on the list, with 300,000 being Americans.

18. These violations of the US Constitution constitute sufficient justification for the court to issue a Preliminary Injunction against the Plaintiffs (FBI, DHS, DOS, DOJ) to recall all Handling Code 3 and 4 lists throughout the world and order the immediate elimination of those components of the TSDB.

19. The Plaintiffs request that the Court prohibit the Defendants from simply transferring those names to another watchlist in secret.

III. Targeted Justice’s $1.3 Billion lawsuit Against 1) Merrick Garland (AJ, DOJ), 2) FBI, 3) DHS, 4) FBI Director, Christopher Wray, 5) DHS Secretary, Alejandro Mayorkas, 6) Director of FBI’s Terrorist Screening Center (TSC), Charles Kable, Jr., and 7) DHS’ Undersecretary of Intelligence and Analysis, Kenneth L. Wainstein.

6-23-cv-00003 2

Case Name: Targeted Justice, Inc. et al v. Garland et al

Case Number: 6:23-cv-00003

There are also other important cases, that are relevant for people doing research, such as ElHady v. Kable, 1:16-cv-375

targetedjustice.com

6-23-cv-00003 2

201 cases that involve Targeted Individuals, including gangstalking and Directed Energy Weapons.

IV. Webmaster’s Summary of “The Program” As Bullet Points From Lawsuit:

Webmaster Comment:

The Targeted Justice lawsuit against Merrick Garland (AG, DOJ) et al. filed in January of 2023 is packed with important and detailed information regarding the targeted individual program. For those wishing a shorter elaboration of the background information about “the program” than is presented in the 543 points in the lawsuit, I am here presenting the information that I think most TI’s should be aware of in the following summary bullet points. Note that I generally use the same verbiage as the lawsuit and that even this summary of this complex program and lawsuit is rather lengthy. Sorry. Still it is worth studying to better understand “the program.”

1. 17 Targeted Individuals (TIs), including Targeted Justice, Inc. (the Plaintiffs), are suing: 1) Merrick Garland (AG, Dept. of Justice), 2) the FBI, 3) Christopher Wray, Director of the FBI, 4) Charles Kable, Jr, Director of FBI’s Terrorist Screening Center (TSC), 5) Department of Homeland Security (DHS), 6) Alejandro Mayorkas, Secretary of DHS, and 7) Kenneth Wainstein, DHS’s Undersecretary for Intelligence and Analysis (the Defendants) for damages in the amount of $1.3 billion for their responsibilities in subjecting these TIs to cruel, illegal, covert, nonconsensual human experimentation and persecution.

2. Plaintiffs (TIs) hold that this covert program combines elements of the CIA’s MKULTRA mind control programs (1953-1963 onward) and the FBI’s COINTELPRO (Counterintelligence Program; 1956-1976 onward).

3. Plaintiffs (TIs) charge that about 200,000 innocent victims in America are being targeted by this illegal, secret, government ongoing, active, nationwide rogue criminal enterprise that is active 24 hours a day within the U.S. and whose increase in scope, intensity and sophistication was made possible by the new communications and surveillance technologies. There are many millions of TIs (targeted individuals) worldwide.

4. Including a person in the FBI and DHS’ Terrorist Screening Data Base (TSDB; aka “The Watchlist”) constitutes the targeting of an individual within the Unites States.

a) A Targeted Individual (TI) is someone who has been selected by Defendant Federal Bureau of Investigations (FBI), Defendant Department of Homeland Security (DHS) or other intelligence agencies of the federal government to unwillingly participate in an experimental torture program.

b) This program was developed under the Central Intelligence Agency’s MK-Ultra project and is designed to break down the individual and “neutralize the person,” using psychological, physical, and emotional stress.

c) On information and belief, following Defendant FBI COINTELPRO model, this program imposes unconstitutional restrictions and limitations on society through intimidation, fear, and threats. Political activists, labor union leaders, scientists, and whistle-blowers are a sampling of the main targets of the program in violation of their First Amendment rights. However, people are also randomly chosen. Familial and spousal relationships are usually destroyed, as part of this psychological torture.

d) Once an individual is on the list, the NSA unconstitutionally authorizes and/or carries out physical and electronic surveillance and stalking on them through various instrumentalities, organizations and entities such as DHS’ National Network of Fusion Centers, Infragard, citizen Watch Groups, Sheriffs and Police Departments.

e) This conduct is referred to as “Organized Stalking” or “gang-stalking” and entails the administration of terror tactics on United States citizens and lawful residents in violation of their rights under the First, Fourth, Fifth, Sixth, and Fourteenth Amendments of the United States Constitution.

5. Plaintiffs (TIs) charge that TIs are subjected to:

a) “illegal and unconstitutional phone taps, illegal re-routing of business and private phone calls for harassment purposes, surreptitious entry into home, office and vehicle, virtual surveillance in the home conducted by illegal placement of miniature remote, wireless cameras (often accessible through the internet), illegal internet spyware, illegal GPS tracking (often through their own mobile phones), regular fixed and mobile surveillance, mail misdirection, mail theft and tampering, financial and employment sabotage, slander campaigns, poisoning, assaults and murder, illegal set-ups on drug charges and other felony charges, amongst [sic] many other civil rights abuses.”

b) “the use of microwave weapons for inflicting physical and psychological torture that ends up causing them the condition known as Havana Syndrome, Remote Neural Monitoring and Voice-to-Skull Auditory Symptoms.

c) “The Targeted Individual program obtains its experimental subject roster from unconstitutional subcategories of the Terrorist Screening Database (TSDB) (“The Watchlist”). 97% names on this blacklist are of individuals with no ties to terrorism. In the exercise of their discretion, Defendants Wray and Kable Jr. decide the fate of unsuspecting individuals such as the Plaintiffs, condemning them to a life of premeditated torture.

d) “The TSDB’s subcategory of individuals who are not “known or suspected terrorists” (KST) is also known as “Non-Investigative Subjects (“NIS”) and are listed under “Handling Codes 3 and 4”.” Over 97% of names on “The Watchlist” are in the NIS/Handling Code 3 and 4 category and have no ties to terrorism, whatsoever, but rather are innocent civilians.

e) A “consortium of governmental agencies (“the Inter-Agency”) acting under the guise of “national security” have secretly, unconstitutionally and maliciously sentenced each NIS to undergo a lifetime of covert human experimentation that targets and tortures these human beings in many instances to their death.” (Webmaster: I.e., the Defendants are guilty of murder.)

6. Plaintiffs (TIs) charge that “Without sufficient grounds to link an individual to terrorism, an unwitting person’s placement on the TSDB’s NIS/Handling Codes 3 / 4 lists is the equivalent of being indicted, tried and sentenced to a lifetime of torture and physical and psychological abuse in violation of this country’s constitutional prohibition against cruel and unusual punishment.”

7. Plaintiffs (TIs) charge that: “Defendants’ (AG Garland, FBI, Wray, DHS, Kable, Mayorkas, Wainstein) unrestricted inclusion of NIS in the TSDB has resulted in huge swaths of the population that have nothing to do with terrorist activity included in an atrocious experiment without their consent and against their will. Consequently, an unprecedented number of people such as Plaintiffs (other TIs) have emerged to publicly expose their experiences enduring these criminal attacks that go unstopped and unpunished. The cloak of invisibility that for decades shielded the program from exposure no longer exists. I.e., the TSC (Terrorist Screening List) includes American citizens and legal residents that are not known or suspected terrorists in its terrorist database under the purview of Defendants Wray and Kable Jr. for no purpose other than secretly enlisting them in an involuntary human experimentation program that targets unsuspecting victims, divesting them of their autonomy and destroying their lives, with no recourse.

8. Plaintiffs (TIs) charge that: “Plaintiffs and TJ Members are victims and survivors of these crimes against humanityand the deprivation of their fundamental constitutional, civil and human rights. Plaintiffs come before this Court to hold Defendants jointly and severally liable for the damages they’ve sustained as a result of the outrageously vicious, illegal, and unconstitutional tortures and constitutional violations they have endured as targeted individuals.” (Estimated damages to 17 Plaintiffs is $1.3 billion.)

9. Plaintiff’s (TIs) herein expose the “Defendants’ “Inter-Agency Scheme” by which President George W. Bush’s September 16, 2003 Homeland Security Presidential Directive 6 (HSPD-6) “to develop, integrate, and maintain thorough, accurate, and current information about individuals known or appropriately suspected to be or have been engaged in conduct constituting, in preparation for, in aid of, or related to terrorism” has been deliberately misconstrued and misused in an unconstitutional and illegal manner in order to expand the FBI-DHS terrorist watchlist to include an overwhelming majority of innocent Americans with no ties to terrorist activities whatsoever.

10. Regarding Form FD-930, the “Standard Nomination Form”

a) “Form FD-930, also known as “Standard Nomination Form” or “Standard Nomination Tool”, is used by private individuals, corporations and the intelligence community (IC) to nominate people for the TSDB”

b) “Form FD-930 is not an official U.S. Government form since it has not been approved by the United States Office of Documents pursuant to the requirements of the Paperwork Reduction Act of 1995”

C) Form FD-930 does not meet the requirements of the Department of Defense Forms Management Program since it does not meet the requirements of the General Services Administration, Standard and Optional Forms Management Program.

d) Form FD-930 is thus an illegal document that is used to nominate and place unsuspecting United States citizens and residents on the TSDB.

e) Form FD-930 does not provide for any due process safeguards to prevent the inclusion in the TSDB of United States citizens like the named individual Plaintiffs, those equally situated to them, and TJ Members despite an absence of links to terrorism.

f) There are no restrictions as to who can fill out and submit Form FD-930 to Defendants regardless of whether the person is a suspected terrorist or not.

g) Thus, private individuals, corporations and foreign governments can submit nominations to Defendant FBI or Defendant NSA through the TSDB nomination form.

h) The TSDB nomination by private individuals is dangerous and repugnant to the principles contained in the United States Constitution, placing in private hands the capacity to obliterate someone’s life for improper motives.

i) Individuals are placed on the TSDB for engaging in the legitimate exercise of First-Amendment protected rights, such as whistleblower or journalist activity, as is the case of Plaintiffs Karen Stewart, Plaintiff Timothy Shelley and Winter Calvert.

j) Other TIs such as Plaintiffs Timothy Shelley, Susan Olsen, Yvonne Mendez and Lindsay Penn were targeted after undergoing a contentious divorce, a child custody battle or the filing of charges against a stalking former spouse.

k) Defendant FBI doesn’t carry out the investigation on the individual nominated to the TSDB. Instead, Defendant FBI delegates this endeavor to the nominating agency or instrumentality and private companies such as the Leidos Company that has been known to corroborate NIS information.

m) A 2009 Audit Report by the USDOJ Inspector General’s Office concluded that “many of the nominations submitted directly to … were processed with little or no information explaining why [or how] the subject may have a nexus to terrorism (also known as “derogatory information”).

n) Approval of a nomination to the TSDB does not require concrete facts. The 2013 Watchlisting guidance specifically provided as follows:

o) The standard to include anyone in the TSDB and secretly submit them to a permanent life of illegal torture, persecution and surveillance is unconstitutionally vague:

p) The particularized derogatory information used to accept, reject, or modify the nomination of a person into the TSDB is supposed to contain an objective factual basis linking the individual to terrorism or terrorist activities. The particularized derogatory information standard requires that Defendant FBI have ‘articulable’ intelligence or information which, based on the totality of the facts, and taken together with rational interference from those facts, warrants a determination that the subject is known or suspected to be (or has been) knowingly engaged in conduct constituting, in preparation for, in aid of, or related to terrorism or terrorist activities.

q) Including in the TSDB persons that are not known or suspected terrorists is a violation to the Administrative Procedure Act’s prohibition on arbitrary government action contained in 5 U.S.C. § 706.

r) Despite an absence of particularized derogatory information linking Plaintiffs and TJ Members to terrorism, their names figure in the TSDB.

s) The TSDBs inclusion standards are so permissive and pliable that they violate Plaintiffs’ and TJ Members’, procedural and substantive due process rights.

t) Defendant FBI subcontracts to private corporations like the Leidos corporation the task of corroborating non-investigative subjects’ personal information upon their nomination to the TSDB and/or their vetting process.

u) The TSC has no quality control procedure in place to specifically confirm that a person is a known or suspected terrorist (KST) or “Non-Investigative Subjects” (NIS) since they rely on the facts and investigation that the nominating agency provides.

v) Private corporations known as “watchlisting cells” serve as contractors to Defendant FBI and/or Defendant NSA for obtaining and corroborating the personal data on individuals to be included in the TSDB.

w) The private contractors that check the information on individuals nominated to the TSDB do not confirm whether the nominee is a known or suspected terrorist.

x) Pursuant to Defendant DHS regulations published in 81 Federal Register 1989, the categories of individuals covered by the TSDB include:

Handling Code 1 – Outstanding Arrest Warrant
Handling Code 2 – Under Active Investigation
Handling Code 3 – Individual has Possible Ties to Terrorism
Handling Code 4 – Identity Provided has Possible Ties to Terrorism. See Exhibit 2.

The first two categories are commonly referred to as “Known and Suspected Terrorists” (KST) and include the ‘Selectee’, and ‘No Fly Lists’. Inclusion on the first two subcategories of the TSDB, the No Fly or Selectee Lists requires additional substantive derogatory criteria.

y) The Selectee List comprises the names of suspected terrorists under active investigation.

z) A “suspected terrorist” is “an individual who is reasonably suspected to be engaging in, has engaged in, or intends to engage in conduct constituting, in preparation for, in aid of, or related to terrorism and/or terrorist activities.”

a’) There is another category of individuals included the TSDB: that of persons who do not meet the “substantive derogatory criteria”. They are grouped into “Handling Codes 3 and 4”. Handling Code 3 is also known as the ‘Expanded Selectee’ list. According to Defendant FBI, Handling Code 3 comprises Individuals with ‘Possible Ties to Terrorism’.

b’) Pursuant to the FBI Handling Code 4 comprises people whose “Identity Provided has Possible Ties to Terrorism’.

c’) On information and belief, the individuals included in the TSDB who “are not considered ‘known or suspected terrorists’ and are not screened as such” are also referred to as NIS are grouped in the categories labeled as “Handling Code 3” or “Handling Code 4”.

d’) Informing TIs of their inclusion in the TSDB would grant them the mechanism of seeking redress to remove of their names from it.

e’) On information and belief, the only information required to include a NIS in the TSDB is his or her first and last name and “ANY” date of birth.

f’) Based on Defendant FBI’S own statistics, NINETY-SEVEN PERCENT (97%) of the persons listed on Defendant FBI’s TSDB are not terrorists. Exhibit 5.

g’) Only the first two components of the TSDB – Handling Code 1 and Handling Code 2 make up the “Watchlist” that contains the names of the KST.

h’). When intervening with a non-investigative subject during a routine situation, law enforcement officials are forbidden from telling the individual they are on the list.

i’) The TSC includes within the National Crime Information Center’s (NCIC) database the “Watchlist” subset of the TSDB comprised of KST included in the “No Fly” and “Selectee” list.

j’) NIS are not included in the “Watchlist” or the NCIC.

k’). The NCIC is a compilation of 14 person files or categories. To wit: 1) KST File, (the Known or Suspected Terrorist (“KST”) File, which is populated with a subset of TSDB information; 2) Supervised Release; 3) National Sex Offender Registry; 4) Foreign Fugitive; 5) Immigration Violator; 6) Missing Person; 7) Protection Order; 8) Unidentified Person; 9) Protective Interest; 10) Gang; 11) Wanted Person; 12) Identity Theft; 13) Violent Person; and 14) NICS Denied Transaction.

l’) The NCIC does not include the TSDB’s NIS/Handling Codes 3 / 4 lists because the people listed in them don’t constitute a terrorist threat.

m’) United States citizens included under “Handling Code 3 / 4” or “Non- investigative subjects” have no available mechanism or formal procedure to challenge their secret inclusion on the TSDB because they are prohibited from discovering their status.

n’) Those included in the TSDB’s NIS/Handling Codes 3 / 4 lists are unwilling participants in an experimentation and torture program and are known as “Targets” or a “Targeted Individual.”

o’) Once an individual has been placed on the TSDB’s NIS/Handling Codes 3 / 4 lists, his or her name lingers on it indefinitely and/or permanently.

p’) A person’s permanent inclusion in the TSDB’s NIS/Handling Codes 3 / 4 lists is equivalent of an unconstitutionally perennial designation as a “person of interest”, depriving them of their presumption of innocence and right to procedural and substantive due process.

q’) NIS have no means of redress to remove their names from the TSDB’s Handling Codes 3 /4 categories.

r’) The inclusion of the individuals in the TSDB constitutes the kind of government stigmatization that broadly precludes individuals or corporations from a chosen trade or business and also deprives them of liberty in violation of the Due Process Clause. Trifax Corp. v. District of Columbia, 314 F.3d 641, 644 (D.C. Cir. 2003).

s’) Once a NIS is listed in the TSDB’s NIS/Handling Codes 3 / 4 lists and in violation of the First, Fourth, Fifth and Sixth and Eighth Amendments to the United States Constitution, Defendants order and/or facilitate state, tribal and federal agencies to constantly track and carry out his or her physical and electronic surveillance and psychological torture.

t’) In violation of such policies, Defendant FBI and TSC distribute the TSDB to at least 18,000 state, local, county, city, university and college, tribal, and federal law enforcement agencies and approximately 533 private entities through its National Crime Information Center (“NCIC”) system.

u’) The list is also shared with more than 60 foreign governments and private entities such as the following: private correctional facilities, private security services for governmental facilities and hospitals, companies providing criminal justice dispatching services or data processing/information services providing services to governmental criminal justice agencies, private probation and pretrial services companies, private city attorneys, a private police department for an airport, a private police department for a transportation authority, private police departments for two private incorporated communities, an inmate transport service, an entity that provides forensic services to detect and identify criminals, court constable services, and animal shelters.

v’) In 2019, Defendant FBI publicly acknowledged it shares the TSDB with 1441 non-government agencies. These include private employment, background check, and credit agencies.

w’) Defendants widely disseminate the TSDB among citizen policing organizations such as Infragard and Citizen Corpsthat perpetrate illegal/rogue vigilante conduct against NIS under the pretense that they are KST.

x’). Defendant Majorkas is responsible for the enactment and implementation of highly unconstitutional operating procedures throughout the National Network of Fusion Centers that have carried out the illegal surveillance, organized stalking and psychological torture of Plaintiffs and TJ Members.

y’) United States NIS in the TSDB aren’t afforded a procedure to contest or challenge their nomination because it doesn’t exist.

z’) Defendants have deliberately concealed Plaintiffs’ and TJ Members’ inclusion in the TSDB’s “Handling Code 3” or “Non-investigative subjects” categories.

a”) Defendants’ lack of notice to Plaintiffs and TJ Members of their inclusion in the TSDB prevented them from discovering that they had sustained an injury susceptible to redress.

b”) The legal provisions available to individuals in the Watchlist to seek redress from their inclusion in the TSDB are not available to those in the NIS/Handling Code 3 / 4 lists. TSDB’s Unconstitutional Bloating: The Numbers Do Not Add Up

c”) Defendant FBI and NSA’s statistics regarding the number of records in the TSDB actual hundreds of thousands of individuals that: a) are not KST; b) were nonetheless secretly and perpetually included in the TSDB; and c) have no legal recourse for their name’s removal therefrom.

11. How Many TIs Are There At Home and Abroad? Fudging the Numbers

a) The Department of Justice’s Office of The Inspector General’s May, 2009 Audit Report 09-25 “The Federal Bureau Of Investigation’s Terrorist TSDB Nomination Practices” found that 35% of the nominations to the lists were outdated, many people were not removed in a timely manner, and tens of thousands of names were placed on the list without an adequate factual basis.

b) In 2008, Rick Kopel, principal deputy director of defendant FBI Terrorist Screening Center, appeared before the House Homeland Security Sub Committee on Transportation Security and stated that the TSDB contained approximately one million records relating to 400,000 individuals of whom 3% (12,000) were U.S. persons. (U.S. Persons, as defined in Executive Order 12333, are U.S. citizens and legal permanent residents.)

c) Conversely, eight years later, the Vice-Chair woman of the Senate Intelligence Committee, Sen. Diane Feinstein, ascertained in 2016 that there were over one million records in the TSDB but only 5,000 ( 0.5 percent or one two-hundredth) of them were Americans.6

d) On September 2014, Transportation Safety Administration’s Christopher Piehota testified before the House of Representatives’ Subcommittee on Transportation Security that by 2013 the TSDB had 500,000 records and in 2014 the list contained 800,000 identities.

e) Mr. Piehota’s testimony confirmed that an estimated 300,000 additional records were included in the first 9 months of 2014 for an average of 33,333 new individuals added per month.

f) Former Deputy FBI Director Timothy P. Groh stated under penalty of perjury in Elhady v. Piehota, 303 F.Supp.3d 453 (2017) that there were approximately 1.16 million persons in the TSDB and that only approximately 0.5% (fewer than 5,000) of those were US persons.

http://archive.today/2023.01.07-071544/https://lawandcrime.com/video/details-of-fbi-watch-lists-revealed- including-number-of-americans-included/

g). A 2007 GAO report found that TSC rejects only approximately one percent (1%) of all nominations to the TSDB.

h) However, in the discovery under penalty of perjury produced in the Elhady case, Defendants submitted the table below including the data regarding nominations, acceptances and rejections. When subtracting the ‘additions’ and ‘rejections’ to the number of nominations, there is a large number that remains unaccounted for.

i) TSC Audits of Defendant FBI produced additional information asserting that approximately 3% of the TSDB is designated as Handling Code 1 or 2. The remaining 97% is designated as Handling Code 3 or 4.

j) On March 11, 2019, Mr. Groh declared under Penalty of Perjury that US persons (citizens and lawful permanent residents) make up less than .5 percent (i.e., one two-hundredth) of the identities in the TSDB. Exhibit 5.

k) The vertiginous increase in the number of people included in the TSDB reflects Defendant Wray’s and Defendant Kable’s and their predecessors’ failure to adhere to constitutional precepts, the law and Defendant FBI’s own standards and procedures.

l) FBI’s reckless, unconstitutional and illicit approval of nominations to the TSDB results in the inclusion of an estimated 98.9% of the people nominated to it.

m) A 2007 United States Government Accountability Office Report to Congressional Oversight, Reduce Vulnerabilities in Agency Screening Processes, and Expand Use of the List”, found that TSC rejects only approximately one percent (1%) of all nominations to the TSDB.

n) In the Elhady v. Kable case, Customs and Border Protection admitted it has never publicly identified an act of terrorism that the TSDB helped prevent. Defendant FBI representatives in the Elhady v. Kable case admitted that they were unaware of a single act of terrorism halted due to the TSDB.

o) The 2007 GAO Report determined that 45% of the TSDB records related to redress complaints reflected that the information on the individuals used to include them on the list was inaccurate, incomplete, outdated, and/or that they had been incorrectly included.

p) In 2019, the New York Times published an article confirming that in only two years, the TSDB had increased to 5.5 million records of which 200,000 or 3.6% of them are United States citizens classified as “targets” while the NSA acknowledged that during that same year it was spying on 200,000 ‘targets’ on US Soil.

q) On October 21, 2021, the USDOJ Office of Inspector General released an Audit Report denouncing Defendant FBI’s “was widespread non-compliance” with the factual accuracy review procedures (“Woods Procedures”) required for applications under Section 702 of the Foreign Intelligence Surveillance Act (“FISA”), Section 702 (50 USC 1804(a)(4) and 50 USC 1801(h)), to carry out electronic surveillance of U.S. Persons.

