Professional Documents
Culture Documents
Targeted Individuals Technical Information
Targeted Individuals Technical Information
Richard Lighthouse
ISBN: 9781370099832
https://www.smashwords.com/books/view/691611
Limit of Liability/Disclaimer of Warranty: While the author has used his best efforts in
preparing this document, he makes no representations or warranties with respect to the
accuracy or completeness of the contents and specifically disclaims any implied warranties or
fitness for a particular purpose. No warranty may be created or extended by sales
representatives or sales materials. The author shall not be liable for any loss of profit or any
other commercial damages, including but not limited to incidental, special, consequential, or
other damages.
TABLE OF CONTENTS
Chapter 1:
Introduction
Chapter 2:
Conclusions
Chapter 3:
References
Abstract
Rev 4a - This author has been researching the claims of Targeted Individuals since January
2016. I have interviewed three people making similar claims, and in my opinion, these claims
are credible and real. Technical information has been obtained on the frequency and voltage
that is being used. There are two signals that are being used from satellites in geosyncronous
orbit; (1) Geolocation and tracking frequency of approximately 3640 MHz, (2) Harm frequency
of approximately 3920 MHz, (3) Voltmeter readings of 0.8 millivolts to 10.0 millivolts on the top
of the person's head; (4) Confirmation of frequency spectrum assignments from the FCC
Frequency Table showing “Fixed Satellite (space-to-Earth) communications,” in agreement
with the measured frequencies. In theory, it may be possible to jam these frequencies using
hardware from companies such as Windfreaktech.com. It may be possible to block the
microwaves by using higher voltage "metal shields" that ground-out the microwaves - such as
battery-jump start boxes from Walmart. Or high-voltage electric-fence signals that can ground
the microwaves onto a metal shield, Anything that is higher voltage can ground the
microwaves or minimize their effect. Thousands of people worldwide are being tortured by
these vicious attacks. One individual reported that the microwaves were used to increase
heart rate and blood pressure about 30 to 50% on a continuous basis, 24 hours per day. The
apparent goal is to cause heart failure. Because the pulsed microwaves are low voltage, it is
possible to construct a shield that will absorb or ground most of the frequencies. It can be
constructed with a metal shield and charged with an electric fence charger - this is one
method. It may also be possible to use an ordinary battery charger to electrify the metal shield
- although I have not tested this - next ebook will address testing. It is important that you have
an electrician help you with this equipment - you may be electrocuted. Several layers will be
more effective than a single layer. NOTE: This author is not responsible for injuries you may
sustain. Please have an electrician or electrical engineer help you.
Dr Barrie Trower, former MI5 agent, has a number of youtube videos describing his
knowledge of these horrific CIA and British Intelligence programs. They are happening now.
Dr John Hall, M.D., author of “Satellite Terrorism in America,” has first-hand knowledge of this
illegal program. Dr Richard Northern of ICAACT.org has performed measurements on
hundreds of people claiming targeting. NSA whistleblowers, William Binney and Kirk Weibe
recently announced their support for Targeted Individuals. Dr. Katherine Horton is an Oxford-
educated scientist and a victim for 5 years – stop007.org. About 70% of the victims are
female. Some information claims that the 3900 MHz frequency is also being used to project
subliminal messages at the Targeted Individual's family and friends. This is done thousands of
times each night while the family sleeps. This is the apparent method used to turn family and
friends against the Targeted Individual – part of the gangstalking and isolation. See my ebook
on “34 Patents on Subliminal Mind Control.” As a protective measure, Seth has recommended
repeating this subliminal message to yourself: “I will only react to constructive messages.” A
long list of references is provided with this ebook. Numerous examples of criminal activity by
the CIA and FBI are provided. For a complete list of my published ebooks, see “Ebooks
published on Smashwords and Lulu by Richard Lighthouse;” ISBN 9781370721948 and ISBN
9781365440090.
It appears that the 3900 MHz frequency is also being used to project subliminal messages at
the Targeted Individual's family and friends. This is done thousands of times each night while
the family sleeps. This is the apparent method used to turn family and friends against the
Targeted Individual – part of the gangstalking and isolation. See my ebook on “34 Patents on
Subliminal Mind Control.” As a protective measure, Seth has recommended repeating this to
yourself: “I will only react to constructive suggestions.” This suggestion acts as a subliminal
and protective blocker – it is most effective when repeated at bedtime. A long list of
references is provided with this ebook. Numerous examples of criminal activity by the CIA
and FBI are provided. For a complete list of my published ebooks, see “Ebooks published on
Smashwords and Lulu by Richard Lighthouse;” ISBN 9781370721948 and ISBN
✙✗✘✑✓✖✕✔✔✐✐✙✐.
Introduction
This author has been researching the claims of Targeted Individuals since January 2016.
I have interviewed three people making similar claims, and in my opinion, these claims are
credible and real. Technical information has been obtained on the frequency and voltage that
is being used. There are two signals that are being used from satellites in geosyncronous
orbit; (1) Geolocation and tracking frequency of approximately 3640 MHz, (2) Harm
frequency of approximately 3900 MHz, (3) Analog voltmeter readings of 0.8 millivolts to 10.0
millivolts on the top of the person's head; (4) Confirmation of frequency spectrum
assignments from the FCC Frequency Table showing “Fixed Satellite (space-to-Earth)
communications,” in agreement with the measured frequencies. In theory, it may be possible
to jam these frequencies using readily-available hardware kits from companies such as
Windfreak.com. Thousands of people worldwide are being tortured by these vicious attacks.
Dr Barrie Trower, former MI5 agent, has a number of youtube videos describing his
knowledge of these horrific CIA and British Intelligence programs. They are happening now.
Dr John Hall, M.D., author of “Satellite Terrorism in America,” has detailed his experience with
these CIA-funded programs from MK-Ultra. Dr Richard Northern of ICAACT.org has
performed measurements on hundreds of people claiming targeting. NSA whistleblowers,
William Binney and Kirk Weibe recently announced their support for Targeted Individuals.
Scans were made using an Aaronia Spectran HF-4040. This is a high-precision scientific
measuring instrument. Typical data readings for the tracking signals are 3648 to 3728 MHz at
-70dbm. Typical data readings for the harm signal are 3921 to 3932 MHz and -57 dbm. Keep
in mind that they were attempting to minimize or hide the signal while we were measuring it –
regularly shutting it off, and then turning it back on.
Figure 1. Typical Spectran HF-4040 reading taken in
summer 2016. 3648 MHz at -71dbm and 3921 MHz
at -59 dbm. There are very few users in this frequency
range – so it is easy to identify. Scans were typically
done by sweeping between 3500 MHz and 4000 MHz,
but could be narrower, once the range is known.
Figure 2. Another typical Spectran HF-4040 reading, 3692 MHz
at -67dbm and 3923 MHz at -57 dbm.
Figure 3. Another typical Spectran HF-4040 reading.
3722 MHz at -58dbm and 3932 MHz at -55dbm. The
power level seems to be determined by the building
structure over the target's head – i.e., a residential roof
or a multi-floor building.
Keep in mind that these satellite systems were designed to be part of President Reagan's
“Star Wars” program. They were launched in the late 1980's and early 1990's. The satellites
are designed to track a ballistic missile traveling up to 10,000 miles per hour and point an
intense beam of microwaves on the nose cone to burn-out the electronics. This destroys the
guidance system in a matter of seconds. So without any missile targets to use, the
government criminals, under the direction of David Rockefeller and the Council on Foreign
Relations, decided to point these satellites at people. My previous ebooks have identified the
source of funding for the Rockefellers – many trillions of dollars on the London Stock
Exchange. See “Fraud on the London Stock Exchange” and “Rockefeller and Rothschild
Dirty Money on the London Stock Exchange.”
