The sounds originate from within, above, or behind the head and are transmitted to the inner ear via bone conduction (thermal expansion). Yep, it was a gradual process. And this is how easy it is for someone who has an axe to grind with you to ruin your life - all they have to do is to report you as a suspicious, "person of interest" or "potentially radicalized" or "at-risk" and you are for it! Seek out your most trusted friends while you do as much as you can do document and record these patterns and occurrences and get concrete evidence to use in legal criminal proceedings against the individuals and also in civil litigation. Thanks for your question. If they wear the same clothes day in and day out, make some remark about their clothes never-changing. -Monitoring newspapers in your area for letters to the editor regarding activities. Defeating the new enemies involves the synchronized use of non-lethal directed energy weapons, isolation, deprivation, and PsyOps against individuals and groups (aka TA, target audience and TI, targeted individuals). For the stalker - gang stalking is both an addictive behavior, as well as a form of entertainment for the stalkers. The) Control Center (CC) acquires access to properties or apartments immediately next to the targets homes or apartments. In 1975, Dr. Joseph Sharp proved that correct modulation of microwave energy can result in wireless and receiverless transmission of audible speech. EC operator can apply music in adjacent apartments with exceptionally powerful bass, directed at the targets unit. For whales, hundreds of miles. Agents must take great care that each and every act of punishment is DENIABLE. -CBA can casually describe the odd behavior exhibited by the target as a result of around the clock activities to the targets neighbors. You know when you are being gang stalked because every person around you, even friends, family, and coworkers, is watching you. The machine successfully transmitted images into a CNN reporters mind. Other times, they will remove the same person, place, or thing from everywhere. PO- PsyOp- Psychological Operations, US Military states that the ultimate goal of PO is to modify the behavior of the TA (TI) by destroying their will. and our A worker examines a ballot at the Clackamas County elections office on May 19, 2022, in Oregon City, Ore. No . Today, enemies are communists and NATO (is the) opposition. You will hear cough non-stop wherever you go. Web spoofing allows an attacker to create a copy of the worldwide web. . Major operational components of organization: Elements of (secret service) gang stalking operations: -Surveillance is foundation of all operations, Appendix 2. The DOD describes this as an attrition-based approach: Attrition is the product or gradual erosion of the will. Zerzetsen: Inflicting as much pain and suffering as possible without leaving any marks. Rarely used, scheduled when the target has acted in a way so as to deserve special punishment, like divulging the name of a criminally acting secret agent. Suffice it to say that it is possible to apply incentives which cause even people closest to the target to cooperate. 2. PsyOp operators profile TAs and TIs and devise themes to attack their TAs (target audience), which include TIs (targeted individuals). Annual Cost of Stalkers Only = 2 voices X 24 hours X 365 days X hourly rate (hourly rate = big mystery) So lets start with 1 Rand an hour Amounts to R17 520/year. Non-ionizing radiation. From 1 to 250 Hz the pain/damage threshold seems to increase with frequency as well as power. -For a CBA convoy, and where the target is at a location (and time) where traffic is normally very sparse, cause heavy traffic, forcing the target to notice. Also keep a journal of daily occurrences and your mood and thoughts. Above, I mentioned that many stalkers are using drones. If you came out and wrote an op-ed critical of the "lone gunman" explanation - you were a "conspiracy theorist". Often you will have an on-site supervisor (OSS) position you, and give you hand signals as to when to start your movement to intercept the target. What is most important is to find your strength and listen to your inner voice, your instincts and do what you need to do to remain resilient in the face of this abuse. They have lots of faults. If the perpetrator had access to your phone or computer, they could most probably be tapped with spyware or a tracking device. The reasons why targeted individuals are targeted vary. It is used to deal with domestic threats in the New War. Do a thorough check of your car; take it to a mechanic if you have to. Most companies and academic institutions have personnel whose job it is to address such problems. Please, dont let them poison you. He imitated me chewing like a cow. In this case, your supervisor will assign you to call in to the show, and instruct you as to appropriate things to say, such as rebutting the targets claims, pretending to be a target calling and making wacko statements such as UFOs are harassing me, or pulling the discussion away from real activities and to something like media mind control.. An anchor is created when an emotional state is linked to something such as an object, person, sound, smell, place, color, etc. Sabotage is applied at the targets home, workplace, and on their vehicle. This is normally done in special shifts and under scheduling and control at a higher level than your local CC. Target selection is done by senior Control Center (CC) staff or higher levels. Contact info: https://neverending1.wordpress.com. If they talk back, theyre acknowledging their existence. My life and livelihood have been compromised for the last 11 years by being attacked by electromagnetic radiation torture, and by organized stalking Thousands of Americans are currently suffering from chemical, electromagnetic, psychological and physical torture with no government relief or laws. TPD Tactical PsyOp Detachment- team of about 13 personnel with a captain and staff sergeant. Professor George J. Stein in Information Warfare, which appeared in Airpower Journal, stated: The target of