12. An October 3, 2012, the Senate’s Permanent Subcommittee on Investigations issued a report after a two-year investigation that led the Commission to conclude that:

a) Fusion Centers “have too often wasted money and stepped on Americans’ civil liberties.”8

b) Defendant DHS intelligence officers assigned to state and local fusion centers produced intelligence of “uneven quality – oftentimes shoddy, rarely timely, sometimes endangering citizens’ civil liberties and Privacy Act protections, occasionally taken from already-published public sources, and more often than not unrelated to terrorism.

c) “The panel includes several examples of costly and time-consuming investigations undertaken by Fusion Centers employees, all which emphasize what appear to be the DHS’ relentless attempts to enter anyone and everyone into a system of suspicious persons. ”

d) Defendants Mayorkas and Wainstein create and mandate the policies and standard operating procedures implemented in the National Fusion Center Network that carry out the unconstitutional organized stalking against Plaintiffs, TJ Members and others equally situated to them.

13) Individual Plaintiffs and TJ Members were included in the TSDB in retaliation for exercising their First Amendment rights to practice their religion, exercising their freedom of speech, their right to peaceably assemble, and/or to petition the Government for redress of grievances.

a) The named individual Plaintiffs and/or some of TJ Members have submitted Privacy Act requests to Defendants requesting them to provide the TSDB with their records and to remove their names from it.

b) Defendants’ failure to meaningfully reply and refusal to acknowledge their petition for removal from the TSDB prompted the filing of this complaint.

c) Defendants’ actions constitute a violation to Plaintiffs’ and TJ Members’ due process and equal protection rights under the Fifth, Sixth and Fourteenth Amendments of the United States Constitution inasmuch as they: a) deprived them of their right to receive notice about their nomination to the TSDB; b) deprived them of a formal, open explanation of charges and c) deprived them of a meaningful opportunity to challenge and disprove them prior to their inclusion on the list.

d) Prior to including the named individual Plaintiffs’ and TJ Members’, Defendant FBI did not carry out a constitutionally-mandated investigation observing its own procedures nor did they oblige the minimum due process requirements and adhere to the standard of proof required for their inclusion.

e) Defendants included the named individual Plaintiffs’ and TJ Members’ names to the TSDB without any of the required “actual basis linking an individual to terrorism or terrorist activities, also known as particularized derogatory information.

f) By denying Plaintiffs and TJ Members an adequate process or mechanism to remove their names from the TSDB’s NIS/Handling Code 3 / 4 categories, Defendants Wray, Kable, Mayorkas, and Wainstein are personally liable to each individual Plaintiff violating their constitutional rights protected under the First, Fourth, Fifth, Sixth, Eighth and Fourteenth Amendments.

g) By denying TJ Members residing in the United States and throughout the world a process or mechanism to remove their names from the TSDB’s NIS/Handling Codes 3 / 4 categories despite the absence of “particularized derogatory information” and/or a “reasonable suspicion” that they are KSTs, Defendants Wray and Kable, have facilitated and enabled physical and psychological torture to Plaintiffs’ in violation of the “United Nations Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment”.

14. As a result of their unfounded and unconstitutional inclusion in the TSDB, the named individual Plaintiffs and TJ Members are victims of Directed Energy Weapons (“DEW”) attacks and other unidentified remote weaponry and instruments of harm.

a) the DEW attacks that the named individual Plaintiffs and TJ Members have suffered have caused them to develop or are in the way of developing the condition known as “Havana Syndrome”.

b) the use of other unidentified remote weaponry and instruments of harm have caused harm and/or destroyed and/or unlawfully taken property, health and life.

c) The Department of Defense’s Joint Publication 3–13 Electronic Warfare, defines “Directed Energy” (“DE”) as:

“[A]n umbrella term covering technologies that produce a beam of concentrated
electromagnetic energy or atomic or subatomic particles. Directed Energy
Weapons (“DEW”) is a system using DE primarily as a direct means to disable,
damage or destroy adversary equipment, facilities, and personnel. DE warfare is
military action involving the use of DE weapons, devices, and countermeasures to
either cause direct damage or destruction of adversary equipment, facilities, and
personnel, or to determine, exploit, reduce, or prevent hostile use of the
electromagnetic spectrum (EMS) through damage, destruction, and disruption.”

e) DE weapons include high-energy lasers, high-power radio frequency or microwave devices, and charged or neutral particle beam weapons. Microwaves and lasers are both part of the electromagnetic spectrum, which includes light energy and radio waves. The distinction between them is the wavelengths/frequency of the energy. While they are both part of the electromagnetic spectrum, laser and microwave weapons operate very differently and have very different effects.

See https://www.nationalacademies.org/news/2020/12/new-report-assesses-illnesses-among-us-government-
personnel-and-their-families-at-overseas-embassies.National Defense University, Prism, Vol. 8, No. 3 (2019)

f) The burns in some of the Plaintiffs are caused by microwave weapons.

g) Cellular towers and satellites have the energy capacity to fire DEW– approximately the same amount of energy required to run 3,000 homes.

h). The required electric capacity of a microwave weapon far exceeds the electrical energy available in any household.

i) In 2020, the National Academy of Sciences (“NAS”), Engineering and Medicine, which was commissioned by the U.S. State Department to investigate the matter, issued a report stating that the attack from “radio frequency waves” or DEW should be the most plausible explanation for the “Havana Syndrome” illness that US State Department employees at the Cuban Embassy began to experience.

j) The NAS found that for the Cuban Embassy employees, Havana Syndrome began with the sudden onset of a loud noise, perceived to have directional features, and accompanied by pain in one or both ears or across a broad region of the head, and in some cases, a sensation of head pressure or vibration, dizziness, followed in some cases by tinnitus, visual problems, vertigo, and cognitive difficulties.

k) CIA Director William Burns admitted that it is “unlikely [that Havana Syndrome cases] have been caused by the use of a ‘secret weapon’ by a hostile state”. (Webmaster: I.e., the US military-intelligence-corporate complex is responsible.)

l) Target program victims show Havana Syndrome symptoms and impairment. Plaintiffs Deborah Mahangor, her daughter and Plaintiff Ber have been diagnosed with Havana Syndrome.

m) On January 20, 2022, the Central Intelligence Agency stated that the over 1,000 Havana Syndrome cases were caused by DEW attacks on United States citizens stationed in foreign nations could not be traced to a foreign adversary. It concluded that there was no sustained global campaign by a hostile power like Russia or China harassing United States with an untraceable weapon.

n) The DEW attacks on NIS, United States citizens who have been unconstitutionally included in TSDB’s NIS/Handling Codes 3 / 4 lists have caused them to develop symptoms similar to Havana Syndrome.

o) Plaintiffs’ DEW attacks on NIS result from their unconstitutional inclusion in that take weeks to heal and look like these:

15) Regarding Voice-to-Skull
(V2K aka microwave hearing aka the Frey Effect, etc.)

a) As a result of the inclusion in the TSDB’s NIS/Handling Codes 3 / 4 lists, about two thirds of the named individual Plaintiffs and TJ Members suffer from another kind of remote/directed energy attack known as “Pulse-Modulated Voice Signature” or “Microwave Auditory Effect”, commonly known as Voice-to-Skull.

b) This torture tactic is documented under United States’ Patent Office patent 4,877,027 for Hearing System dated June 6, 1988. No civilian has the equipment required to produce a microwave beam that carries a voice signal and produce Voice-to-Skull effect.

c) This patent consists of a hearing system for human beings in which high- frequency electromagnetic energy is projected through the air in a microwave beam of an intensity less than 3.3 kilowatts per square centimeter to the head of a human being and the electromagnetic energy is modulated to create signals that can be discerned by the human being regardless of the hearing ability of the person..

d) This microwave auditory effect produces in most of the named individual Plaintiffs and TJ Members a torture known as “voice-to-skull” that mimics the hearing of voices or “microwave auditory effect”.

e) V2K is an extremely debilitating condition as it operates twenty-four hours a day in a continuous flow of computer-generated derogatory verbiage to obliterate the person’s psyche such as: “You’re stupid”; “You’re fat”; “Why don’t you kill yourself?” Approximately two thirds of Plaintiffs and TJ Members have the condition known as V2K.

Webmaster comment: Dr. Ewen Cameron, a CIA psychiatrist, pioneered the re-programming of human brains during his CIA experiments in Canada in the 1960s. He developed a process where in “de-patterning” or actually, erasure, of the brain (through drugs, induced comas, sleep deprivation, ECT (electric convulsive therapy, etc.) is followed by “psychic driving” to re-program the individual. The incessant negative messages that TIs “hear” are identical to those that Cameron developed in his “psychic driving” experiments.

f) Plaintiffs and TJ Members suffer from 1) sleep deprivation and the anxiety it produces caused by remote DEW attacks as well as 2) artificial tinnitus triggered by the constant location tracking inherent to the Targeting program.

g) No private organization has the capacity to inflict widespread V2K, DEW or artificial tinnitus on the civilian population of the United States.

16) Regarding Unconstitutional Interference with Electronic Communications,
TI’s:

a). experience constant hacking of computers, emails, accounts and interference with phone and electronic communications constituting suspicionless seizure and searching of internet traffic on U.S. soil.

b) In the course of this surveillance, United States’ communications are seized indiscriminately while they are in transit, in violation of Article III and the First, Fourth and Fourteenth Amendments of the Constitution of the United States.

17. National Fusion Centers’
Organized Stalking of TSDB-listed Individuals

a) The National Network of Fusion Centers (“Fusion Centers”) is under the purview of the DHS as a mechanism for counteracting terrorism. Although the Fusion Centers are deemed “state-owned and operated”, Defendant FBI and Defendant DHS employees are assigned to work in them.

b) The Fusion Centers Network have become the Stasi arm of Defendant DHS. They conduct surveillance, stalking, cyberstalking, and other clandestine and illegal operations against everyone in the TSDB: from KST to NIS.

c) Defendant DHS controls and funds 100% of the Fusion Center Network operations.

d) Defendants Mayorkas and Wainstein are responsible for the determinations regarding funding, creation and implementation of the policies, Standard Operating Procedures and tactics implemented at the Fusion Centers throughout the nation.

e) Defendant FBI employees under the supervision and control of Defendant Wray and/or Kable directly work at Defendant DHS’ Regional Fusion Center Network to implement and witness the unconstitutional, rogue and illegal organized stalking carried out against people listed in the TSDB.

f) Defendant DHS’ Fusion Centers’ personnel and contractors have carried out illegal surveillance, search and seizures and organized stalking of Plaintiffs’ and TJ Members’ due to their inclusion on the TSDB’s NIS/Handling Codes 3 / 4 category in violation of their Fourth Amendment rights.

g) DHS’ Fusion Centers’ personnel and contractors have inflicted psychological torture on Plaintiffs and TJ Members in violation of their constitutional right to be secure in their persons, houses, papers, and effects and against unreasonable searches and seizures enshrined in the Fourth Amendment of the United States Constitution.

h) Defendants Mayorkas and Wainstein create and mandate the unconstitutional policies and Standard Operating Procedures that the Fusion Centers implement to carry out Plaintiffs’ and TJ Members’ organized stalking. As such, they are personally liable for the illegal stalking and torture of the named individual Plaintiffs and TJ Members included in the TSDB’s NIS/Handling Codes 3 / 4 lists, in violation of the Fourth Amendment that protects persons and their things from illegal searches and seizures, the Fifth and Sixth Amendments that prohibits the imposition of a sentence on a person without due process of law, the Eighth Amendment that prohibits the infliction of cruel and unusual punishments and the Fourteenth Amendment that guarantees the equal protection under the law.

i) As a result of being unfounded and unconstitutionally included in the TSDB’s NIS/Handling Codes 3 / 4 lists, Plaintiffs and TJ Members experience constant harassment known as gang stalking, organized stalking, or overt harassment (OH) that includes the use of organized stalkers to carry out the vandalizing of personal property; surreptitious entries into domicile; tampering with postal mail, computer, and telephone; spreading false and defamatory rumors about the individual in the neighborhood and work place to attain their virtual ostracizing from society.

j) The illegal and unconstitutional organized/gang-stalking that Fusion Centers carry out against TIs occurs pursuant to Defendant Mayorkas’ and Wainstein’s orders, authorization and/or supervision. These psychological operations follow the FBI manual crafted for the program’s predecessor, COINTELPRO. The guiding policy of the program is the (illegal) actions they carry out agaisnt the “target” be “plausibly deniable”.

k) When complaining to law enforcement agencies or physicians about the events and symptoms resulting their status as a TI, some of the individual Plaintiffs and most of TJ Members have been illegally detained for “mental health observation” in deprivation of their liberty without due process, in violation of their rights under the Fifth, Sixth and Fourteenth Amendments of the United States Constitution.

l) As an example of the above, last year Plaintiff Hopson called Defendant FBI’s offices to denounce the gang-stalking and DEW attacks she was suffering from. The first dispatcher hung up on her when she reported the crimes of gang stalking and DEW attacks. Upon calling a second time, a different dispatcher also dismissed her, told her she needed to “take her medication” and said “You people are all crazy”. At this juncture, Plaintiff Hopson asked the dispatcher if she received any such calls frequently, she replied: “All the time”.

m) Prior to being included in the TSDB, none of the individually named Plaintiffs or TJ Members experienced any of the events described above unless they were victims of the MK-ULTRA or COINTELPRO programs.

n) An estimated 200,000 individuals in the United States included in the TSDB’s Handling Codes 3 / 4 categories every day undergo various forms of torture including DEW attacks, V2K and organized stalking in violation of the “Convention Against Torture ratified by the United States of America in 1994. All of it paid for with taxpayer’s money.

18) FISA Court Violations

a) Under Section 702 of FISA, 50 U.S.C. § 1881a, defendant FBI can apply for the interception and Upstream Surveillance of Plaintiffs’ and TJ Members’ electronic communications without the need for any court to review or approve the individual targets of the surveillance based on their secret, unconstitutional inclusion in the TSDB’s NIS/Handling Code 3 /4 categories.

b) Defendant FBI has relied on the Foreign Intelligence Surveillance Act (“FISA”), 50 U.S.C. § 1801, et seq., to carry out illegal surveillance on Plaintiffs, TJ Members, TIs, and other equally-situated NIS’ electronic communications.

c) Defendant FBI effortlessly obtains wiretap/surveillance warrants through the FISA Court since the procedure does not require the “probable cause” standard that Article III Courts demand in 18 USC 2518(3)(a) applications.

d) FISA Court acknowledges it approves 99% of all wiretap applications.

e) In November, 2021, the presiding judge of the FISA Court, James Boasberg, issued a ruling concluding that Defendant FBI “has been seriously and systematically abusing its warrantless electronic surveillance authority.”

f) A prior 2019 audit report had revealed that Defendant FBI had engaged in a “pattern of abuses and deficiencies in the FBI FISA process.” “FISA orders can be used to surveil U.S. persons; and in some cases, the surveillance will foreseeably collect information about the individual’s constitutionally protected activities.”

g) Unlike warrants granted under 18 USC 2518(8)(d) where the government must inform the person object of the warrant that his or her communications were collected, FISA Court-issued warrants don’t require Defendant FBI to ever notify the subject that his or her communications were collected unless government proceeding is brought against the person.

h) As part of the 97% of individuals on the TSDB’s grouped under the NIS/Handling Codes 3 / 4 categories who have no ties to terrorism, Plaintiffs have a right to know how many FISA warrants has the FBI obtained to listen in to their conversations and communications.

i) Any FISA warrant for the surveillance, search and/or seizure of Plaintiffs’ communications and/or property that Defendant FBI obtained was done so in violation of law since the agency knows Plaintiffs have no ties to terrorism.

j) Any “Sneak and Peek” warrant that Defendant FBI has obtained and executed against Plaintiffs and TJ Members under Section 213 of the Patriot Act, is in violation of law since its agents know that Plaintiffs have no ties to terrorism.

k) For years and devoid of probable cause that meets the Fourth Amendment’s mandates, Defendant FBI has illegally intercepted, recorded, listened in, stolen electronic communications and files from Plaintiffs and TJ Members under the pretext that their names appear in the TSDB.

l) All warrants obtained and carried out against Plaintiffs’ and TJ Members’ electronic surveillance and secret searches and seizures are contrary to law and in open violation of their privacy rights. Defendants FBI and DHS are jointly liable for the damages the execution of any such illicit warrant caused Plaintiffs.

19. Discrimination Against Women and the Poor: TJ’s data demonstrates that the illegal targeted individual program discriminates against single women who compose 66.6% of the TI community and the poor.

TJ’s statistics obtained within its membership reflect the following:

a) 14% are homeless (National average is 0.5%);

b) 35% are living with a relative or friend because they cannot afford to pay rent;

c) 67% are unemployed (National average is 3.7%);

d) 40% were indigent – having less than $100.00 in their possession. (Substantially below the poverty line).

20. Violation of TIs Constitutional Rights

a) The TSDB violates the First, Fourth (illegal searches and siezures), Fifth, Sixth, and Fourteenth Amendments (deprivation of personal property and freedom without due process of law), Eighth (prohibition against cruel and unusual punishment), and rights to privacy guaranteed in Fourth and Fourteenth Amendments.

b) Holding Defendants jointly liable for the enabling and implementing of an ongoing “crime against humanity” of a highly illegal targeting program that preys on, tortures and prompts the death of innocent civilians throughout the world included under TSDB’s NIS/Handling Code 3 / 4 categories and the consequences thereof, in violation of the United Nations’ Convention 1753 against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, ratified by the United States of America in 1994.

c) The human experimentation program on Targeted Individuals is repugnant to the United States Constitution as it violates the following:

a) First, Fourth, Fifth, Sixth, Amendments of the Constitution of the United States by punishing its victims for the exercise of Free Speech, conducting illegal searches and seizures of their person and things, and depriving them of property and liberty without due process;

b) Eighth Amendment as it constitutes totalitarian cruel and unusual punishment;

c) Fourteenth Amendment as the experimentation program disproportionately targets women and conservatives; and

d) The United Nations’ Convention 1753 against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, ratified by the United States of America in 1994.

Plaintiffs’ and TJ Members’ inclusion in the TSDB and the consequences thereof violate their fundamental rights to privacy embodied in the Fourth and Fourteenth Amendment.

Primary Perpetrators of the TI Program according to Richard Lighthouse and Ana Toledo:

a) CIA
b) FBI
c) DHS
d) DOJ
e) DHS/FBI Fusion Centers
f) Director of National Intelligence (DNI)
g) Shriever Air Force Base, Colorado
h) Council on Foreign Relations
i) President George W. Bush
j) VP, Richard Cheney
k) Mossad- Israeli Intelligence
l) David Rubenstein – CFR.org (Council On Foreign Relations)
m) Dick Cheney – USAP (Unacknowledged Special Access Programs; Black Projects), TI Program Director
n) David Cohen – CIA Operations (Central Intelligence Agency)
o) General John Raymond – US Space Force
p) Avril Haines – ODNI (Office of the Director of National Intelligence)
q) Merrick Garland – DOJ (Department of Justice)
r) General Scott Berrier – DIA (Defense Intelligence Agency)
s) Melissa Smislova – DHS Intelligence & Analysis (Department of Homeland Security)
t) Steve Vanech – NCTC (National Counterterrorism Center)
u) Jill Sanborn – FBI, National Security Branch (Federal Bureau of Investigation)
v) Charles Kable – FBI, Terrorist Screening Center (Federal Bureau of Investigation)
w) Stefanie Tompkins – DARPA (Defense Advanced Research Projects Agency)
x) Michael Lauer, MD – NIH Extramural Division (National Institutes of Health)
y) Christopher Wray, Director of the FBI
z) Alejandro Mayorkas, Secretary of DHS
a’) Kenneth Wainstein, DHS’s Undersecretary for Intelligence and Analysis
b’) Owners of the Federal Reserve
c’) Federal Reserve
d’) United Nations
e’) FBI Terrorist Screening Center

21) Elizabeth Mueller, “Occupy Wall Street” Activist and targeted individual from Virginia (See: Elizabeth Mueller: American Targeted Activist (April 24, 2018 video))

“It’s mind boggling how many people are involved in targeting one person. It’s quite terrifying actually. It’s like a full-scale military operation. There is somebody directing these operations. They can be psychological operations. It can be smearing people, stalking their mail, and physically breaking in. They want to be always learning more and more about you. It’s called “The Collect:” they want to collect information about how to control you. They disseminate the information back to the team. And they keep running missions. It can be constant. Targets will have people doing these ops against them all day long. If they break into your house, they report back.”

Primary Perpetrators according to Elizabeth Mueller:

a) a mind boggling number of people involved in something like a full-scale military operation with nearly continuous “missions.”
b) someone directing the operations
c) “they” use psychological operations
d) they collect information about how to control targeted individuals
e) this collected information is disseminated to “the team”

More On “The Collect:”

What the lovely, intelligent, and good-hearted Ms. Mueller may not understand is that “the collect” process, that is, “collecting information about how to control TIs,” carried out against her by “a mind boggling number of people involved in something like a full-scale military operation with nearly continuous missions, with someone directing the operations using psychological operations” is America’s modern version of the “information liquidation model” (Hughes, 2024) that was deployed in the CIA’s Phoenix Program during the Vietnam War that resulted in the torture and murder of many tens of thousands of innocent civilians. This “information liquidation model” torture-murder program has also been deployed by the US military-intelligence establishment throughout Latin America under names like “the Pink Plan,” Operation Condor, and the Salvador Option, and the Middle East, under names like Abu Ghraib, has now “come home to roost” and is being deployed against American civilians under the FBI-Department of Homeland Security Fusion Center system. Meanwhile, the normally innocent targeted victims of this diabolical system are enjoined to call it “gangstalking” or “organized stalking-electronic harassment???!!!!” What a despicable disgrace this nation and its people have become. See: “The CIA as Organized Crime: How Covert Operations Corrupt America and the World” by Douglas Valentine (2017).

