Category Archives: How to Get Help
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.
The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. At best, it gives a general indication something may be amiss or a threat, but offers little proof or useful confirmation. ONE GOOD USE of such pas, as is true for low cost meters, is documenting excessive Smart Meter RF/EMF radiation, which makes it easier to force power companies to revert back to regular dial meters (beware of fake dial meters with a thick back — which conceals yet another Smart Meter without digital readout).
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
The way it is
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
Knowing the difference can alter TI tactics
About Death Threats
There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.
Stray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.
In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.
The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.
There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.
The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.
The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.
It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.
To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.
After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.
Symptoms, regardless of cause
At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.
Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.
Serious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.
In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.
The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.
Smart Meters and stray voltage; a possible new conspiracy
A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.
Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.
It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.
The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.
Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.
Stray voltage as targeting weapon
Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.
Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.
In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.
In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.
Proving stray voltage
To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.
The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.
Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.
If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s owner/renter’s awareness, even though BOTH are in use — by SOMEONE.
It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.
And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.
If there is one thing I’ve learned after having contact with 12,000 Targeted Individuals over some 25 years, it is that without help, they have no good chance at properly dealing with their targeting. There are many reasons self help fails, and yet the solutions are not that complex.
The TI dilemma
I have never met a long-term Targeted Individual (TI) who did not have the same generalized and massive array of problems. The easiest victims to help were those who had only recently become aware of targeting, as their problem list was much shorter, making defensive solutions easier to derive and implement. But for everyone else, the list of issues was, well, mind boggling. I would see it in the very first communication (typically email or letter). It would be as if a letter about life from Lil Abner’s (by Al Capp) character, Joe Btfsplk, who never had a good thing happen to him or anyone around him.
Note: I am no longer in a position to offer such personal helps. I do still offer a free Helps Kit by email which is useful to the TI in multiple ways, and I’ve written many how-to books on topic which are quite detailed and useful, to date still the only ones of their kind, as far as I am aware. I am still open to email contact at proparanoidgroup at gmail com, and can field simple generic questions, but I no longer engage in situational analysis and tactical advice, investigations, or direct intervention. This post is intended to help take up that slack.
That first contact would be pages long, typically, in story telling mode, and full of unhappy emotion, a hard thing to read; both in terms of eyestrain and emotional drain. Paragraph after paragraph of one problem or targeting issue after another. There would be a long list of events and suspect perps (perpetrators). It would commonly entail problems with their job, their family, their church or other membership, their neighbors, the cops, the legal system, the medical system, their financial situation, their computer security, and more, to include actual targeting symptoms impacting their health, and at times, the health of their pets and their plants.
The effects would be physiological, emotional, mental, and in some cases, impact physical objects. It must have been even harder for them to compose it, than for me to read it. Each such effect might entail a variety of individual symptoms and clues as to cause. Oddly enough, typically NON OF IT IS USEFUL in providing helps. Their valiant and painful plea for help ends up being little more than an exhaustive rant in terms of value in a practical investigative analysis. The ONLY way to tackle targeting usefully, either as a helper or as a victim, is to start completely over, which is why the Helps Kit was evolved; it started over in a way which simplifies, organizes, and quantifies useful information.
A Detective investigating a crime does not want to hear the long drawn out account of the victim up front. They start with a GENERIC description of the nature of the crime from the Cop on the scene (who did get that account from the victim), and then they INTERVIEW the victim with SPECIFIC simple questions aimed at nibbling away at facts in order to find the ones which represent CLUES. “What did you see? What was said?” and so forth, each question hopefully suggesting another. They then use the answers to solve the crime. A good model for helpers and TIs, alike. A flood of data drowns the truth, but point-by-point realizations build toward it.
There is another problem. While their described symptom or effect may perfectly match a known Political Control Technology (PCT) or method, it is also absolutely true that each and every example could also be due to a natural medical situation, or have a simple but yet as unknown social, or financial cause. Since authorities and professionals who are the natural ‘go to’ for help prefer not to believe in the Boogey Man, the assumption is always that a natural cause is to blame. A wise TI would do the same, seeking to eliminate any such possibility.
Failing the wisdom creates more problems for the TI, even when the go-to helper cannot find the natural cause or address it, because it is next easiest to blame the TI for the problem, even to the point of accusing them of being a paranoiac schizophrenic; the easy out. For the record, when working long term with a TI, I will in time discover the truth, and the truth is, purely imagined targeting among those reaching out to me has proven quite the exception. But some might be delusional, of course, but I’ve also learned that persons with mental issues are often selected for targeting in training projects, so that any serious mistake by trainees will be far less likely to draw interest of authorities, who will make the assumption the whole thing was imagined.
The bigger problem
As result of all these things, a TI is faced with so many problems, and so many clues, that they can literally find themselves immobilized by confusion, unable to reason it out, or even unable to cope. And yet, there is always one more problem, far more serious than the rest: they do not understand the truth of their targeting situation. I’ve never known a long term TI who did not have a false belief as to the nature, cause, purpose, source, and method of their targeting. This is by design, a primary goal of targeting; to create a false belief structure which makes it impossible to defend against, because defenses will be aimed at the wrong problem.
This further makes easier another primary goal, to make the victim seem crazy, either by their reactions being seen as paranoiac, or by telling others things deemed insanely impossible. But to underscore, the biggest problem is that their defenses will not meet the need, resulting in failure and frustration, a tool for their tormentors. So, finally, they come to me in a desperate state, not just in terms of needing help, but in terms of simply needing someone to listen to them and actually believe their story.
No one should presume a TI’s story to be imagined or fake, though it is true there are some who pretend for ulterior motives. In time, the truth will out. But because of their failure to truly understand the nature of their targeting, they might have been led to believe almost any untrue thing which cannot be seen as rational. For instance, one victim (who was schizophrenic, as well) believed they were beset by Alien vampires. In truth, the targeting was evolved against the person because they had discovered a firm involved in illegal dumping of biohazard materials, and to insure that her story was not believed by authorities, they led her to so believe. They relied on her schizophrenia to protect them from discovery both as perps inflicting mind control, but as criminals violating Federal law. The schizophrenia, itself, made that easier to accomplish.
How to eat an Elephant
The old saying is, one bite at a time. Here are the bites, a series of axiomatic advice points presented in a somewhat stepwise manner, the same things I would normally work through with every client. Remember, only you can decide any risks involved, and take the wisest course of actions based upon those perceived risks. This is merely a guideline of what has worked well in the past, and is generic in nature…
- Acknowledge your belief structure has been manipulated and you do not likely truly know the who, what, why, and how of things; you have been deliberately mislead. Following this guideline should help address that flaw, but only if you remain open to the possibility. Educate yourself about PCT and know your enemy, and always seek and eliminate any possible alternative explanations — but also keep in mind the pitfall cited at this post’s end;
- Be wary of professionals which we should otherwise rely upon, such as doctors, lawyers, dentists, and private investigators. Most will either walk away or take advantage of you on the assumption you are crazy, or worse, seek to have you evaluated by mental health professionals. The best strategy regarding that, is to seek an evaluation on your own: a written clean bill of mental health can be a wonderful defense if eventually accused of being delusional, even if by authorities. If you must find a professional, including a therapist, your best bet is to go to a city at least 50 miles away, and find a relatively recent graduate (i.e., a lawyer new to the Bar), of some minority race. They are likely to be hungrier for work, and more anxious to do a good job, and less likely to have had their morals corrupted over time by the industry. Avoid saying you are targeted, just tell them your concern and enough facts to get their interest. Answer their questions, but where a question requires an answer which gets into targeting details, give the details, and offer no presumption of cause, even if asked. Let THEM make that conclusion on their own, or not — it should not change how they perform for you;
- Cops, on the other hand, will either instantly so peg hole you, or worse, turn out to be in place assets working with the enemy against you. If you MUST do so (as in reporting a crime), or if you choose to become a TI activist or otherwise ‘go public’ (includes any Web presence), follow the advice found here;
- Start and maintain an event log. Use a voice activated (VOX) recorder kept on your person to make verbal notes describing questionable events, suspect persons, vehicles, etc. Leave it on to capture events directly, automatically. Transfer this at days end using headphones, to a computer spreadsheet or database file. It should include Time, Date, Location, Description, Details, and your emotional or intuitive thoughts at the time as to what it might mean. Compare new events of the day with older events, looking for patterns, frequent appearances of the same person, vehicle, etc. With respect to persons, give them a ‘code name’ based on their appearance or behavior until able to acquire their actual name. For vehicles, do get plate numbers, but since plates can be replaced or stolen, also note vehicle damage, stickers or decals, and the like. This will help you get closer to the truth of your targeting, and may be useful as evidence at some point;
- Remember that if you have a pattern in your life (such as going to work the same general time of day along a given route), so do others. Do not be concerned in such routines to see others around you repeatedly, because other people also have routines which may overlap with yours. DO be concerned if seeing the same person/vehicle at disparate locations and times when out of routine, and especially if also noted while in routine;
- Establish site security at home, and to the extent possible, work. My book, The Professional Paranoid will help, but in general, you need to insure no door, window, or opening can be accessed from the outside, even with a key, without breaking and entering. Perps don’t like to do that, because it leaves proof you are not imagining things. The only entrance that should be key accessible, should be via a pick proof deadbolt lock. Put one on your garage door, as well. If you can, install security lighting and a video monitoring system. Protect rooms and entrances or items with simple alarms, and employ and document any trip traps you set per the instructions in my book;
- Establish computer security AFTER site security. Backup all files, wipe the hard drive, reformat, reinstall OS, set new password, reinstall apps, restore files. Discard wireless keyboard. Disconnect from Internet. Buy cheap used iMac and set it up to be a local server, connect it to the Internet with Web sharing turned on, connect your main computer to it. Download a Web security monitoring utility to run continuously on the Mac, check it daily. Reset your router/modem to factory specs, install new password. Repeat this process and reset and all passwords regularly, do not use same PW for all. Consider to join the Free Will Society, a closed Facebook Group I maintain (application is via the Helps Kit mentioned in the Note near page top), or any of the many public TI Groups on FB (I am member of many);