If a satellite can track a ballistic missile at 10,000 miles per hour, then it can easily track a
person on the ground, even through a building or roof – by receiving the reflected signal that
comes from the persons' skull bone. This signal is reflected 5 to 10 times every second, so
they always know the precise location for someone that is targeted. This tracking signal is
approximately 3648 MHz, and shows up on the official government frequency table (FCC
Frequency Allocation Table – See Figure 7 and 8)
The data shown in this document was obtained from multiple locations that were more than
20 miles apart, which makes it very likely that the signal is from a satellite. Any horizontal
signal at these frequencies in the atmosphere would be quickly dampened. Also, the person
being measured indicated the sensation on the top of their head. The voltage readings were
measured using an aluminum strip across the top of the head. Voltage readings at a
minimum were around 0.8 millivolts, which the individual can feel. The harm frequency is
generally pulsed at about once per second or faster. At the minimum voltage, it may cause
permanent brain damage, and can be used to induce muscle twitches throughout the body.
At an approximate voltage of 9 to 10 millivolts, the person is in a fetal position, in excruciating
pain.
Other Background Information and William Cooper, former intelligence officer
Harlan Girard is a Targeted Individual that has been writing about his experience for more
than 20 years. His material is available on the internet. He has tried to get help from US
Government officials, the United Nations, and Human Rights Committees in Europe. Make
no mistake about it - the deliberate targeting of innocent civilians is a War Crime. I agree with
Dr John Hall in San Antonio, who has written two books on this subject – the apparent goal is
using people as guinea pigs to experiment and determine the best ways to control people. It
is notable that this directive is part of “Alternative 2” and “Alternative 3” as discussed by
former intelligence officer, William Cooper. These directives were decided and carried out
under the Bilderberg committees, of which David Rockefeller is a founder. Readers will note
that David Rockefeller and Nelson Rockefeller appear numerous times in the material
provided by William Cooper, describing the formation of the Secret Government, Black
Budget Operations, and plans of the National Security Council (NSC). William Cooper wrote
a book, published in 1991, “Beyond a Pale Horse.”
Cooper has quoted specific National Security Council orders, the date they were signed, and
named the individuals that were on these secret committees. Many of them were members of
the Council on Foreign Relations, of which David Rockefeller was the leader.
One targeted individual reported that during the first 3 months of harassment it is particularly
difficult, because they try to “soften you up.” This means using high levels of voltage and
painful torture.
Other helpful technical data noted from persons: pillows made with 70% polyurethane foam
and 30% gel seem to be effective as dampeners – available at Bed, Bath, & Beyond. Gel
packs have also been reported to be helpful. This does not block the signal but seems to
spread out the beam, and dampen the reflected signal, making it more difficult to track the
target. Another target reported - Maximum power from the satellite cannot penetrate a
building more than about 30 floors. Try going to an underground parking garage under a
skyscraper, and note the difference.
Some frequencies target the heart for accelerating the rhythm and blood pressure, which
might lead to heart failure. Heart rate can be increased by 20 to 30 bpm, and blood pressure
can be increased 20 to 30 points. One individual reported that the microwaves were used to
increase heart rate and blood pressure about 30 to 50% on a continuous basis, 24 hours per
day. The apparent goal is to cause heart failure.
One individual reported the hacking of his vehicle, including start interrupts, music system
scrambling, electric window failure, etc. Note that famous journalist, Michael Hastings, was
murdered by electronic hacking of his car and making it accelerate to high speed. Many
newer cars can be easily hacked, as they are not well protected. If this happens to you –
simply put the transmission into neutral and use the brakes or the emergency brake.
The vehicle start interruption seems to be accomplished by sending a repetitive signal to the
starter circuit that disables the starting system. When the target turns the key, nothing
happens. No clicks, no lights, no electrical circuit available. However, testing the battery
shows more than 12 volts available, and yet no headlights and no clicks from the starter.
Also this person reported digital cameras that stopped working. (These criminals don't like
their picture taken.) This seems to be accomplished by sending a continuous serious of
shutdown commands through a Wi-Fi router, or through the person's mobile phone, so that
starting the camera's power button, immediately results in a shutdown of the camera. The
shutdown command is sent continuously. This was reported on 3 different digital cameras
simultaneously, all using new batteries. It is highly unlikely that this is the result of 3
simultaneous malfunctions of nearly-new digital cameras.
Figure 9. Microchip implant made by a company called Verichip. Bob Boyce was the victim
of this CIA test. pesn.com/2010/12/07/9501740_Bob_Boyce_verichip_removed
So who is behind the control dials of these horrific programs? Based on my research, the
satellite launches are probably conducted by the NRO – National Reconnaissance Office.
The CIA, FBI, and NSA are likely involved in the targeting and daily operations, including
gangstalking. The FBI has a number of bogus programs that are a cover for such illegal
activity – such as the Citizen Corps (dhs.gov/citizen-corps) and InfraGard (infragard.org). The
local FBI managers of these programs would certainly be knowledgeable about the criminal
activities they were hiding. There are numerous news articles describing the FBI's criminal
activity (see below) and the ACLU has written extensively on the FBI's illegal spying and
stalking programs. Often, they are trying to use private citizens to do their dirty work, such as
gangstalking. The informants and gangstalkers are paid through bogus expense reports and
expense checks. Some are paid up to $100,000. If the informants try to leave the program,
they are threatened with criminal charges for submitting bogus expense reports. In this way,
the informants and gangstalkers are stuck in the program after submitting one bogus expense
report. If you are asked to “help” with harassing a person, this is the treatment you will
receive.
“One investigative report by RT.com, showed that FBI informants were authorized to break
the law 5,600 times in one year. “A document obtained by Reuters “specifically directs” the
agents of the Special Operations Division (SOD) to cover up their information sources from
investigative reports, affidavits, discussions with prosecutors and courtroom testimony.”
Clearly, unconstitutional and illegal. This is a serious Felony crime.
www.rt.com/usa/dea-agents-nsa-evidence-067/
“In at least 5,658 cases in a single year alone, the FBI authorized its informants to commit
crimes varying from selling drugs to plotting robberies, according to a copy of an FBI report
obtained by USA Today. After much redacting by the authorities, the watered-down FBI's
2011 report obtained under the Freedom of Information Act has revealed that agents had
been authorizing 15 crimes a day on average, in order to get the necessary information from
their informants.” www.rt.com/usa/fbi-crimes-informants-scheme-035/
“The FBI has built a massive network of spies to prevent another domestic attack. But are
they busting terrorist plots—or leading them? The bureau now maintains a roster of 15,000
spies, some paid as much as $100,000 per case..."The problem with the cases we're talking
about is that defendants would not have done anything if not kicked in the ass by government
agents," says Martin Stolar, a lawyer who represented a man caught in a 2004 sting involving
New York's Herald Square subway station. "They're creating crimes to solve crimes so
they can claim a victory in the war on terror." Is this a system ripe for abuse?
www.motherjones.com/politics/2011/08/fbi-terrorist-informants
Recall that in Germany, after World War 2, it has been reported that about 15% of all citizens
were working directly or indirectly for the government, using many people as spies and
informants under the disturbing Stasi programs. This is one reason why most Germans are
highly sensitive to privacy issues today.
“The FBI has a long history of abusing its national security surveillance powers. The potential
for abuse is once again great, particularly given that the lines between criminal investigations
and foreign intelligence operations have been blurred or erased since 9/11. As a result,
intrusive surveillance tools originally developed to target Soviet spies are increasingly being
used against Americans.”