22) Robert Naeslund, Swedish TI, documents the series of medical implants he received involuntarily at Swedish hospitals beginning in 1967. See: Robert Naeslund: Human Brain Project (2011 Youtube Lecture) and “A Brain Implant Victim Speaks Out” (2013 Article)

Brains can be stolen and raped. The authorities do it!…

“Bio-medical telemetry has long been thought to be impossible by the majority of people and has been relegated to science fiction. The fact is that scientists developed this technology into reality at least thirty years ago and started experiments with unwitting people.

By means of two-way radio communication, called telemetry or remote control, one can send a wavelength round trip to a brain transmitter in a person’s head. The wavelength streams through the brain and returns to a computer, where all aspects of a human being’s life are uncovered and analyzed.

“During the 1960’s, brain transmitters as small as a half of a cigarette filter made it possible for doctors to implant them into unwitting patients during operations easily and without surgery via the nostrils.

To analyze an EEG in a computer instead of a printer gives a whole new perspective on what can be concluded. The receipt of mental manifestations as thoughts and visual impressions or feelings, behavior and psychological reactions can be continually registered. Bio-medical telemetry has made it possible for medical scientists and the state to observe the person deeper and more completely than what the individual can possibly do himself.

Through analysis and programmed computers, even affects and changes in a person’s physical and mental status can be created.

Quotes from “Physical Control of the Mind: Toward a Psycho-Civilized Society” by professor J. Delgado (1966):

“By electrical stimulation of specific cerebral structures, movements can be induced by radio command, hostility may appear or disappear, social hierarchy can be modified, sexual behavior may be changed, and memory, emotions, and the thinking process may be influenced by remote control” …

“Transmitters have no batteries, are activated by radio, and can be used for life, so that the brain can be stimulated indefinitely”…

Quote from “Bio-Medical Telemetry” by Dr. Stuart Mackay:

“The possibilities by bio-medical telemetry are limited only by the imagination of the investigator.”

From P.M. Persson, Swedish Defense Research Institution, FOA, 1965:

“Distances were not a problem, since long wavelengths could travel globally at the speed of light. Liquid crystals which are injected directly into the bloodstream and fasten themselves to the brain have been developed in the last ten years. It works on the same principle as the usual transmitter and uses the same technology and contains the same possibilities. An essential part of biotelemetry encompasses the transmission of data. This occurs mostly with help from a surgically implanted transmitter. The technology has been developed quite extensively in medical research.”

From Publishers Weekly’s review of “The Mind Stealers” by Samuel Chavkin:

“Telemetry for the surveillance of every citizen is on the drawing boards. That mind control techniques could become standard equipment of government, prison and police departments is backed by a forceful documentation”.

Robert Naeslund, in his 2011 lecture in Stockholm, Sweden, described hidden aspects of the CIA-DoD’s Phoenix Program of torture and murder of Vietnamese civilians from about 1967-72:

“Headline: 33,000 Civilian’s Killed With Brain Tech in South Vietnam, 1970.

“This was disclosed by British professors Malcolm Varner and Dr. Michael Stone in their book, “The Data Bank Society” (1970), which is a strong protest against governments’ power over people’s minds. At that time, the US had its war in Vietnam and it had advanced techniques for implanting people. By mixing microchips in both medicines, alcohol, and probably Coca-Cola, they (Americans) could scan a large part of the South Vietnamese upper and middle class over a period of a few years. The supercomputers could thereafter analyze and evaluate people, assess their opinions, and see what they were up to. They found there were 33,000 very important people who were Viet Cong sympathizers and that they planned to execute. And it could be done with the same technologies through which their sympathies were assessed. Through the connection to their brains, their biological functions could be changed to a state that killed them by creating heart attacks, cancer, strokes or whatever they liked.”

Webmaster: According to Naeslund, the CIA and DoD’s Phoenix Program, that targeted Vietnamese civilians for torture and murder during the Vietnam War, amounted to “the military’s use of brain technology for mass murder.” This has enormous implications for what is happening today. In 2003, David Kilkullen advised President George W. Bush that “we need a global Phoenix Program!”

Could the US government actually be planning to subjugate the entire world population with this technology?

23) John St. Claire Akwei; Plaintiff in 1992 lawsuit against National Security Agency (NSA): See: Covert Operations of the U.S.: National Security Agency (NSA) and NSA’s Signals lntelligence (SIGINT) EMF Scanning Network: Illegal Satellite Tracking, Targeting, & Torture of Innocent Civilians (Articles by James F. Marino & John St. Claire Akwei)

Covert Operations of the U.S. National Security Agency (NSA)

pastedGraphic_7.png

by John St Clair Akwei
From an article in Nexus Magazine April/May 96

from MindControlForums Website

A lawsuit filed against the U.S. National Security Agency reveals a frightening array of technologies and programs designed to keep tabs on individuals.

John St Clair Akwei
vs
National Security Agency
Ft George G. Meade, MD, USA
(Civil Action 92-0449)

The following document comprises evidence for a lawsuit filed at the U.S. Courthouse in Washington, DC, by John St Clair Akwei against the National Security Agency, Ft George G. Meade, Maryland (Civil Action 92-0449), constitutes his knowledge of the NSA’s structure, national security activities proprietary technologies and covert operations to monitor individual citizens Ed.

1. THE NSA’S MISSION AND DOMESTIC INTELLIGENCE OPERATION

Communications Intelligence (COMINT)

Blanket coverage of all electronic communications in the US and the world to ensure national security. The NSA at Ft Meade, Maryland has had the most advanced computers in the world since the early 1960s.

NSA technology is developed and implemented in secret from private corporations, academia and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and track persons with the electrical currents in their bodies. Signals Intelligence is based on fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves.

The NSA/DoD [Department of Defense] developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic, that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all US citizens. The NSA gathers information on US citizen who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent national security anti-terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the US is easily and cost-effectively implemented with NSA’s electronic surveillance network. This network (DOMINT) covers the entire US, involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost-effective implementation of operations is assured by NSA computer technology designed to minimize operations costs. NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track.

NSA personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual Citizens Occasionally Targeted for Surveillance by Independently Operating NSA Personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the US by using the NSA’s domestic intelligence network and cover businesses.

The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen.

NSA DOMINT has the ability to assassinate US citizens covertly or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

The above symptoms highlight a fraction of the vast array of Neuro-Electromagnetic Frequency Assaults perpetuated by the Police and Military Intelligence Agencies toward  Remote Mind Control Experiments, Behavioral Manipulation and Murder.

2. NSA’S DOMESTIC ELECTRONIC SURVEILLANCE NETWORK

As of the early 1960s, the most advanced computers in the world were at the NSA, Ft Meade. Research breakthroughs with these computers were kept for the NSA.

At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology. The NSA obtains blanket coverage of information in the US by using advanced computers that use artificial intelligence to screen all communications, regardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists.

These computers monitor all communications at the transmitting and receiving ends.

This blanket coverage of the US is a result of the NSA’s Signals Intelligence (SIGINT) mission. The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF (electromagnetic frequency) spectrum.

This equipment was developed, implemented and kept secret in the same manner as other electronic warfare programs.

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the US.

This is an integral part of the Domestic Intelligence network. The NSA’s EMF equipment can tune in RF (remote frequency) emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies).

The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PCs. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Detecting EMF Fields in Humans for Surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.

With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours a day.

The NSA can pick out and track anyone in the US.

_____________________________________________

Enhancement of Psycho Electronic Weapons and Remote Mind Control/ Jew World Order (above)

The Mind Controllers/Their Collaborators/And Apologists

a. many have knowledge of the whole system
b. are allowed private thoughts
c. easy to criticize and attack victim with his own thoughts
d. mob psychology allows massive ridicule and nazi-like acts
e. have access to information stolen from other victims
f. many “earn” a good salary for inflicting torture/have pension plans

Victim

a. Usually alone in his/her torture
b. has no privacy even for his/her private thoughts
c. cannot plan secretly, hold trade secrets or intellectual property
d. is subject to vicious physical and psychological attacks
e. does not know how harassment is happening or by whom
f. does not know why harassment is happening
g. may be accused of mental illness, called delusional
h. cannot get away no matter where he/she goes

Weapons deployed by Mind Controllers Against Victims: microwave voices, clicks, pops, brain zappping, direct harassment, newspapers, magazines, print media, TV including ads, gossip, rumors, social and job connections, various internet methods, mind raped thought streams, bugged conversations, private writings, public writings, public declarations
__________________________________________________

 3. NSA SIGNALS INTELLIGENCE USE OF EMF BRAIN STIMULATION

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL).

EMF Brain Stimulation has been in development since the MKULTRA program of the early 1950s, which included neurological research into radiation (non-ionizing EMF) and bioelectric research and development.

The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence”, defined as,

“information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation”.

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the US Government.

The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyze electrical activity in humans from a distance. NSA computer generated brain mapping can continuously monitor all of the electrical activity in the brain continuously. The NSA records and decode individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex, thus allowing audio communications direct to the brain (bypassing the ears). NSA operatives can use this covertly to debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves.

NSA operatives can use this surreptitiously to put images into a surveillance subject’s brain while they are in REM sleep for brain-programming purposes.

Capabilities of NSA Operatives Using RNM

There has been a Signals Intelligence network in the US since the 1940s.

The NSA, Ft Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brains. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

The above is a simple flowchart of Neuro-Electromagnetic Frequency Assaults showing methods that can be perpetuated by the Police and Military Intelligence Agencies toward Remote Mind Control Experiments, Behavioral Manipulation and Murder. 

4. NATIONAL SECURITY AGENCY SIGNALS INTELLIGENCE ELECTRONIC BRAIN LINK TECHNOLOGY

NSA SIGINT can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to monitor remotely and non-invasively information in the human brain by digitally decoding the evoked potentials in the 30-50 Hz, 5 milliwatt electromagnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 Hz, 5 milliwatt electromagnetic (EMF) wave.

Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials”. Every thought, reaction, motor command, auditory event and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials”. The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SIGINT uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way electronic Brain Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes). The images appear as floating 2D screens in the brain.

Two-way electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote neural monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system.

It is used by a limited number of agents in the US Intelligence Community. 

The above is a simple flowchart of Neuro-Electromagnetic Frequency Assaults showing methods that can be perpetuated by the Police and Military Intelligence Agencies toward Remote Mind Control Experiments, Behavioral Manipulation and Murder.

5. [NO HEADING IN ORIGINAL DOCUMENT]

RNM requires decoding the resonance frequency of each specific brain area.

That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band. (See Table 1 below)

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft Meade.

They used RNM 3D sound direct to the brain to harass the Plaintiff from October 1990 to May 1991.

As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to the authorities about their activities against the Plaintiff in the last 12 years. The Kinnecome group has about 100 persons working 24 hours a day at Ft Meade.

They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated.

This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

The ESCHELON GOVERNMENT TERRORIST NETWORK



6. NSA TECHNIQUES AND RESOURCES

Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country.

A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous systems to affect their performance. RNM can electronically identify individuals and track them anywhere in the US.

This equipment is on a network and is used for domestic intelligence operations, government security and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

Tens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.

Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA’s thousands of subjects in public. NSA agents in remote offices can instantly identify (using~ RNM) any individual spotted in public who is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with Hidden NSA Installed and Maintained Plastic Plumbing lines

The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing-aiding drugs).

This is an outgrowth of CIA pharmapsychology (psychopharmacology).

Brief Overview of Proprietary US Intelligence/Anti-Terrorist Equipment Mentioned

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country. All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).

Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980s.

Editor’s Note:

I tried ringing Mr Akwei to find out what was the out-come, if any, of his court case. He firmly but kindly told me that he could not speak about anything to do with the case over the phone and hung up. A subsequent conversation of similar length resulted in the information that he did not wish his address or phone number published with this article.

So, if we hear of any developments, we’ll let you know.

Its totally obvious from the above article that the US National Security Agency is none other than a covertly run terrorist organization.

Their highly sophisticated technology that is used to monitor and manipulate the minds of millions of innocent people daily, is a blatant expression of the dominating and authoritarian mentality that exists behind the facade of our so called democratic society.

George Orwell’s “THOUGHT POLICE” is an absolute reality in today’s world.

Whether we realize it or not, every individual within our society is negatively effected by this dictatorship attitude.

It has to change – It will change – It starts with you!

George Farquhar
Project Freedom

An example of EMF Brain Stimulation

Table 1

pastedGraphic_8.png

Brain Area

Bioelectric Resonance Frequency
Information Induced Through Modulation
Motor Control Cortex
10 Hz
Motor Impulse co-ordination
Auditory Cortex
15 Hz
Sound which bypasses the ears
Visual Cortex
25 Hz
Images in the brain bypassing the eyes
Somatosensory
9 Hz
Phantom touch sense
Thought Center
20 Hz
Imposed subconscious thoughts

RESOURCES

These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept of Justice, etc.) of Public Corruption by named NSA employees.

When no action was taken against the NSA employees, I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications.

1) The Body Electric: Electromagnetism and the Foundation of Life, by Robert Becker, M.D. Monitoring neuroelectric information in the brain ESB. (p. 265,313,318)
2) Cross currents, by Robert Becker. Simulating auditory hallucinations. Remote computer tampering using RF emissions from the logic board. (p. 70,78,105,174,210,216,220,242,299,303)
3) Currents of Death, by Paul Brodeur. Driving brain electrical activity with external EM; magnetophosphenes; Delgado. (p. 27,93)
4) The Zapping of America, by Paul Brodeur. DoD EM ESB research; simulating auditory hallucinations.
5) Of Mice, Men and Molecules, by John H. Heller 1963 Bioelectricity; probing the brain with EM waves. (p, 110)
6) The Three-Pound Universe, by Judith Hooper. CIA EEG research; EEGs for surveillance. (p.29,132,137)
7) In the Palaces of Memory, by George Johnson. EM emissions from the brain; the brain as an open electromagnetic circuit.
8) The Puzzle Palace, by James Bamford. Signals Intelligence; most advanced computers in the early ‘sixties.
9) The US Intelligence Community. Glossary terms at National Security Archives; Radiation Intelligence (information from unintentionally emanated electromagnetic energy, excluding radioactive sources).
10) The Search for the “Manchurian Candidate”, by John Marks. Electrical or radio stimulation to the brain; CIA R&D in bioelectrics. (p.227)
11) Secret Agenda, by Jim Hougan. National security cult groups.
12) Crimes of the Intelligence Community, by Morton Halperin. Surreptitious entries; intelligence agents running operations against government workers.
13) War in the Age of Intelligent Machines, NSA computer supremacy, complete control of information.
14) Alternate Computers, by Time-Life Books. Molecule computers.
15) The Mind, by Richard Restak, M.D. EEG Systems inc.; decoding brain EM emanations, tracking thoughts on a computer. (p. 258)
16) MedTech, by Lawrence Galton. Triggering events in the brain, direct to auditory cortex signals.
17) Cyborg, by D.S. Halacy, Jr, 1965. Brain-to-computer link research contracts given out by the US government.
18) Psychiatry and the CIA: Victims of Mind Control, by Harvey M. Weinstein M.D. Dr. Cameron; psychic driving; ultraconceptual communications.
19) Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas, Intelligence R&D; Delgado; psychic driving with radio telemetry. (p. 127,276,116,168,169)
20) Mind Manipulators, by Alan Scheflin and Edward M. Opton. MKULTRA brain research for information-gathering.
21) The Brain Changers, by Maya Pines. Listening to brain EM emissions. (p.19)
22) Modern Bioelectricity. Inducing audio in the brain with EM waves; DoD cover-up; EM wave ESB; remote EEGs
23) Magnetic Stimulation in Clinical Neurophysiology, by Sudhansu Chokroverty. Magnetophosphenes; images direct to the visual cortex.
24) The Mind of Man, by Nigel Calder. US intelligence brain research.
25) Neuroelectric Society Conference, 1971. Audio direct to the brain with EM waves; 2-way remote EEGs.
26) Brain Control, by Elliot S. Valenstein. ESB., control of individuals.
27) Towards Century 21, by C.S. Wallia. Brain Stimulation for direct-to-brain communications (p21)
28) Mind Wars, by Ron McRae (associate of Jack Anderson). Research into brain-to-brain electronic communications., remote neural EM detection (PP. 62 106, 136).
29) Mind Tools, by Rudy Rucker. Brain tapping; communications with varying biomagnetic fields (p82).
30) US News and World report, January 2nd 1984. EM wave brain stimulation; intelligence community hi-tech (p38).
31) Ear Magazine. Article on extremely low frequencies radio emissions in the natural environment; radio emissions from the human body.
32) City Paper, Washington DC January 17, 1992. Article FCC and NSA “complete radio spectrum” listening posts.
33) Frontiers in Science, by Edward Hutchings Jr 1958 (p48).
34) Beyond Bio Feedback, by Elmer and Alyce Green, 1977 (p118)
35) The Body Quantum, by Fred Alan Wolf
36) Cloning; A Biologist Reports, by Robert Gillmore McKinnell. Ethical review of cloning humans.
37) Hoovers’ FBI, by Former agent William Turner. Routines of electronic surveillance work. (p280).
38) July 20th 2019, by Arthur C. Clarke LIDA; Neurophonics; Brain-computer link.
39) MegaBrain, by Michael Hutchison. Brain stimulation with EM waves; CIA research and information control. (pp.107,108,117,120,123).
40) The Cult of Information, by Theodore Rosnak, 1986. NSA Directive #145; personal files in computers; computer automated telephone tapping.
41) The Body Shop, 1986 implantation of an electrode array on the visual cortex for video direct to the brain; other 1960’s research into electronically triggering Phosphenes in the brain, thus bypassing the eyes.
42) Evoked Potentials, by David Regan. Decoding neuroelectric information in the brain.

Primary Perpetrators According the John St. Claire Akwei and his lawsuit against the NSA:

a) NSA
b) NSA personnel (about 50,000 spies) in the community using cover identities such as social workers, lawyers and business owners.
c) DoD
d) Jew World Order
e) police
f) military intelligence agencies
g) Kinnecome group (about 100 individuals) at the NSA, Ft Meade
h) Tens of thousands of persons in each area working as spotters and neighbourhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel
i) NSA Agents working out of offices

B. Journalists, Authors, Lawyers, Independent Researchers

24. Elisabeth Thornburgh JD, Human Rights Defender in email to webmaster.

“RNC (Republican National Committee), DNC (Democratic National Committee), EU (European Union), UK, and Swiss politicians using brain scanning techs fmri (magnetic resonance imaging) techniques by NSA Sigint (signals intelligence), CIA and GCHQ (UK’s Government Communications Headquarters), NATO for free dating service, free political focus groups. They are using these weapons (as) pre-crime devices, radiofrequency weapons, behavior modification weapons, and EMRs for sex trafficking. Trace Congress and UK, Swiss, EU, UK politicians stocks in Neuralink, Raytheon, TEVET, metres, Sierra Nevada, etc. (re:) Insider Trading EEG (electroencephalogram) trafficking, IP theft.”

Primary Perpetrators according to Elisabeth Thornburgh:

a) RNC (Republican National Committee)
b) DNC (Democratic National Committee)
c) EU (European Union)
d) UK government
e) Swiss politicians
f) NSA SIGINT
g) CIA
h) GCHQ (Government Communications Headquarters)
i) NATO
j) US Congress
k) US politicians
l) Swiss politicians
m) EU politicians
n) UK politicians

25) Alison McDowell, independent researcher. (See: DIGITAL EMPIRE & TARGETED INDIVIDUALS: The War on Humanity and Natural Life, Alison McDowell Video Presentation w/ Partial Transcription; 8/17/21)

Alison McDowell: “What is coming is a bio-nanotech imperialism, a colonization of our very cells, even our very neural activities. The tools they will use are blockchain, the spatial web, the nanoelectronics and EM frequencies. .

Most people, 98.5%, don’t even have any concept of what is planned. So we are sitting ducks. If you don’t know what weapons are being arrayed against you, you can’t develop an optimal defensive strategy.

… These medical tracking systems are tied to sensor networks, including wearable technologies, and related to biosensors and the connection to graphene. Once the predictions are made, it’s not simply about threat assessment, which is what Mitre was always about, but now our bodies are viewed as weaponized systems against society, against the technocracy, against the SMART city polis that is coming, and what that means for us.

This is an imperial machine of domination that really is looking to usurp God as the Creator at the top of this cosmic universe. There is someone at the top (webmaster comment: obviously Satan, see below*) and they are looking to get the key to life and become the top coder and push God out of the way. That the singularity, I think, is their attempt to unlock the key of life. Along the way, the creation of the singularity is to learn us inside and out, not just humans but all living beings on the planet. And that is the function of the planetary computer. So they want to compress and flatten our 3, 4, 5 dimension universe to 2 dimensions for this mind upload so they can control it more easily.

That this transition involves cybernetics, systems engineering, nanoelectronics, ubiquitous computing, EM frequencies, and the weaponization of the atmosphere and the environment as a whole.

“We are involved in a military engagement… The bio-surveillance state is linked to health systems engineering. The goal is to have lots of us with lots of (bio)sensors. They can engineer the world in virtual space and then have those virtual worlds have direct consequences for our physical material world. I think the sensors are for building out the digital twin and that the electronic records and blockchain are part of that…

… The future of warfare is information and information is actually down to your neural function. So when we think about cyberwarfare at this point we are thinking about potentially hackable human beings down to a nano electronic level that can be used to cause harm and to engineer people in ways that they have no idea they are being engineered.”

The hedge fund data analytics goes with the e-government solutions, goes with the public-private-partnerships, goes with the biosensor data, all in the attempt to trigger the singularity in order to crack the code of life and rule the universe.”

Principle Perpetrators According to Alison McDowell:

a) imperial machine of domination
b) cybernetic/technocratic transition involves cybernetics, systems engineering, nanoelectronics, ubiquitous computing, EM frequencies, and the weaponization of the atmosphere and the environment as a whole.
c) military and health industry are behind bio-surveillance state
d) hedge fund data analytics
e) e-government solutions
f) public-private-partnerships

26) Marshall Thomas is author of “Monarch: the New Phoenix Program”. (See: Monarch: The New Phoenix Program (Audio Narration, Music, & Text: Insights of Marshall Thomas, author)

Marshal Thomas:

“The MONARCH program is the military’s weaponization of the CIA’s top-secret MKULTRA (and) other mind control experiments and programs.

