Gangstalking (Crime of The Century) Solved!? Computer Investigations Show (Some) TI’s Are MKULTRA Victims and Biomedical Slaves; (Israeli) Black Cube & Mossad Are Primary Perpetrators
New World Order
Articles & Interviews
Cognitive Warfare June-November, 2020 Francois du CluzelMarch 16, 2023
Part IV: The (Jewish) “Controllers” and Their Destructive MissionFebruary 21, 2023
Part VI: Mind Control: History and ApplicationsFebruary 2, 2023
Appendix 1: Crestone/Baca “Group Dynamics” (2006-2008)December 22, 2022
Appendix 25: Noahide Law: Merry Christmas, and OFF WITH YOUR HEAD!October 21, 2022
Appendix 5: Maurice Strong: Godfather of Crestone/BacaMarch 15, 2022
Appendix 63: NASA’s Project Blue Beam by Serge Monast- 1994February 9, 2022
Appendix 64: The Unified Conspiracy Theory; The Greatest HoaxJanuary 31, 2022
Appendix 66: The Zionist Jew World OrderJanuary 30, 2022
Timeline of United States Military OperationsDecember 25, 2020
New World Order: UN Agenda 21/2030 Mission GoalsDecember 19, 2020
The Jewish Conspiracy is British Imperialism (Henry Makow, Ph.D.)November 27, 2020
(Choose) Freedom In ChristOctober 18, 2020
Digital Twins, Digital Immortality, and Targeted IndividualsSeptember 19, 2020
Are Lawyers Patenting TI’s DNA?March 30, 2020
Some Appropriate Graphics For Covid 19(84) & 5G N(J)ew World OrderFebruary 28, 2020
Who Are “They?”… Their Statements Say…. Starts with J….November 18, 2018
USA Freedom Act (2015 Update of USA PATRIOT ACT)November 9, 2018
You Are The Enemy (by Preston James of Veterans Today, 2014)September 25, 2018
The Unified Conspiracy TheoryMay 19, 2018
Terrorism and War (Dr. E. Karlstrom Lecture Notes, ca. 2000)March 17, 2018
Post-WWII U.S. undeclared and/or secret wars and “war triggers”January 20, 2018
Truth In Quotes and Images: Freedom Fighters Help YourselvesJanuary 5, 2018
Trump’s ‘Jew-nited States of Israel’ (Icke Commentary)January 5, 2018
Chabadniks and Zionists are 9/11 “perpetraitors”November 26, 2017
Dr. Eric Karlstrom: Global Warming (Hoax) is Politics Not ScienceNovember 7, 2017
(Jewish) Protocols Explain Almost Everything: Author Hugh Akins ExplainsSeptember 27, 2017
USAF Squadrons & Satellite WeaponsJune 19, 2017
Trump is Puppet of Zionist Jews (youtube)December 6, 2016
Appendix 148: Kabbalah, Satanic Jewish Black Magic, & FreemasonryOctober 25, 2016
Synonyms and Fronts for the NWOFebruary 19, 2016
Total Individual Control Technology (by Omnisense)February 17, 2016
The United Nations and Planned World Government (from De Ruiter, 2015)February 15, 2016
Techniques and Strategies of the NWOJanuary 23, 2016
The Illuminati, Skull and Bones & “The Plan”January 11, 2016
YOU are THE ENEMY by Preston James, Ph.D. (Veterans Today, 2014)November 27, 2015
Secret Records Revealed HighlightsNovember 25, 2015
Introduction to Terrorism: Theirs and OursJanuary 21, 2015
Post-WWII American War CrimesJanuary 21, 2015
“The Zionist/Jewish-Controlled Media is Public Enemy Number One”January 21, 2015
Oil politics 101February 28, 2014
Eco-Politics and EconomicsFebruary 28, 2014
Alan Watt, ResearcherFebruary 28, 2014
Charlotte Iserbyt, AuthorFebruary 27, 2014
John Taylor Gatto, AuthorFebruary 26, 2014
Scientific evidence exposes chemtrail spraying as crime against humanityFebruary 25, 2014
Social Engineering 101: Silent Weapons for Quiet Wars (Against Humanity)February 25, 2014
Dr. Steve FillingFebruary 25, 2014
Merry Christmas, and OFF WITH YOUR HEAD!February 25, 2014
Jewish “global lies” are collapsing (National Journal, 2011)February 24, 2014
Organized Gang Stalking QuotesFebruary 23, 2014
Important Email Message to Professor Eric Karlstrom from Canadian TI, Bobbi Peitsch (February 28, 2021)
I have not spoken with you in a long time.
I have dug out enough people, countries and proved many things.
We would ask you to sit on the European Coalition of Cyber Torture.
I put your name forward, and it was agreed after the coalition found Black Cube/Mossad was involved.