“COINTELPRO. During the Cold War, the FBI ran a domestic intelligence/counterintelligence
program called COINTELPRO that quickly evolved from a legitimate effort to protect the
national security from hostile foreign threats into an effort to suppress domestic political
dissent through an array of illegal activities. COINTELPRO targeted numerous non-violent
protest groups and political dissidents with illegal wiretaps, warrantless physical searches and
an array of other dirty tricks. The FBI used the information it gleaned from these improper
investigations not for law enforcement purposes, but to "break up marriages, disrupt
meetings, ostracize persons from their professions and provoke target groups into rivalries
that might result in deaths." The Church Committee, a Senate Select Committee that
investigated COINTELPRO in the 1970s, found that a combination of factors led law
enforcers to become law breakers.”
“Patriot Act. With the enactment of the USA Patriot Act Congress expanded the FBI's authority
to make secret demands for personal information and records about not just suspected
terrorists or spies but about anyone the FBI deemed merely "relevant" to an FBI investigation.
Not surprisingly, a series of five audits by the Department of Justice Inspector General
confirmed widespread FBI mismanagement, misuse and abuse of this unchecked authority,
which is now used, more often than not, to target Americans.”
“The final and most dramatic changes to the Attorney General Guidelines were made in
December 2008, in the Bush Administration's final month in office. Then-Attorney General
Michael Mukasey instituted new guidelines that authorize the FBI to conduct investigations
called "assessments" without requiring any factual predicate suggesting the target of the
investigation is involved in illegal activity or threats to national security. The Mukasey
guidelines allow the FBI to utilize a number of intrusive investigative techniques during these
assessments, including physical surveillance, retrieving data from commercial databases,
recruiting and tasking informants to attend meetings under false pretenses, and engaging in
"pretext" interviews in which FBI agents misrepresent their identities in order to elicit
information. "Assessments" can even be conducted against an individual simply to determine
if he or she would be a suitable FBI informant. Nothing in the new AG Guidelines protects
entirely innocent Americans from being thoroughly investigated by the FBI for no good
reason.”
www.blogs.abcnews.com/theblotter/2007/07/fbi-proposes-bu.html
FBI Proposes Building Network of U.S. Informants
July 30, 2007
By JUSTIN ROOD REPORTS:
The FBI is taking cues from the CIA to recruit thousands of covert informants in the United
States as part of a sprawling effort to boost its intelligence capabilities. According to a recent
unclassified report to Congress, the FBI expects its informants to provide secrets about
possible terrorists and foreign spies, although some may also be expected to aid with criminal
investigations, in the tradition of law enforcement confidential informants. The FBI did not
respond to requests for comment on this story.
www.theguardian.com/world/2014/jul/21/government-agents-directly-involved-us-terror-plots-
report
“Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11
featured the "direct involvement" of government agents or informants, a new report says.
Some of the controversial "sting" operations "were proposed or led by informants", bordering
on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are
significant, one of the reasons the stings persist. The lengthy report, released on Monday by
Human Rights Watch, raises questions about the US criminal justice system's ability to
respect civil rights and due process in post-9/11 terrorism cases. It portrays a system that
features not just the sting operations but secret evidence, anonymous juries, extensive
pretrial detentions and convictions significantly removed from actual plots. In one such
incident, the initial basis for a material-support case alleging a man provided "military gear" to
al-Qaida turned out to be waterproof socks in his luggage.”
www.washingtonpost.com/wp-dyn/content/article/2005/09/12/AR2005091201825.html
FBI Agents Often Break Informant Rules
By Dan Eggen
Washington Post Staff Writer
Tuesday, September 13, 2005
Many FBI agents have ignored Justice Department rules for handling confidential informants
that were established in the wake of several high-profile scandals, according to a study
released yesterday. In an analysis of 120 informant files from around the country, the Justice
Department's inspector general, Glenn A. Fine, found that FBI agents violated procedures in
87 percent of the cases, including some in which informants allegedly engaged in illegal
activity without proper oversight or permission. "We found significant problems with the FBI's
compliance with the attorney general's guidelines on confidential informants," Fine said in a
statement. "We are concerned that the FBI has not taken the necessary steps to ensure that
FBI agents and their supervisors adhere to these important requirements."
Why Does the US Government Target Innocent Citizens for Gangstalking? August 22, 2014.
beforeitsnews.com/conspiracy-theories/2014/08/why-does-the-us-government-target-
innocent-citizens-for-gang-stalking-2464840.html
The NCVC (National Center for Victims of Crimes – VictimsOfCrime.org) which keeps
records on statistics reports receiving thousand of citizen complaints per month from around
the country related to government gang stalking. It is real and everyone in government and
police work are aware it's going on. There is the well-known case of Judi Bari, who sued the
US Government and won a $4.4 million dollar judgement against the FBI for trying to frame
her as a terrorist. Her crime was trying to save endangered redwood trees, and being a labor
leader and organizer.
Figure 10. VictimsOfCrime.org – Stalking Resource Center. The Bush torture memos
specifically cited anti-stalking laws as being exempt from enforcement when "terrorism" was
suspected.
Bob Levin is a former FBI agent and a Whistleblower and, as a targeted individual, is a
blacklisted investigative journalist. Levin has stated that revelations in his soon to be released
publication will be more revealing than Wikileaks. Levin has described in detail his
experience with being Targeted and Gangstalked. “Telling the truth and doing my job caused
me to survive a US Pentagon assassination, ongoing illegal Cointelpro operations, political
persecution, covert and overt acts of torture and terrorism by the deep state. The Bush White
House and their jackals outed my clandestine security clearance multiple times, threatened to
invent a criminal charge against me if I did not remain silent, punitively withdrew my Social
Security Disability Benefits weeks before beginning cancer treatments and orchestrated a
former clandestine federal agent and federal felon released from prison to conduct ongoing
illegal Cointelpro operations against me that resulted in my being physically assaulted, when
near death from cancer treatments, stalking and threatening, and costing me the only job I've
held in the private sector since leaving the FBI.” - BobLevin.org
www.scribd.com/BobLevin
Figure 11. Cathleen Gary is another person that has been Targeted and Gangstalked. She
tried to file a lawsuit in 2009. The Rockefellers have lots of money to bribe and threaten
judges, prosecutors, and anyone in the US Justice Department. They have trillions of dollars
at their disposal to silence and humiliate people.
Figure 12. DOD Directive 5240, Signed by the Attorney General, William Smith, and the
Secretary of Defense, Caspar Weinberger, in 1982. Note that both of these men were
members of the Council on Foreign Relations, headed by David Rockefeller. Weinberger was
also on the Trilateral Commission, founded by David Rockefeller.
Figure 13. DOD Directive 5240 – Chapter 5 covers Electronic Surveillance of US civilians,
Chapter 6 - Concealed Monitoring, Chapter 7 - Illegal Searches, etc. Targeted Individuals and
Gangstalking has been defined and approved by the Department of Defense. Again, the men
approving this document were members of the Council on Foreign Relations.
Stalking
§ 2261A. Stalking
§ 2264. Restitution
§ 922. Unlawful acts. – [Domestic Violence and Stalking Firearm Prohibitions only]
Related Offenses
(B) bodily injury or death for a member of the other person's family or household or
for an individual with whom the other person has a dating relationship; or
(C) that an offense will be committed against the other person's property;
(2) causes the other person, a member of the other person’s family or household, or an
individual with whom the other person has a dating relationship to be placed in fear of bodily
injury or death or in fear that an offense will be committed against the other person’s property,
or to feel harassed, annoyed, alarmed, abused, tormented, embarrassed, or offended; and
(B) fear bodily injury or death for a member of the person's family or household or
for an individual with whom the person has a dating relationship; or
(C) fear that an offense will be committed against the person's property; or
(1) "Claimant" means a party seeking to recover damages under this chapter, including a
plaintiff, counterclaimant, cross-claimant, or third-party plaintiff. In an action in which a party
seeks recovery of damages under this chapter on behalf of another person, "claimant"
includes both that other person and the party seeking recovery of damages.