The Vietnam war was the formative experience for a generation of CIA and military intelligence personnel involved in the Phoenix Program. They viewed the military defeat in Vietnam as a betrayal on the home front, a loss of will by domestic political enemies, not a military failure against a nationalistic revolution fought as a guerrilla war.

The Phoenix Program, assassinating suspected VC (Viet Cong) civilian sympathizers in a systematic manner, worked well and is the blueprint for the current black operation (aka gang stalking) targeting thousands of loyal Americans using state of the art microwave and radio frequency radiation weapons. The motivation to suppress domestic dissidents and to assassinate loyal American opposition stems from the perception of dissent against the war as treason. This philosophy is stated very clearly in the “Mind War” (1980) paper written by Michael Aquino. (Commander Paul E. Vallilee and Lt. Col. Michael Aquino’s “From PSYOP To Mind War: The Psychology Of Victory” (1980)).

The Department of Defense has a huge stake in futuristic technology that kills by ionizing and non-ionizing radiation, leaving little or no trace. The indiscriminate killing of the Phoenix Program continues on American soil. The terms “soft kill,” “slow kill,” and “silent kill” refer to the new way of killing the enemy in conflicts short of war and in small wars of the future. The counterinsurgency doctrine has now been applied to the home front so that the perceived betrayal of the military in Vietnam will not be repeated.

The generation of CIA and military intelligence led by Ted Shackley, (CIA Director) Richard Helms, (CIA Director) William Casey, Maj. John Singlaub, Richard Secord, Maj. John B. Alexander, Col. Michael Aquino, Paul Vallilee and others have built the perfect beast, using selective assassination that leaves no trace. The ability to cull the human herd with “silent kill” technology allows a few personalities to remake the entire society in their own image.

Extremely low frequency (ELF) technology slowly drives the target crazy with silent sound, similar to the CIA MKULTRA psychiatrist, Dr. Ewen Cameron’s, “psychic driving” technique, used to break down the target’s personality. The new buzzwords at the Pentagon are “synthetic telepathy” and “psychotronics.” Another means of attack on targets is the Smirnoff patent, that uses subliminal suggestion to manipulate human behavior. This patent was purchased by the remote viewing company, Psi Tech Corporation.

Military intelligence officers involved in developing these “non-lethal weapons” also control Psi Tech. Emotional manipulation is accomplished using Dr. Michael Persinger’s work to remotely project emotional states that the brain entrains or locks onto and emulates. One can broadcast rage or fear at an individual target to manipulate and control them. As if these methods were not enough to torture and murder people, add to this nightmarish toolbox, active gang stalking. CIA-created cults and other cause-oriented groups are used by actively harassing them in public in neutralization techniques described in counterintelligence operations manuals that are aimed at enemy agents.

In the race to develop a new weapon it has always been necessary to test it on human beings. Perfecting the latest weapons designed to kill slowly and silently as well as perfecting the process of controlling the human mind are no different. Once the weaponry has been perfected on these few thousand people, the same techniques will be applied en mass to the general population and then to humanity as a whole.”

Groups and Individuals Behind organized stalking-electronic harassment (OS-EH) identified by Marshall Thomas:

a) DoD
b) CIA
c) CIA-created cults and cause-oriented groups
d) DoD’s Monarch Program, CIA’s MKULTRA program, CIA/DoD’s Phoenix Program
e) Commander Paul E. Vallilee and Lt. Col. Michael Aquino, authors of “From PSYOP To Mind War: The Psychology Of Victory” (1980)
f) Ted Shackley, (CIA Director) Richard Helms, (CIA Director) William Casey, Maj. John Singlaub, Richard Secord, Maj. John B. Alexander, Col. Michael Aquino, Paul Vallilee and others
g) Psi-Tech Corporation
h) Dr. Michael Persinger, Professor of neuroscience at Laurentian University, Canada
i) Dr. Ewen Cameron, CIA MKULTRA psychiatrist

27) Whitney Webb, independent journalist: From: NWO Pre-Planned 2020 Election Chaos & The “New 9/11” (Brought To You By The 9/11 & Organized Stalking Perps!?); 3 Whitney Webb Interviews (10/30-11/1/20):

DHS and FBI JTTF (Joint Terrorism Task Force) Fusion Centers are getting information from their “partners,” tech companies and the ADL (Anti-Defamation League), that they then use to go after terrorists. The ADL functions as a lobby for the Israeli government and criminalizes anyone who criticizes Israel. The ADL is funded by the Mega Group, (Jewish billionaires) like the Bronfmann family, Ronald Lauder, and Pierre Omidyar who are at the forefront of de-platforming independent media.

Testimony from March, 2020 Congressional and DHS hearing:

Ms. Sanborn: “I can tell you from my time in the upper Midwest that one of our best partners was and still is the Jewish Community Relations Council of Minnesota and the Dakotas. These relationships are working. In just the first quarter of this fiscal year, these partnerships have assisted (FBI’s) JTTF in disrupting and arresting 38 terrorism subjects right here in the United States.”

Elizabeth Neumann (Deputy Chief of Staff of the Department of Homeland Security): ““All the counter-terrorism professionals I know at home and overseas (including “Five Eyes” plus Israel Super-spy Group) agree that another 9/11 is coming and we don’t know how to stop it…. We need to regulate speech online.”

(Reporter, Whitney Webb: “These people manufacture the crises they claim to be combating.”)

Some Primary Perps according to Whitney Webb:

a) DHS and FBI JTTF (Joint Terrorism Task Force) Fusion Centers
b) tech companies
c) ADL (Anti-Defamation League)
d) Israeli government
e) Mega Group (Jewish billionaires)
f) Bronfmann family (Jewish billionaires)
g) Ronald Lauder (Jewish billionaire)
h) Pierre Omidyar (Jewish billionaire)
i) Jewish Community Relations Council of Minnesota and the Dakotas
j) Elizabeth Newman (Deputy Chief of Staff of the Department of Homeland Security)

28) Rahul Manchanda, Esq. (Professor and International Attorney); From: The Surreptitious Reincarnation of COINTELPRO with the COPS Gang-Stalking Program

“In 1994, Senator Joseph Biden wrote and then President Bill Clinton enacted the Violent Crime Control and Law Enforcement Act (“VCCLEA”) establishing the Office of Community Oriented Policing Services (“COPS”) within the US Department of Justice.

… Targets can be chosen for many reasons: (1) political views; (2) whistle-blowing; (3) political dissidence; (4) asserting rights at work; (5) making the wrong enemy; (6) too outspoken; (7) investigating something that the state does not want investigated; (8) signing a petition; (9) writing a letter; (10) being called “suspicious” by a civilian spy/snitch; or (11) being a religious/ethnic/racial minority.”

Some Primary Perps according to Rahul Manchanda, Esq:

a) Senator Joseph Biden
b) President Bill Clinton
c) COPS (Office of Community-Oriented Policing Services)

29) Arkin, W.M. journalist, author, ex-military; From: “Signature Reduction” (SIGREDUX) = Dark State’s Undercover 60 K Spy Army = Unconventional Warfare = Counterintelligence/Contract Stalking = Man-Hunting Business = Slow-Kill Torture & Murder of Law-Abiding Citizens = Counterterrorism = Authoritarian Political War = Comprehensive Coercion = Cyber War/Stalking/Torture = Psychotronic War (PsyOps + Directed Energy & Neuro Weapons) = Havana Syndrome = G5 (Global Government Gangstalking Genocide GESTAPO) = NSA-Five Eyes Global Spy Network = UN-NWO Policing System = Traitors, Thugs, Criminals, Cowards, Bullies, Spooks, Weaponized Psychologists, 5D (Deceive, Degrade, Disrupt, Deny, Destroy) Devils = Highest Treason

“Signature Reduction” (SIGREDUX) is “the largest undercover force the world has ever known: the one created by the Pentagon, with tens of thousands of soldiers, civilians and contractors operating under false names, on the ground and in cyberspace…. Special operations forces constitute over half the entire signature reduction force… Military intelligence specialists reportedly make up the second-largest part of the secret army…. The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force.”

Primary Perps according to W.M. Arkin:

a) Signature Reduction Force (SIGREDUX) comprised of about 60,000 Special Forces and military intelligence specialists
b) works in cooperation with some 130 private companies and dozens of known and secret government organizations

C. Highlights From High-Level Perpetrators, military neuroscientists, defense contractors

30) Preston James, Ph.D., veteran, writer for Veterans Today. See: 23 Major Crimes of the International Zionist Criminal Syndicate (IZCS) Against America (from “YOU are THE ENEMY” by Preston James, Ph.D.

“What does the International Zionist Crime Syndicate (IZCS) run out of the City of London through its main Cutouts Israel and the hijacked USG attain? Obviously the IZCS’s unlimited funds and the fact it owns and/or controls almost every member of Congress and most USG officials and Judges, means that the ICS has been able to determine USG Policy.

It can do this because it owns and/or controls all USG top Policy-Makers, most of whom just happen to be outside of the visible USG and within the Secret Shadow Government (SSG).

Obviously the crimes of the IZCS and their espionage fronts like AIPAC, the ADL, SPLC and the like against the American Republic are far worse than the Rosenbergs.

There is now a New American War. It is inside America. It is called the “War on Terror”. The enemy is YOU! It is a staged, Phony War that has been created by the International Zionist Crime Syndicate (IZCS).

Every Military Force needs an enemy. Without an ongoing or perpetual war, the War profiteers quickly go bankrupt. In order to keep their profit stream going from war, war-profiteers need to create successive new wars or a significant threat of impending war.

This New War on Terror has an enemy. That enemy is the American People, You and Me…. And anyone who wants to restore the American Republic will also be defined as a “Domestic Terrorist”.

This new War on Terror has been socially engineered to provide a continual stream of degradations and provocations against the average American, provoking many in a never-ending stream to resist, and causing them to be labeled dissenters.

Once they have been labeled dissenters they are put on a Department of Homeland Security (DHS) Main Core Terror Watch List, which top insiders know is a targeted assassination list for later eradication of all Freedom-loving Americans who want to restore the American Constitutional Republic.

At present the Main Core list has over ten million Americans on it, and it is growing every day with thousands of new additions. Get a ticket for a driving offense or any arrest (even if later proven innocent) and it is highly likely you will be placed on this Main Core Terror Watch and Assassination list.

Over time these provocations are designed to result in a continuing stream of American dissenters that want to take their Republic back from the Zionist hijackers and will meet DHS tyranny and force with the like. Any and all Dissenters are now being defined as “Enemies of the State”.

… the Department of Homeland Security is now recognized as a major IZCS beach-head inside America and part of a long term plan to establish a foreign-controlled IZCS neo-Bolshevik military force inside America to tyrannize, wage war against, and eventually serially mass murder most Americans.

DHS is a terrorist group, hand assembled by American/Israeli dual citizen Traitors and is designed to tyrannize, capture and eventually be deployed against Americans to serially mass murder them. This is why they have been called the New American Gestapo of the Neo-Bolshevik Red Cheka Terror Machine.

This is why some top insiders refer to DHS as the New American Gestapo or Stasi. Some see it now morphing into a New Red Cheka mass-murder machine for dispensing Bolshevik-style Red Terror and the serial mass-murder of Americans.

The War on Terror is obviously a Phony. But it has been the greatest boon to the American Defense Complex ever, with many times more net American Taxpayer dollars spent on this war than any other war in history, including WW2 or the Vietnam War.

Here is the new game in the so-called American Defense Industry. It is a stateside game and it involves magically transforming any and all innocent, Constitutional, law-abiding citizens into Domestic Dissenters, “Domestic Terrorists” or “Potential Domestic Terrorists. Either of these categories is considered “reasonable suspicion” enough to place then on numerous “watch lists” and to stalk or gang-stalk these folks Cointelpro-style.

Actually the real situation is just the opposite–it is the USG and specifically the Fusion Centers and the Department of Homeland Security run by perverts, thugs and lowlifes and enemies of “we the people”. These scum are the real risk to the true and actual National Security of America the Republic and a significant risk to all honest, law abiding, Constitutional Americans. And the USG and DHS and Fusion Center officials are nothing less than world class criminals committing both High Treason and Sedition against America the Republic. The USG has been hijacked and is being run by those who have turned everything upside down.”

….A SERIOUS SPELL, A RACIAL DELUSION OF SUPERIORITY HAS BEEN CAST ON MANY JUDAICS NO MATTER WHERE THEY LIVE, BUT ESPECIALLY SO AMONG THOSE LIVING IN GREATER ISRAEL, WHERE THE LUCIFERIAN HEX FLAG FLIES. WHETHER TRUE OR NOT, TOP ZIONIST LEADERS BELIEVE THIS HEX FLAG SIGNIFIES THE MERGER OF DEMONIC FALLEN ANGEL BEAST-BLOODLINES FROM ABOVE, BRED WITH HUMAN FEMALE BLOODLINES BELOW. THEY BELIEVE THIS MAKES THEM THE “CHOSEN ONES” OF THEIR GOD LUCIFER, AND SUPERHUMAN OR PART GOD ALSO.”

Listed below are some of the IZCS crimes against America:

1. The NSA and all American Intel has been completely hijacked by the IZCS and all NSA intel data goes directly to Israeli Defense Contractors and Israeli communication Corporations that process all American phone calls and data transmissions. This means that the Five Eyes International Intel System is really a Six Eyes System controlled by Israeli Intel entities and proprietaries.

Thus, America has no real Intel, and Israeli Intel has control over all American politicians, judges and officials by use of this Intel for human compromise, blackmail and sophisticated mind-kontrol operations. Any time factions within American Intel agencies (there are 37 and growing) form opposition to the IZCS, this is readily discovered through Israeli Intel intercepts of NSA raw Intel and actions to neutralize such efforts are quickly deployed–whatever is required.

The conclusion here is that America no longer has any real Intel of its own–none at all–it is all compromised and hijacked by Israeli and City of London Cutouts and contractors.

2. Because the IZCS has hijacked all American Intel directly from NSA feeds, the IZCS has a long history of stealing American intellectual property and providing it to their corporations. The IZCS can also hijack American corporate bids and defeat them repeatedly until many companies go out of business.

3. The IZCS has compromised almost every single member of Congress, US Supreme Court Judges, most Federal, and almost every single USG official and American Intel Director.

pastedGraphic_9.png

4. The IZCS’s new DHS is a zionist terrorist front, a new Internal American Army that has been deployed against YOU as their NEW ENEMY. The IZCS has created and deployed DHS as the New American Stasi and a New American Neo-Bolshevik Red Cheka. It is controlled by an Israeli-American dual citizen who made millions of USD from selling unshielded X-ray machines to the TSA, which is creating numerous cancer clusters among TSA officers.

5. The principal goal of the IZCS in America is to deploy DHS to tyrannize and degrade Americans and then eventually to start a live “shoot to kill” war against ordinary Americans who organize to take their government back and restore the American Constitutional Republic. This tyranny by DHS is planned to culminate in serial mass-murder of up to 80% of Americans–one way or another.

6. The IZCS has set up and deployed AIPAC, the ADL, the SPLC and others to serve as agents of espionage inside America, to work to destroy its institutions of government, dirty up Americans and to destroy the American Family, America’s language borders and culture and to destroy Christianity and Deism in general.

7. The IZCS has hijacked top factions in the CIA, DEA and other American Intel and uses them to traffick illegal narcotics and drugs into America to raise money for deep-cover covert ops.

8. The IZCS has compromised almost every major Urban and Suburban police Department, coercing them to sign secret transfer of jurisdiction agreements giving the Feds, DHS and the Fusion Centers complete jurisdiction in any matter they choose. In return, they are bribed with “stolen” war materials, machine guns, rounds, armored cars and, even in some cases, grenade launchers.

9. The IZCS has stolen numerous loads of nuclear materials from US DOD contractors and refiners for their Dimona Plant and nuclear storage center.

10. The IZCS has used NSA-provided intel to murder hundreds of witnesses to their crimes and federal Whistle-blowers. The rest that they don’t murder are watched and often become victims of targeted harassments, placed on DHS and Fusion Center “Terror Watch Lists”, “No-Fly” Lists and “No work lists”. Take the example of Ronald Reagan’s Secret Agent, the Great American Hero Lee Wanta who was instrumental in “bringing down” the evil Soviet Union. Lee Wanta has been wrongfully imprisoned, tortured, and endures ongoing harassment for his heroic and impressive service to all Americans.

Or consider Mark Novitsky, another Great American Hero who refused to do wrong and coverup crimes while working for an NSA contractor. Novitsky continues to be harassed daily by advanced psychotronic and other means, cannot obtain any employment because he is on a DHS secret “no-work” list and any potential employer he applies with is paid a visit by a DHS officer which lies to the potential employer and tells them Novitsky is a “national security risk” and a “suspected domestic terrorist”. With visits like this to enforce no-work lists, employers are usually shown a national security letter which threatens ten years in a Federal Prison and a $10,000 USD fine if they ever tell anyone of the visit or why the applicant could not be hired. Both of these American Heroes have paid a terrible price for obeying the law and for putting the welfare of the American People first. This harassment of Novitsky has been going on for 12 years and it is disgusting and criminal too with DHS committing serial felonies against Novitsky and yet getting away with it because of the phony War on Terror. By the way there are witnesses to Novitsky’s harassment and he does not exaggerate any of his reports of this harassment.he is releasing more and more facts about the crimes of the entities he works for so stay tuned. You will be surprised how much he knows. I know I was when I found out.

Lee Wanta should have gotten the Congressional Medal of Freedom for his gallant service for America and a ticker-tape parade in NYC after the fall of the Iron Curtain. Instead he was wrongly jailed on phony charges like over 1,000 CIA agents and operatives to shut them up and keep them from fingering Bush 1 in any drug trials over Mena and the Iran Contra drug trafficking scandal.

11. The IZCS has hijacked the America Monetary Production and Distribution System and transformed Americans into debt-slaves, drastically reduced the Middle Class and the standard of living, and done this by massive asset-stripping of American wealth and prosperity.

12. The IZCS has used its Cutouts to debase American culture, take the God of our Founding Fathers out of the schools and institutions where they had certain Bible verses and phrases etched in stone, destroy traditional male and female sex roles, destroy the family, promote sexual perversion, promote promiscuity and sexual irresponsibility and addiction, promote diversity and political correctness and illegal immigration and multi-culturalism.

13. The IZCS has completely compromised all of the Major Mass media, transforming it into a propaganda dispenser for the USG and the Central Banksters which are completely under their control. Thus the Major media is now the Controlled Major Mass Media (CMMM).

14. The IZCS has hijacked American seed companies and most major food processors and is in the process of deploying sophisticated GMO’s which will, over time, radically increase the death rate of Americans.

15. The IZCS has hijacked Big Pharma and Big medicine and has used it to deploy vaccines containing monkey viruses like SV40 and numerous harmful adjuvants like squalene and aluminum or formaldehyde, as well as so-called preservatives like ethyl mercury.

16. The IZCS has hijacked many large Insurance Companies and used them for its own designated purposes.

17. The IZCS has deployed contract aircraft through their hijacked intel groups like the CIA that are spraying toxic weather and eugenic substances in the atmosphere. They have also been able to covertly add these toxic substances to ordinary jet fuel.

Numerous samples of these substances have been collected by researchers and scientists who have had them analyzed. What they found were toxic levels of nano-particulized aluminum, barium slats, Hemophilus Influenza, red blood cells, white blood cells, toxic molds, and other strange fiber like substances and compounds.

18. The IZCS has used its vast criminal networks and resources to launder its drug money by buying up large real estate entities and banks and is able to finance almost every new major corporate building with laundered drug money.

19. The IZCS has used a great deal of its money from illegal drug trafficking to build deep underground military bases (DUMBS). Some of these bases are claimed by top insiders to be joint ventures with alien entities and have special genetic labs involved in the development of alien ET/human hybrids.

20. The IZCS is the world’s top Mind-kontroller. It has used hijacked American Intel and its defense contractors to develop and deploy advanced high technology for psychotronic, direct brain entrainment and sound-based subliminal mind-kontrol.

21. Israel used advanced mind-kontrol on those who accept its all-paid junkets. Visitors end up drinking their special Kool-aide and are hit with sophisticated psychotronics, becoming significantly mind-kontrolled to operate as functional zionists without even being aware of it.

22. The IZCS has created what they call the federal family. They have done this by creating Fusion Centers, the DHS, the TSA and numerous armed (previously unarmed) agencies like the Department of Education. Unduly large salaries and extremely liberal benefits have been provided, as well as a special anointing with authoritarian powers to kill with very little accountability if any, due to the War on Terror.

Many of these federal Family folks have been mind-kontrolled by shoulder-held constant on pulsed beam microwave radios and other highly advanced psychotronics, which increases their tendencies to tyrannize and become violent with the public and minimizes their ability to control violent impulses which may crop up.

23) The IZCS has militarized local police departments and many Sheriff’s departments. Their ADL provides most of the police training and drives a hard line against any public dissent, describing it as “domestic terrorism”. It controls what the Fusion Centers and DHS put out as war propaganda which labels the public as “Domestic Terrorists”.

Here is the first part of one of their confidential lists of Domestic Terrorists or Suspected Domestic Terrorists: Catholics, Evangelical Christians, Veterans, Libertarians, Constitutionalists, Tax protestors, Gun owners…..These reports of course are pure ADL propaganda lies and complete smear jobs, all intended to provoke police and Federal Family officers to tyrannize and easily become violent with innocent ordinary Americans or anyone who decides to peacefully protest, an American Constitutional Right.

Remember that the operational goal of the top Policy-Makers who are tools of the IZCS is to provoke a full scale shooting war between ordinary Americans and their police and Federal family Members such as DHS.

Conclusion: The IZCS has hijacked America and has deployed numerous weapons against it now culminating in a phony, staged War on Terror, and if you are an American or live in America, one way or another YOU will soon become THEIR NEW ENEMY. Yes, from here on out if you live in America, you are the designated enemy of the USG and its agents of war DHS, the TSA, FEMA, the Alphabets and the US Military in this new War On Terror (which is a war against the American people who are not in the “federal Family”).