Below are my findings that I believe may be of interest to you, yes it is clear we are MkUltra victims.
We have xrays and MRIS of mother sister and I.
This is how it works for all targeted individuals in Canada:
We are all routed to asn577 (AS Number)
The owners of ASN577 that engage in this program with two network engineers that manipulate and use BGJ hijacked networks are:
and Peter Wong
AS577 Bell Canada – bgp.tools
Bell Canada AS577 and Related Computer Networks
All targeted individuals in Canada are then routed to AS74
AS74 Shared Services Canada – bgp.he.net
Hurricane Electric Shared Services
Technically, they are not telling lies about us, we are not prostitutes, but they have labelled us prostitutes because they sell us all over the world to whoever is conducting research, so we are whores of the federal government of Canada.
Transactions are then related to Churchill Medical Center in Manitoba (yes the Arctic). From there the transmissions go all over the world.
First responders participate in this and transactions are made in blockchain. I have proven all of this factually in the (Computer) Networks. I have images, dates times, etc.
If someone took this forward it would win, (in court) because the ISP and the hackers would have to provide their records, and metadata is forever.
All targeted individuals in Canada are Routed to the Behavioural Health Foundation in Winnipeg. It has been in operation since 1967, it is actually the CIA. I did a 5-hour investigation on the site with my team. One night we watched their transactions and they deal in block chain, gift cards. Hacking tools, many things.
The CIA and McGill University and others were guilty of the MkUltra project, and what I believe we have is evidence that it never ended. we (Targeted Individuals) are all MkUltra Projects.
They have video surveillance inside of our home, my spouse sees all of this stuff. I have been drugged and raped, I hardly leave the house now I am terrified they will break in again as there is weapons and a camera system in here. My sister, mother, and I all connected to multiple banks, brokers and insurance companies. None of us have enough money to hire someone to see the accounts that have been fraudulently taken out on us.
Transactions occur every night in blockchain on our networks.
What is an IP Camera? How does IP Surveillance Camera Work? [Complete Guide] (it4nextgen.com)
What is an IP Camera? How Does IP Surveillance Camera Work (Complete Guide)
They use a surveillance fencing system with Digi and Pegatron systems controlled by IMSI catchers that operate with Apple Airplay. They use this system to assault with Radio Frequencies on a fenced system that they load because we are in cancer research projects. I live in a town of 1000 souls with 300 homes, today I have over 1000 networks in my home and 2000 wifi, I have none that live behind me or on one side of me.
A surveillance Mesh technique is used, wrapping around a victim’s home and inside of their home. This is the person who lives next door, look at the frequency.
This is the product that they use:
X20 Dual 5GHz MeshRangerSmart Virtual Fiber
The control appears to be from next door:
They collect the impacts of the biomedical data through Porthru the far right column is in MHz, these levels inside of a home are illegal, it is radiation. The -5180 is elf waves which are the most dangerous. My perpetraitors on Rossburn can be traced.
I have traced my mother’s inside of her route, they hacked directly into it, their name is Paradoski who work with cancer research. It is all organized crime because there are no checks and balances on Research Grants.
They have unlimited access globally once they have a biomedical slave. Victims are a hidden economy for money laundering and organized crime at the highest levels of our society.
It is all filtered through BC University (University of British Columbia?) which are financial money washers by the looks of it.
Canada Post (mail service) hacks me out, around the clock as well as a real estate development company (dozens hack). I believe because my mother who is a widow, as a decent property and they have been creating land developments around her house. (It’s) just easier to kill a family, I guess, and take the property than pay for it.
The financial/medical system & Canada Foreign trade department hack & experiment torture and relay medical information internationally with a well-known military contractor who deals in data (Linode):
Medical records and Health Sciences center hacking into my private home network:
GTIS is Government of Canada Forgein Trade department:
They restrict our searches by inserting code through the browser, that code (one of them) is a font called woff, woff2.
They restrict our search results from locating a Xerox lobbyist who came to Canada from the UK. In 1998, he approached the ON Leg; I don’t know what he discussed. He is an RFID expert who works with the military, police, medical, IBM, and others.
I have evidence of multiple military contractors in my network; those are fingerprints and the contractors are from all over the world. They have taken multiple patents out based upon torture, I have proof of one. We have RFID placed into our bodies, I have the mac addresses and they relay straight back to the Health Sciences Center and St Boniface Hospital in Winnipeg.
After a victim sees a doctor, the clinic heads to their network and relays the data back to the hospitals that are participating in this crime. All victims are in an ARPA/DARPA project on ASN112.
Kim, I ask you to share this, I have so much more data it is unreal. But the hospitals want to call you crazy, (but) you’re not crazy with readings like this. Finger prints are proof of network hacking with the system I have created.
This Post Has 0 Comments