information warfare, then, is the human mind. Some of the most common tactics of Community Stalking are: electronic harassment, constant surveillance, mental manipulation, sabotage, investigation and disclosure, aka "doxxing" of personal information, trauma-based manipulation and other purposeful interferences with one's daily life such as noise and disruptions in one's daily routine and vandalism and similar acts. There is also no obvious leadership either . If possible -- change jobs. In 1972 France was using infrasonic generators which operated at 7 Hz on its civilian population. These incentives are applied by specialists from our organization at higher than the local level. The battle remains, the battle for the mind.. The person is unkowingly part of an experiment. Taxi drivers can delay arriving when called by the target, especially when going to the airport. When in doubt, hang back a bit, and contact the center for instructions, as targets in transit can present many unanticipated situations. PsyActs usually utilize multiple people to transmit messages. And because it is basically an invisible act - stalkers become more aggressive as time goes on. Take that information and load it on to your PC and then make at least 3 copies and transfer that data to 3 thumb drives or other hard drives.You should never upload that to the Internet! And every time I succeed in getting them really angry. Mine stalk me from out of eyesight range. Okay, I chew like a cow. They have to obey rules we dont even have to think about. This stuff is very real and happens to innocent people every day, perhaps even someone you know. The most important thing to do is remain vigilant and calm, and not to question your own sanity. The person pissed off the wrong person. DARPA helped create CRs through programs like the Adaptive Cognition-Enhanced Radio Teams (ACERT), and Situation Aware Protocols in Edge Network Technologies (SAPIENT). If you are being harassed over the phone, contact your . they make lies up about us the targets to get people to murder us.gangstalkers don't care vigilantes don't care they love the power they have over people even if that power involves murder.these people are pure evil to call them human really is an insult to humanity. Infrasound easily passes through buildings and travels great distances. So, hit them with your thingamajig! These opportunities are great ways to discredit targets by talking about UFOs, things like black helicopters following you, foil beanies, satellites parked just above your home, and perhaps events normally considered paranormal like seeing (things that) appear and disappear. These self-described "targeted individuals" say they are being monitored, harassed, and stalked 24/7 by governments and other organizations. But if you're an old-timer, the best thing to do is ignore them, ignore them, ignore them, ignore them, ignore them. "Predatory Gangstalking is a criminal phenomenon referring to a group of loosely affiliated people who, in an organized and systematic manner, relentlessly invade all areas of an individual's life on a continuing basis, as part of their lifestyle. After reading about the Stasi, guess where the US government and other "Five Eyes" nations got this model from? Thats one of the rules they have to live by. Rumours consist mainly of lies. Thankfully with the rise of various video platforms and alternative tech, there are many good outlets for you to turn the tables on your stalkers and expose them for the rest of the world to see. The government has been proven to have and use, Another aspect of electronic harassment is the use of technology such as RNM - "remote neuronal monitoring" and V2K, or so-called ". With those diamond studs in your ear, you look like a woman. He didnt know what to say. More and more commonly now we are also seeing drones, which now put previously advanced technology into the hands of your stalker, causing you to have a perpetual "peeping Tom" in your life. They give orders in secrecy to police, media, legal system, and judges, etc. The target can say whatever he/she wants, but the gangstalkersare never, ever suppose to reply to you. 3. As a fellow human undergoing the same trials as you, may I make a suggestion? Not to be be alarmist, but one might be not surprised to hear someone asking: could the rise in gangstalking accounts in the last several years be evidence of governments running covert tests on people, before a mass rollout of a social credit/tracking system? The next time I saw him, he was about to say the same thing he always says, but I shut him up right away. Plus you get to see one of my dumbass gangstalkers who followed me around - an ugly fucker. Like sabotaging the targets reputation, discrediting their public statements, web sites, media appearances, letters to the editor and the like are done under the supervision of psychologists and psychiatrists on their staff. Electronic punishment training is beyond the scope of this manual. The battlespace is your neighborhood and the war is global. Insurgents those who try to persuade the populace to accept political change. A gang stalking group is a well-run organization comprised of members who are unidentified as gangstalkers to the outside world. -Medical lab technicians can substitute blood samples, or otherwise falsify results making the target appear to have absolutely no reason for their complaints. They cause a variety of effects, including tiredness, dizziness, nausea, vomiting, abdominal pain, convulsions, epileptic seizures, temporary paralysis, vibration of internal organs, cooking of organs, cataracts, burning sensation on the skin, hyperthermia (heating of body), headaches, loss of short-term memory, interruption of cognitive processes, cardiac arrest, and cancer. Possibly being parked in front of the home when the target returns, repeatedly. Indoors, it might be good to invest in EMF Protection blankets, Wi-Fi jammers, and Faraday shield covers for your devices to block government trackers such as the. He replied that he wasnt doing anything to me. vigilantes and gangstalkers are into blood libel i.e. Most are run by DPKO (Department of Peacekeeping Operations) of the UN. Your local lead agent will schedule surveillance watches for each target in that community. Beyond active surveillance, agents perform acts to keep the target uncomfortable, around the clock. 