Primary Perpetrators according to Preston James, Ph.D.:

a) International Zionist Crime Syndicate (IZCS)
b) Israeli government
c) Israeli-American dual citizen, Michael Chertoff, first head of DHS
d) Jewish lobby groups, AIPAC, the ADL, the SPLC and others

The IZCS has hijacked the following American functions:

e) hijacked US Government
f) central bankers
g) Secret Shadow Government (SSG)
h) Department of Homeland Security/FBI Fusion Centers
i) every member of Congress and most USG officials and Judges
j) USG top Policy-Makers
k) NSA
l) all American Intel agencies
m) DHS: a zionist terrorist front, a new Internal American Army
n) IZCS has hijacked top factions in the CIA, DEA and other American Intel and uses them to traffick illegal narcotics and o) drugs into America to raise money for deep-cover covert ops
p) almost every major Urban and Suburban police Department
q) the America Monetary Production and Distribution System
r) Central Banksters
s) Major Mass Media
t) Big Pharma and Big medicine
u) American seed companies and most major food processors
v) many large Insurance Companies
w) local police departments and many Sheriff’s departments
x) TSA, FEMA, the Alphabets and the US Military

31) Dr. James Giordano, Georgetown University neuroscientist, neuroweaponologist, and “neuro-ethicist.” See: Weaponizing Brain Science: Neuroweapons w/ DARPA “Neuroweaponologist” Dr. James Giordano (Parts 1 & 2)

“We” (Pentagon-big science-National Security Establishment, DOD, DARPA, NIH, etc.) need “viable targets” “to test our latest neuroweapons and neurotechnology.” Giordano also noted that “mortality and morbidity (in these programs) is real.”

Dr. James Giordano (Professor of Neuroscience, Georgetown University, and DARPA/U.S. Army/EU Human Brain Project Consultant) in “Brain Science from Bench to Battlefield: The Realities – and Risks – of Neuroweapons” lecture, August 29, 2017; From: Confessions of a High-Level Perp: Dr. James Giordano – Battlespace/Organized Stalking Applications of Neuroscience and Neuroweapons (2017 youtube lecture, my transcription and notes, and pdf) and Weaponizing Brain Science: Neuroweapons – Part 2 of 2:

“I refer to myself as a “neuroweaponologist… Neuroscience captures $175 billion dollars annual market space…. The brain is the next battlespace…. We are targeting the brain…. Like any race, the morbidity and mortality, going at this speed… is real.

We are tracking neurological or brain signatures of key targeted individuals that are thought to represent whole groups. If I understand how his or her brain works and do this on a broad enough scale, I can develop patterns and I can use this in ways that informs my intelligence; this force multiplies and synergizes my human intelligence (HUMINT), my signals intelligence (SIGINT), and my communications intelligence (COMINT). NEURINT (Neuro intelligence) coupled with assessment and access gives me these capabilities”….

….”(Regarding the weaponization of neuroscience): That level of deep surveillance… examines the idea of what type of surveillance and its informational transfer and ultimately actionability, would obtain and entail. One of the things that we argued for very strongly is that the very least of what is necessary is a cooperative, collaborative “whole of government approach”. A cooperative, collaborative “whole of government” approach. But although that is necessary, we argued that that is not sufficient.

Working with my colleagues, Former Navy Captain, Rick Bremsiff, Attorney Accounting General Snow, Dr. Diane DeEuliss, Joe DeFranko, what is really required in that type of deep surveillance that carries it through for the acquisition of information all the way to actionable entities that would then target certain things to be able to then mitigate our strategic competitors’ and/or adversaries’ (Webmaster: “targeted individuals”) efforts in this area would require more “a whole of nation approach.” Where now we have almost a seamless triangulation between government entities, research entities, and commercial entities that are then able to mobilize those resources in the deep surveillance that is necessary for acknowledging, addressing, and assessing relative risks that may become threats, quantifying the risk to threat index, and then identifying what aspects of those quantifiable risks are mitigable and/or preventable, and then engaging the resources that are necessary to do that.”

Primary Perpetrators according to Dr. James Giordano:

a) Pentagon-big science-National Security Establishment, DOD, DARPA, NIH, etc.
b) Dr. James Giordano, Former Navy Captain, Rick Bremsiff, Attorney Accounting General Snow, Dr. Diane DeEuliss, Joe DeFranko
c) “whole of nation” approach involving seamless triangulation between government entities, research entities, and commercial entities

32) Dr. James Canton, author and futurist, CEO and Chairman of Global Inc. and Institute For Global Futures, advisor to Fortune 1000 companies, US military Joint Chiefs of Staff, and governments. See: Neuroweapons, “Dark Network Supply Chains,” “Man-Hunting Business” (aka GANGSTALKING) & “Hybrid Warfare;” Presentation By Dr. James Canton (Video, Transcription, and My Commentary)

And Neuroweapons, Havana Syndrome, “Dark Network Supply Chains,” “Man-Hunting Business” (aka GANGSTALKING) & “Hybrid Warfare;” Presentation By Dr. James Canton (Video, Transcription, and My Commentary)

“There are two parts of Neurotechology: The first is the “soft” or “nonlethal” dimension. This creates dysfunctionality and cognitive impairment, inability to make good decisions, dizziness, health effects. This is a weapons system to create cognitive impairment of individuals. The second is the “hard” dimension, which refers to killing people.

The issue of non-lethality (as per “nonlethal weapons”) is associated with neurotechnology. The American officials attacked in the embassies in Cuba and China (webmaster comment: referring to the so-called “Havana Syndrome”) were attacked to demonstrate a proof of concept, that is, to demonstrate an operational, deployed capability of soft, non-lethal neuroweapons that could and did “take them out of the game.”

Soft neurotech (these non-lethal weapons) have many possibilities in “hybrid conflicts”…. And these are now available.

I came up with the concept of “Dark Networks” when I was advising SOCOM (Special Operations Command) on this concept of “Bad Guy Hunting-Targeting”…..

In global Dark Networks, which have evolved, you’ve got mixtures of terrorists and sovereigns, a variety of actors, rogue states, radicals, non-states, criminals. You’ve got to have banking, logistics, you need to have things to trade that are not monetary, you need to have crypto-currencies, the ability to have monetary forms to support your operation that are not transferable or discoverable; you need to have a complete supply chain. Just like Wal-Mart has a supply chain, Dark Networks have supply chains. Their goal is to produce disruption and conflict. So if you are in the Bad-Guy Hunting Business, you’ve got to have a supply chain.”

“What are the top, exponential technologies that are game changer technologies for our civilization that affect everything from health care to defense to manufacturing? Our group identified these as: Nano, bio, IT, and neurotechnology, and later I added quantum as another strategic technology that would yield massive new opportunities….

Neural nets at the core of AI (Artificial Intelligence) involve over a trillion dollars of financial trading.

The American officials attacked in the embassies in Cuba and China were attacked to demonstrate a proof of concept, that is, to demonstrate an operational, deployed capability of soft, non-lethal neuroweapons that could and did take them out of the game. I’m not interested in killing them, just in making sure they can’t get back in the game.

(“I want him out of the game and I don’t want him to be able to get back in.”)

Neurotechnology will drive the next “hybrid war,” which has already started. In terms of conflicts, the following are apparently legal: basically relating to psychological warfare, dysfunctionality stuff, rendering lack of capacity, acoustic weaponry, etc.:

a) Microwave RF Anti-Functional and Anti-Personnel Weaponry, b) Chemical Anti-Functional Weaponry, c) Chemical Psychological Effects Via Sensory Organs Weaponry (i.e., smell), d) Chemical Personnel Incapacitation Weaponry (Non-warfare, hostage/terrorism only), e) PSYWAR, f) Acoustic Weaponry, and g) Mechanical Micro Dust

Neuro-hacking includes the ability to create thoughts and blend them with AI. Neuro-hacking allows us to adjust memories at the nano-scale.

I came up with the concept of “Dark Networks” when I was advising SOCOM (US Special Operations Command) on this concept of “Bad Guy Hunting Business -Targeting”….. So these Dark Networks work together in a supply chain to plan, implement, and deliver. To learn their identity, follow the money, follow the logistics, follow the customers, follow the producers….

Slide: “There is no longer any distinction between what is and is not a battlefield.”

Who are the potential bad actors that would do this? The Russian view of modern warfare is based on the worldview that the major battlespace is the mind, according to the National Defense Academy of Latvia Policy Paper. Subtler tools are information warfare, penetration of elections, fake news, fake elections, and non-attributable phenomenon, such as these attacks in Cuba and China. They are part of the same thing.”

Dr. James Canton, from “The NeuroFuture: Emerging Technologies, Actors, and Geopolitics” lecture at SOFWERX J5 Donovan Group Radical Speaker Series at SOFWERX-US Special Operations Command (USSOCOM) Conference, Sept. 20, 2018. Canton, (Jewish?!) CEO and Chairman of Globalinc. and Institute For Global Futures, advises governments, Fortune 1000 companies, and the Joint Chiefs of Staff of the U.S. military.

(See: Neuroweapons, “Dark Network Supply Chains,” “Man-Hunting Business” (aka GANGSTALKING) & “Hybrid Warfare;” Presentation By Dr. James Canton (Video, Transcription, and My Commentary))

Primary Perpetrators According to Dr. James Canton:

a) Global Dark Networks
b) Global Dark Networks supply chains
c) “Bad-Guy Hunting-Targeting Business”

33) Col. Richard Szafranski (RAND Corporation); In: Military Review, US Army Command and General Staff College, 1994; From: Gangstalking/Electronic Torture Is ¨Neocortical Warfare,¨ ¨Metaphysical Control,¨ US Military Doctrine, & High Treason (Perspectives of Military Strategist and 2 Targeted Individuals):

“The object of war is to subdue the hostile will of the enemy, make him comply with our will, i.e., to force or encourage him/it to make the choices we want him to make…. We believe ¨will¨ is brain centered, therefore we must enter the brain….

Neocortical warfare strives to control or shape the behavior of enemy organisms without destroying the organism. It does this by influencing, even to the point of regulating, the consciousness, perceptions, and will of the adversaries´ leadership, which is the neocortical system (brain)…. NW seeks to penetrate adversaries’ recurring and simultaneous cycles of observation, orientation, decision, and action.

(Regular, Irregular/Civilian, and Special) Forces could execute both violent and nonviolent operations. (Our nonlethal and lethal forces) will understand that… the enemy (“target”) is the ¨customer¨ and the enemy´s segmented society is the ¨workplace¨ of neocortical warfare. Since adversaries may abound, global reach will be an important requirement in the world that is emerging.”

Primary Perpetrators According to Col. Richard Szafranski:

a) US Army
b) (Regular, Irregular/Civilian, and Special) Forces
c) the enemy (target) is considered the “customer”
d) enemy’s segmented society is considered the “workplace” of neocortical warfare

34) Ben Norton, In: “Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries” (Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries (by Ben Norton, October 8, 2021))

Western governments in the NATO military alliance are developing tactics of “cognitive warfare,” using the supposed threats of China and Russia to justify waging a “battle for your brain” in the “human domain,” to “make everyone a weapon.”

The US-led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries (webmaster: i.e., so-called “targeted individuals”), including economic warfare, cyber warfare, information warfare, and psychological warfare. Now, NATO is spinning out an entirely new kind of combat it has branded cognitive warfare. Described as the “weaponization of brain sciences,” the new method involves “hacking the individual” by exploiting “the vulnerabilities of the human brain” in order to implement more sophisticated “social engineering.”

This document (“Cognitive Warfare”) shows that figures in the NATO military cartel increasingly see their own domestic population as a threat, fearing civilians to be potential Chinese or Russian sleeper cells, dastardly “fifth columns” that challenge the stability of “Western liberal democracies.”

NATO’s development of novel forms of hybrid warfare come at a time when member states’ military campaigns are targeting domestic populations on an unprecedented level.

(Francois) Du Cluzel defined cognitive warfare as the “art of using technologies to alter the cognition of human targets.”

Those technologies, he noted, incorporate the fields of NBIC – nanotechnology, biotechnology, information technology, and cognitive science. All together, “it makes a kind of very dangerous cocktail that can further manipulate the brain,” he said.

“The nature of warfare has changed,” the report emphasized. “The majority of current conflicts remain below the threshold of the traditionally accepted definition of warfare, but new forms of warfare have emerged such as Cognitive Warfare (CW), while the human mind is now being considered as a new domain of war.”

For NATO, research on cognitive warfare is not just defensive; it is very much offensive as well.

“Developing capabilities to harm the cognitive abilities of opponents will be a necessity,” du Cluzel’s report stated clearly. “In other words, NATO will need to get the ability to safeguard her decision making process and disrupt the adversary’s one.”

And anyone could be a target of these cognitive warfare operations: “Any user of modern information technologies is a potential target. It targets the whole of a nation’s human capital,” the report ominously added.

“As well as the potential execution of a cognitive war to complement to a military conflict, it can also be conducted alone, without any link to an engagement of the armed forces,” the study went on. “Moreover, cognitive warfare is potentially endless since there can be no peace treaty or surrender for this type of conflict.”

This weaponization of neuroS/T (Science/Technology) can and will be fatal, the NATO-sponsored study was clear to point out. The research can “be utilised to mitigate aggression and foster cognitions and emotions of affiliation or passivity; induce morbidity, disability or suffering; and ‘neutralise’ potential opponents or incur mortality” – in other words, to maim and kill people.”

Primary Perpetrators According to Ben Norton:

a) US-Led NATO (North Atlantic Treaty Organization) Military Cartel (i.e., Western governments in the NATO military alliance)
b) cognitive warfare: (new 6th domain of warfare) utilize technologies that “weaponize brain science” and incorporate the fields of NBIC – nanotechnology, biotechnology, information technology, and cognitive science.

35) Steven J. Smith, author of National Security Agency (NSA) – Part 1. Citadel of evil, Part 2. A Prison For The Mind, Part 3. Collateral Damage

“The American government, ostensibly engaged in protecting the lives and property of American citizens, is simultaneously (and covertly) stripping those very same citizens of their wealth, security, and freedom. To be blunt, the American government is using NSA controlled psychics in a secret war against its own citizenry. The ultimate goal being to turn every single man, woman, and child living in America, into a government controlled slave laborer. It has taken 50+ years, but the transformation of America from a bastion of freedom and democracy, into a vast slave labor camp spanning an entire continent, is almost complete. Slavery does not require guards with guns, or cells with bars, or even awareness of enslavement. If you can build a prison for the mind…

The NSA (national security agency) was created in 1952, is headquartered at Fort Meade Maryland, and administered by the United States Department of Defense (DoD). Government generated disinformation portrays the NSA as strictly involved in the collection and analysis of foreign communications. In other words, electronic surveillance of foreign countries. Although specifically bared from domestic surveillance of American citizens by the Foreign Intelligence Surveillance Act (FISA) of 1978, the NSA has recently admitted to limited spying on American citizens. If this were the limit of NSA transgressions, the essay you’re about to read would not be necessary. Sadly, the NSA is engaged in illegal activities that make electronic eavesdropping on American citizens seem almost trivial by comparison.

The NSA is involved in some of the most heinous crimes and vicious acts of barbarism ever perpetrated on humanity. Even the monstrous autocracies committed by WWII Nazi war criminals pale in comparison to the crimes of the NSA. This document concerns it self with nothing less than the wholesale medical experimentation, torture and outright murder of American children, some less than six years old. The rationale behind these despicable acts? To create a secret slave army of government controlled super psychics, which at present, number in the tens of thousands. The solders (both men and women) of this vast psychic army live and die at the whims of DNI (director of national intelligence) and NCA (national command authority). Its Ironic that Nazi biologists and doctors involved in human experimentation, relocated to America in the aftermath of WWII (under Operation Paperclip), were the precursors responsible for this foul excursion into the darkest corners of evil and depravity.”

Primary Perpetrators According to Steven J. Smith:

a) US government
b) NSA (National Security Agency)
c) NSA-controlled psychics
d) Dept. of Defense (DoD)
e) DNI (Director of National Intelligence)
f) NCA (National Command Authority)

IV. Results: Summary of Findings

This compilation of testimonies from exceptionally brilliant and brave TIs and others above is, as noted, meant to:

1) help clarify the nature of targeted individual program,
2) identify the main groups and individuals behind it,
3) provide a data base of information and insights for a theoretical (or real) Grand Jury of citizens throughout the world

Again, I have selected the above testimonies from among 100s of others because I believe they are highly accurate and reliable. These testimonies span the past over half century in which governments and cooperating agencies and individuals have carried out these illicit, criminal activities on innocent civilians. The list of primary perpetrators furnished by these experts cannot be exhaustive by any means. However, this reveals the major perpetrators and systems deployed in the TI program.

Like so many other massive crimes that have gone unpunished in America since World War II (including 9/11, the JFK assassination, Covid-19 scamdemic, etc.), these crimes continue to be covered up and remain unpunished. Victims and their families cry out for justice. These and other related deep state crimes involve the coordination of numerous different military, intelligence, mafia, and corporate entities, that is, the so-called “INTERAGENCY.” What is distinctive about the system exposed herein is that it seems to have successfully weaponized virtually all segments of society against individuals who are secretly watchlisted, targeted and tortured!!!!! This can only be possible through an all-encompassing 1) command and control structure, and 2) electronic communications system.

The following summary of insights from our expert panel indicate the following groups and individuals are primary perpetrators of this ongoing “war crime”/“crime against humanity:” Note that in many instances, identities of the guilty parties are obfuscated by the fact that the same entity or entities may have different names and descriptions.

ENTITIES BEHIND “THE ARCHITECTURE OF OPPRESSION”/CONTROL SYSTEM IN AMERICA AND OTHER COOPERATING STATES

A. Global-International Perps

1) financial elites/central bankers/owners of the Federal Reserve and City of London, “Mr. Global” (1,12,20,30)
2) International Zionist Criminal Syndicate (IZCS)/Jewish and Jewish/American mafia aka Jewish (Brooklyn/New Jersey) mafia/Meyer Lansky National Crime Syndicate, Mafia (1,9,13,30) total=4
3) Central Banking/Warfare System, imperial machine of domination (12,25)
4) New World Order (1,2,18)
5) the Organization/Brotherhood/Firm/Enterprise = FBI, British Intelligence and local lackies (1,2,9,18)
6) Illuminati with the Star of David (Jews and Israel); (Jewish) New World Order, Sons of Satan (1,2,3,6) total=4
7) Jewish sources (Synagogue of Satan/Sons of Satan) (1,2,3,6,14) total=5
8) Freemason/satanists run the system (2,9)
9) Jew World Order (23)

(#1-9 together= almost the same entity: (1,2,3,6,9,12,13,14,18,20,23,25,30) total=13)

10) imperial machine of domination (25)
11) transnational intelligence cabal (5)
12) NSA Global Spy Network (5)
13) British intelligence/MI6, GCHQ, JTRIG (1,5,24)
14) 5 Eyes Spy Agreement (FVEY, US, UK, Canada, New Zealand, Australia) (5)
15) US-Led NATO (North Atlantic Treaty Organization) Military Cartel (i.e., Western governments in the NATO military alliance) (5,8,9,24,30,34) total=6
16) psychopaths (2)
17) US and Israeli satellites (1)
18) hedge funds/data analytics (23)
19) mafia states (US, Canada, Israel named) (13)
20) Drug cartels (1) public-private-partnerships (PPP) (23)
21) e-government solutions (23)
22) professions of psychiatry/neuroscience/psychology/cognitive science (1)
23) United Nations (20)
24) Global Dark Networks (30)
25) Global Dark Networks supply chains (30)

B. US Government (INTERAGENCY)/American Perps

26) “whole of nation” (31)
27) Deep State Shadow Government (7,32)
28) National Security Racketeering Network (7)
29) US government (1,2,3,8,14,16,17,18,24,30,35) total=11
30) (most of) US Congress (1,22,30)
31) Federal Reserve (20)
32) “whole of nation” approach involving seamless triangulation between government entities, research entities, and commercial entities (29)
33) secret, central governance/Central Banking/Warfare System (1, 12)
34) Covert Social Credit System with three primary lines of control: 1) financial carrots and sticks, 2) surveillance and mind control, 3) covert ops, including covert physical intervention (12)
35) DoD; Dept. of Defense, all military branches develop “the technology” and involved in targeting operations (1,5,7,8,11,16,19,23,24,25,26,30,31,35) (Total=14)
36) Pentagon (DoD)-Big Science Establishment (31)
37) Navy SEALS (9)
38) US Navy (17)
39) Marine Corps wet ops/special ops (9)
40) US Marine Corps (17)
41) Special Operations Forces (USSOCOM) (9,18)
42) US Air Force (17,19)
43) DARPA (Defense Advanced Research Projects Agency of US Army) (16,19,31)
44) US Army (6,33)
45) US Army PSYOPS aka MISO (Military Information Support Operations) (10)
46) US Air Force (17,19,30)
47) Shriever Air Force Base, Colorado (20)
48) Joint Chiefs of Staff (9)
49) DoD’s Monarch Program (28)
50) NSA (National Security Agency); Signals Intelligence (SIGINT) and Human Intelligence (HUMINT) (1,3,4,5,7, 8,9,11,23, 24,30,35) (total=13)
51) SIGINT AND HUMINT by NSA, CIA, DOD, FBI, DHS, and NATO (5,22,28)
52) NSA General Council (3)
53) NSA Security (3)
54) NASA (Nazis) (6)
55) Department of Justice (DOJ) (7,20)
56) CIA (1,5,8,10,14,16,17,19,20,22,23,26,30) total=13
57) CIA/military “information operations” (10, 22)
58) CIA’s MKULTRA program, CIA/DoD’s Phoenix Program (22, 26)
59) FBI and FBI’s JTTF (Joint Terrorism Task Force) (1,3,7,8,11,17,20,26,30) total=9
60) FBI Terrorist Screening Center (20)
61) Signature Reduction Force (SIGREDUX) comprised of about 60,000 Special Forces and military intelligence specialists works in cooperation with some 130 private companies and dozens of known and secret government organizations (27,28)
62) DOE (Dept. of Energy) (8)
63) DEA (Drug Enforcement Agency) (7)
64) White House (9)
65) Director of National Intelligence (DNI) (20,33)
66) Department of Homeland Security (DHS) (a zionist terrorist front, a new Internal American Army) (5,3,7,20,24,30) total=6
67) Department of Homeland Security and FBI (Joint Terrorism Task Force (JTTF) Fusion Centers (3,5,6,7,20,27,30) total=7
68) law enforcement, COPS Program (Community-Oriented Policing Services), Sheriffs, local police and the gangstalkers, firefighters/first responders/veterans they employ (1,3,4,6,11,26,28,30) total=8
69) Council on Foreign Relations (20)
70) RNC (Republican National Committee) and DNC (Democratic National Committee) (24)
71) Training and Doctrine Command (9)
72) SHAPE (Supreme Headquarters Allied Powers Europe) started by President Eisenhower (Jewish) in the 1950s (9)
73) Dept. of Health/health industry (1,25)
74) Princeton University, where Nazi Psy-Ops people landed (9)
75) taxpayers pay for all this (12)
76) US government slave holders/owners/contractors/employers of targeted individuals who furnish them to CIA/FBI/DHS (16)
77) every member of Congress (30)
78) most US officials (30)
79) most US judges (1, 30)
80) most top-US policy makers (1, 30)
81) Pentagon-Big Science Complex (31)
82) NIH (National Institutes of Health), Dept. of Health (1,31,35)
83) Neural Network Association (1)
84) “Bad-Guy Hunting-Targeting Business” (32)
85) Regular, Irregular/Civilian, and Special (USSOCOM) Forces (33)
86) NCA (National Command Authority) (35)
87) TSA (Transportation Security Administration), FEMA (Federal Emergency Management Agency) (30)
88) neoconservatives (Jewish intellectual “movement” that has infiltrated and controlled American institutions and policy for over a half century (6)
89) JOINT mob-military partnership, Kabbalistic Jewish Zionists who came to America to escape Nazi Germany (9)
90) Reagan-Bush Regime (17)
91) media (30)
92) Hollywood (30)
93) multiple teams of U.S. government operators (16)
94) HAARP facility (High Active Frequency Auroral Research Project) (16)