(2) "Defendant" includes any party from whom a claimant seeks recovery of damages
under this chapter.
(4) "Harassing behavior" means conduct by the defendant directed specifically toward
the claimant, including following the claimant, that is reasonably likely to harass, annoy,
alarm, abuse, torment, or embarrass the claimant.
(1) on more than one occasion the defendant engaged in harassing behavior;
(2) as a result of the harassing behavior, the claimant reasonably feared for the
claimant's safety or the safety of a member of the claimant's family; and
(3) the defendant violated a restraining order prohibiting harassing behavior or:
(B) the defendant had the apparent ability to carry out the threat;
(C) the defendant's apparent ability to carry out the threat caused the claimant to
reasonably fear for the claimant's safety or the safety of a family member;
(D) the claimant at least once clearly demanded that the defendant stop the
defendant's harassing behavior;
(E) after the demand to stop by the claimant, the defendant continued the
harassing behavior; and
(F) the harassing behavior has been reported to the police as a stalking offense.
(b) The claimant must, as part of the proof of the behavior described by Subsection (a)(1),
submit evidence other than evidence based on the claimant's own perceptions and beliefs.
Tex. Civ. Prac. & Rem. Code § 85.006. Cause of Action Cumulative. (1997)
The cause of action created by this chapter is cumulative of any other remedy provided by
common law or statute.
A little more about the NSA's Tailored Access Operations, TAO division, because the
electronic hacking is sophisticated and must be available on-call, for new devices that the
target individual might purchase. This on-call service for hacking electronic devices is the
signature of the TAO, headed by Rob Joyce. Although some news articles indicate that the
CIA and FBI are attempting to develop their own capabilities in this area because the NSA will
sometimes not provide the support that is requested.
“One of the two main buildings at the former plant has since housed a sophisticated NSA unit,
one that has benefited the most from this expansion and has grown the fastest in recent years
-- the Office of Tailored Access Operations, or TAO. This is the NSA's top operative unit --
something like a squad of plumbers that can be called in when normal access to a target is
blocked.”
“According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are
involved in many sensitive operations conducted by American intelligence agencies. TAO's
area of operations ranges from counterterrorism to cyber attacks to traditional espionage.
The recruitment strategy seems to have borne fruit. Certainly, few if any other divisions within
the agency are growing as quickly as TAO. There are now TAO units in Wahiawa, Hawaii;
Fort Gordon, Georgia; at the NSA's outpost at Buckley Air Force Base, near Denver,
Colorado; at its headquarters in Fort Meade; and, of course, in San Antonio.
But it is the growth of the unit's Texas branch that has been uniquely impressive, the top
secret documents reviewed by SPIEGEL show. These documents reveal that in 2008, the
Texas Cryptologic Center employed fewer than 60 TAO specialists. By 2015, the number is
projected to grow to 270 employees. In addition, there are another 85 specialists in the
"Requirements & Targeting" division (up from 13 specialists in 2008). The number of software
developers is expected to increase from the 2008 level of three to 38 in 2015.”
The military recently ordered 30,000 new drones. What war is this being used for? Guess
what these drones will actually be used for? Some Targeted Individuals reported having their
cars followed, and having seen these drones flying outside of their house. In one interview,
the woman described the winged-drone following her for more than 100 miles on the freeway,
regularly hitting her with microwaves. It is incredible to me that anyone working for the
government and sworn to defend the United States Constitution, would show up for work
everyday and commit Treason and War Crimes against innocent United States civilians. But
it is clearly happening. There are also Federal and State Laws against stalking. These
government criminals think that the laws do not apply to them. See Dept of Defense 5240.
I do not know if this list is legitimate, or what methods are used to protect innocent people.
But the fact that it exists, is disturbing. www.whosarat.com
The site claims to list undercover agents and informants, mostly from courtroom records.
The Examiner recently ran an article on criminal behavior of the FBI, demonstrating how they
were Targeting Individuals using the “Watch List.” Basically, this means all complaints filed by
a Targeted Individual will go through a special call center for suppression and denial.
Figure 14. Police offer no protection to Targeted Individuals when they complain. More
than100,000 people have been placed on “Watch List” in the US.
Hearing Voices – Patented Technology
There are a number of technologies that have been patented and proven to alter brain waves,
including to put “voices” in your head. These people are not crazy. By microwaving your
head, the soft tissue in the inner ear is heated up (literally cooking it) and it will develop the
ability to transmit certain high frequencies to the brain. This must be repeated continuously or
during sleep periods for several months to develop the condition. In other words, the
microwaves can transmit certain frequencies that only the targeted individual can hear. This
technology was developed under the CIA's MK-Ultra program. Congress told the CIA to stop
this research, but they never did. There are a number of patents that demonstrate this
technology. One targeted individual has reported Synthetic Telepathy – this means that what
the person “sees with their eyes,” is transmitted to another person. The technology seems to
work using the same frequencies that are used for microwave harm. Approx. 3921 MHz is the
carrier wave. They use this frequency to train your brain to operate and respond in a certain
way. Again, this takes many months. This technology was also developed under the CIA's
MK-Ultra program, which is on-going. UC Irvine is one university that received funding to
develop this illegal technology. The technology can only be performed between the target
and the trained exploiter, and cannot be transferred to a third person. It is clear, this is
another “guinea pig” technology that the CIA is currently developing. In practical terms, it is
far too expensive and time-consuming to be deployed on a large scale. But as long as the
Rockefellers continue to fund this horrific research, there will be CIA agents that are willing to
do the criminal work. Truly sad and pathetic.
Another method is used primarily while you are sleeping, to burn frequencies into the soft
tissue of the inner ear – and your brain develops the ability to hear certain radio frequencies
that no one else can hear. Note that Aaron Alexis, the Navy gunman, claimed that he was
affected by ELF waves, but this was really an FBI psyop to provide disinformation. Some ELF
frequencies may be used to generate an emotional response in the range of 3 to 35 hertz,
and can travel through almost any wall or material. Some frequencies have been related to
depression, anger, and other negative emotions. These can be defeated by listening to
binaural beats or isochronic tones at 7.83 Hz. In my opinion, these technologies are a War
Crime, as they are designed to induce torture in the targeted persons. The Geneva
Convention is very clear about the definition of War Crimes and targeting civilians. Again,
these programs are being carried out under “Alternative 2” and “Alternative 3” as directed by
the Bilderberg Committees. David Rockefeller is a founding member of the Bilderberg Group,
the Trilateral Commission, and the Council on Foreign Relations. In William Cooper's talks
(see youtube), you may have noticed the large number of people involved with the National
Security Council that are also members of the Council on Foreign Relations (CFR). David
Rockefeller has been the head of the CFR for many years.
1. US Patent #3,773,049, Nov. 20, 1973. Apparatus for the Treatment of Neuropsychic and
Somatic Diseases with Heat, Light, Sound and VHF Electromagnetic Radiation. Inventors:
Rabichev et al. EPI257
2. US Patent #4,034,741, July 12, 1977. Noise Transmitter and Generator. Inventors: Adams
et al. Assignee: Solitron Devices Inc. EPI267
3. US Patent #4,191,175, March 4, 1980. Method and Apparatus for Repetitively Producing a
Noise-Like Audible Signal. Inventor: Nagle, William L. EPI269
4. US Patent # 4,335,710, June 22, 1982. Device For the Induction of Specific Brain Wave
Patterns. Inventor: Williamson, John D. Assignee: Omnitronics Research Corporation.