- Improve personal security, starting with phone. NO CELL PHONE IS YOUR FRIEND. Keep it in a foil pouch, turned off when not in use. Where that is not practical, remove battery and install only to check for calls to make calls, or other use. If a smart phone, there are a number of apps I suggest you install. Mobile Justice from ACLU; an aircraft tracker that sees transponders; Spectrum Analyzer and/or EMF Detector; RSOE EDIS notifier; iTriage health advisor. You MUST disengage certain features. Cary a camera ready to go (not cell phone) and voice activated recorder to document events. More advice in my book, including land lines and general bug detection;
- While observing (3,4), avoid trying to deal with the sum total of the problem. It becomes a matter of ‘too many clues,’ per the introduction of this post. Instead, choose any ONE. Then review all others for any which seem related, aligned, supportive, or opposing, and set them aside for study as a subset. Analyze these, alone, formulate a means to prove or disprove each clue, and based on those results, validate, reject, or find the subset unresolvable, and move on to the next subset;
- You MUST presume any physiological symptoms are potentially actual health issues and seek a Doctor’s advice. When doing so, do NOT mention targeting, but it is OK to mention external symptoms (pets, plants, etc.) as might possibly be related. Pursue any suggested treatments until no treatment proves useful. ONLY THEN will you know the truth, and be closer to true understanding of your targeting, andy you may actually improve or cure actual health problems as well. Along these lines, anything you can do to impact your physical, mental, and psychological well being is to your good — become a health nut and try everything that claims a benefit, as everyone’s situation and physiology is different, but products seldom attempt claims of addressing targeting effects; you won’t know until you try it — but try only one new thing at a time, or you won’t know which is responsible for good outcome;
- Deal with Gangstalking. Very simple. Ignore it. It is only there to jerk your chain, and that only happens if you allow it to happen. You can choose not to be upset, worried, etc. Document it, yes, but laugh at it and them for wasting their time and money. This is simple in concept, and yet hard to do because of human nature. Stop, Think Act, practice, practice, practice;
- My book MC Realities offers a very good review of how to detect, identify, and deal with PCT. Once a better understanding is obtained from he previous steps, you can start to defend yourself more usefully with these trial and error methods, which should give you some good specific truths about your targeting. In general, we worry about implants, which can include voice to skull (V2S), Directed Energy Weapons (DEW) which cause physical harms, mood/sleep control; and other electronic tech which can also account for V2S. The precise defensive/offensive tactics will vary to type and specifics. Shielding is almost always the best defense, but there are so many factors that the easiest thing to do is to shield an entire room for a few hundred dollars, but other methods should be tried first, as that is where the targeting truths can be learned. Where there are problems still encountered, feel free to contact me;
- If your targeting involves pain inducement DEW, or you have actual medical conditions which cause pain, ask me for my Jedi Mind Trick, the best way to describe a method I have developed which allows one to mask pain with nothing more than the power of their mind. It is difficult to master and requires practice, but once mastered, it is easy to apply, and for some users, it can also turn your body into an EMF meter for advanced warnings of attacks, and has application to general problem solving, including the issue of true understanding of the targeting’s nature. I use it to eliminate pain from toothaches (a Molar who’s roots were growing through my gums, into my mouth, and into my cheek), burns, fibromyalgia, and even tinnitus, and I can use my hands to find power lines in walls, as well as microwave and EMF sources. Demonstrated it many times;
- Once defensive efforts are well in hand, there may be some significant offensive opportunities. These are outlined in my books. Should you think any are appropriate, feel free to run your ideas about implementation by me for fine tuning or other commentary;
- As a rule, a TI has no concrete knowledge of the reason why they are targeted. Exceptions tend to be incorrect, as earlier mentioned. Knowing the who and why us the key-most truth, as it can sometimes lead to establishing a blackmail insurance policy. This key can sometimes be discovered in memories. Go back in time in your mind to a point roughly six months to a year prior to first noticing your targeting. You would be looking for some odd or unusual event or thing overheard or seen. It might be an argument or a document or a conversation which, at the time, did not make much sense to you, but stood out as unusual in some way. Almost always, it is a work related memory, especially if your work had some relationship to government, intellectual property, high finance, or high profile legal matters; the sort of place where conspiracies and dark crimes might hatch, take place, or be evidenced. Should you find such a memory, contact me for general advice on how to verify its usefulness and take advantage of it;
- Where defense cannot be well achieved or maintained, relocation can typically buy several weeks to months of temporary relief. Often, simply going mobile can offer at least partial, if not full relief for a time, especially when not in your own vehicle, and leaving behind all personal possessions (new clothes, luggage, etc.) and taking no phone, NOT CALLING ANYONE, visiting online accounts, or purchasing anything on a card. For a more permanent solution, consider residency at Free Will Haven, a targeting-free self-sufficient and low-cost intentional community project of the Free Will Society, which is based on tiny homes living. I myself have been living quite comfortably in about 120 square feet (excessively tiny) for the last three years, and am quite content to do so, sacrificing little in the way of lifestyle, otherwise. Again, an application is contained within the Helps Kit mentioned in the Note near page top.
- Be prepared for local, regional, national, or even global social turmoil, be it disaster, civil unrest, martial law, real or false flag terrorism, revolution, race war, or political or financial upheaval. PCT has been being ramped up in terms of victim numbers (some estimates place the national number as high as 12,000,000) and individual intensity. It is my belief that the reason so many people are being targeted and the targeting is increasing, is we are heading to a crescendo designed to amplify any crisis turmoil in order to enable a shift in government form, all in the name of restoring national security and social order. Arrange to have a 90 day supply of food and emergency supplies and basic tools. Leverage your preparedness with a visit my special Facebook pages and review each post found there: the Post Apocalyptic Library of portable survival how-to knowledge; the Post Apocalyptic Local Area Defense Network, especially useful to TIs even without a crises event; and the FEMA, Martial Law, Revolution Database;
- Consider dropping off of the Grid; escape the Matrix (there is an actual matrix involved), perhaps even with a new identity. This is seldom possible while still being targeted, but the attempt, if done properly, can buy you significantly more targeting-free time before you are reacquired. This two-part post can help.
There are also some common mistakes that TIs make which can be avoided. Oddly enough, almost every TI has already made them, and yet, tends to continue making them, failing to see the risk they pose until till late. Here is a summary list, but remember, there are no hard and fast rules. There can always be an exception. If you think you have encountered one, contact me for review to see if I might not agree, or why not.
- NEVER seek help from authorities or ERTs due to targeting, itself. If an actual injury or crime is involved, such as vandalism, death threat, theft, etc., by all means report it, as having it on record can be useful evidence of targeting for possible use at some future point — but do not mention targeting concerns, and once more, follow the guidelines found here. If questions are asked as to why someone might undertake an action against you, you CAN mention that there have been strange things happening and you might choose one or two examples, if asked to cite them, but state you have no understanding as to why anyone would do so, and that you have no suspects (even if you do). The last thing you want is an investigation which concludes you are mental, which is where it almost always will end up going the moment you deviate. It may be wise to apply this rule to friends and family, and certainly to co workers, as you can end up destroying relationships with disclosure. The only exception should likely be limited to those living with you, and even then, you will pay a price. I lost a wife and a foster daughter to it, and possibly another daughter;
- NEVER react to targeting stimuli if you can avoid it. Train yourself to Stop, Think, and ACT, do not REACT. You, STOP yourself from reacting, THINK about what they are trying to cause you to do (i.e., get angry), and the ACT contrary to that in some random manner. This both negates the purpose of the targeting, and causes perps all manner of concern, either about the validity of the psychological profile they had prepared on you in order to determine the best targeting methodology, or the operational reliability or skill of any equipment or perps involved. This can at times lead to dramatic increases in targeting efforts, but if you continue the ploy, it will lead to them trying to ‘repair’ whatever problem they think is the cause. That typically results in a small rest period of no attacks. Eventually, it can destroy the effort entirely, especially if this method is applied by someone in early targeting, as it prevents them from advancing to other kinds of targeting, or they advance and abandon the failing method(s). This, and use of the Jedi Mind Trick, and numerous blackmail insurance policies (each time I created one for a client, it protected me, as well) is how I have managed to negate nearly three decades of attempted targeting and its consequences; I do not consider myself a TI, because I keep winning;
- NEVER be overly concerned about death threats, being followed, or about gang stalking events, it will simply make you wax paranoid, and be seen as such. The people who engage in PCT would simply kill you, not threaten you, if they wanted you dead. Unless a threat was quite specific and included a warning that you should do or not do something, ‘or else’ vividly described, it has no basis in any real threat. If you get a threat with such a basis, that basis must represent a clear and present danger to THEM, in order to be valid. Telling you to stop being an activist, or stop investigating why you are being targeted, does not count, unless perhaps, you have gotten to the point where you can CLEARLY identify and prove with legally useful smoking-gun caliber evidence the who, why, when, what and who of it. In such a case, you have the makings of a blackmail insurance policy which can not only counter the threat, but force capitulation and even remuneration for your troubles at their hands. That was how I ended my first targeting, and was offered $40,000 per my demand. It has become the model for all client help efforts ever since. Being followed or gang stalked is merely a jerk-your-chain tool that goes back to Stop, Think, Act. The only real danger is in giving into it. The only targeting which is a real threat is PCT based on electronics of one kind or another, chemical or biological assaults, physical abuses (i.e., rape, beating, accessing you while you sleep), and dirty tricks which impact finances, relationships, reputation, and the like;
- NEVER presume another TI, TI activist group or organization, or general Web resource to know what they are talking about regarding PCT or solutions, for the likelihood they have it right is very low. Take it with a grain of salt, and tuck it away for comparison to other resources. Books are a far better bet at getting at the straight dope. Older books will by now have a reputation establishing usefulness. Avoid newer books or other sources by anyone claiming to be an insider, ex intelligence operative, or other ‘expert,’ as they are likely providing disinformation to insure you continue to fight the wrong problems;
- NEVER hook up with another person, especially another TI. There are many reasons this is important advice, and I assure you that the risks you undertake with even a casual date or one night stand is significant. I see it play out again and again. Rare is the TI that can better their circumstance by not living alone, and a sexual adventure is far too easily a set up opportunity of one kind or another;
- NEVER pay money to anyone offering implant scans, ‘scientific’ testing, or new age solutions without EXTREME CARE; it is likely a scam, even if there are YouTubes or personal testimonies, the likelihood remains high. Research, research, research. Even if you actually did locate an implant by some method, the number of people able to have an implant removed can be counted on one hand; the medical industry will not cooperate. I have yet to see any positive results from testing services or new age approaches, but if you want to submit a chemical sample to an actual laboratory for chemical or spectrum analysis to find out what it is, that is worth the time and money;
- Avoid participating in poorly conceived TI activist efforts to outreach, or outreaching directly yourself. By poorly conceived, I mean an effort which does not heed the advice employed here. At best, such efforts defame and set back the TI movement and each person associated with it, labeling them as mental. Many of these efforts are designed and promoted by perps, and used as a kind of ‘evaluation survey,’ especially those asking you provide personal histories or statements. If legitimate, such statements will tend to seem crazy to anyone not already believing that targeting is real — adding another ‘crazy story’ to a stack of them will not change their minds.