3. The enemy does not necessarily use violence to promote social change. Key Terms from Rich (2011) and Equivalencies with Terms Presented in Kildes Manual For Gang Stalkers, Terrorism- The US and its allies will terrorize the civilian population to achieve political objectives. How to Get Revenge On Gang Stalkers - Parabellum - YouTube PayPal: https://www.paypal.com/paypalme/douglasjones1962 Cash App: $dougster62Please Donate! Technicians in all fields- telecommunications, electric power, building electrical and alarm systems, and utility employees in all fields use their positions to inflict many absolutely normal-looking problems on targets on an ongoing basis. Thefts have to be carefully considered and authorized by your local Center, unless you have authorization, do not steal. Sabotage producing extreme safety hazards is generally not suitable for operations, because of the potential for bringing official investigators to an accident scene. These weapons can target the brain, causing changes in brain chemistry which influence thoughts and emotions. It can also cause feelings of pressure in the chest, choking, irregular breathing patterns and respiratory incapacitation. If the stalker is directly or indirectly threatening to harm you or themselves, immediately contact the police. Law Enforcement Intelligence Units are more elaborate than their first inception as "Red Squads" over 100 years ago to fight subversive political movements. Every target will have at least one CBA watching them (at) all times, even while at home and asleep. Let them lower themselvesdont you follow! Otherwise, the adage, "If you see something, say something" still applies. Your local Control Center will supply this help, and will bring specialists in from a distance in the case of rural areas. I can positively say I'm being gangstalked by my brother My mother my father And most likely my . He yelled right back at her and told her to f**k off! This directional weapon could target specific individuals by producing an audible sound at about 16Hz which turned into infrasound at 2Hz when it coupled with the ears. -Frequent use of sirens near the targets home. In this case, it is usually waged by people within oppressed populations. PO involve syngergistic coordination of PsyOp, MILDEC, OPSEC, and EBO. This multinational force (MNF), involving NATO (North Atlantic Treaty Organization) and the UN, is termed civilian-military operations (CMO). Examples: target protection can be changed to youth account, or, an overdraft protection feature can be disabled, or simply steal money from the account. The goal is to make it looks as if the target is negligent in maintaining fluid levels, and generally not causing a catastrophic failure that non-targets might see as sabotage. -Money is never transferred to the journal subscription or membership in a certain club like opposition to government surveillance. Money simply disappears from the bank with help of cooperating employers. Similarly, the US Marine Corps document, Multiple-Service Concept for Irregular Warfare (2006) states: frightening the population into inactivity is sufficient to (achieve) our goals.. 5. The other way if you can is upscale. It can be applied from hundreds of meters away from a target using man-portable transmitters. This is especially effective in the automobile repair trade. It doesnt take much. Activities are rotated among the choices, but at least one of them is applied daily: -Noise. I have experienced the myself several times. Myron May is an example of a radicalized target. Time it so every time the target opens a window the music starts. They might still cough at you, but theyll think twice before doing it. PolWar- Political Warfare- a translation of the German term, weltanschuauugskrieg (worldview warfare), which means the scientific application of terror and propaganda as a way of securing ideological victory over an enemy. New comments cannot be posted and votes cannot be cast. DEW include microwaves, lasers, bright lights, holographic projections, and acoustics. These are not random occurrences, but demonstrable, repeated patterned behaviours, directed at you as a Targeted Individual. Another CBA or CBA team may pick up the visible following, but once you have broken away, they advise that you are clear and ready for the next assignment. Some of these are the exact same groups promoting the use of PsyOp on civilians. Companies then dispatch top reporters to ask their sources and brag about the proximity of their tables to the stage. It is also recommended to look into "bug sweepers". On foot, walking for an extended period on the opposite side of the street from walking target. Italy and Belgium had terror actions by Stay Behind, and when the organizations (ceased to exist, the terror operations also ceased to exist). PO Peace Operations- the new war (4GW, IR, UW, etc. The military sometimes actually employs people from theatre actor guilds and modeling agencies. But no sane person will work for this slave wage. PsyActs psychological actions- aka F2C- are audiovisual products consisting of agents of action who deliver messages to a TA (target audience or individual). A group, as many as a dozen CBAs, may be assigned to arrive at a store just ahead of a target, and form a queue ahead of the target, spending time buying lottery tickets, to delay the target. And they are in MOOTW, CMO, IW, UW, LIC operations such as counterterrorism and peacekeeping. C4ISR centers can be mobile or stationary, or virtual, or strictly computer-based. They always do the same damn thing. Remember, these effects were achieved by civilians over 30 years ago! The key to dealing with this is an understanding of what gang stalking, organized community stalking is - and determining if you are actually a targeted individual. However, in order to secure cooperation