C. Private (and Public-Private-Partnership) (DoD) Subcontractors/Perps

95) (Jewish-owned) National Fusion Center Association (3)
96) Private security and private intelligence subcontractors paid by governments through taxpayer funding (ex., over 1800 such companies operate in US without oversight) (ex. Infragard, Citizens Corps) (3)
97) Townsend and Clark in New Zealand) (5,7)
98) DOD subcontractors, for example, General Dynamics and their subsidiaries, Electric Boat and Sonles (Soundlist?) (11)
99) Psi-Tech Corporation (27)
100) Phelps Luck Community Meeting House for local police to organize stalking operations of vigilante civilian dupes (3)
101) intelligence specialists who work with some 130 private companies and dozens of known and secret government organizations
102) over 1800 private intelligence agencies in the US that operate with zero oversight (7)
103) Tetra Systems (11)
104) Scientific Engineering InstituteD. Foreign Government Perps

106) UK government (14,17,24)
107) (covert) SIGINT and HUMINT Ops by UK Ministry of Defense GCHQ (General Communication Headquarters), JTRIG (Joint Threat Research Intelligence Group), MI6, MI5, etc., in Britain (5,24)
108) JTRIG (Joint Threat Response Intelligence Group), a part of GCHQ (Government Communications Headquarters; the British equivalent of the NSA) (5)
109) Britain’s Tavistock (Brainwashing) Institute (3)
110) (covert) SIGINT and HUMINT by their equivalents in over 100 nations associated with 5 Eyes (5)
111) EU (European Union) (1,22)
112) Canadian Government (13,17)
113) Australia (17)
114) Germany (17)
115) Finland (17)
116) France (17)
117) CSIS (Canadian Security Intelligence Service) (13)
118) RCMP (Royal Canadian Mounted Police) (13)
119) Toronto Police Service (13)
120) Israel (3,25)
121) Swedish government and Secret Intelligence Service (SAPO) (22)

E. Israeli/Jewish Perps

122) Israeli Mossad agents (national spy agency/perverts) (3,4,9)
123) (covert) SIGINT and HUMNIT by the IDF (Israeli Defense Forces), Unit 8200, Mossad, Shin Bet, etc., in Israel (5,9,20)
124) Neoconservatives (Jewish political movement/think tanks in America) (6)
125) Jewish Community Relations Council of Minnesota and the Dakotas (27)
126) Israel/the jews/Jewish lobby (ADL, AIPAC, SPLC, etc.) (1,3,4,14,15,27,30) total=7
127) Israeli military (IDF) and spy agencies (Mossad, Shin Bet, Unit 8200, IDF) (5,13,15)
128) Many, many Israel (jewish) gangstalkers (sayanim) (3,4,14,15)
129) Jewish (Brooklyn/New Jersey) mafia/Meyer Lansky National Crime Syndicate (9,13)
130) jews (sayanim, Nation of Israel embedded within Canada) (13)
131) Jewish realtors at Coldwell Bank in Orina, CA (15)
132) Megagroup (Jewish) billionaires (27)
133) American Jewry (aka “Nation of Israel” Embedded within Canada, US, etc.) (13,14)
134) Israeli mafia (13)
135) American Jewry (14)
136) Jewish agents (14)
137) Jewish agent “mentor” (15)
138) Israeli Government (3,27,30)
139) Jew World Order (23)

F. Street Perps (gangstalkers, “surveillance role players,” “counterterrorism specialists,” extra-judicial militias, vigilante dupes, targeting crews, secret-police, “fools and traitors,” police informants. “LARPers’ (Live Action Role Players), Neighborhood Nazis, Citizen Corps creeps, Infragard goons, “flying monkeys,” “gangbangers”)

140) “street perps” (“surveillance role players,” “counterterrorism specialists,” extra-judicial militias, vigilante civilian dupes, targeting crews) (1,5,7,8,16)
141) Many, many Jewish street perps (aka sayanim or helpers) (4,13,15)
142) Jewish realtors at Coldwell Bank in Orina, CA (15)
143) Mexican gang stalkers (15)
144) Neighborhood Watch, police informants, FBI spooks, citizen vigilante groups
145) gangstalkers from CIA-created cults and cause-oriented groups (26)
146) FBI operatives who include groomed, mind controlled stalkers who are predators electronically addicted to violence, a sex addiction (11)
147) Infragard vigilantes (3)
148) NSA low level security goons (3)
149) DHS civilian dupe stalkers (3)
150) private intelligence agencies’s run extra-judicial militias, or targeting crews (7)
151) police informants (13)
152) US Government RODs (Retired-On-Duty) operatives (16)
153) CIA-created cults and other cause-oriented groups (28)
154) DHS (a zionist terrorist front, new Internal American Army) (30)
155) ex-military officers (7)
156) black operatives, thugs, extremist cells, “stalkers” (19)

G. Individuals named

157) JOINT mob-military partnership, Kabbalistic Jewish Zionists, including Col. George Griggs, Gen. Al Gray, General Sheehan, Henry Kissinger, Caspar Weinberger, Nicholas Walt Whitman Rostow, Eugene Debs Rostow) (9)
158) Israeli-American dual citizen, Michael Chertoff, first head of DHS (30)
159) Dr. James Giordano (DARPA “Neuroweaponologist”), Former Navy Captain, Rick Bremsiff, Attorney Accounting General Snow, Dr. Diane DeEuliss, Joe DeFranko (29) recommended “whole of nation” approach involving seamless triangulation between government entities, research entities, and commercial entities (29)
160) Eric Hagemann, SES (Senior Executive Service) manager, his close friends from Vietnam service, Jack Schabe and Drew French, all employed by NSA (3)
161) Herbert Goldstein, Jewish University of Wisconsin professor (6)
162) Janet Reno, Jewish Attorney General (6)
163) the “Brotherhood,” “Firm,” “Organization” operatives: George Griggs, Bob Edwards, Donald Rumsfeld, William Colby, George Schultz, Frank Carlucci, and Allen Dulles of George Griggs, Bob Edwards, Donald Rumsfeld, William Colby, George Schultz, Frank Carlucci, and Allen Dulles
164) Presidents William Clinton, George H.W. Bush, George W. Bush, Barak Obama
(3, 9,17,20)
165) 100s of thousands of Germans who came to America after World War II under the CIA’s Operation Paperclip (9)
166) James A. Baker and George Herbert Walker Bush (17)
167) Lt. Gen. Leonard Perroots, U.S.A.F. (17)
168) Michael W. Wynne, 21st Secretary of the Air Force (2005-2008) (19)
169) George W. Bush (19)
170) David Rubenstein – CFR.org (Council On Foreign Relations) (20)
l71) VP, Richard Cheney – USAP (Unacknowledged Special Access Programs; Black Projects), TI Program Director (20)
172) David Cohen – CIA Operations (Central Intelligence Agency) (20)
173) General John Raymond – US Space Force (20)
174) Avril Haines – ODNI (Office of the Director of National Intelligence) (20)
175) Merrick Garland – DOJ (Department of Justice) (20)
176) General Scott Berrier – DIA (Defense Intelligence Agency) (20)
177) Melissa Smislova – DHS Intelligence & Analysis (Department of Homeland Security) (20)
178) Steve Vanech – NCTC (National Counterterrorism Center) (20)
179) Jill Sanborn – FBI, National Security Branch (Federal Bureau of Investigation) (20)
180) Charles Kable – FBI, Terrorist Screening Center (Federal Bureau of Investigation) (20)
181) Stefanie Tompkins – DARPA (Defense Advanced Research Projects Agency) 20)
182) Michael Lauer, MD – NIH Extramural Division (National Institutes of Health) (20)
183) Owners of the Federal Reserve (20)
184) Commander Paul E. Vallilee and Lt. Col. Michael Aquino, authors of “From PSYOP To Mind War: The Psychology Of Victory” (1980) (26)
185) Generation of CIA and military intelligence led by Ted Shackley, (CIA Director) Richard Helms, (CIA Director) William Casey, Maj. John Singlaub, Richard Secord, Maj. John B. Alexander, Col. Michael Aquino, Paul Vallilee and others (26)
186) Col. John B. Alexander, promoter of “non-lethal weapons” (2)
187) Mega Group (Jewish billionaires) (25)
188) Bronfmann family (Jewish billionaires) (25)
189) Ronald Lauder (Jewish billionaire) (25)
190) Pierre Omidyar (Jewish billionaire) (25)
191) Jewish Community Relations Council of Minnesota and the Dakotas (25)
192) Elizabeth Newman (Deputy Chief of Staff of the Department of Homeland Security) (25)
193) President William Clinton (28)
194) Senator/President Joseph Biden (28)
195) Margarita “Rita” LaPointe (Mossad “honeypot”) (3)
196) NSA Inspector General George Ellard (3)
197) NSA Security’s attack dog psychologist, Dina Wiezcynski (3)
198) Col. George Griggs, General Steiner, General Jim Joy, and General Chuck Krulak who work in the Nelson Rockefeller group in the Republican Party (9)
199) US government RODs (Retired On Duty) (16)
200) US politicians (24)
201) Swiss politicians (24)
202) EU politicians (24)
203) UK politicians (24)
204) Dr. Michael Persinger (26)
205) Dr. Ewen Cameron, CIA MKULTRA psychiatrist (17, 26)
206) local psychologist contractor named Joyce Carol Warner-Burke (3)
207) NSA-controlled psychics (35)
208) Andrew Torielle, President of Soundlist (subsidiary of Electric Boat and General Dynamics, Inc.) (11)
209) Christopher Wray, Director of the FBI (20)
210) Alexandro Mayorkis, Secretary of DHS (20)
211) Kenneth Wainstein, DHS’s Undersecretary for Intelligence and Analysis (20)
212) FBI trained cyberstalkers and perverts (11)

213) NSA personnel in the community using cover identities such as social workers, lawyers and business owners.

This extensive list of primary perpetrators of the TI Program is incomplete. I imagine the true number of perpetrators at all levels of “the program” would be staggering, possibly including 10s to 100s of millions worldwide. A team of computer experts, such as the DOGE (Department of Government Efficiency) team or NSA or DoD computer experts, could probably map out the entire “network” and produce a complete list of perps using supercomputers.

By contrast with supercomputers and AI projects, this survey is comprised of the resources/data I have been able to garner over the past 11 years. The 36 expert testimonies above identify the following nations, agencies, cults, corporations, and individuals as the primary perpetrators of the Targeted Individual Program. I believe the evidence presented here irrefutably indicates that these major institutions are at the very core of the TI program:

Summary of Summary of Findings: Major Institutions at Core of TI Program

1) DoD (Department of Defense, now Department of War) – 20 mentions = 56% of testimonies
2) Israel/Jewish/International Zionist Criminal Syndicate, Jew World Order (# of Jewish organizations, etc.) – 14 mentions = 39% of testimonies
3) NSA/NSA Global Spy Network – 14 mentions; 39% of testimonies

4) Financial elite, Central bankers (owners of Wall Street, City of London), Freemasonic satanists, “Mr. Global,” New World Order, Illuminati with the Star of David, Jew World Order – 13 mentions- 36% of testimonies
5) CIA – 13 mentions; 36% of testimonies
6) Street Perps (gangstalkers, “surveillance role players,” “counterterrorism specialists,” extra-judicial militias, vigilante civilian dupes, targeting crews, secret-police, “fools and traitors,” police informants, citizen-based agents, death squads, NSA personnel in the community using cover identities such as social workers, lawyers and business owners.) – 14 mentions; 39% of testimonies
7) US Government – 11 mentions; 31% of testimonies
8) FBI and FBI’s JTTF (Joint Terrorism Task Force) – 9 mentions; 25% of testimonies
9) law enforcement, COPS Program (Community-Oriented Policing Services), Sheriffs, local police and the gangstalkers, firefighters/first responders/veterans they employ; 8 mentions; 22% of testimonies
10) DHS (Department of Homeland Security) and FBI (Joint Terrorism Task Force (JTTF) Fusion Centers – 7 mentions; 19% of testimonies
11) Private (and Public-Private-Partnership) (DoD) Subcontractors/Perps – 7 mentions, 21% of testimonies
12) Foreign governments- 7 mentions, 21% of testimonies
13) Department of Homeland Security (DHS) (zionist terrorist front & new Internal American Army) – 6 mentions; 17% of testimonies

Additionally:

14) the number of agencies in the US INTERAGENCY (i.e., US military’s “whole of government” & “whole of nation” approach) involved in TI Program = 44+
15) the number of American corporations/public-private-partnerships named = 1810 +

While the actual “numbers of mentions” and “percentages of testimonies” noted above in this very “quasi-quantitative” study should NOT be regarded as absolutely or even relatively definitive, I believe I can state unequivocally that:

1) ALL of the first 13 governments/agencies/entities are primary perpetrators of the “TI Program,” indicating that these are military operations
2) The number of US Interagency entities and corporations/public-private-partnerships involved in the TI Program EXCEEDS the numbers reported here (44+ and 1810+, respectively).
3) The US and other governments are captured by and co-extensive with the International Zionist Criminal Syndicate (IZCS).

Summary of Summary of Findings: Major Institutions at Core of TI Program

1) DoD (Department of Defense, now Department of War) – 19 mentions = 58% of testimonies
2) Israel/Jewish/International Zionist Criminal Syndicate (# of Jewish organizations, etc.) – 13 mentions = 40% of testimonies
3) Financial elite, Central bankers (owners of Wall Street, City of London), Freemasonic satanists, “Mr. Global,” New World Order, Illuminati with the Star of David – 12 mentions- 36% of testimonies
4) CIA – 13 mentions; 40% of testimonies
5) NSA/NSA Global Spy Network – 13 mentions; 40% of testimonies
6) Street Perps (gangstalkers, “surveillance role players,” “counterterrorism specialists,” extra-judicial militias, vigilante civilian dupes, targeting crews, secret-police, “fools and traitors,” police informants, citizen-based agents, death squads) – 13 mentions; 40% of testimonies
7) US Government – 11 mentions; 33% of testimonies
8) FBI and FBI’s JTTF (Joint Terrorism Task Force) – 9 mentions; 27% of testimonies
9) law enforcement, COPS Program (Community-Oriented Policing Services), Sheriffs, local police and the gangstalkers, firefighters/first responders/veterans they employ; 8 mentions; 24% of testimonies
10) DHS (Department of Homeland Security) and FBI (Joint Terrorism Task Force (JTTF) Fusion Centers – 7 mentions; 21% of testimonies
11) Department of Homeland Security (DHS) (zionist terrorist front & new Internal American Army) – 6 mentions; 18% of testimonies
12) Private (and Public-Private-Partnership) (DoD) Subcontractors/Perps – 7 mentions, 21% of testimonies
13) Foreign governments- 7 mentions, 21% of testimonies

Additionally:

14) the number of agencies in the US INTERAGENCY (i.e., US military’s “whole of government” & “whole of nation” approach) involved in TI Program = 44+
15) the number of American corporations/public-private-partnerships named = 1810 +

While the actual “numbers of mentions” and “percentages of testimonies” noted above in this very “quasi-quantitative” study should NOT be regarded as absolutely or even relatively definitive, I believe I can state unequivocally that:

1) ALL of the first 13 governments/agencies/entities are primary perpetrators of the “TI Program,” indicating that these are military operations
2) The number of US Interagency entities and corporations/public-private-partnerships involved in the TI Program EXCEEDS the numbers reported here (44+ and 1810+, respectively).
3) The US and other governments are captured by and co-extensive with the International Zionist Criminal Syndicate (IZCS).

V. Discussion and Conclusions

This study draws on testimonies I’ve selected from among many hundreds, perhaps thousands of TI testimonies on this, my gangstalkingmindcontrolcults.com website, which now has over 2,590 posts. In effect, this website provides a data base, in digital library form, that others can also utilize to conduct similar or different types of surveys. Unlike government computer data bases used to surveille and destroy their targets, this data base is meant to help citizen targets (aka “targeted individuals”) and others defend themselves from government and corporate crimes, in specific, the TI program, aka “organized stalking-electronic harassment (OS-EH), “information liquidation operations,” and “geo-slavery.” I hope that this semi-quantitative survey of experts on the TI program will be replicated and tested by others in order to expand our understanding of these “crimes against humanity” and to eventually restore justice and freedom for citizens of our nation and the world.

Taken together, this survey appears to validate the following assertions made by members of our “expert panel.” These profound statement bear repeating:

1) Catherine Austin Fitts, former central banker (#12 TI): … “What we are experiencing is a coup. The current secret, central governance system is harvesting this planet for enormous amounts of resources. The Central Banking/Warfare System controls everything through people, one by one, person by person… Unbeknown to most of us, we have a Covert Social Credit System with three primary lines of control: 1) financial carrots and sticks, 2) surveillance and mind control, 3) covert ops, including covert physical intervention. The control system is phenomenally wasteful. They have AI and software. The more money the taxpayer pays for this system to operate, the more money “Mr. Global” makes. So there is no amount of money “they” won’t spend on the control grid”…..

2) Skizit Gesture (#6 TI): “Entire populations can be enslaved with this technology. Your thoughts can be read and messages can be put into your mind so that your thoughts and actions are not your own. You become a slave. The 2003 article entitled “Geoslavery” by Jerome Dobson and Peter Fisher.. defines “geoslavery” as “a practice in which one entity, the master, coercively or surreptitiously monitors and exerts control over the physical location of another individual, the slave”…. With the conversion of a once meaningful life into an existence of human slavery, the individual sense of self-identity in human beings is eroded by the hopelessness of an emerging virtual death camp environment.”

3) Dr. Rauni Kilde, MD (#1 TI): “This is the most important policy of the US government.” (Now, however, this statement can be modified as follows: “This (no-touch torture, control, and enslavement of humanity program) is the most important policy of the US government.”)

4) Bobby Fischer, possibly the world’s greatest chess player (#14 TI): “My basic thesis is that the Jews are a criminal people, and the Jews completely control the United States, and the Jews are using the United States as a vehicle to take over the World. There is no United States as people think of it. It’s just a puppet in the Jews’ hands. It’s a plaything for the Jews… The US government and American Jewry are virtually interchangeable…”

5) Preston James, Ph.D. (#28): “What does the International Zionist Crime Syndicate (IZCS) run out of the City of London through its main Cutouts Israel and the hijacked US Government attain? Obviously the IZCS’s unlimited funds and the fact it owns and/or controls almost every member of Congress and most USG officials and Judges, means that the ICS has been able to determine USG Policy. It can do this because it owns and/or controls all USG top Policy-Makers, most of whom just happen to be outside of the visible USG and within the Secret Shadow Government (SSG). Obviously the crimes of the IZCS and their espionage fronts like AIPAC, the ADL, SPLC and the like against the American Republic are far worse than the Rosenbergs.”

Regarding the capture of the US government by the IZCS, aka Zionist-controlled organized crime, aka the “Nation of Israel embedded” and the “Nation of Israel proper,” James F. Marino states in: “The Human Species Is On The Precipice Of Becoming A Race Of Mind-Controlled Cybernetic Slaves:”

“It is Rothschild Zionism’s control over the U.S. Military Intelligence complex, and its total subversion of this complex, which the American citizenry must collectively be made aware of. Especially since this Orwellian complex is being used in secret to brain map the entire U.S. population in the interest of ultimately reducing us to a cybernetic race of beings, whose state of consciousness will come from a neural network of artificial intelligence driven computers.

Imagine a race of people all thinking the same thoughts simultaneously while being incapable of having an individual thought – a true slave race – and you can begin to understand the inherent evil which drives those who operate within the very hierarchy of this complex. This program of implants will be applied to the whole human race so they can be totally controlled, surveilled, tracked, tortured, harassed and electronically punished.”

What kind of megalomaniacs and lunatics would work so secretly and so diligently to enslave all of humanity? Who are these sadistic would-be slavemasters?

Again, Preston James, Ph.D.:

“A SERIOUS SPELL, A RACIAL DELUSION OF SUPERIORITY HAS BEEN CAST ON MANY JUDAICS NO MATTER WHERE THEY LIVE, BUT ESPECIALLY SO AMONG THOSE LIVING IN GREATER ISRAEL, WHERE THE LUCIFERIAN HEX FLAG FLIES. WHETHER TRUE OR NOT, TOP ZIONIST LEADERS BELIEVE THIS HEX FLAG SIGNIFIES THE MERGER OF DEMONIC FALLEN ANGEL BEAST-BLOODLINES FROM ABOVE, BRED WITH HUMAN FEMALE BLOODLINES BELOW. THEY BELIEVE THIS MAKES THEM THE “CHOSEN ONES” OF THEIR GOD LUCIFER, AND SUPERHUMAN OR PART GOD ALSO.”

Regarding the TI Program, in particular, the analysis of Canadian artist (#13 TI), Stephen O’Keefe, who actually filmed his stalkers in action and posted those videos online, is particularly insightful:

6) “This video profiles the surveillance proficiencies of jews, and their Nation of Israel, as Shin Bet, Mossad and their “sayanim” (helpers)- who profiled, mob stalked and ruined my personal and professional life- and have declared themselves “deceivers in hiding.”