Other facts to consider
The following may temper your views in seeking full understanding and formulating defenses. Simply keep them in mind when reasoning things through.
- Many perps are themselves victims of mind control, typically the worst kind, the Monarch/MK Ultra kind. They know not what they do, literally; they are programmable people based on multiple personalities which can be triggered at will. While some perps are psychopaths, these, are not, though they my be controlled to exhibit the same behavioral traits;
- You may be such a programmable person, yourself, and like them, not be aware. If such a person, and also targeted, you represent some form of ‘failure’ in the programming, and the targeting is designed to neutralize any damage you might cause to the program if you become fully aware of your true situation, which is a real possibility as you work through understanding and defensive efforts. The important and terrible truth is, that such a person will sabotage their own daily efforts in this regard, and make no progress whatsoever. Such a person will likely exhibit many additional symptoms as found in my book, MC Realities. Most notable among these is a question or belief they were targeted or abused as a child, or themselves have abuser thoughts or have so abused. Should you come to suspect you are a programmable, you should contact me for special advice too complex for this forum;
- All PCT is Satanic in nature, origin, and intent. Your enemy is as forecast: Powers and Principalities, and there is scientific proof available. Therefore, your best ally is religious faith, and the best faith for the purpose is Christianity, and the best Christian Church (because it is acknowledged to hold closest to God’s Word in the original Greek and Hebrew translations) is the Wisconsin Synod of the Lutheran Church. There is a whole chapter in my book, MC Realities, which explains exactly why this is true in both practical and Biblical terms;
- You will hear it said all the time, that TIs fear they are being murdered, or that they have been murdered. THERE HAS NEVER been such a case. Being a TI can certainly mean to be suffering in great pain, and it may certainly to some, at times feel like it has the potential to kill. But thus far, the only known deaths of TIs have been from suicides or accidents, or natural causes such as old age or disease, according to official records. While it is true that there are ways to fake such deaths and such ways are known by our enemies… and it is true that some potentially deadly illnesses such as cancer may be caused by targeting… death is NEVER the goal. They invest perhaps a quarter-million dollars a month on a full-time TI. There is no point in killing off such an investment. So the only deaths which bother me are the suicides, because that kills not just the person, but effectively the soul, as that is the only unforgivable sin; a sin against the Holy Ghost. If you give in to it, you are surrendering to your enemy, Satan, not just the perps. I am in communication with literally dozens of persons who have professed to have been being murdered as far back as 1992 or so, and they are STILL HERE, some of them still making the claim from time to time. Only two out of 12,000 are known to have died, one of old age and disease, and the other in a traffic incident;
- There is no place one can go where targeting is not likely to follow within weeks to months, save one or two foreign countries. The only one of these that has been verified by multiple TIs, is Ecuador, which to me does not make sense, but it seems to be true, with three such instances reported to me personally from TIs I had vetted as legitimate TIs.
After working with over 12,000 persons coming forward for help with targeting over the last two plus decades, I’ve learned a good deal more than just found in my earlier books. There has never been a Targeted Individual who has not been accused of schizophrenia. While that can be true, it is often not true, and even when true, targeting may also exist. The issue must be dealt with head on, and with care, lest it become a stumbling block beyond cure.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
• there are good and bad ways of addressing the problem.
First impressions DON’T count
When I’m first contacted by stalking victims for help as online consultant, the stories told me tend to border on what people unfamiliar with the subject would think impossible. The ‘natural’ conclusion, especially for professionals in health care, law enforcement, or governmental authorities such a person might turn to for help with their enemy and/or suffering… is that the person is suffering something in the realm of paranoia or schizophrenia. That is not always wise, but unfortunately, it is quite unavoidable, and for two reasons.
The first is that the symptoms of targeting are by and large identical to those of schizophrenic episodes. Hearing voices or seeing things no one else does are perhaps the most well known examples, all things that can be simulated with advanced electronics; voice to skull can be achieved by multiple methods; Sound Canons and other tricks can create otherwise unbelievable visual aberrations. But also, the general belief of claim that people are following, spying, or threatening, especially in numbers, is seen as a symptom. Enter gang stalking methodologies.
The second reason is less coincidental. People simply don’t want to believe in the Boogeyman, especially officials and other professionals, because trying to deal with something they can’t see evidence of being true is beyond them. That is their failing, often a thing wrongly taught them in their training. Often, that training was crafted by people who helped develop targeting methodology, former CIA mind control scientists. This has been well documented in many books, some of which were written by retired CIA types, and as referenced in my own book on topic, MC Realities.
This is especially true of the DSM series of mental health manuals, because at one time and even currently in some cases, the history of heads of collegiate psychiatric departments and EVERY professional association to which a psychiatric professional could be member… as well as Industry watch dog or promotional organizations… can be traced back to the original CIA mind Control Experiments as CIA employed researchers. As they die off, new ones are recruited, and the false narrative… a ‘lunacy’ about lunacy, goes on.
When Congress investigated CIA (and other agencies) in the Church and Rockefeller Committee hearings in the 1970s, CIA officially (claimed*) they had already shut down such programs because (they claimed*) they did not work. They then quickly scattered the CIA scientists involved to form three kinds of groups:
a) institutional and professional groups which insisted MC did not exist, did not work, and that anyone thinking otherwise was mentally ill or, in the case of professionals, guilty of malfeasance or malpractice;
b) like groups which pretended to seek and ‘help’ victims of MC; and
c) into key positions of power and authority within the psychiatric professional associations (all of them), and collegiate Psych departments, where they not only taught the preferred view about mind control, but also helped to write the DSM series of ‘bibles’ used by shrinks in diagnosis/treatment.
Ironically, the most notorious of group (b), above, was the Cult Awareness Network; CAN, which was consistently called upon by government to help ‘resolve’ crisis arising involving the so-called ‘suicide cults.’ CAN has since taken over and operated by the Church of Scientology, seen by many as a mind control cult in its own right. This was a favorite area of CIA mind control experimentation, trying to find ways to get large numbers of people to kill themselves as a collective. Read Psychic Dictatorship in the U.S.A., by Alex Constantine, for a long list of such experiments. Alex, by the way, was targeted for his writings, and went into hiding for a time. The other purpose of group (b) is to recapture persons who may have escaped mind control projects or who, due to mental issues, may become good subjects as training fodder, and brought into such projects.
What makes it ironic is that CAN advice and helps (pre Scientology) consistently resulted in the mass deaths of those being helped, examples being WACO and JONESTOWN. In both cases, the CIA plants within the groups ‘miraculously,’ managed to survive unharmed, and quite by ‘coincidence,’ the leaders and core members of those groups had previously been in spheres of influence of MC scientists in group (c), above. More could be said about such things, and have been, in MC Realities, Alex’s book, and others. But starker proofs such claims are false exist.
In my first book, The Professional Paranoid, I cited in the Appendix some 400 CIA fronts and influenced organizations which predominantly predated the Church/Rockefeller hearings. Almost exactly half of those had to do with Mind Control. CIA book vanished that book by buying all available copies from suppliers, having one of their own publishing fronts invest in my publisher with the proviso my book not be reprinted, and then ‘selling’ used copies for nearly ten times their face value so that people who had copies would sell theirs for a bit less… and then buying all those up, as well. It is a common CIA trick.
But my publisher was a good guy and he returned the book rights to me, something CIA had failed to think of specifying he not do. So I now effectively ‘self publish’ using print on demand for hard copy (through paranoiapublishing.com), and ebook versions directly through me (proparanoidgroup at gmail com. This makes it impossible to book vanish. Subsequently, in my third book in the Professional Paranoid Series, The Defensive Field Guide, I included 1,000 CIA fronts, almost all of the additions coming into existence post Church/Rockefeller hearings. Guess what? STILL — over half of them were/are involved in mind control related operations. CIA lied to Congress.
The unexpected result of my books was that they sponsored a flood of requests for help from victims of targeting. The overwhelming majority of such requests were from people suffering some form of mind control technology or methodology, most notably, organized ‘gang’ stalking, and/or Directed Energy Weapons (DEW). As result, I felt obliged to attempt to offer professional online consulting services to attempt to help such persons.
This is a very difficult thing to undertake for more reasons than just the communications issues forced by being limited to dialogs at distance without more personal on site direct involvement. While I also offered direct intervention services, they were always beyond the financial ability of the victims; mind control is never worked upon the wealthy unless they first attack and destroy the victim’s financial underpinnings.
Early on in offering such helps, and even in trying to sell my books in the first place, the issue of mental health questions loomed large due the Boogyman Disbelief Syndrome. BDS is a form of mental illness (not found in the DSM, of course) which causes professionals to ignore facts in the Congressional Record, scientific papers, patents, and books by endless authorities on topic, and insist therefore that persons claiming to be targeted are ALWAYS mentally ill, per the DSM bible they worship; they live and work as if in a cult, themselves victims of a form of mind control, the very thing they deny exists.