EPI292
6. US Patent #4,834,701, May 30, 1989. Apparatus for Inducing Frequency Reduction in
Brainwave. Inventor: Masaki, Kazumi. Assignee: Hayashibara, Ken. EPI266
7. US Patent #4,889,526, Dec 26, 1989. Non-Invasive Method and Apparatus for Modulating
Brain Signals Through an External Magnetic Or Electric Field To Reduce Pain. Inventors,
Rauscher, Elizabeth A. and Van Bise, William L. Assignee: Megatech Laboratories, Inc.
EPI268
9. US Patent #4,883,067, Nov. 28, 1989. Method and Apparatus for Translating the EEG into
Music To Induce and Control Various Psychological and Physiological States and to Control a
Musical Instrument. Inventors: Knispel et al. Assignee: Neurosonics, Inc. EPI282
10. US Patent # 5,123,899, June 23, 1992. Method and System for Altering Consciousness.
Inventor: Gall, James. EPI289.
11. Patent # 5,352,181, Oct. 4, 1994. Method and Recording For Producing Sounds and
Messages To Achieve Alpha and Theta Brainwave States and Positive Emotional States in
Humans. Inventor: Davis, Mark E. EPI291
12. US Patent #5,289,438, Feb. 22, 1994. Method and System For Altering Consciousness.
Gall, James. EPI333
13. Ruttan, Leslie A. et al. “Enhancement of Temporal Lobe-Related Experiences During Brief
Exposures To Milligauss Intensity Extremely Low Frequency Magnetic Fields.” Journal of
Bioelectricity, 9(1), 33-54 (1990). EPI311
14. US Patent #5,562,597, Oct. 8, 1996. Method and Apparatus for Reducing Physiological
Stress. Inventor: Van Dick, Robert C. EPI294
15. US Patent # 5,586,967, Dec. 24, 1996. Method and Recording or Producing Sounds and
Messages To Achieve Alpha and Theta Brainwave States in Humans. Inventor: Davis, Mark E.
EPI296
If you are targeted, Dr John Hall recommends using mp3 players or your iphone to
continuously listen to binaural beats or isochronic tones at 7 to 8 hertz. This seems to disrupt
their ability to target the soft tissue in the inner ear for “hearing voices”. If you are targeted
and develop “hearing voices” - ignore everything that is said to you. Do not follow instructions
or any promises. Ignore and do not respond to anything, either verbally or mentally. Any
response will simply entrain the brain even more. Ignore everything that is said mentally. I
recommend reading Dr John Hall's two books for more information - “Satellite Terrorism in
America,” and “Guinea Pigs.”
Hacking of mp3 music players, and other electronic equipment – one person reported that 6
different portable mp3 players had been disabled within a 2 month period of time. Any
electronic device with a battery was particularly susceptible. Blood pressure monitors, tv
remotes, mobile phones, battery-powered lights, etc. It is highly unlikely that all of these
battery-powered devices would malfunction at the same time. This appears to be part of the
harassment and targeting – which is sometimes called gangstalking (Reference 2).
“Mind Games: New on the Internet:” a community of people who believe the government is
beaming voices into their minds. They may be crazy, but the Pentagon has pursued a weapon
that can do just that; This is the story of Harlan Girard. By Sharon Weinberger; Washington
Post; Sunday, January 14, 2007. Sharon Weinberger is a Washington writer and author of
“Imaginary Weapons: A Journey Through the Pentagon's Scientific Underworld.”
It has been suggested by some websites that these same microwave frequencies or ELF
waves can be loaded with subliminal messages. As a protective measure, Seth has
recommended repeating this: “I will only react to constructive messages.” It is particularly
effective when repeated at bedtime. This way, the individual is programming yourself to reject
negative and destructive messages.
“If you tell a lie big enough and keep repeating it, people will eventually come to believe it,”
Joseph Goebbels, Adolf Hitler’s chief propagandist notoriously but accurately stated. “The lie
can be maintained only for such time as the State can shield the people from the political,
economic and/or military consequences of the lie. It thus becomes vitally important for the
State to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie,
and thus by extension, the truth is the greatest enemy of the State.”
Figure 15. Youtube.com – Stories of Organized Stalking and Electronic Harassment. If you
watch these individuals tell their own story, you will appreciate how many people are being
targeted.
Figure 16. Raytheon Corporation – High Altitude Laser. If we put a slow-moving blimp over
Russia or China, do you think they could easily shoot it down? Guess where they actually
intend to use this weapon? Over the United States.
Conclusions
We have described some of the technical details of a horrific, CIA-funded program which
likely originates from the Council on Foreign Relations. The CIA developed these disturbing
projects through the MK-Ultra program. Your awareness can help to get these programs
stopped.
Martial Law
The U.S. Senate recently passed the National Defense Authorization Act with a vote of 93 in
favor and seven opposed, which implemented martial law in the United States. It also nullifies
the Bill of Rights and Posse Comitatus, which prohibited the military from policing civilians in
the U.S. since 1878. The NDAA codified into law the power of the U.S. military to indefinitely
detain an American citizen with no charge, no trial and no oversight whatsoever. Of course,
the Act was justified by the fictional War on Terror, despite the fact that no major terrorist
attack has occurred in the United States since 9/11, which itself was a false flag operation.
A little research by the 93 senators would have quickly revealed that bee stings, being hit by
lightning, medical malpractice, car accidents, cancer, hot weather, heart disease — all of
these things are much more likely to harm you than a terrorist attack.
Readers are encouraged to research these programs and form their own opinions.
This document is a living document. The author reserves the right to make corrections and
changes.
References
1. Richard Lighthouse, “The Ends Never Justify the Means” smashwords.com and lulu.com,
2016.
6. Seth (Jane Roberts), Session 163, 1965; “Suggestions given by an individual on any kind
of a conscious basis have to be given with the cooperation of the ego. Many suggestions
bypass the ego entirely. Suggestion however, as you think of it, operates both ways. This is
not usually understood. Suggestions may come therefore from the physical world, to act upon
the personality. Suggestions may also come from within the personality to act upon the
physical environment. You can indeed to a large measure train yourself to react to
constructive rather than impeding suggestions. This merely means that you will, or may to
some extent, choose the direction in which action within you will move. This also implies that
some part of the personality does the choosing, and is capable of distinguishing a
constructive suggestion from an impeding one. And here it is necessary that we discuss more
thoroughly the nature or characteristics of constructive suggestions versus impeding ones, for
one may turn into the other.”
7. Seth (Jane Roberts), Session 222, 1966; “...you simply need the suggestion that you will
only react to constructive suggestions.”
8. Seth (Jane Roberts), Session 319, 1967; “The constructive suggestions before bed are
particularly important, and the request for therapeutic dreams, as these automatically relieve
the morning symptoms...”
Dr John Hall, MD "New Breed: Satellite Terrorism in America", and "Guinea Pigs"
Ted Gunderson, Former FBI Chief of Los Angeles. After retiring from the FBI, he gave
presentations all over the country alerting the public to the reality of false flag terrorism,
satanic ritual abuse, and mind control. Gunderson stated that “the CIA makes the mafia look
like a Sunday school class” and that the CIA and FBI is “behind most if not all” terrorism.
Aaron Russo; "From Freedom to Facism"; Aaron Russo was a personal friend of the
Rockefeller family. See his videos on youtube.com, www.youtube.com/watch?v=7gwcQjDhZtI
– he is very critical of their violent history. They told him a year before 9-11, that there would
be an “event”, followed by the invasion of Iraq and Afghanistan.