of specific members of the community to participate in the punishment phase, additional information keyed to appeal to the patriotic or community service sense of such community members may be used as well. -Passing as side street stop sign, then stopping an uncomfortable distance into oncoming traffic just as target is about to arrive at the side street, causing the target to have to slam on the brakes (this requires Control Center assistance and prompting by walkie-talkie style cell phone. Joint resolution replacing B3-2021, 2058, 2068, 2087/90. -Passing as side street stop sign, then stopping an uncomfortable distance into oncoming traffic just as target is about to arrive at the side street, causing the target to have to slam on the brakes (this requires Control Center assistance and prompting by walkie-talkie style cell phone. CNO- Computer Network Operations- aka NW Ops, or network operations/NetOps) are information warfare attacks used to deny, deceive, degrade, and disrupt networks and computers used by the enemy. DOD defines them as: weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment. It will eventually escalate to the point that you will be pushed into saying or doing something you will regret. While these may seem like trivial acts, keep in mind that the target will have these trivial things happen every single day, and repeated intercepts like these will force the target to always watch for such acts, essentially ensuring the target never has a nice day. This is the goal, to ensure the targets punishment. Whales, elephants, hippopotamuses, and rhinoceros use infrasound to communicate over great distances. In terms of government/military use of IO, DOD defines IO as: The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specific supporting and related capabilities, in influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own., The 1999 Air and Space Power Journal, in an article called What is Information Warfare? states: Information Wafare is any action to deny, exploit, corrupt or destroy the enemys information and its functions; protecting ourselves against those actions and exploiting our own military information functions.. The lease or deed will bear either an entirely false name, or the name of a senior staff member whose actual home will be at a different location. The pentagon said it was too sensitive a subject to comment on. It might seem a harsh thing to do, but look at how they treat you. At first, to break them down and get them to comply, and then it's used to train them by showing them what to do to others when they become gang stalkers. The target must not have easy cause to involve law enforcement. You will receive instructions from your local center as to following the target. TI targeted individual (insurgents, non-state actors (NSAs), dissidents, terrorists, asymmetrical threats, irregular threats, potential enemies, etc.). As mentioned earlier, the organization has many top psychologists and psychiatrists on permanent staff at headquarters, and some in larger population centers. -Target bank accounts can be disrupted in ways which do not give the target cause to involve law enforcement. You are only giving them more reason to believe that what they are doing to you is just. FundIng for unneeded work is available from headquarters. The short answer is to keep the constant pressure on the targeted individuals. Thus, much of the modern PsyOp was built by a small group of private interests, using the social sciences to install a global government. It is not a conspiracy or paranoid belief to see a surveillance van on your street. However, it is possible to stage an accident so only the target knows it was staged. Ever be able to get rid of your gang stalkers, trust me because I thought I could tried so many different ways on how to get rid of my organised gang stalking group nothing worked n. Often we hear the term "mobbing" used as well. Police follow orders by e.g. Condemns the clandestine creation of manipulative and operational networks and calls for full investigation into the nature, structure, aims and all other aspects of the clandestine organizations or any splinter group, their use of illegal interference in the international political affairs of the countries concerned, the problem of terrorism in Europe and the possible collusion of the secret services of Member States or third countries; There are other tactics which are not strictly part of the categories discussed so far: -IMPORTANT: Community-based agents (CBAs) are strictly forbidden from adding anyone to the list of targets. It is their responsibility to design the campaign to destroy the targets reputation. The Center can schedule these every day the target commutes, and both to and from work. This is an excellent means of punishment where a target has committed a serious offense specifically against secret services by revealing their criminality to the public. This section will give some examples of ways community-based agents (CBAs) with specific trades or situations in the community can apply deniable punishment to targets. Gangstalkers even target innocent individuals. Some of the institutions that conducted these studies were known to be subversive. From commonplace things like the CCTV in your neighbourhood to every swipe of your ATM card you use for consumer purchases, everything is being watched. I remarked to him, Did someone beat you up? He replied, No. I said, What happened to your teeth? As a community-based agent (CBA) you will have the privilege of working with a team capable of delivering better justice than the official system. Targets in transit may be either covertly or visibly followed. No Labels is getting on state ballots, drawing a lawsuit and concerns about a spoiler. In addition, security contractors (among others) are being hired as military thugs to gangstalk targets[19]. Natural examples include avalanches, earthquakes, volcanoes, and waterfalls. Here are some examples of sabotage a community-based agent (CBA) may be assigned to carry out: -Entering a vehicle, or home, and changing control and radio settings.