I have personal proofs I can speak to, as well. I ask professionals who think only schizophrenia possible to explain how it is that, with my defensive and offensive tactical advice, it is possible that some TIs have obtained the ultimate relief? By that, I mean total ending of their problem in ways which prove it was not a mental issue. The proof being in the form of paying huge sums of money by those guilty of targeting as retribution, and/or providing ‘dream jobs,’ record contracts or book deals, and so forth.
The Elephant in the room
That unhappy irony aside, Virtually ever TI, if telling their story in full, will make claims they assume to be fact which seem impossible to the listener, especially if unfamiliar with the topic. After thousands of such stories, even I can still be surprised. As stated, the natural conclusion is some form of mental defect in need of professional care. Especially if the listener is a psychiatric professional; the DSM tells them what to believe true — that schizophrenia is the only possible cause for targeting claims.
It was therefor proper that I early on advised that some form of schizophrenia or paranoiac affliction must always be considered a possibility. However, I also told clients that EVEN IF TRUE, it did NOT mean the person was not ALSO targeted, something no psychiatrist seems able to ever consider possible. In fact, that TI circumstance is actually quite common in my decades of experience of working with TIs. I therefore chose by policy to ignore any and all clues of potential mental health in any decision to proceed to offer helps. The only SAFE presumption by ANYONE professionally offering help is that targeting must be considered and investigated. To do less could leave one legally liable.
One additional reason to so proceed exists, and it is unique to true targeted persons. One of the primary goals of targeting is to reduce them to a political, social, and financial zero, and the main method employed is to make them LOOK insane, as quickly as possible. One way to do that is to mislead the victim into believing things true, which are untrue. Therefore, any general belief expressed by a TI which seems unbelievable may be explained by this fact, and is yet one more reason not to dismiss the claims as baseless; they are in fact, mere symptoms of targeting as much as of potential schizophrenia.
There are countless ways this can be done, and two key benefits are derived by the tactic. The first is that the implication of insanity is achieved, which leads to denial of helps even from loved ones. Destruction of personal relationships and other help resources is also a primary goal. The second is that the TI will end up fighting a non existent problem, and in making no headway, more quickly succumb to giving into feelings of defeat, breaking their will to resist. IT IS A TRAP, one I never allow a victim to fall into.
I have, therefore, never turned someone away regardless of how much it appeared their problem was mental. For one thing, it was quite often found true in time that persons with various mental issues were (and are) deliberately selected for targeting because of that fact, especially if the purpose of targeting is training exercises; any mistakes that might end up involving Police will be immediately dismissed on that same ‘presumptive’ basis. So it is absolutely possible that targeting and mental health issues are present in a given TI’s case.
So I always tried to early on include dialog on how to best address the possibility of schizophrenia and PROVE the answer, whatever it really was, one way or the other. If TRUE, it would be best to get treatment and resolve that issue, first. RARELY is anyone willing to take that advice; they find the prospect too scary, because of the history of psychiatry being rather prone to forced institutionalization with horrific results (as exemplified in One Flew Over the Cuckoo’s Nest). Such hesitance has not seemed to matter that much, because after working with someone for a while, I am eventually able to discern the truth for myself, and advise such help is their only chance at relief.
I will state for the record, quite contrary to DSM assertions, that about only about 1 in every 5 or 6 do suffer schizophrenia and are not truly targeted. I would then so advise, offering as many factual reasons as I hoped would be logically seen as true and valid to the client. Once in a while, they would see the truth, and act on it, but not often enough. A lesser number have been judged both schizophrenic and were also found to be targeted. The remainder were simply targeted, and merely seemed schizophrenic outwardly by third parties. They might additionally be seen as slowly being driven into a naturally resulting state of paranoiac behaviors. That is not the same as being mentally ill, certainly not the same as being schizophrenic; it is simply survival instincts gone overboard in an appropriate effort at self defense. That, I can work with on my own, and it takes no psychiatric skills, only logic.
The nature of the Elephant in the room
It is important to understand: Schizophrenia is not some shameful state of insanity such as people tend to think it. It is simply (rather overstated) a chemical imbalance in the brain which can often be addressed with drugs and good council. Yes, there are significant pitfalls in the treatment process; there is a level of quackery to the ‘science’ behind it, and that results in a hard path typically full of side effects from trying to find the right med and dose level. The patient becomes a Guinea Pig. When the ‘science’ can consider the varied physiology of individual patients and come up with the right med and dose the first time, THEN, and only then will it actually be science, IMO.
But there is a significant difference between privately seeking help and being forced into it by ‘the system.’ The latter can sometimes result in forced treatment to the point of creating a ‘cured’ human vegetable who cannot function on their own, essentially institutionalized for life. The former is considerably safer and far less likely to have an unhappy ending, the worst possible result being an unflattering written record and a period of unpleasant side effects which soon enough wear off. A good result, however, would be a written clean bill of mental health; a well deserved middle finger upraised to all who doubted.
Too, some care must be taken to insure that the meds do not lead to suicidal thoughts without care to prevent actualization; many psychotropic treatments do have such side effects upon withdrawal from use, some upon use. I know of this and other unpleasant side effects first hand, as I and several members of my family have been put on such medications, which are often used for more than mental issues.
Fortunately, there are ways to seek voluntary helps with reduced risks — but which are situation dependent and cannot therefore be well described, here. But schizophrenia can also be addressed with WILL POWER, though a rare eventuality. This is seen in the movie, A Beautiful Mind, a true story. In fact, watching it led me to develop an all new technique useful in reducing the actual effects of various targeting methods, including DEW. I’m talking about reduction of targeting effects, such as pain and manipulations of mood, alertness, and mental acuity.
They can even work with non targeting issues, such as pain reduction for toothaches, burns, Diabetes, and other cause, or even to help neutralize tinnitus (encouraging, but as yet no results against voice to skull). While simple in method, they are difficult to master; akin to trying to become a Jedi Knight in descriptive processes. But some can make them work usefully to one degree or another. This, too, is beyond the ability of this Post to well address. Anyone wanting to know more may email me at proparanoidgroup at gmail com and ask for the Jedi papers.
The good fight
I write of all this, today, because I just received an email from a Man in a distant country I had been working with for a while. He was quite adamant about his stalking, and elements of it certainly were beyond anything possible in reality. But he did have the will to brave the process of professional care and did brave the treatment trial and error, and was actually cured. He wrote to thank me and put my mind at ease, a kind consideration on his part. The transformation in his life was so significant that it was clearly evidenced in his writing style and commentary. His very personality and mental prowess was restored.
It was extremely gratifying to hear of his victory, and see him restored to a normalcy, even though I could take no credit. I wish I could get away with saying all TIs were schizophrenic, and that such treatment was the only solution (the official shrink view); it would have saved me decades of unhappy dialogs and less than perfect results. If it were true, and if victims would be willing to undergo treatment because there were no dangers in doing so, it would be a far more perfect World. But sadly, such a World view would be delusional: exactly as embraced by most professional psychiatrists, today.
I complimented him on his bravery for undertaking that hard road, and for enduring the clumsy treatment process which eventually leads to a cure, or eventually illustrates by lack of cure, that schizophrenia is not present. Getting a piece of paper from a Doctor that treatment had no effect is useful evidence to a TI. EITHER RESULT is a win win, even where actual targeting is present along with mental disorder. Where the victim can eliminate those things imagined, they can better focus on defense and attempts to prove those things which remain and are real. Perps will flee in the face of exposure. The trick is actually being in a position to confront them with that possibility, a matter which dealing only with reality can afford.
It cannot be done by struggling against imagined enemy tactics and methods, regardless of if imagined through chemical imbalance, or imagined due to deliberately fostered false clues. “A mind is a terrible thing to waste,” but that is exactly what mind control seeks to achieve. A TI must above all else, therefore, take any and ALL steps necessary to safe guard the health of their own mind. Free Will, the gift of God, is as precious as the gift of His Grace and of life, itself. These things are a TI’s best weapons of defense and offense. I have a whole chapter in my book on exactly how that is true; Religion and MC. This, too, is available as a free .pdf on request.
The right use of Free Will (righteousness = right use ness) might just include ‘willing’ one’s self to brave confrontation with that Elephant in the room. Clearly, it will involve other battles, as well. Never is it an easy path, and even where victories are gained, it is more often true than not, that total escape is not possible. Some break free, but all who properly resist can at least better their circumstances well enough that they can claim victory, and as a survivor, survive what targeting remains as more a nuisance than a life-long debilitating experience.
Is this not what someone with a physical handicap or long-term debilitating health issue must do, if to survive? Targeting is no different a thing, except that it is forced upon the TI by outside forces for evil cause, quite Satanic at its core. It is, therefore, a spiritual handicap, more than physical or mental, if rightly viewed; it is a war for the spirit and free will of the victim, that very gift from God. Therefore, God is indeed the best ally.
I hope this one example gives hope to those in dire need. That, too, would be a credit to the man who wrote me, a kind of legacy or testimony which hopefully leads others to dare to do the same. Just take care, if that includes you. The path is not easy to see, and there are brambles to each side which must be avoided. While I can no longer offer actual paid consulting services, I do remain available for guidance and providing answers to simple questions which do not involve significant situational analysis (proparanoidgroup at gmail com). I answer all inquiries in person.
Even our own government, normally blind to problems until too late, has been warning us for years to be prepared for ‘something scary,’ and the list of concerns is very scary. The stakes couldn’t be higher: if even just one thing on the list takes place, being ill prepared can perish whole families and, in short order, whole communities. Here is something that can make a difference, and its free. Its called knowledge.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
In this post you will learn…
• What Preppers are and why they exist;
• Why YOU should become a Prepper, and HOW to proceed;
• There are 2 NEW and FREE resources to simplify the effort usefully
Note: I usually well footnote my posts so you can verify what I say for yourself. In this case, the two Facebook pages mentioned at article end, themselves, offer ample proofs for those items not otherwise footnoted.
The wise live for Today, but plan for Tomorrow: uncertainty is the only certainty
The Bible is the oldest source of Wisdom modern Man relies upon, and it clearly echoes that thought; there are no less than 25 places in the Bible which so admonish. A good number of these directly talk about the kind of preparedness this post addresses, while the remainder speak to being prepared for entry into the Kingdom of Heaven. But, if one is not prepared for things which can take one’s life, is not the later concern all the more important to prepare for, as well?