Dr Ron Paul, former Congressman; RonPaulLibertyReport.com; also “The Rise of the Secret
Government.” www.youtube.com/watch?v=gJPMcsFIwnk
Dr Steven Greer, MD; "Sirius"; website siriusdisclosure.com; also youtube.com, “How the
Secret Government Works.” November 21, 2015. www.youtube.com/watch?v=oHxGQjirV-c
Dr Peter Dale Scott, "Crime and Cover-Up: The CIA, the Mafia, and the Dallas-Watergate
Connection" (1977); "Cocaine Politics: Drugs, Armies, and the CIA in Central America" (1991,
1998); "Deep Politics and the Death of JFK" (1993, 1996); "Drugs Oil and War" (Rowman &
Littlefield, 2003) and his latest "The Road to 9/11: Wealth, Empire, and the Future of America"
Attorney Chomi Prag; targeted individual
Dr. Nick Begich, “Dancing to the Tune of an Unknown Drummer”; The development of mind
control at the CIA.
Attorney Myron May, FSU gunman; "The Targeting of Myron May", by Renee Pittman
Julianne McKinney is a former Army Intelligence Officer. After leaving the Army, she became
part of the Association for National Security Alumni. She was a whistleblower and became a
Targeted Individual. Now for 30 years, she has lots of experience and contacts with other
Targeted Individuals. She published a free book on Microwave Harassment in 1992.
Dave Larson’s investigation of the Central Intelligence Agency (CIA), Alfred Mann Foundation
(AMF), and National Institutes of Health (NIH). The Larson Report details the implants he had
removed and showed how they were identical to recent US patents.
Bob Boyce; Targeted Individual that had numerous implants removed. Some with cancerous
tumors.
Phillip Marshall murder-suicide by CIA . Marshall wrote a book on 9/11 - The Big
Bamboozle, was also a pilot for the CIA smuggling drugs. Marshall wrote that - 1. Obvious
controlled demolition of building 7 (World Trade Center building 7), which happened at 5:20
something in the afternoon on 9/11. It was reported twenty minutes early by the BBC.
US National Security Agency Officer Wayne Madsen says the 9/11 investigative author Philip
Marshall and his children were killed in a “black ops hit” by the CIA, dismissing the suicide
hypothesis.
Dr Sue Anne Arrigo, M.D. Former Special Operations Advisor to Directors of the CIA, Former
Intelligence Advisor to the Joint Chiefs of Staff in 2003-2004, Assigned a Rank of a 2-Star
General. Remote viewing Guru and former Pentagon General. Also tortured with Synthetic
Telepathy.
andylewistargetedindividual.wordpress.com/2016/04/10/the-curious-case-of-anthony-forwood/
THE CURIOUS CASE OF ANTHONY FORWOOD
Suhajda, Joseph M. “Non-Lethal Weapons for Military Operations Other Than War.”
www.usafa.af.mil/wing/34edg/airman/suhajd~1.htm EPI348
James Lico – TI
Donna Joy – TI
beforeitsnews.com/conspiracy-theories/2014/08/why-does-the-us-government-target-
innocent-citizens-for-gang-stalking-2464840.html
Mary
“For the most part I believe it’s all about the money. The Homeland Security Dept. has created
what they call an interoperational program that integrates communications between volunteer
groups they solicit and government run agencies. From Neighborhood Watch programs to fire
depts., emergency first responders, police, and FBI. It creates a spy community on the local,
national and even international level.”
“This is a statement from homeland security Citizen Corp volunteer program. They provide
training to be “better prepared to respond to the threats of terrorism, crime, public health
issues, and disasters of all kinds” Citizen Corp partners with many other community volunteer
programs such as Neighborhood Watch to volunteer police programs and probably the FBI
volunteer program. All of these programs are funded thru the government and many if not all
are eligible for grants from the government. Below are links to these programs.”
“So how does a TI get listed? Well these programs need justification for continued funding
and lets be honest with the drop in crime rates and statistically finding a terrorist at a local
level it opens up the doors to offer up the heads of many innocent people (many TIs) all in the
name of money. It becomes easy access for any vindictive personalities involved in any of
these interoperability programs and at a local level. I got caught up in between a
Neighborhood Watch neighbor and the local police. What was my crime? The best I can
figure is I witnessed my neighbor’s husbands leaving her. When she brought harassment of
the local police dept on me I complained to the chief of police.”
“So how do these programs get all these volunteers to devote their time in gang stalking and
solicit more volunteers? Easy, you get tagged with hot button issues like pedophiles, drug
dealers and rapists. There are other reasons as well but I believe this to be the major group of
volunteers. Since your most likely not a terrorist, you get tagged usually and it seems most
predominately as a pedophile. Which doesn’t even make sense statistically when applied
against the general population stats. Offer people an opportunity to think they are doing
something self righteous and I think most will jump at it. For the most part I believe most gang
stalkers are duped with manipulation and misinformation.”
“My feelings are to become a gang stalker you have to suspend belief. You have to believe
that our law enforcement agencies are so incompetent that they cannot entrap a drug dealer,
catch a rapist with todays technology and believe your community has the largest population
of pedophiles to ever be recorded historically.”
“I am your average citizen with no criminal record, yet I am being tracked with gps on my
vehicle, my cell phone is tapped, gang stalked, of course internet tracking, and the new
element of tracking by air when I am local and on foot. Also the more vocal I get, the more
their tactics seem to escalate. It boggles the mind to comprehend the amount of unwanted
and extraordinarily expensive attention these programs can generate against one individual
until you realize they are making money on TIs.”
Acknowledgments
Acknowledgments: The author gratefully acknowledges Seth, Jane Roberts, and Rob Butts
for their significant contributions.
Funding:
This research was generously supported with a grant from the Foundation Opposed to
Academic Puffery (FOAP).
APPENDIX
I am a government whistleblower – see my ebooks about the criminal acts of the CIA and FBI.
Readers are advised that the NSA may be blocking or restricting access to some of my
ebooks, especially outside the United States. Readers are further advised that digital tracking
tags may have been placed in my ebooks. It may be best to download from Apple Books, if
possible. Note how slowly the jpg's load into the ebook when viewing. The content of some
ebooks may have been altered – still trying to monitor this.
Readers are advised to review the website drjudywood.com which provides compelling
evidence about 9-11. Dr Judy Wood and Dr Morgan Reynolds, university professors, filed
lawsuits against the US Government for fraud and conspiracy about 9-11. Dr Woods scientific
presentation is available at youtube. Readers are also advised to see the movie "Sirius" by Dr
Steven Greer, M.D. It is available for free on Netflix, where it is the #1 documentary, and to
watch the youtube videos by the Honorable Paul Hellyer, former Canadian Minister of
Defense. He has a book titled, “The Money Mafia.”
Also, find my brief educational videos on youtube (Some have been blocked from the search
engines).
For more than 4 years, this author has been stalked, harassed, and threatened by US
Government agents from the CIA, FBI, and NSA - because of the content of these ebooks.
My home has been broken into, repeatedly. In May 2014, my girlfriend was drugged and
kidnapped from LaGuardia airport. This is not a joke. My computer, phone, and alarm system
have been hacked, including those of my friends and family. It is truly sad and pathetic, these
agencies have become criminal organizations. If something happens to me (disappearance,
false criminal charges, sudden accident, etc. - my readers can be certain that the FBI and CIA
were involved. In my opinion, the Council on Foreign Relations (CFR) is behind these criminal
acts. David Rockefeller has been the CEO and Chairman for many years.
More References:
(The author does not necessarily agree with the contents or opinions of these references.)
1. A New Breed: Satellite Terrorism in the USA by Dr. John Hall (Doctor of Osteopathic
Medicine), 2009.