With so many jews involved with methods of deep psychological torment directed at me for so many years, it is impossible that these methods are not culturally jewish, known by all jews above a certain age…. This culturally jewish method of profiling and stalking someone to ruin would have existed before technology made it easy, perhaps explaining why jews have been exiled from so many lands.

The benefits to shadow governments are endless; spy operations, police stings, drug dealing, money laundering drops and black operation terror events where an asset or target are surrounded by nothing but layers of backup in a pre-scripted crowd simulation….

Original Mossad slogan: “By deception thou shalt do war.”/”Deceit is essential in warfare”
Shin Bet slogan: “Defender that shall not be seen.”

Jewish mob stalking works like this: jews pass your photo and details around by mobile phone and conspicuously stalk you wherever you go. Once you start discussing it, or taking their photos, they complain to authorities that you’re insane and obsessed with jews, a Nazi, white supremacist or potential terrorist and that you must be watched very closely, and that jews will help. “Helping” means setting you up for ruination which benefits the police state which protects Israeli interests- and that’s usually a white supremacist rally, violent outburst or terror event- where the mob stalking victim is absorbed into the jewish profiling.

The culturally jewish methods of deception and concealment are mafia tactics, as evidence by the similarity in criminal activities between the American jewish mafia and the Israeli mafia; the embedded Nation of Israel and Israel proper… CSIS (Canadian Security Intelligence Service), the RCMP (Royal Canadian Mounted Police), the Toronto Police Service and the Nation of Israel embedded within Canada expanded my targeting to develop a GPS terrain surveillance and cueing system. This involves portable biometric gear in backpacks, duffle bags and luggage totes which redundantly biometrically position you amongst plain clothed police, spies and their assets and targets; fed to and through satellite GPS.

Jewish stalkers were so intent on always appearing to be a victim in anything I recorded, they gave themselves away as my core predators despite so many government agencies serving as their camouflage.”

In sum, insights presented herein indicate that the US Government:

1) IS organized crime; it is a captured terrorist, mafia state that is traitor to “we the people.”
2) is occupied and controlled by fifth column groups, including dual Israeli-American citizens who believe they are descendants of “demonic, fallen angel beast-bloodlines” and are the “Chosen ones” of Lucifer, “superhumans or part God.” Heavy stuff, indeed. One 40-year TI of Jewish parentage, Alan Landis, from New Mexico told me personally in 2015: “Jews are behind the whole (TI) thing. They make psychopaths.”.

It should be noted, however, that this data indicate that Jews themselves, for example, Chess Master, Bobby Fischer, among many others, may become targets of this diabolical system if they “step out of line.”

Some of our experts, especially Kay Griggs (TI #9), Jeffrey Madore (TI#11), and Steven J. Smith (#33), provide explanations of how psychopaths are created. Indeed, creating psychopaths, killers, sex slaves, couriers, supersoldiers, etc. was/is the main purpose of the CIA’s MKULTRA-Manchurian Candidate mind control operations from 1950 onward. Many of our experts refer to these programs directly and indirectly.

Is the globalized TI program (aka Global Phoenix Program, “information liquidation model,” “cybertorture,” etc.) a key component of the “Antichrist Kingdom” now apparently being implemented? This conclusion is consistent with statements found in the Jews’ most holy scripture, the Talmud, which states:

– “When the Messiah (the Christian antichrist) returns, every Jew will have 2800 gentile slaves.” (Simeon Haddarsen, fol. 56-D)

_ “Jehovah created the non-Jew in human form so that the Jew would not have to be served by beasts. The non-Jew is consequently an animal in human form, and condemned to serve the Jew day and night.” (Midrasch Talpioth, p. 225-L)

– “The best of the gentiles kill.” (Minor Tractates. Soferim 15, Rule 10. Rabbi Simon ben Yohai.)

– “Kill the most honest of the goyim.” (Talmud, Abod. Zar. 26 b)

– He who sheds the blood of the goyim (gentiles or ‘human cattle’) is offering a sacrifice to God. (Talmud, Jalquit Simeoni)

– Everyone who sheds the blood of the impious [non-Jews] is as acceptable to God as he who offers a sacrifice to God. (Yalkut 245c)

– Extermination of the Christians is a necessary sacrifice. (Zohar, Shemoth)

– All Israelites will have a part in the future world…. The Goyim, at the end of the world will be handed over to the angel Duma and sent down to hell. (Zohar, Shemoth, Toldoth Noah, Lekh-Lekha)

– Gentiles are not men but “beasts of the earth.”

– By deceit and trickery wherever possible, they (goyim) must be fought against without ceasing, until proper order is returned….. We shall free ourselves from them and rule over them. (Rabbi Jehuda, Zohar I, 25b)

– “When a grown-up man has intercourse with a little girl it is nothing, for when the girl is less than this [three years old], it is as if one puts the finger into the eye; but when a small boy has intercourse with a grown-up woman he makes her as ‘a girl who is injured by a piece of wood.’… (Kethuboth 11b)

– “A Jew may marry a three-year-old girl (specifically, three years “and a day” old). (Sanhedrin 55b)

– “A Jew may have sex with a child as long as the child is less than nine years old. (Sanhedrin 54b)

– “A proselyte who is under the age of three years and a day is permitted to marry a priest. For it is said, “But all the women children that have not known man by lying with him, keep alive for yourselves” (Rabbi Simeon ben Yohai, one of Judaism’s very greatest rabbis and a creator of Kabbalah)

– A girl who is three years of age and one day may be betrothed by co-habitation” . . .(Yeb. 57b)

– “A woman could molest a young boy without questions of morality even being raised: “…the intercourse of a small boy is not regarded as a sexual act.”

The (Jewish) Talmud (aka “the teachings of men” according to Jesus Christ) is clearly a manual for criminals, pedophiles, perverts, and psychopaths.

Addressing the Jewish leadership (Pharisees) directly, Jesus said: “Ye are of your father the devil, and the lusts of your father ye will do. He was a murderer from the beginning, and abode not in the truth, because there is no truth in him. When he speaketh a lie, he speaketh of his own: for he is a liar, and the father of it.”

In 1 Thessalonians 2:15, the Apostle Paul states: “(Jews) Who both killed the Lord Jesus, and their own prophets, and have persecuted us; and they please not God, and are contrary to all men.” ).
German Jewish-American statesman, Henry Kissinger, referred to this perennial conflict when he stated: “There is a war between the Jews and the non-Jews.” Kissinger, however, failed to mention that, until today, this has been mainly a covert, undeclared war in which Jews are the aggressors and most gentiles are largely unaware.

In “The Controversy of Zion” (1978), British journalist, Douglas Reed asserts that “Judaism is a political program disguised as religion” and “Judaism IS the worship of Moloch” (Satan).

Some scholars have analyzed the “Jewish Question” (JQ) through the lens of biology. In “The Jewish Strategy,” (2002), the late classics professor, Dr. Revilo P. Oliver, presents a biological/evolutionary argument that Jews may actually comprise a different species. See my post: The Jewish Controllers and Their Destructive Mission):” Oliver states:

“… For all practical purposes, the (Jewish) race is today, as Josephus boasted it was in his time (about 2100 years ago), a unit, and it is somehow very ably directed in its predatory operations against other races… The great mass of Jews seem to be, almost without exception, under the tight control and discipline of their fairly numerous leaders, who could, in turn, be equally subject to the orders of a supreme and secret directorate, which plans and directs a conscious strategy as set forth in the famous “Protocols.”….

The racial solidarity of the Jews, furthermore, includes such complete subordination of the individual to the race, whenever the welfare of the race is concerned, that it suggests an hyperbolic comparison with the social organization of certain insects, especially some species of ants and bees, in which the individual is virtually a tentacle of a large organization, and it also reminds me of (Jew) Roderick Siedenberg’s hope, expressed in his “Post-Historic Man and Anatomy of the Future” (Chapel Hill, 1950 & 1961), that all human species (except the “administrators,” i.e., Jews) can be reduced to mindless automata that operate by reflexes without thought or consciousness, like cockroaches, for example.

From chapter VIII, “CONSPIRACY OR INSTINCT?:” ”.. how it is possible for the dispersed and widely scattered members of the race to act with what amounts to unanimity and perfect coordination? (one) hypothesis (is) that the Jews are directed by instinct, at least to a large extent. They may represent a complex and highly advanced form of the biological phenomenon of which a simple manifestation is seen in mammals that hunt in packs or bands.

As is well known, wolves and African wild dogs, for example, hunt in organized packs and stalk and bring down their game by a kind of strategy that is carried out by the pack as a unit but with each individual in it having a definite function and adapting him self to the needs of a specific situation.… It is entirely possible, therefore, that a species could have been formed by biological selection that automatically preys on our species as instinctively as wolves prey on caribou, although, of course, with much greater cunning and versatility.”

(Webmaster: This seems a good description of what we refer to as “organized stalking.”)

In chapter IX, “EXTERMINATION,” Oliver states: “… so far as we can tell, a distinct change has taken place in the Jews’ activity in this century and at approximately the time of the “Protocols” (about 1900 AD). Before this, the aliens seem to have been content to exploit the Aryans and, in biological terms, feed on them; the present objective is obviously extermination of our species through mongrelization and massacres, so that it would seem that the organization and domination of the Jewish colonies by the Zionists produced a change in purpose that must, to a large extent at least, have been consciously determined and planned.

This implies some measure of rule by some kind of directorate that has the ability and power to set objectives for the race. The alternative is to explain the change as a natural result of the progressive weakening of our race by less direct attacks during the past thousand years or more, comparable to the change in the activity of a wolf pack when it senses that the harried caribou are nearing exhaustion.”

Other Primary Perps of Gangstalking Ops

Recall also that author and TI (#2) Mark M. Rich notes that: “I’ve determined that, among other things, the targeting program facilitates torturous public executions for the benefit & entertainment of the Freemason satanists who run the sick system.” Masons refer to these same stealth murder operations as the “White Glove” and the “Soft Dagger,” “Slow Dagger,” and “Silent Dagger.” Freemasonry is a gentile front for Judaism whose degrees and philosophy are based on the Jewish Kabbalah, the world’s most evil system of black magic. Intelligence agencies and certain “destructive cults” created by intelligence agencies, also deploy organized stalking techniques to destroy their enemies. In this regard, we can view the intelligence agencies, CIA, MI6, Mossad, etc. etc. as destructive cults. See: “The CIA and the Cult of Intelligence” by Victor Marchetti and John D. Marks (1974). Scientology, another “destructive cult” spawned from British and American intelligence (MI6 and CIA) mind control operations stalks, hunts, and directs mind control and psychological operations that ruin individuals who try to escape the cult. This means of extracting revenge and retribution from individuals, referred to as “Fair Game,” is basically the same program as the TI program.

So we must expand the list of primary perpetrators to include Masons, spies, cults/secret societies, the INTERAGENCY of captured government and non-governmental agencies, the corporate sector, law enforcement, and civilian vigilante groups such as the Neighborhood Nazis (Neighborhood Watch). Among the crimes perpetrated by these networks of organized stalking perpetrators are torture, murder, attempted murder, cruel and unusual punishment, human trafficking, illegal human experimentation, human trafficking, sex trafficking, treason, and slavery.

The Orwellian-type “smokescreen terminology” deployed by the “slavemasters’” propaganda system allows for cover-up of these crimes via gaslighting, psyops, and obfuscation of reality. One aspect of the psyop is that entities behind the TI Program and, indeed, this current coup against humanity are often referred to by many different terms. For example, the system of financial elites/central bankers/owners of the Federal Reserve and City of London identified by some of our experts is co-extensive with the “New World Order,” “imperial machine of domination,” and “Mr. Global,” as identified by others.

Likewise, the “coup” to which Catherine Austin Fitts refers may be identical to the so-called ‘war for technocracy,” United Nations “Agenda 2030,” and the World Economic Forum’s “Great Reset”/“Fourth Industrial Revolution.” Indeed, these monikers appear to be synonymous with the Jewish “New World Order,” Jewish Utopia, “Tikkun Olam,” and the Antichrist Kingdom. And the “Organization,” “Firm,” “Brotherhood,” “Enterprise,” likewise, is probably co-extensive with the Jewish/American Mafia (the “International Zionist Criminal Syndicate” (IZCS)), British, American, Israeli and other government “intelligence agencies,” the Illuminati/Freemasonic/Satanist cult, and the global mega-cabal. Ergo, most or all the primary perpetrators named by these 36 experts may actually be part of the same overarching “control system.”

Actually, evidence for these equivalencies confronts us nearly everywhere we look. Bob Dylan (real name Robert Zimmerman), perhaps the most famous of 1960s singer/songwriters, recently put out a song, “Murder Most Foul,” in which he seems to take credit for the 1963 assassination of President John F. Kennedy on behalf of International Jewry. The song also heralds the beginning of the “Age of the Antichrist,” that is, Jewish Utopia. The lyrics include:

“President Kennedy was riding high
A good day to be living and a good day to die
Being led to the slaughter like a sacrificial lamb
Say wait a minute boys, do you know who I am?

We’re gon’ kill you with hatred and without any respect
We’ll mock you and shock you, we’ll grin in your face

We ask no quarter, no quarter do we give
We’re right down the street from the street where you live
They mutilated his body and took out his brain
What more could they do, they piled on the pain

It’s vile and deceitful – it’s cruel and it’s mean
Ugliest thing that you ever have seen
They killed him once, they killed him twice
Killed him like a human sacrifice

The day that they killed him, someone said to me, “Son,
The age of the anti-Christ has just only begun.”

Dylan’s lyrics seem to accurately express the malevolent, mocking, demonic spirit of gangstalking as well as the m.o. behind the highly coordinated assassination of President John F. Kennedy in 1963. This begs another question we can couch as a hypothesis: Are the Kennedy assassination, the Targeted Individual program, 9/11, and the Covid-19 “clot shots” among modern versions of historically-proven rites of Jewish Ritual Abuse and Jewish Ritual Murder (aka Satanic Ritual Abuse (SRA) and Satanic Ritual Murder) implemented in order to eliminate opponents to their New (Jew) World Order (aka Jewish Utopia/Tikkun Olam/Antichrist Kingdom) and shock others into submission? Is Dylan heralding the age in which the Jewish collective (The Synagogue of Satan/Antichrist people) overthrows Western Christian civilization through murder, stealth, sabotage, thievery, subterfuge, and all other manner of criminal activities? See: Murder Most Foul” by Bob Dylan Explains Jewish “Hidden Hand” Behind JFK Ritual Murder (& 9/11, Targeted Individuals/Global Gangstalking Ops, Neocon-Scripted Wars, and Covid-19)

VI. Conclusions

Testimonies presented here indicate that the American military-intelligence-corporate establishment has developed a stealth weapon system capable of torturing, controlling, murdering and enslaving individuals and genociding (demociding) humanity. Through combinations of remote electronic torture, mind-influencing technologies such as Remote Neural Monitoring and synthetic telepathy, and psychological attacks, this psychotronic/neuroweapons system can turn normal human beings into assassins (Manchurian Candidate), sex slaves, supersoldiers, superspies, couriers, and psychopaths, and/or kill them outright. This weapon system, sometimes referred to as organized stalking-electronic harassment, “the TI program,” and “murder for hire,” has been and is being deployed worldwide against millions of innocent individuals as a means of population reduction and culling the herd of “undesirables,” aka “enemies of the state,” “potential terrorist threats,” and “enemy non-combatants.” To avoid mass slaughter of millions to billions, this system must be exposed and the primary perpetrators thereof must be brought to justice. This can be accomplished through addressing the following priorities:

1) Education of all civilian populations regarding the existence of these exotic (nonlethal, neuro-nano-IT-bio-directed energy weapons systems).

2) Implementation of legal measures such as:

a) Ban and criminalize the use of exotic (“nonlethal” neuro-nano-IT-bio-directed energy) weapons
b) Repeal Section 702 FISA ACT
c) Repeal Violent Crime Control and Law Enforcement Act of 1994 which established the Community-Oriented Policing (COPS) program.
d) Repeal USA PATRIOT ACT 2001
e) Homeland Security Act 2002 that created Department of Homeland Security
f) Repeal National Security Act of 1947 and declassify all classified documents
g) Repeal Military Commissions Act of 2006 that created new concept of “enemy non-combatants”
h) Repeal USA Freedom Act 2015
i) Shut down FBI/DHS Fusion Centers and prosecute operators as criminals
j) Shut down FBI’s TSDB (Terrorist Screening Data Base) and all government blacklists
k) Abolish CIA, NSA, FBI, and DHS. Prosecute criminals therein.
l) Death penalty for conducting research on nonconsensual human subjects
m) Repeal Federal Reserve Act of 1913, which gave control of US economy to foreign bankers
n) Abolish and prosecute all foreign lobby groups such as ADL, AIPAC, SPLC, etc.
o) Cut off all aid to Israel
p) Deport all Israeli-US dual citizens
q) Reign in US military; restrict their focus to protecting the border and serving and protecting the American people and the US Constitution

3) Prosecution and conviction of the primary, secondary, and tertiary perpetrators of these programs, as identified in this report

4) Development and widespread dissemination of effective counter-measures to these exotic weapons system

VII. References and Resources

Aaronson, T., 2013, The Terror Factory, Inside the FBI’s Manufactured War on Terrorism, lg Publishing.

Akins, H., 2012, Synagogue Rising: A Catholic Worldview of Anti-Christian Judaism and Counterrevolutionary Resistance, CatholicActionResourceCenter.com, Orlando, FL, 727 pp.

Balko, R., 2013, Rise of the Warrior Cop: The Militarization of America’s Police Forces, Public Affairs, 400 pp.

Balthazar, A., 1977, Project MK-Ultra and Mind Control Technology: A Compilation of Patents, Adventures Unlimited Press, 384 pp.

_____, 2017, Big Brother Technology: PRISM, XKeyscore, and other Spy Tools of the Global Surveillance State and Reports, Adventures Unlimited Press, 264 pp.

Barker, J., 2004, The No-Nonsense Guide to Terrorism, New International Publications, Toronto, 144 pp.

Barker, K.R., 2015, Overcoming Monarch Mind Control: Feedback from Therapists & Survivors, Create Space Independent Publishing Platform, 108 pp.

______, 2014, Mental Liberation in the Age of Thought Control: Deprogramming Satanic Ritual Abuse, MK Ultra, Monarch & Illuminati Mind Control, CreateSpace Independent Publishing Platform, 176 pp.

_______, 2014, Angelic Defenders & Demonic Abusers: Memoirs of a Satanic Ritual Abuse Survivor, CreateSpace Independent Publishing Platform, 178 pp.

Barnett, T.P.M., 2005, The Pentagon’s New Map: War and Peace in the Twenty-First Century, Berkley Books, New York, 433 pp.

Blackstock, N., 1988, Cointelpro: The FBI’s Secret War on Political Freedom, Pathfinder Press, 203 pp.
Becker, R.O., 1990, Cross Currents: The Perils of Electropollution The Promise of Electromedicine, Penguin, New York, 336 pp.

Becker, R.O., and Selden, G, 1985, The Body Electric: Electromagnetism and the Foundation of Life, William Morrow, New York, 364 pp.

Begich, N, Dr, 2006, Controlling the Human Mind: The Technologies of Political Control or Tools for Peak Performance, Earthpulse Press Inc., Anchorage, AK, 256 pp.

Behnke, K., and Fuchs, J., 1995, Zersetzung der Selle, “Decomposition of the Soul:” Psychology and Psychiatry in the Service of the Stasi.

Black, D., 2001, Acid: A New Secret History of LSD, Vision Paperbacks, London, 214 pp.

Bell, M.F., The Invisible Crime: Illegal Microchip Implants and Microwave Technology and Their Use Against Humanity,

Blum, W, 2000, Rogue State: A Guide to the World’s Only Superpower, Common Courage Press, Monroe, Maine, 308 pp.

____ 1995, Killing Hope: U.S. Military and CIA Interventions Since World War II, Common Courage Press, Monroe, Maine, 457 pp

Bowart, W., 1978, Operation Mind Control, The CIA’s Plot Against America, Dell Publishing, 317 pp.

_____, 1995, Operation Mind Control: Researchers Edition, 818 pp.

Burghardt, T., Ed. 2002, Police State America; U.S. Military “Civil Disturbance” Planning, Arm the Spirit/Solidarity.

Brzenzinski, Z, 1997, The Grand Chessboard: American Primacy and the Its Geostrategic Imperatives, Basic Books, New York, New York, 223 pp

Cherubini, C., Dr., Gang Stalking: the Threat to Humanity, 176 pp.

Cherep-Spiridovich, 1926 (2000), The Secret World Government or “The Hidden Hand:” The Unrevealed in History, The Book Tree, Escondido, CA, 203 pp.

Churchill, W., and Vander Wall, J., 1990, Agents of Repression: The FBI’s Secret Wars Against the Black Panther Party and the American Indian Movement, South End Press, Boston, MA, 509 pp.

_____, 1990, The COINTELPRO Papers, Documents from the FBI’s Secret Wars Against Dissent in the United States, Black Classic Press, Baltimore, 467 pp.

Cockburn, A., 2015, Kill Chain: The Rise of The High-Tech Assassins, Henry Hold and Co., 320 pp.

Coleman, J, 2005, Tavistock Institute of Human Relations: Shaping the Moral, Spiritual, Cultural, Political, and Economic Decline of the United States of America, World in Review, Carson City, NV, 240 pp.

Collins, A., 1997, In the Sleep Room: The Story of the CIA Brainwashing Experiments in Canada, Key Porter Books, Toronto, Ontario, 275 pp.

Constantine, A., 1995, Psychic Dictatorship in the U.S.A., Feral House, Los Angeles, CA, 221 pp.

_____. 1997. Virtual Government: CIA Mind Control Operations in America, Feral House, Los Angeles, CA, 304 pp.

Cook, J., 2008, Israel and the Clash of Civilizations: Iraq, Iran, and the Plan to Remake the Middle East, Pluto Press, Ann Arbor, MI, 204 pp.

Cottrell, R., GLADIO, NATO’S DAGGER at the HEART OF EUROPE; The Pentagon-Nazi-Mafia Terror Axis, Progressive, San Diego, CA, 483 pp.

Cunningham, C., 2015, Conspiracy Facts: Neocons Unmasked, Critical Thinking Institute, Fort Myers, FL, 351 pp.
de Poncisn, V.L., Freemasonry and Judaism: Secret Powers Behind Revolution, A&B Publishers Group, Brooklyn, N.Y., 260 pp.

Day, L., M.D. 2020, The Deliberate Destruction of America and the World: Who’s Doing It and Why? Rockford Press, Inc., Thousand Palms, CA, 803 pp.