Perhaps the strongest and simplest of these are found in Proverbs (natch):
22:3 “The prudent sees danger and hides himself, but the simple go on and suffer for it;”
27:1 “Do not be confident about tomorrow, for you do not know what a day may bring.”
If we hold onto any one thing in this country, it is the wisdom of our Founding Fathers, and they were almost to a Man God Fearing and, therefore, they heeded such words. But they themselves also spoke plainly and logically about such things, and framed them in terms of the Nation, as well as the Individual and those we each love, to whom we are responsible for their well being:
John Adams, on the risk of overconfidence and reliance upon government: “I give you this warning that you may prepare your mind for your fate;”
Benjamin Franklin: “By failing to prepare, you prepare to fail;”
Alexander Hamilton: “If fortune should smile upon us, it will do us no harm to have been prepared for adversity; if she frowns upon us, by being prepared, we shall encounter it without the chagrin of disappointment. Your future rank in life is a perfect lottery;”
Thomas Jefferson: “Instead of considering what is past, however, we are to look forward and prepare for the future.”
George Washington, on wise use of funds, such that: “timely disbursements to prepare for danger frequently prevent much greater disbursements to repel it.”
Thomas Pain, on being fugitive from tyranny: “O! receive the fugitive, and prepare in time an asylum for mankind.”
The Modern Prepper and Dr. Strangelove
That last quote brings us to the advent of the modern Prepper, a phenomenon brought about by the Cold War and fear of the Bomb. President Eisenhower spoke frequently about the need for Civil Defense Preparedness, and founded what ultimately became FEMA, the ‘Grandaddy Prepper.’ For the rest of us, we were encouraged to prepare for nuclear war in our thinking, and our behavior.
We were taught to ‘Duck and Cover,’ and to plan to flee the cities, or take to bomb shelters. The whole basis of our modern Interstate Highway System was to that end, and so that the military and other aid could quickly flow to any wound in need of dressing. Cold War tensions culminated in the dire climactic confrontation of the Cuban Missile Crisis, and firmly established the era of the Bomb and Fallout Shelters. There were, in fact, enough shelters built to save 100,000,000 Americans, millions being built by citizens in their own homes or back yards: Dig a hole, drop in a pipe and add a floor, and fill it in and stock it.
Why prep today? Darker times > starker threats > greater fears
For a time, I managed a gas station while investigating the Oil Industry. That led me to a face-to-face confrontation with terrorism which rendered the investigation superfluous. For those who do not appreciate or understand the Prepper, or why they do what they do, or for the matter, who do not understand Conspiracy Theorists, Truthers, or Targeted Individuals claiming mind control, I highly recommend working for at least 30 days in a gas station. Why? Because that is an excellent place to talk with a large number and a variety of people in the course of doing business, and elicit from them things they would never otherwise admit in open conversation.
I could ask almost anything, and if well proposed, obtain a deeply personal and meaningful reply. And I did, regularly, on on a wide range of topics. What I learned is that there are more people afraid of more things than the mere threat of global extinction from The Bomb and the ‘Red Menace.’ Terrorism, yes, and for more of a seriously right reason than the obvious, a reason unexpected even by them.
It is to me even scarier than the fact that terrorism exists. Few are aware, but the top ranking U.S. Military General, Tommy Franks (who brought the flame throwing tank to Waco), has warned in a public statement that if there is another 9-11 level terror attack in the United States, the Military will take over the government in nation-wide Martial Law. I, for one, do not want flame throwing tanks on my streets.
And, we are still threatened by nuclear war: China’s top military leader has stated that war with the U.S. is inevitable, the only thing remaining being to decide when and how to be the first to strike. And, we have recently learned, they have stealth subs we cannot detect; one surfaced unexpectedly in the middle of a U.S. Carrier Fleet in the middle of an exercise looking for subs. North Korea is constantly making threats, and Obama and Hillary Clinton have assured terroism-minded Iran has access to the Bomb. We have several times in the last year, alone, come close to trading blows with Russian forces which could easily have escalate to a nuclear exchange. And we supposedly like each other, now.
Moreover, as recently played out in the Press, we have learned that a single well placed nuke high in the atmosphere could cause an EMP wave sending us back into the stone age by wiping out all electronics, including the entire power grid. Just as bad, spurious energy waves from the Sun could achieve the same ends, globally, or for the matter, doomsday rocks from space could effect similar damage, or worse. Movie theaters are awash these kinds of with (Extenction Level Event) scenarios. But there are other fears, and each one seems, in turn, to begat another, often wilder and seemingly more far fetched… which unfortunately, do not seem all that far fetched if daring to explore the facts which are their basis.
Every few months there seems to be another new exotic biological threat, either a weaponized or natural pathogen or virus on the verge of pandemic capability. Each such threat additionally threatens to be incurable and impossible to stop in time because it takes such a long time to come up with defensive medicines. Then there is the risk of financial collapse, which could trigger a global replay of the Great Depression on an unimaginable scale. Civil unrest levels are at the greatest and most dramatic in all of history; the Occupy/99% movement spontaneously fielded many millions of people around the World in the space of days. Our government’s liberal policies and some unfortunate events have fomented racism issues to the point that Blacks are shooting Cops as if at war, and threatening worse.
We see paranoia rampant in our government, who treats us all as if terrorists in the wings, spying on us and taking away our rights, and leading to fears of Martial Law, and/or efforts to take away our guns. DARPA, on the other hand, has ordered billions of rounds of ammo, enough to kill every living soul in North America several times over. FEMA seems to be building large facilities some fear are closer to concentration and even death camps than to shelters. It is at least concretely true that several special inciner-ators have been built, each strategically located, and capable of efficiently destroying hundreds of millions of tons of contaminated materials — which could include human bodies. The fear of Fascism and the comparison of our government to Nazi Germany is commonplace, which brings me back to the dialogs at the gas pump, where these things were said. The most common phrase heard in response to such things was, “When the revolution comes…”
Then there is the dramatic increase in UFO sightings, and much more than that, a growing body of evidence of actual combat taking place. If chemtrails were not already their own perceived threat, consider the latest theory as to their purpose; to weaponize the atmosphere against alien aggression. There is actually some scientific basis for such wild theories, and some to additionally suggest there is an off-world secret space program with Buck Rogers-like Space marines using captured Alien technology. I don’t know about any of that, but the fact that the government is becoming more secretive about the UFO question than ever, before, does not allow me to discount the notion. Presidents Roosevelt, Regan, Bush, Clinton, and Obama, and even Putin, have all alluded to these possibilities, as well as have high ranking military. The recent discovery of a constructed mega-structure orbiting a distant Sun amplifies the possibility: we are not alone. And those at the gas pump agree. More people have seen UFOs or otherwise have reason to believe in Aliens, than not. Don’t take my word for anything in this paragraph; just tune into Ground Zero and scan the archives of shows with Clyde Lewis’ expert guests.
Dare we mention a credible Planet X, super volcanos, global warming and melting ice caps, mega earthquakes, the shifting of our magnetic poles, and any number of scientifically plausible threats and natural disasters capable of inflicting significant regional, national, or global destruction of cataclysmic proportion… or dare we say… Biblical? After all, the other common comment at the gas pump is, “We are living in the End Times.” Indeed, the Illuminati conspiracies, AKA The New World Order, are not difficult to validate with a barrage of demonstrable facts which defy coincidence. This author has made a case in several of his books that the ultimate goal of the New World Order is to form a One-World Government — in order for the Antichrist to have a seat of power, and usher in the End of Ages, the ultimate End Game. It IS prophesied, after all, and many of us fear that as much as anything else.
That brings us full circle, back to the Bible’s admonishments. Being prepared ought rightly be not only for bad tidings, but for salvation. The government agrees, at least with the first part. The last ten years have seen an unprecedented effort by the government to urge us to be prepared for disaster. They have even reinstated and updated the old Cold War emergency radio alert system, and are stockpiling huge quantities of everything from food and medicine, and other supplies, to coffins. And ammo. All they ask you to do, is to have emergency plans and a ‘go bag,’ or store of emergency foods and critical supplies.
It’s simply good common sense. Preppers have been doing this for decades. What’s your excuse? That they are crazy? Better look in the mirror, if you believe that.
Here are two simple and free tools to help you get started
Both are easy to use Facebook pages. One is a kind of compendium of information regarding the possible breakdown in civil society due to the inability of government to respond, or even perhaps government itself has gone terribly awry. It is called the FEMA, Martial Law, Revolution Database (kind of covers all possibilities). It has no subversive intent, despite the scary title. It is very informative, and can help push anyone teetering on the notion of being prepared into taking action. One way it does this, is by telling you what to expect, and what a good action plan/go bag might look like for a given scenario.
The other also has a scary title, but it implies nothing but what it is; a library. In this case, it is a series of links to critical information one might need to survive for long periods without outside help in a serious catastrophe. It is a collection of how-to survival tricks, and how to quickly and easily make common critical items such as water purification systems, emergency generators, and so forth. It is called the Post Apocalyptic Library. The idea is simple: visit the links, download or copy the information, print it out, and put it into your go bag. Instant expert on a moment’s notice! Many of the links will deserve further exploration of their sites, for other good information. There is always more than one way to solve a problem.
Have you ever wanted a certain soft drink? Well, I’m a Prepper, he’s a Prepper, she’s a Prepper, we’re a Prepper; shouldn’t you be a Prepper, too?
Great. Drink deep for best result.
When I created the Free Will Society to aid Targeted Individuals, one of the lofty goals was to eventually build some form of Safe Haven community for Tis. That dream now seems on the threshold of coming to pass thanks to partnering with Ascension Arts, a non profit specializing in sustainable life styles, service to others, and increasing human potential. The result is Free Will Haven. iWhere can a targeted individual get help? Free Will Haven; Targeting Free Intentional Community for TIs by H. Michael Sweeney proparanoid.wordpress.com proparanoidpress.com proparanoid.net copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. What is Free Will Haven?
Free Will Haven?