2. Controlling the Human Mind: the technologies of political control by Dr. Nick Begich
(Doctor of Naturopathic Medicine), 2006. He convinced the European Parliament to vote for
A4-0005/99 Resolution on the environment, security and foreign policy which calls for an
international convention introducing a global ban on all developments and deployments of
weapons which might enable any form of manipulation of human beings. They voted it on
January 28, 1999.
3. Gang stalking: the threat to humanity by Dr. Corkin Cherubini (Ph.D. education), 2014.
4. Guinea pigs: technologies of control by Dr. John Hall (Doctor of Osteopathic Medicine),
2014.
5. The Invisible Maiming torture enterprise of organized stalking assaults by Dr. Tomo
Shibata (Ph.D. Sociology), 2012.
6. Who are targeted individuals & why should you care? by Gaye Leto, 2015.
7. Targeted Individuals: low-tech defense against electronic harassment by G. Rauwel, 2016.
8. 1996 by Gloria Naylor, 2006. She was a writer for theater, film and television. She became
a victim in 1996. She described that year using a fictional character.
9. A “Perfect” Crime by Carl Sneider, 2015.
10. Covert Technological Murder: Big Brother approved! by Renee Pittman Mitchell, 2013
(mind control technology book series part 3).
11. Diary of an Angry Targeted Individual by Renee Pittman Mitchell, 2014 (mind control
technology book series part 4).
12. Electronic torture, electronic rape: technology and gang stalking at the post office by
Jewel Krayan, 2014.
13. Gang Stalking is a covert crime running rampant in America by Margaret Kannaday,
2011.
14. Swedish flag Hjärnprojektet: min egen historia by Robert Näslund, 2011.
15. How to Deal with and Defeat Gangstalkers by Chomi Prag, 2014.
16. Mafia State: how one reporter became the enemy of the brutal new Russia by Luke
Harding, 2011. Luke Harding was the Guardian’s former Moscow correspondent. He was the
first western journalist to be expelled from Russia since the end of the cold war.
17. MC Realities by Michael Sweeney, 2006.
18. My Life Changed Forever: the years I have lost as a target of organized stalking by
Elizabeth Sullivan, 2008.
19. Orange Bruises by Maud Oortwijn from the Netherlands, 2014.
20. Remote Brain targeting by Renee Pittman Mitchell, 2011 (mind control technology book
series part 1).
21. The Devil Beside Me: gang stalking, the secret war and how to win by E. Wyatt, 2015.
22. The Invisible Crime: Illegal microchip implants and microwave technology and their use
against humanity by Michael Bell, 2012.
23. Tortured in America: the life of a targeted individual by Michael Fleming, 2013.
24. You are not my big brother by Renee Pittman Mitchell, 2012 (mind control technology
book part 2).
25. Spiked by Sharron Gold, 2013. She claims that she has been drugged and forced to
become a gang stalking perp.
26. Mind Games: New on the Internet: a community of people who believe the government
is beaming voices into their minds. They may be crazy, but the Pentagon has pursued a
weapon that can do just that; By Sharon Weinberger; Washington Post
Sunday, January 14, 2007.
– Indigoribbon.com
– Icaact.org
– Freedomfchs.com
– Eucach.org
– Electronictorture.com
– Peacepink.ning.com
– Covertharassmentconference.com
– Targetedindividualscanada.com
– Areyoutargeted.com
– Defeatgangstalking.org
– Targetedindividualsua.weebly.com
– Fightgangstalking.com
– Mindhasnofirewall.com
– Stoppsywar.com
– Stoporgangstalking.com
– Stopeg.com
– Surveillanceissues.com
– Osinformers.lefora.com
– Wanttoknow.info/mindcontrolinformation
– Mindjustice.org
– Nanobrainimplant.com
– Unwittingvictim.com
– Sites.google.com/site/targetedindividuals101
– Dataasylum.com
– Chroniclesofamindcontroltarget.blogspot.com
– Jeffpolachek.com
– Osnanaimo.org
– Bigbrotherwatchingus.com
– Fightgangstalking.com
– Organised-crime-of-covert-electronic-assault-nz.com
– Sites.google.com/site/targetedstalkedterrorized
– Usa-anti-communist.com/ard/index.php
– Targetedindividualsworldwide.wordpress.com
– Multistalkervictims.org
– Aisjca-mft.org
– Sfreport.blogspot.de
– Wiseti.blogspot.com
– Jbhfile.com
– Gangstalking.wordpress.com
– Bibliotecapleyades.net/esp_sociopol_mindcon.htm
– Bibliotecapleyades.net/ciencia/ciencia_nonlethalweapons.htm
– Bibliotecapleyades.net/ciencia/ciencia_psychotronicweapons.htm
– Ongangstalking.blogspot.com
– Gangstalkingwiki.com
– Gang-stalking.blogspot.com
– Oregonstatehospital.net/d/russelltice-nsarnmebl.html
– Sites.google.com/site/thetargetedtruth
– Raisingawarenessoftargetedindividuals.blogspot.com.au
– Targeted-individuals.com
– Torturedinamerica.org
– Reddit.com/r/Gangstalking
– Canrnonconsensual.weebly.com
– Electromagneticweapons.info
– Learning-mind.com/tag/mind-reading
– Targetedinamerica.com
– Jacobsm.com/projfree/part_1.html
Dr Barry Trower
www.youtube.com/watch?v=aMMEQNnSZIo
Dr Barrie Trower in a sit-down interview tells all to ICAACT. Today many are guilty of the same
type sinister crimes many Scientists were hanged for after World War II's Nuremberg trials.
TRUTH IS STRANGER THAN FICTION. Well worth time spent to watch & LEARN the Truth.
FEB 21
Posted by tragicmyronmay
This new video is defenately worth watching. It goes through the most basic and well-known
info on the argument “Targeted Individuals”, but also it brings up the topics of cybernetics and
transhumanism stripping away that aura of paranoia rotating over the community. Targeted
Individuals are crazy people no more, but simply victims of modern social control. Seat tight
and.. “enjoy”: www.youtube.com/watch?v=UWvv2Xq8EcI.