Deikman, A.J., M.D., 1994, The Wrong Way Home: Uncovering the Patterns of Cult Behavior in American Society, Beacon Press, Boston, MA, 192 pp.

Delgado, J.M.R, M.D., 1969, Physical Control of the Mind,: Toward a Psychocivilized Society, Harper Colophon Books, Harper & Row Publishers, N.Y., N.Y, 288 pp.

Donner, F., 1990, Protectors of Privilege; Red Squads and Police Repression in Urban America, University of California Press, 496 pp.

Douglass, J.A., 2008, JFK and the Unspeakable; Why He Died and Why It Matters, Touchstone, 560 pp.

Duncan, R., 2010, Project: Soul Catcher, Volume Two: Secrets of Cyber and Cybernetic Warfare Revealed, Higher order Thinkers Publishing, Boise, ID, 306 pp.

_____, 2014, How to Tame a Demon: A Short Practical Guide to Organized Intimidation, Stalking, Electronic Torture, and Mind Control, Higher Order Thinkers Publishing, Boise, ID, 98 pp.

Engdahl, F.W., 1992, A Century of War: Anglo-American Oil Politics and the New World Order, Pluto Press, Ann Arbor, MI, 303 pp.

_____, 2009, Full Spectrum Dominance: Totalitarian Democracy in the New World Order, 257 pp

Epperson, A.R., 1985, The Unseen Hand, An Introduction to the Conspiratorial View of History, Publius Press, Tucson, AZ, 488 pp.

______, 1990, The New World Order, Publius Press, 357 pp.

Epstein, O.B., Schwartz, J., and Schwartz, R.W., (Eds.), 2011, Ritual Abuse and Mind Control; The Manipulation of Attachment Needs, The Bowlbey Center, Karnac Books, Ltd., London, 183 pp.

Estabrooks, G.H., 1943, Hypnotism, E.P. Dutton and Co., New York, 251 pp

Estulin, D., 2015, Tavistock Institute: Social Engineering the Masses, Independent Publishers Group, 239 pp.

Executive Intelligence Review, 1992, Dope, Inc.: The Book That Drove Henry Kissinger and the Anti-Defamation League Crazy, Executive Intelligence Review, Washington, D.C., 695 pp.

Felton, G., 2005, Enemies by Design: Inventing the War on Terror; Tree of Life Books, 415 pp.

Fleming, M.D., 2014, Tortured in America: The Life of a Targeted Individual, CreateSpace Publishing, 74 pp.

Forwood, A.K., 2011, Gang-Stalking and Mind-Control: The Destruction of Society Through Community Spying Networks, Lulu Publishing, 96 pp.

Ganser, D., USA, The Ruthless Empire, Skyhorse Publishing, Inc., New York, 341 pp.

_____, 2005, NATO’s Secret Armies: Operation Gladio and Terrorism in Western Europe, Frank Cass, New York, 315 pp.

Glass, D., 2006, Stalking the Stalker: Fighting Back with High-tech Gadgets and Low-tech Know-how, iUniverse Inc., 93 pp.

Glick, B., 1989, War at Home; Covert Action Against U.S. Activists and What We Can Do About It, South End Press, Cambridge, MA, 90 pp.

Grupp, J., 2007, Corporatism: The Secret Government of the New World Order, Thinker’s Library, Malaysia, 412 pp.

Hall, J, Dr., 2009, A New Breed: Satellite Terrorism in America, Strategic Book Publishing, 132 pp.

_____ , Guinea Pigs: Technologies of Control, Strategic Book Publishing and Rights Company, Houston, TX, 180 pp

Harris, S., 2010, The Watchers, The Rise of America’s Surveillance State, Penguin Books, 432 pp.

Hersh, B., 2002, The Old Boys: The American Elite and the Origins of the CIA, Tree Farm Books, St. Petersburg, FL, 472 pp.

Higham, C, 1983, Trading With The Enemy: An Expose of the Nazi-American Money Plot 1933-1949, Delacourt Press, N.Y, 277 pp.

Hughes, D.A., 2024, “Covid-19,” Psychological Operations, and the War for Technocracy, Volume 1, Palgrave MacMillan, 391 pp.

_____, 2024, Wall Street, the Nazis, and the Crimes of the Deep State, Skyhorse Publishing, Inc., Delaware, 218 pp.

_____ 2025, Omniwar, The Solari Report, Solari Inc., Hickory Valley, TN, 120 pp.

Hoffman, M., 2008, Judaism Discovered From Its Own Texts: A Study of the Anti-Biblical of Racism, Self-Worship, Superstition, and Deceit, Independent History and Research, Coeur D’Alene, ID, 1102 pp.

Hunt, L, 1991, Secret Agenda: the United States Government, Nazi Scientists, and Project Paperclip, 1945-1990, St. Martin’s Press, New York, 340 pp.

Funder, A., 2002, Stasiland: Stories From Behind the Berlin Wall, Harper Perennial, New York, New York, 288 pp.

June TI, 2016, No Ordinary Stalking: A Look at Organized Stalking and Electronic Harassment, Friesen Press, Victoria, BC, Canada, 476 pp.

Kah, Gary H., En Route to Global Occupation, 224 pp.

Kannaday, P., 2011, Gang Stalking is a Covert Crime Running Rampant in America, 20 pp.

______, 2011, Gang Stalking The Hidden Crime, 24 pp.

Karayan, J., 2014, Electronic Torture, Electronic Rape: Technology and Gang Stalking at the Post Office, Infinity Publishing, 156 pp.

Karlstrom, E.T., 2012, Mind Control: History and Applications.

______, This website as well as 911nwo.com.

_____, “Is Crestone/Baca, Colorado, the “Vatican City of the New World Order?: An Expose of the New World Religion:”

Kilde, R.L., M.D., 2015, Bright Light on Black Shadows, Georgetown, Ontario, Canada, 445 pp.

King, M.S., 2015, Planet Rothschild: The Forbidden History of the New World Order, Volume 1, 1763-1939, San Bernadino, CA, 318 pp.

_____, 2015, Planet Rothschild: The Forbidden History of the New World Order, Volume 2, WWII to 2015, San Bernadino, CA, 318 pp.

Klein, N., 2007, The Shock Doctrine, The Rise of Disaster Capitalism, Metropolitan Books, N.Y., N.Y., 558 pp.

Keith, J., 1997, Mind Control, World Control: The Encyclopedia of Mind Control, Adventures Unlimited Press, Kempton, IL, 311 pp.

_____, 2003, Mass Control: Engineering Human Consciousness, Adventures Unlimited Press, Kempton, IL, 253 pp.

Knuth, E.C., 1946, The Empire of “The City” (World Superstate): The Jekyll/Hyde Nature of the British Government (130 Years of Power Politics of the Modern Era), Milwaukee, WI, 111 pp.

Koehler, J.O., 1999, Stasi: The Untold Story of the East German Secret Police, Westview Press, Boulder, CO, 459 pp.

Lee, M., 2017, Persecuted But Not Forsaken, Kenneth M. Lee, 144 pp.

Lee, M.A., and Shlain, B., 1985, Acid Dreams, The Complete Social History of LSD: The CIA, the Sixties, and Beyond, Grove Press, New York, 345 pp.

Levine, Y., 2018, Surveillance Valley: The Secret Military History of the Internet, PublicAffairs, 384 pp.

Lina, J, 2002, Under the Sign of the Scorpion: the Rise and Fall of the Soviet Empire, Referent Publishing, Stockholm, Sweden, 446 pp.

Lockshin, A., and Lockshin, L., 1988, Silent Terror, One Family’s History of Political Persecution in the United States, Novosti Press Agency.

Marchetti, V., and Marks, J., 1974, The CIA and the Cult of Intelligence, Dell Publishing, New York, New York, 365 pp.

Marks, John, 1979, The Search For the Manchurian Candidate, The CIA and Mind Control; the Secret History of the Behavioral Sciences, W.W. Norton & Company, 288 pp.

Marrs, J., 2006, The Terror Conspiracy; Deception, 9/11, and Loss of Liberty, The Disinformation Company Ltd., New York, New York, 482 pp.

Marrs, T., 2016, Holy Serpent of the Jews: The Rabbis’ Secret Plan for Satan to Crush Their Enemies and Vault the Jew to Global Dominion, RiverCrest Publishing, Austin, TX, 224 pp.

Martin, R.L., 1966, Fabrian Freeway: High Road to Socialism in the U.S.A., Heritage Foundation, Chicago, 566 pp.

Martinez, B, 2014, Grand Deceptions: Zionist Intrigue in the 20th and 21st Centuries, Progressive Press, 177 pp.

McCoy, AW., 2006, A Question of Torture: CIA Interrogation, From the Cold War to the War on Terror, Metropolitan Books, New York, New York, 310 pp.

McCrae, R., 1984, Mind Wars: The True Story of Secret Government Research Into the Military Potential of Psychic Weapons, St. Martin’s Press, N.Y, 155 pp.

MacDonald, K., 2002, The Culture of Critique; An Evolutionary Analysis of Jewish Involvement in Twentieth-Century Intellectual and Political Movements, 1stbooks, Long Beach, CA, 421 pp.

_____, 2002, A People That Shall Dwell Alone: Judaism as a Group Evolutionary Strategy, with Diaspora Peoples, Writers Club Press, New York, 492 pp.

_____, 2004, Separation and Its Discontents: Toward an Evolutionary Theory of Anti-Semitism, 1stbooks, Long Beach, CA, 407 pp.

McGowan, D., 2004, Programmed to Kill: The Politics of Serial Murder, iUniverse, Inc., New York, 383 pp.

Melzer, N., 2011, Cyberwarfare and International Law, United Nations Institute For Disarmament Research,

Milan, M., 1989, The Squad: The U.S. Government’s Secret Alliance with Organized Crime, Shapolsky Publishers, Inc., New York, 304 pp.

Miller, A., 2012, Healing the Unimaginable, Treating Ritual Abuse and Mind Control, Karnac Books Ltd., London, 303 pp.

Naylor, G, 2005, 1996, Third World Press, Chicago, 175 pp.

Nelson-Pallmeyer, J, 1990, War Against the Poor: Low-Intensity Conflict and Christian Faith, Orbis Books, Maryknoll, New York, 106 pp.

_____, 2001, School of Assassins: Guns, Greed, and Globalization, Orbis Books, Maryknoll, New York, 155 pp.

Melton, H.K., and Wallace, R., 2009, The official CIA Manual of Trickery and Deception, Declassified, William Morrow, 248 pp.

Moreno, J.D., 2000, Undue Risk: Secret State Experiments on Humans, Routledge, 368 pp.

______, 2012, Mind Wars: Brain Science and the Military in the 21st Century, Bellevue Literary Press, 236 pp.

______, 2006, Mind Wars: Brain Research and National Defense, Dana Press, 225 pp.

_______, 2011, The Body Politic: The Battle Over Science in America Defense, Bellevue Literary Press, 208 pp.

Mullins, E., 1988, Murder By Injection: The Story of the Medical Conspiracy Against America, Omnia Veritas Ltd., 333 pp.

_____ 1992, The World Order: Our Secret Rulers; A Study in the Hegemony of Parasitism, Omnia Veritas Ltd, 366 pp.

_____, 2014, The Federal Reserve Conspiracy, Martino Publishing, Mansfield Center, CT, 144 pp.

Nelson-Pallmeyer, J., 1990, War Against the Poor: Low-Intensity Conflict and Christian Faith, Orbis Books, Maryknoll, New York, 106 pp.

_____, 2001, School of Assassins; Guns, Greed, and Globalization, Orbis Books, Maryknoll, New York, 155 pp

Noblitt, JR., and Perskin, P.S., 2000, Cult and Ritual Abuse: It’s History, Anthropology, and Recent Discovery in Contemporary America, Praeger, Westport, CT, 269 pp.

Nordangard, J., 2024, The Global Coup D-Etat, The Fourth Industrial Revolution and the Great Reset, Skyhorse Publishing, Inc. 378 pp.

Lawrence, L., 1967, Were We Controlled? The Assassination of President Kennedy, University Books, Inc., New Hyde Park, N.Y, 173 pp.

O’Brian, C., 1995, Trance Formation of America, The True Life Story of a CIA Mind Control Slave, Reality Marketing Incorporated, 267 pp.

O’Toole, G., 1978, The Private Sector, Rent-a-cops, private spies and the police-industrial complex, W.W. Norton & Co., 250 pp.

Olsen, L., 2007, The Hidden Masters Who Rule the World: From Ancient Wisdom to the New World Order, R Publications Resource, Cotati, CA, 424 pp.

Orwell, G., 1945, Animal Farm, Rupa, (2013), 124 pp.

____, 1948, 1984, Signet Classics, 328 pp.

Otterman, M., 2007, American Torture: From the Cold War to Abu Ghraib and Beyond, Pluto Press, Ann Arbor, MI, 285 pp.

Paladin, 2014, T.I., Advice for the Targeted Individual and Gang Stalking Victim, 54 pp.

Pijl, K.V.D., 2022, States of Emergency: Keeping the Global Population in Check, Clarity Press, Inc., Atlanta, GA, 298 pp.

Piper, M.C., 2013, False Flags; Template for Terror; An Analytical Critique of the Covert Model Utilized by the Conspirators Who Orchestrated 9-11, the Oklahoma City Bombing, the JFK Assassination, Sandy Hook, and Boston, Seward Square, 328 pp.

_____, 2009, The New Babylon; Those Who Reign Supreme, Those Who Reign Supreme: A Panoramic Overview of the Historical, Religious, and Economic Origins of the New World Order, American Free Press, Washington, D.C., 266 pp.

Pittman, R.M., 2012, Remote Brain Targeting: A Compilation of Historical Information Derived from Various Sources, Create Space Independent Publishing Platform, 280 pp.

_____, 2013, Covert Technological Murder: Big Brother Approved! (Mind Control Technology Book Series), Create Space Independent Publishing Platform, 294 pp.

Prag, C., 2014, How to Deal With and Defeat Gang Stalkers.

Priest, D., and Arkin, 2011, W. M., Top Secret America; The Rise of the New American Security State, Back Bay Books, 368 pp.

Prouty, L.F., 2008, The Secret Team: The CIA and its Allies in Control of the United States and the World, Skyhorse Publishing, N.Y., N.Y., 572 pp.

Quigley, C., 1981, The Anglo-American Establishment, from Rhodes to Cliveden, GSG & Associates, San Pedro, CA, 354 pp.

_____, 1966, Tragedy and Hope: A History of the World in Our Time, GSG & Associates, San Pedro, CA, 1348 pp.

Rauwel, G., Body Hackers: Cyber Murders

______, Targeted Individuals: Frequently Asked Questions (FAQs): Why Do TIs Experience Stomach Issues?

Redden, J., 2000, Snitch Culture; How Citizens are Turned Into the Eyes and Ears of the State, Feral House, 320 pp.

Reed, D., 1985, The Controversy of Zion, Vertas Publishing Company, Midland DC, Western Australia, 587 pp

Rich, M.M., 2008, The Hidden Evil: The Financial Elite’s Covert War Against the Civilian Population, Lulu Enterprises, Morrisville, N.C., 247 pp.

_____, 2013, New World War: Revolutionary Methods for Political Control, Lulu Enterprises, 416 pp.

Ross, C.A., M.D., 2000, Bluebird: The Deliberate Creation of Multiple Personality by Psychiatrists, Manitou Communications, Richardson, TX, 401 pp.

_____, 2006, The C.I.A. Doctors: Human Rights Violations by American Psychiatrists, Manitou Communications, Inc., Richardson, TX, 351 pp.

Rothmiller, M., and Goldman, I.G., 1992, L.A. Secret Police In the LAPD Elite Spy Network, 226 pp.

Rutz, C., A Nation Betrayed: The Chilling True Story of Secret Cold War Experimentsw Performed on Our Children and Other Innocent People, Fidelity Publishing, Grass Lake, MI, 241 pp.

Scahill, J., 2007, Blackwater; The Rise of the World’s Most Powerful Mercenary Army, Nation Books, 560 pp.

____, 2014, Dirty Wars: The World is a Battlefield, Bold Type Books, 680 pp.

Scott, P.D., 1993, Deep Politics and the Death of JFK, University of California Press, Berkeley, CA, 413 pp

Shorrock, T., 2008, Spies For Hire; The Secret World of Intelligence Outsourcing, Simon & Shuster, 464 pp.

Silvey, D. M., 2010, Project Artichoke; The Zodiac Killer Hoax Revealed: A True Story, Author House, Bloomington, IN, 145 pp.

Simpson, C., 1988, Blowback: The First Full Account of America’s Recruitment of Nazis, and its Disastrous Effect on Our Domestic and Foreign Policy, Collier Books, New York, 398 pp.

Slekine, Y., 2004, The Jewish Century, Princeton University Press, Princeton, NJ, 438 pp.

Sniegoski, S.J., 2008,Transparent Cabal: The Neoconservative Agenda, War in the Middle East, and the National Interest of Israel, Enigma Editions, Norfolk, VA, 447 pp.

Spingola, D, 2012, The Ruling Elite: The Zionist Seizure of World Power, Trafford Publishing, 762 pp.

Springmeier, F., 2007, Bloodlines of the Illuminati, Pentracks Publications LLC, 619 pp.

Starks, S., Threat Assessment of Directed Energy Weapon (DEW) on Targeted Individuals and Those Experiencing Electronic Harassment and Gangstalking

Storey, C., 2006; The New Underworld Order; Triumph of Criminalism, Dark Actors Playing Games, The Global Fantasies of the Geomasonic Illuminati, Edward Harle Limited, London and New York, 740 pp.

Sullivan, E., 2008, My Life Changed Forever: The Years I Have Lost as a Target of Organized Stalking, Infinity Publishing Company, West Conshoken, PA, 154 pp.

Sullivan, K., 2003, Unshackled: A Survivor’s Story of Mind Control, Dandelion Books, LLC, Tempe, AZ, 452 pp.

Sutton, A.C., 2002, America’s Secret Establishment: An Introduction to the Order of Skull and Bones, Trine Day,
Walterville, OR, 317 pp.

_____ 1986, The Best Enemy Money Can Buy, Liberty House Press, Billings, MT, 261 pp.

_____, 2005, The Federal Reserve Conspiracy, Bridger House Publishers, Inc., Carson City, NV, 115 pp.

_____ 2010, Wall Street and the Rise of Hitler, Clairview, West Hoathly, 220 pp.

_____, 2015, Wall Street and the Bolshevik Revolution: The Remarkable True Story of the American Capitalists Who Financed the Russian Communists, Clairview, West Hoathly, 228 pp.

Sweeney, H.M., The Professional Paranoid: How Fight Back When Investigated, Stalked, Harassed, or Targeted by Any Agency, Organization, or Individual, Feral House, Venice, CA, 197 pp.

Tarpley, W., (5th Edition), 2012, 9/11 Synthetic Terror: Made in USA, Progressive Press, 568 pp.

Taylor, B., 1999, Thanks for the Memories; The Memoirs of Bob Hope’s and Henry Kissinger’s Mind-Controlled Slave, Bryce Taylor Trust, Lynn, NC, 311 pp.

Taylor, E., 2009, Mind Programming: From Persuasion and Brainwashing to Self-Help and Practical Metaphysics, Hay House, Inc., New York City, 338 pp.

Thomas, G., 1989, Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, Bantam Books, N.Y., 388 pp.

Thomas, M., 2007, MONARCH: The New Phoenix Program, Lexington, KY, 267 pp.

Thomas, W., 1998, Bringing the War Home, Earthpulse Press, Inc., Anchorage, AK, 434 pp..

Towers, B., 2016, Circle of Snakes: How To End Your Gang Stalking!, CreateSpace Independent Publishing Forum, 86 pp.

Turse, N., 2008,The Complex: How the Military Invades Our Everyday Lives, Metropolitan Books, N.Y., N.Y., 290 pp.

_____, 2013; Kill Anything That Moves: The Real American War in Vietnam, Picador, 416 pp.

Twyman, T.R., 2008, Mind Controlled Sex Slaves and the CIA, Global Communications/Conspiracy Journal, 175 pp.
U.S. Army, 1994, Intelligence and Electric Warfare Operations Field Manual, Field Manual No. 34-1, Washington, D.C,

Valentine, D., 1017, The CIA as Organized Crime: How Illegal Operations Corrupt America and the World, Clarity Press, Inc., Atlanta, GA, 446 pp.

Verdier, PA, 1977, Brainwashing and the Cults, An Expose on Capturing the Human Mind, Wilshire Book Co., No. Hollywood,CA, 118 pp.

Victorian, A., Dr., 1999, Mind Controllers, Lewis International Inc., 216 pp.

Vine, D., 2020, United States of War: A Global History of America’s Endless Conflicts, from Columbus to the Islamic State (California Series in Public Anthropology) (Volume 48), University of California Press, 461 pp.

Webb, W., 2022, One Nation Under Blackmail, Vol. 1, Trine Day Publishing, LLC, Walterville, OR, 532 pp.

_____, 2022, One Nation Under Blackmail, Vol. 2, Trine Day Publishing, LLC, Walterville, OR, 418 pp.

Whitehead, J.A., 2013, A Government of Wolves, The Emerging American Police State, SelectBooks, 288 pp.

Watt, E.J., 2015, The Devil Beside Me: Gang Stalking, The Secret War and How to Win, Amazon Digital Services, 144 pp.

Willan, P., 1991, Puppetmasters: the Political Use of Terrorism in Italy, Author’s Choice Press, San Jose, CA, 375 pp.

Williams, P., L., 2018, Operation Gladio, The Unholy Alliance Between the Vatican, the CIA, and the Mafia, Prometheus Books, Amherst, New York, 416 pp.

Wood, J., 2010, Where Did the Towers Go? Evidence of Directed Free-Energy Technology on 9/11, 498 pp.

Wood, P.M., 2015, Technocracy Rising: The Trojan Horse of Global Transformation, Coherent Publishing, 274 pp.

Woolfolk, L.B., 1890, The Great Red Dragon or London Money Power, George E. Stevens, Cincinatti, 328 pp.

Yeadon, G., and Hawkins, J., 2007, The Nazi Hydra in America: Suppressed History of a Century: Wall Street and the Rise of the Fourth Reich, Progressive Press, 660 pp.

Zuboff, S., 2019, The Age of Surveillance Capitalism, The Fight for a Human Future at the New Frontier of Power, Public Affairs, New York, 691 pp.

See Websites:

gangstalkingmindcontrolcults.com
911nwo.com
fightgangstalking.com
and many more

Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *

Back To Top