UPDATE: April 2016
Thanks to partnering with a person who is expert in tiny homes and intentional communities, we have finally secured property for Free Will Haven in Oregon, near the Idaho border. The site is remotely located well away from any nearby ‘civilization’ and yet within easy drive to markets. It is also extremely defensible against targeting, the primary goal of FWH. However, we now face the problem of actually getting onto the site and establishing utility services, erecting and putting into place the several domiciles and other structures and support goodies we have acquired over the last two years for the project. Springtime access is critical if we are to plant foods for harvest later in the year. PLEASE CONTRIBUTE to our gofundme program: djxbgr3w
UPDATE: December 2016
The site described in the prior update is currently occupied and available for residents to seek application, thanks in large part to the gofundme, which is STILL ACTIVE. We greatly appreciate all those who participated with donations, which helped fund the costly relocation of considerable physical resources and living space, and the first occupant, to the site. These resources were key to making it survivable, including for instance, water treatment, storage, and hot house facilities. The site now also has electrical power.
However, there seems to be a slight rift or division between the Free Will Society with the person who has ownership control of and who occupies and is responsible for the site. As such, it is no longer officially part of the Free Will Haven project via the Free Will Society, though we support it in our hearts and have done so financially, and may continue to do so. Do not misconstrue to think we have abandoned the site, but it is true the person who owns the property has a right to do it ‘their way,’ and we respect that. We see the current site effort as somewhat a Beta adventure, which may very well prove quite satisfactory in the long term, for all involved; it is after all, a first ever and, as such, a learning experience where any negative outcome represents an opportunity learn how to make it better. The skills and knowledge base of the owner should help insure good success.
Meanwhile, the Society is still looking for a site we may establish and manage to meet ALL goals set for it by Society, which we feel will better assure success long term, and ultimately, prove to be more viable. If seeking immediate residency, contact this author for advice on how to do so at the current site, which is in the scenic Hells Canyon Recreational Area of Oregon. Otherwise, please contact me about joining the Free Will Society to help plan for a second site down the road, hopefully in the near future, likely to be somewhere in Idaho. This would give you the option of choosing which site you would prefer, once able to relocate.
Only Free Will Society members will be eligible for the official Free Will Haven site, once available. And, of course, even if you elect the current site, you are still encouraged to join and participate in the Society. The only other update is that I, myself, am currently at another Oregon site which, except for zoning restrictions and cost, would make an excellent location. Living as a hermit, so to speak, and fending for myself in my motor home, I am learning much which should prove (and already has proven) useful to any community next established. The last bit of update: an application for non profit status has been made (it is my understanding such already exists at the first site), and once that is granted, the current gofundme will be terminated and replaced with a new one.
Free Will Haven is the name of the first (likely of several) intentional communities specifically for targeted individuals. As the name implies, these will be targeting free sites, a feat achieved both by Mother Nature and by reliance upon a combination of proven methods and technologies. These will even thwart directed energy and psychotronic signals from satellites or drones. Another feature useful to TIs will be affordability, achieved by the use of ‘tiny homes,’ which are increasing in popularity in many kinds of intentional and green communities around the Globe. Free Will Haven as a concept was first proposed early as 2002 by privacy/security and abuse of power author/consultant H. Michael Sweeney, and is now the active project of The Free Will Society to aid Targeted Individuals (TIs), which he founded for cause. The Free Will Society has about 750 plus members as of Sept, 2014.
Joining in the project by brining funding and expertise to the table is Ascension Arts, a non profit specializing in sustainable life styles, service to others, and increasing human potential. Together, along with recent developments in all the key factors and areas of topical concern which go into intentional communities, as well as enabling defense against targeting, a nexus of serendipitous opportunity is almost forcing it to come to pass. In fact, the forces in play extend to many levels, even to the point including personal matters for those involved. This would seem to be true even for early participants invited for their particular skills and talents; we dare not seek to escape a destiny which envelops us head long! This is their dialog on the project.Where can a targeted individual get help?
Update: Sept. 2, 2014: Something wonderful has happened which has accelerated our plans, saved considerable money (e.g., FREE rental through the winter of space for your RV/camper/trailer/motor home), and many more benefits, including immediate access to existing facilities. It is in ADDITION TO the update cited below. As result, the Free Will Society (Facebook CAUSE) is being closed down and the Free Will Society GROUP on Facebook has been activated, and is now the ONLY place where updates will in the future be posted, and where members of the group ($25 membership) will be able to have dialog with one another and founders of Free Will Haven. Therefore, this is the LAST UPDATE to this blog post. Join us at Free Will Society GROUP on Facebook by sending $25 to proparanoidgroup at gmail com and specifying membership, citing your facebook account name (e.g., mine is H. Michael Sweeney), and make sure you request friendship with me under that name so that you can be invited to the Group. It will also result in your receiving a Helps Kit which includes information on and facilitates application to be a resident of Free Will Haven. I’ve done my part to open the door to a targeting free environment. The actual first step through that door is up to you. YOU are what you’ve been waiting for.
Update: Update Aug. 19, 2014: We have killed our plans for a site in the Great Southwest and have instead selected a site in Idaho, in what is called the Banana Belt, a temperate weather zone suitable to support year-round golfing. The site features a significant creek bed which will help solve both water needs as well as eventually to supply small scale hydro power. It also has access to a nearby landing strip which could be useful in emergency medical situations.
The original post, herein, cites that only a couple of TI’s plus the principles would be initial residents through this first winter, while constructing their homes. This was to be followed by Wave Two occupancy, which would be able to use our temporary quarters while their homes were being built. To be eligible for Wave Two, one had to be a member of the Free Will Society to aid targeted individuals.
A CHANGE: Where an early-bird TI applicant already has access to or can rent an RV or similar (see main text), they may be able to join in Wave One Residency with the founders, immediately, existing Free Will Society membership not required (though advised, keep reading). Send for your application kit, today by emailing proparanoid at comcast net. You should also join the Free Will Society to aid targeted individuals ($25 membership) to access the latest news and community dialogs on topic. That would also put you in Wave Two eligibility if unable to bring your own temporary living space. If you have no RV (etc.) and are not a member of Free Will Society, you must wait for Wave Three. Regardless of which Wave, without your own RV (etc.), you will be put into a first-come, first-serve que serviced as existing temporary quarters on site become available. KEEP CHECKING THIS PAGE (or use the Subscribe button to be notified of changes) for future updates. Something very exciting in additionally in the works. End Update.
What makes Free Will Haven an intentional community?
Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), and Fellowship for Intentional Community’s Facebook page.
In Free Will Haven’s case, these goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, etc.); survivability (in this case, against political control technology and methods), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Sustainability is one of Ascension Art’s strong points, and defensive survivability lays at the heart of Mr. Sweeney’s seven books and online consultancy he has made available to TIs for more than 15 years as The Professional Paranoid, the title of his first book.
Both of these major players in Free Will Haven have, by necessity in order to provide their services to others, additionally catered to spiritual wellbeing and pursuit of happiness, which is the primal force driving client participation in the first place. A TI is desperate to escape the emotional and physical suffering of targeting and regain some normal sense of existence, and anyone seeking a sustainable life style does it for the quality of life it enables. And what of the financial affordability aspect? Sustainability itself, and a few other tricks such as tiny homes, make that a natural outcome of the project. Additionally, and as part of the pursuit of happiness goal, Free Will Haven will be organized to foster and support cottage industry; ideally, every resident should have a means to earn money ‘at home’ or by participating in community-based endeavors.
What is a tiny home like in Free Will Haven?
A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization. The bulk of the TI community is commonly made up of single targeted individuals, or someone living with one other person, and seldom with children in residence, and thus, tiny homes would seem a Godsend, for them. For those with families, we would hope to eventually construct alternative intentional communities in the future, but of course, that will alter the equation for achievement of goals.Sidebar: the true nature of a typical TI, alone, should crucify the notion fostered by media, government, and the psychiatric community that ANYONE who thinks they are targeted is SURELY a paranoiac schizophrenic. For that to be true, they would need explain how the dynamics of such ‘false’ beliefs seem to impact only persons of low financial standing who live alone, and who tend to have been an activist or involved in some form of ties to/with government, military or intelligence community contractors, or the military or intelligence community, itself. How is it that such a combination of things ’causes mental illness?’ Not even Freud could answer that one, because IT DOES NOT. Political Control Technology is REAL.
The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.
You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven. The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.
Free Will Haven will be able to accommodate any needed assembly of a home or placement in the same way that the Amish community bands together to raise barns. That means it is both fast, and, because Free Will Haven will be located in the country where few building codes and regulations exist, little or no required use of professional labor or building inspectors. That does not mean we won’t apply basic sound ‘code,’ ourselves. Naturally, we would hope you would be part of the work ‘crew,’ but don’t worry if you cannot do so for some reason.
Is Free WIll Haven a sustainable community?
Here is an ‘official’ review of a sustainable living lifestyle, but it is not the only view, because residents define the lifestyle. Free Will Haven will produce its own power, have its own water source, deal with its own sewer and waste disposal, which means no costly utility bills. The goal will be for each home to be self sufficient, but also networked to increase supply vs. demand, favorably. There will be enough land for individual residents to have their own garden plots, but there will additionally be a community farming effort which residents may elect to participate in at various levels; no participation, participation as a paying consumer, or participation in both production and consumption. That effort will include livestock, which means it will be logical at some point to have horses which can also be used for horseback riding.
Somewhat related, is the notion of cottage industry; financial sustainability. There will be satellite based Internet access (and TV) allowing residents to make money online. The community itself will additionally evolve community industry to help fund the needs of community ‘commons.’ One such example will be the offering of seminars and other functions open to the greater public, many of which will be intended to address topics of concern to the greater TI community. We would intend to have our own Radio and/or TV shows for similar cause, for the matter. This will eventually mean construction of central community center and overnight living spaces which can be rented out to visitors.
How does Free Will Haven prevent targeting?