lissakr11humane.com/2012/09/03/witness-list-record-targeted-individuals-oppose-all-torture-
electronic-harassment-microwave-tazer-laser-crimes-assist-us-urgently/
WEB: www.americanresister.com
Citizenship: USA
Email: bruno_marchesani@msn.com
Citizenship: Canada
NAME: A J MCKAY
Citizenship: CANADA
Email: a.j.mckay1@hotmail.com
WEB: www.facebook.com/group.php?gid=2393294598
Citizenship: USA
Citizenship: USA
Year Torture/Abuse Began:
Email: graciemini@gmail.com
Citizenship: Bolivia
TEL: 776-74690
Citizenship: USA
Year Torture/Abuse Began: 1997
Citizenship: USA
Email: danmor24u@yahoo.com
TEL: (916)933-9658
MAIL: 816 Mt. Ranier Way, El Dorado Hills, CA 95762, USA
Citizenship: USA
Email: simplexity@earthlink.net
Citizenship: USA
TEL: 303-377-4789
MAIL: 1422 Leyden #6, Denver, CO 80202, USA
NAME: MS MUDD
Citizenship: USA
Year Torture/Abuse Began:
Email: msmudd88@yahoo.com
NAME: T N
Citizenship: USA
Year Torture/Abuse Began:
Email: c/o news.omega@googlemail.com
WEB: tonynazzal.blogspot.com/2008/09/my-life-as-targeted-individual.html
Email: mayorlady@gmail.com
WEB: www.rbgtube.com/play.php?vid=5548
rudy2.wordpress.com/torture-case-of-gloria-naylor-english-espanol-francais-deutsch/
www.fedame.org/phpBB2/viewtopic.php?t=6431&sid=d2251ff5d779f39a3aafee8ebbd62b2c
Citizenship: USA
Email: connie_connieneal@yahoo.com
MAIL:866 Fox Hollow Road; Afton, VA 22920-2782, USA
TEL: 540 4566935
Citizenship: USA
Email: krrneal@yahoo.com
Citizenship: USA
NAME: NICOLE
Citizenship: Canada
Year Torture/Abuse Began:
Email: Nicole1124@videotron.ca
NAME: N N
Citizenship:
Year Torture/Abuse Began:
Email: ghstdtnee@yahoo.com,
WEB: www.astrium.eads.net/en/eads_contact ,
NAME: A B
Citizenship: USA
Email: mcactivism-owner@yahoogroups.com
Citizenship: USA
Citizenship: USA
Email: davidalanbeach2@juno.com
Citizenship: USA
Email: skibeldobr@earthlink.net
NAME: BEST
Citizenship: USA
Year Torture/Abuse Began: 2003
Email: bestckurself@yahoo.com , c/o Iolmisha@cs.com
Citizenship: USA
Email: unclemicrochips@yahoo.com,unclemicrochips@myway.com,
Citizenship: USA
Email: butler9674@sbcglobal.net
Citizenship: USA
Email: robfile@sbcglobal.net
WEB: www.rob-profile.com
NAME: CADEWCH
Citizenship: USA
Email:
Citizenship: USA
Citizenship: USA
Email: soler29@hotmail.com
NAME: CHRISTINA
Citizenship: USA
Year Torture/Abuse Began:
Email: cmw99us@yahoo.com
NAME: CONSUELO
Citizenship: USA
Year Torture/Abuse Began: 2003
Email: cgolmar@shaw.ca , cgolmar@yahoo.ca,
MAIL: 23-1600 43 Avenue.Vernon BC V1T9G6 Tl.
TEL: 250-5428082
NAME: T. CORSANICO
Citizenship: USA
Year Torture/Abuse Began: 2000
Email: xposperps@yahoo.com
WEB: emftorturechamber.blogspot.com/, www.geocities.com/xposperps
Citizenship: USA
Email: Ophnell56@yahoo.com
MAIL: PO Box 21140, Tallahassee, FL 32316, USA
TEL: 850-766-1835
NAME: VALERIE CUTLER
Citizenship: USA
NAME: D
Citizenship: USA
Year Torture/Abuse Began:
Email: environmental_peace@yahoo.com
NAME: N D
Citizenship: Canada
Year Torture/Abuse Began: since birth
Email: www.fedame.org/phpBB2/viewtopic.php?t=2183
NAME: DAVID
Citizenship: USA
Year Torture/Abuse Began: 1982
Email: Browmorbrin@aol.com
NAME: KIM DAVIS
Citizenship: USA
Year Torture/Abuse Began:
Email: nplskimdavis@aol.com
NAME: DEEPNDARK
Citizenship:
Year Torture/Abuse Began:
Email: deepndark@mail.com,
WEB: www.mindcontrol-victims.eu/petition.htm
NAME: D DEERWOMAN
Citizenship: USA
Year Torture/Abuse Began:
Email: mirthfulherd@yahoo.com
NAME: D B DONOVAN
Citizenship: USA
Year Torture/Abuse Began:
Email: donovan1@intermind.net
Citizenship: USA
Citizenship: USA
Email: dunl254@aol.com
Citizenship: USA
Email: sam@evans.org
Citizenship: USA
Citizenship: USA
Email: maryfairdaclubhouse@yahoo.com
NAME: FUTUREBUISNESS
Citizenship: USA
Year Torture/Abuse Began:
Email: futurebuisness@aol.com
Citizenship: USA
Citizenship: USA
Citizenship: USA
Email: Ericgoodman31@hotmail.com
MAIL: 221 Town Center West #205, Santa Maria, CA 93458, USA
TEL: 805-478-9155
NAME: GORDON
Citizenship:
Year Torture/Abuse Began:
Email: bagnall@acenet.net.au
Citizenship: USA
NAME: ERIC H
Citizenship: USA
Citizenship: USA
Citizenship: USA
Email: yessir1000x2003@yahoo.com
Citizenship: USA
Email: yomiyomix@excite.com
Citizenship: USA
NAME: AL HENDERSON
Citizenship: USA
Year Torture/Abuse Began:
Email: elegante_al@yahoo.com
NAME: RAFAEL HERNANDEZ JR
Citizenship: USA
Year Torture/Abuse Began: 2005
Email: madscientist669@gmail.com
NAME: HUGGLES
Citizenship: USA
Year Torture/Abuse Began:
Email: tophuggles@googlemail.com
WEB:
www.canadaka.net/blog/gangstalking/vibrating_floors_and_more_gang_stalking_101_b-
985_sid-c21ceab72f861c10c13b4030ce886ad3.html
Citizenship: USA
Citizenship: USA
Year Torture/Abuse Began: 1985
Email: snipeheadhunters@yahoo.com
MAIL: c/o Louise Polty, P.O. Box 5083 , Pilot Station, ALASKA 99650, USA
NAME: INTERIQ
Citizenship: USA
Year Torture/Abuse Began: 2006/since high school
Email: interiq@bellsouth.net
NAME: “IQPRISONER”
Citizenship: USA
Email: iqprisoner@yahoo.com
NAME: JACK
Citizenship: USA
Email: jackblack.2007@yahoo.com
NAME: JALBY
Citizenship: USA
Year Torture/Abuse Began:
Email: JALBY955@YAHOO.COM
NAME: JANIS
Citizenship: USA
Year Torture/Abuse Began:
Email: midnightladync@yahoo.com
NAME: JEANNIE
Citizenship: USA
Year Torture/Abuse Began:
Email: hokiemania49@yahoo.com
NAME: JENNIFER
Citizenship: USA
Year Torture/Abuse Began:
Email: jm4444@netzero.net
NAME: JIM
Citizenship:
Year Torture/Abuse Began:
Email: www.fedame.org/phpBB2/viewtopic.php?t=2573
NAME: JON
Citizenship: USA
Year Torture/Abuse Began:
Email: jonmnsn@aol.com
NAME: GEORGE JONES
Citizenship: USA
Year Torture/Abuse Began:
Email: georgejns596@gmail.com
NAME: JUNE
Citizenship: Canada
Year Torture/Abuse Began: 2004
Email: drahevil@yahoo.com
TEL: 780 4825075
NAME: KATHI
Citizenship: USA
Year Torture/Abuse Began: 1987
Email: rckymtthii@comcast.net
NAME: KEITH
Citizenship: USA
Year Torture/Abuse Began: 1992
Email: tekkaman_scalar@yahoo.com , mgb.young@sbcglobal.net,
NAME: KEVIN
Citizenship: USA
Year Torture/Abuse Began:
Email: c/o ruth.gill@freenet.de
NAME: KEVIN 2
Citizenship: USA
Year Torture/Abuse Began: 2002
Email: c/o Iolmisha@cs.com
NAME: KIM
Citizenship: USA
Year Torture/Abuse Began:
Email: kimjk822@yahoo.com
NAME: KIMBERLI
Citizenship: USA
Year Torture/Abuse Began: 2001
Email: kimberlilmt@gmail.com
NAME: KOMMY
Citizenship: USA
Year Torture/Abuse Began: 1972
Email: kommmy@gmail.com, ti.synergy@gmail.com
NAME: LINDA
Citizenship: USA
Year Torture/Abuse Began: 2000
Email: luv2sailtoo@yahoo.com , onlyrealhope@gmail.com