Free Will Haven will increase its ability to protect its residents from political control technology. As all neighbors will be certified TIs approved by residents, there can be no conspiratorial persons (perps) among the population who are not quickly identified and dealt with legally. The approval process will additionally be designed to weed out persons who may be truly schizophrenic or have other mental issues causing them to claim to be targeted when, in fact, they are not, as well as victims of the kind of mind control which produces ‘programmable’ people who are capable of sabotage (to include self sabotage) without being aware. Such persons are susceptible to trigger phrases which enable them to carry out actions without memory of it… in the style of The Manchurian Candidate.Sidebar: it is important to realize that exotic application of programmables such as portrayed in movies like The Manchurian Candidate, The Long Kiss Goodnight, and the Jason Bourne series are based on known facts as to the capabilities of specific exotic forms of mind control. However, very few persons entering such programs, typically while a child, ever ‘graduate’ with skill levels and usefulness as assassins, couriers, or other operative status. Such ‘rejects’ or ‘escapees’ as I prefer to call them, of which some estimates number in the hundreds of thousands, tend to be released as ‘sleepers’ into the greater population. They are then targeted to be made to look schizophrenic, and as result, many of them join in with the TI community from where they can effectively, though unknowingly, become Wolves in Sheep’s clothing. The key point is this; while they retain a useful level of programmability for lesser needs than a Jason Bourne, it is important that should they come to realize their true status in life, that anything they attempt to reveal will be discounted because they are ‘crazy.’ Sadly, such persons cannot be allowed into FWH because of the potential harm they could do, unwittingly. Sad, because they need help and safety, too.
In Free Will Haven, we are talking about a gated community with a video security system which can be monitored by all residents; many eyes being better than just those of one or two people. More importantly, each home design will feature incorporation of useful DEW shielding (e.g., Faraday Cage) against remotely aimed signals, even to include Satellite or Drone assaults. Additionally, no technology will be brought into the community unless it can be certified as attack-tech free. Finally, there will be made available a State-of-the-art TSCM (Technical Security CounterMeasures) suite of equipment from Europe, well able to detect, identify and measure, and document any DEW signal and its source.
Where is Free Will Haven?
Location and Logistics?
Currently, there are multiple sites in three states in the Pacific Northwest and Great Southwest being evaluated for suitability. Naturally this entails a wide variety of factors which will impact on the final choice, which will be reflected by an update, here. All are in relatively remote forested mountainous areas with nearby rivers (some with creeks or small rivers on site). Once a preliminary site is selected and financial obligations are established, there is a plan to ‘seed’ the site with approximately four ‘wave one’ principle residents who will arrive in RVs, Campers, etc., and live on site in those temporary living spaces while constructing their own tiny homes in teamwork fashion. This will be a chance to work out kinks in organizational planning and logistics.
Once finished and they have moved in, additional residents can either bring in their own temporary living spaces or rent those no longer in use by the principles. In time, the number of temporary spaces available at any given point will grow, allowing more people to be building new homes at a time, and more quickly growing the community. Rental would also be available for and allow prospective approved residents to visit and explore the full potential of becoming a resident before ever making any actual obligation to do so. This affords a means of seeing what the greater area has to offer, selection of a site, a home design, and making all appropriate arrangements in advance so that there are no nasty surprises or disappointments.
What does it cost to live at Free Will Haven?
Costs and Obligations?
There is a $25 application fee and an evaluation process involving two weeks of online dialogs with H. Michael Sweeney. This is based on the same methods and goals as his Helps Kit program for like consultation with targeted individuals for the purpose of helping them defeat or better resist targeting. To actually become a resident will require an additional investment addressing the cost of a home, either prebuilt or for materials thereof. Once placed and moving in, the new resident will be looking at various options which might impact monthly living expenses.
There will be multiple sizes of properties available, which will determine the monthly cost for land, be it rented or purchased under contract. Ideally, a tiny home with a modest property suitable for a garden and/or a yard area would be in the range of $250 a month, which is less than it typically costs to rent just the property beneath a manufactured home in a trailer court. Naturally, if one elects to have even more land, such as a buffer for privacy, or to protect a viewpoint, the cost will be commensurate.
A resident will have the opportunity to contribute labor to the construction or placement of new homes, which can credit towards the ‘bill’ for the construction of their own homes by such means, if they had so enjoyed. Or, it can be credited towards the ‘cost’ of being a ‘consumer’ of the community farming (co-op) project. In like manner, a resident will have the opportunity to contribute labor to the farming project, as well. By such a means, it is possible to have one’s home built at no expense beyond that of materials, and possible to have almost all foodstuffs at no expense, as well — at least some of the time.
On the other hand, one can choose to pay for such things with money, and be free to acquire them from the community as just described, or from outside resources. That would mean builders and contractors, or traveling to town to buy food and supplies, something likely to be done anyway at some level in order to obtain brand name items and other things not possible to create within the community. While it is not possible to ‘estimate’ the cost of labor to build a given home without knowing all the specific details and design, we do estimate that $250 a month would cover the cost of co-op food.
In summary, it is quite possible that, electing the right home design and options, a TI could easily find their final move-in costs were less than a down payment on a conventional home, and total living expenses should be in the range of $500 a month, if not half that. Even if on a limited SS income, and with no cottage industry, that should mean being able to save hundreds of dollars every month for things other than necessities; it would be a very comfortable financial situation, one many retired people today would find most enviable. But best of all, they can do it with their Free Will in tact, and unfettered by targeting. They can spend their money (or not), as they see fit, and actually enjoy it instead of seeing it all go toward defending or dealing with targeting related costs.
How do I become a resident at Free Will Haven?
What steps next?
If you are a Targeted Individual and would like to consider residency options at Free Will Haven, your first step is to request the application materials from me: proparanoidgroup at gmail com. These will answer many questions and, more importantly, may actually provide unexpected aids to the TI outside of any eventual application. The materials are inclusive within the Professional Paranoid’s Helps Kit, which contains many tools for the TI and provides a basis for consultations. In fact, application will result in a two week online consultation dialog aimed not only at determining residency eligibility, but also, regardless of if being found eligible, or not, it may actually improve the applicant’s ability to endure or defeat targeting in the first place.
To actually apply involves a $25 fee which covers the two weeks dialogs and consultations, a $100 value. It is advised that one should also join the Free Will Society (also $25), which not only provides access to updates and dialogs on the project, but membership can also favorably impact priority consideration for actual residency. So unless a member, an application will most likely end up placing them in a Wave 3 que, where membership allows Wave two access. Use PayPal to the above email addy to so effect.
The actual approval process involves a panel review which can also impact que position. Each member of the review panel can also request to escalate or promote a given applicant one position in the que if that applicant has a particularly needy circumstance (a humanitarian consideration) and/or one position if having a very useful skill or other resource to the project they can contribute. The Panel, by the way, does not have access to personal identifying information in that review, which is judged only on the basis of the targeting scenario and findings revealed through use of the Helps Kit.
Therefore, the process looks like this:
Who can be a resident at Free Will Haven?
1. Request the Helps Kit by email from proparanoid at comcast net. This arrives by email as a .pdf and also a .docx Word file.
2. Use the Helps Kit to decide if you wish to apply. If so, complete the kit and invest $25. The kit fully describes attendant steps.
3. Undergo the two weeks dialog. Expect an answer within 30 days as to acceptance, or not, and initial que assignment.
4. Once applicants are officially being accepted, you would be invited, via the que, to visit the Free Will Haven site to evaluate all options toward your satisfaction.
5. Based on such a visit, or any other means, you commit to become a resident and all arrangement details are set into motion. Or, not. No obligation.
6. Arrive and stay in temporary quarters you rent or bring with you (e.g., RV) while your home is constructed or placed.
7. Move into your new home and become a resident of Free Will Haven, and participate as you are able and desire according to your own Free Will.
What is the Free Will Society?
Joining the Free Will Society:
If you are not yet a member of the Free Will Society, and wish to join, Membership is $25 a year. To join, you can send payment via PayPal to proparanoid at comcast net specifying membership in the accompanying text message PayPal enables, or send any form of payment other than cash payable to HMS at PO 1941, Clackamas, OR 97015, earmarked for FWS membership. A confirmation and welcome email will confirm receipt, and provide links to the organizations resources, which are available to members only. Once more, to be clear, membership will advance one’s application for residency by one whole wave, or que, if accepted.
How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.
What is a Web Troll?
by H. Michael Sweeney
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How does being a web troll work?
UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.
Are you being targeted by online government trolls
How Social Network Trolls Target, Track, and Psychologically Profile You
Reading this post you will learn…• That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU; • That there are troll profiling and tracking tools or methods which can be recognized; • That there are ways to protect yourself without drawing more unwanted attention; • That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting. Is social media infiltrated by government trolls?
Government and Commercial Trolls
Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.
These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.
The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.
Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.
And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.
How can you spot a social media troll?
Differentiating an innocent graphic from a potential spy tool…
There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.
So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.
Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic. YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:
So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?
When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.
Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”
Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.
Are social media trolls sociopaths or psychopaths?
More Direct Trolls; Psyops and Sociopaths
The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.
Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.
Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.
But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?
Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.
Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).
It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.
Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.
This is also true of the sociopathic/psychopathic ‘cause’ trolls.
Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.
Can trolls lead to real-world targeting?
Dangerous escalations; why we dare not ignore trolls
The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.
And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.
But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’
What should I do if I encounter a social media troll?
What to do with a Troll
I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.
But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.
My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.
Are social media trolls dangerous?
Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it. The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.
And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.
It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.
When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.
How do I protect my business in a disaster?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can gun shop owners do to protect against gun consfication?
The Threat to Business Property is significant in a disaster…
In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.
But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.
There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.
And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…
What will happen to gun shops in a FEMA declared emergency?
Partnering with Family Collectives
The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.
The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.
My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.
In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny. We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.
We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.
Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.
How can we prevent government confiscation of our business assets in a declared emergency?
Making it work for all concerned
I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property. Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.
Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.
I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.
Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.
From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.
Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military. I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.
Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.
In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.
How can I protect my business as well as my family in a disaster?
- FEMA Preparing Military Police For Gun Confiscations and Martial Law (eutimes.net)
- The Use of Food As a Weapon Against American Citizens (republicbroadcasting.org)
FEMA and the rest of government seems quite paranoid about disasters of late, but clues suggest there are hidden reasons behind urging preparations — not the earthquakes, floods, nor fires they talk about. Conspiracy theories based upon dialogs by geophysicists, astrophysicists, and politicos seem far more likely the cause, and that puts a whole different face on what ‘preparation’ should involve and mean for you.
Why is government pushing emergency preparedness?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Can we really trust FEMA?
Reading this post series in three parts you will learn…
- That there are significant reasons you absolutely should have an emergency preparedness program in place;
- These reasons go well beyond natural disasters FEMA implies of concern;
- There is a logical preparedness program that accommodates all concerns…
- A program which should be considered by privately-held businesses as well as families:
- It is NOT approved by FEMA, DHS, the Military, or other elements of the New World Order
What is the history of the emergency broadcast system?
I very clearly remember the ‘Red Scare’ spillover from McCarthyism which translated to ‘fear the bomb’ in the 1950’s and 60’s… starting with the Eisenhower White House: Air Raid sirens were tested weekly or daily, typically at a fixed time of day as if a Church Bell announcing Noon. I was a teen during the Cuban Missile Crises under Kennedy, when talk of the day was the home Fallout Shelter, and at school, we had ‘duck and cover’ drills as often as fire drills. But the scare wore off by the 70’s, and sirens and shelters were no longer in vogue, though every downtown building tended to have a well marked public shelter. Yawn.
Fast Forward, Bush I White House: For no visible or announced reason at all, the Emergency Alert System (EAS) and CONELRAD Radio alert system which had in evolutionary form driven those sirens for two decades was turned back on in the 90’s, and updated for improved use with TV. But rarely was it tested, and then typically late at night between late-show snoozes. Just fire drills at school. No more sirens, unless there was perhaps a fire or other actual emergency. Very unobtrusive. No problem.
Fast Forward, Bush II White House: Suddenly, somewhat synchronous with the formation of Homeland Security, these alerts started increasing in frequency and were randomly interrupting all manner of broadcasts at any time of day. They now had the ability to actually take over newer televisions, even if turned off or in use with a VCR at the time. Somewhere along the way, it was expanded to include hazardous weather condition reports and the AMBER ALERT system for missing children. Schools still worried about fires. OK. Well, perhaps.
What kind of threats should an emergency preparedness plan address?
The current threat assessment
Fast Forward, Sorento White House: Suddenly, and synchronous with DHS seeking to buy 1.4 billion rounds of ammunition (that’s several Vietnam wars worth), all over and above military orders… not to mention a long list of equally disturbing purchase efforts involving coffins, ‘emergency housing’ which more closely resembled prison camps, food and water stores, vaccinations and anti-biotics… numbering in the millions more often than not — the tests started increasing in frequency and in duration. Annoying. Suspiciously omnipresent, excessively foreboding.
What bothers me most is a synchronous rush request for proposals on delivery of emergency preparedness items and relocation and readiness orders to military to FEMA Region III (Atlantic Seaboard States near D.C.), all with a date of October of this year. In fact, much of FEMA’s promotional material is geared to 2013, specifically. Most of the darker things cited in this post are happening right now in 2013 or otherwise generally depicted as an immediate potential threat.
Worse, both DHS and FEMA have started multiple high-profile media campaigns suggesting we all need emergency kits and emergency plans. This is also all simultaneous to a bit of mainstream news and much suppressed facts being revealed on the Web regarding an approaching Planet X, approaching comets, several near misses by planet-killing asteroids, and a flurry of unusual meteor activity to include nuclear blast-strength explosions in our atmosphere (the Russian meteor injured nearly 2,000 people and caused significant wide-spread structural damage over hundreds of miles). And there is more…
Also simultaneous are geo-political and financial threats the likes of which have never been seen in the history of the planet, each threatening dire unrest to the point of forcing Martial Law. While this goes on, the sun is spitting gigantic record bursting electromagnetic pulses at us and the pole is shifting, Fukushima is continuing to increase its threat, not to mention shifting weather patterns and an increase in seismic activities of Biblical proportions. Dare I mention strange phenomenon like objects orbiting the sun, mysterious loud and scary sounds heard over thousands of square miles, two suns and other oddities in the skies day and night? Endless wars somehow always tied to terrorism and oil keep being announced. No wonder large numbers of people are actually starting to think End Times might actually be around the corner.
The end of oil supply as we know it indeed approaches. Extremist terror groups pose theoretical threat of biological, chemical, or nuclear WMD. Criminal nations threaten to attack us with nuclear weapons. China is on the verge of surpassing the US as super power, and their top military leader has said war with the US is inevitable; their only answer to that being to strike first. Man-made bio weapons, nanotech, and even genomic weapons are being developed daily by all modern military powers, and we get cover stories expressed as worries of a natural pandemic outbreak of catastrophic proportions. The Center for Disease Control has even gone so far as to talk about preparation for a Zombie apocalypse, and there is some evidence it is not as tongue-in-cheek as they profess. Don’t forget chemtrails and the feared NWO depopulation plot.
The worst part is all the talk about a possible military takeover, martial law, a new Constitution and a North American Union. Why, that’s nothing short of saying the Antichrist is coming to power… and some say that’s the case, too. Agenda 21, GMO crops, Codex Alimentarius, the Small Arms Treaty (goodby 2nd Amendment), etc. All these things tie in one to another as if all by some organized conspiracy (Illuminati?) After all, they say, the Norway Spirals were likely a test of Project Bluebeam, to simulate with a kind of holographic event the Second Coming in the Antichrist’s name. And what about those tens of thousands of ‘State of Martial Law’ warning/instruction signs coming into the US from foreign sign makers in convoy manner? Really, really not good.
Almost everyone has some kind of foreboding sense that SOMETHING bad this way comes. Armageddon Online has a more detailed summary view. And just as someone chooses to discounts all of these things as ‘baseless,’ something like this comes along to make us wonder all over again: a lot of people are saying there is a purge of the military taking place, and that usually portends a violent overthrow of government.
So, quite naturally, some of us are taking the DHS/FEMA advice to heart, or at least considering it. But I fear most of us are preparing for the wrong thing in the wrong way. Its one thing to have food, water, medical, and key supplies stashed away for an earthquake or flood… and another to truly be prepared for upheavals of the political or Biblical sort… the sort government advice is NOT addressing, because if you were prepared for that, government looses the ability to maintain political control through dependency upon government for survival.
Never fear; the Professional Paranoid is here to help you find your way through it all… in part II: A Logical Home Emergency Response Plan: The Government Does NOT Approve
Why should I hide my emergency preparedness kit and weapons?
- FEMA Preparing Military Police For Gun Confiscations and Martial Law (eutimes.net)
- What’s This FEMA Video Trying to Tell Us? (politicaloutcast.com)
- Dave Hodges ~ The Use Of Food As A Weapon Against American Citizens (shiftfrequency.com)
- FEMA REGION III – OCTOBER 1st – OFFICIAL FEMA DISPATCH! (prayingforoneday.wordpress.com)
- Is the FEMA Region III Alert a Red Herring? (activistpost.com)
- “Martial Law is Now in Effect” Signs: Why Would These Signs Be Printed? (solidarityintruth.wordpress.com)
What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.
Free will: a Tis greatest asset, oft hardest to employby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can you do if you are a targeted individual?
What you will learn reading this in-depth post…
- That belief structures define us, establish our psychology, and our responses to stimuli;
- There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
- Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
- The pitfalls of targeting psychology as it relates to Free Will, and;
- How to use Free Will to thwart targeting and run psyops on the perps.
Where do you get help if you are a targeted individual?
Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…
Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.
Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.
We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.
When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.
Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.
Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon. For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.
This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted. Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows. But that does not mean the information has no power over perps, if realized and properly used.
Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.
The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.
Why won’t people believe it when someone says they are being targeted?
It gets tricky
Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.
Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.
Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.
Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.
Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.
This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’
Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.
Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.
At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.
Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.
Who is responsible for political control technology?
Consequences of false beliefs:
To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.
This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.
But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.
This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).
The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.
I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.
Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.
Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).
And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.
Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.
Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.
The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.
Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.
This is why I no longer participate in group dialogs, polls, petitions, etc.
And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.
How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.
I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.
But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.
What is political control technology?
But then there is FREE WILL
Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.
A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.
Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.
To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.
They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.
- Gang Stalking – We targets are alone. (neverending1.wordpress.com)
We go through life thinking we know who we are and why we do what we do, but like Actors who start believing they are the sum of their Press Clippings and the heroic characters they play, we are frauds. It took a simple but powerful video to teach me the truth, something I once knew, but lost sight of.
I once was lost, but now am found.by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What you will learn reading this post…
- I’m a fool, and have been offering knowledge as if expert and wise, when in fact, I fall short;
- While my advice and opinions are based on truth and logic, I should have offered a better, more useful message;
- That message does not betray my beliefs and life experiences, but instead, explains them, and gives them meaning;
- That it should be the same for you as it was for me, if you will but open your heart and consider it;
Whre can I get help when no one believes my story?
A note of apology: a technical glitch with wordpress refuses to let me format the document correctly, making it a little difficult to separate paragraphs. No matter what I do, it displays as intended in preview mode, but not in actual URL access. I regret any inconvenience.
I’m talking about me, H. Michael Sweeney, aka the Professional Paranoid, activist author, and consultant on privacy/security, and abuse of power topics. People come to me for help all the time, and I’ve started to believe in the value of my advice as much as they hope it to be of value in their desperation. Well, my advice may be good some of the time (more often than not, I have always thought, based on feedback), but even so, I’ve not quite been offering the best advice, in the best possible way.
This self examination also translates to my abuse of power issues of which I so frequently write, as everything I tend to blog about is so much in parallel to the basic aspects of things now clearly revealed to me because of simple but powerful video, that I’m hoping those who read my blog posts as activists, will see that parallel as well. It’s not just about me, its about everything in the World and how we deal with it. Let me explain by first going back in time. Some of you who have read my material before may know some of this, but as Paul Harvey used to say, its time “For the rest of the story…”
Open Letter of Complaint to the United Nations, by Xin Zhong Qing
Received by H. Michael Sweeney direct via email March 18, 2013
PLEASE REPOST. NO COPYRIGHT NOTICE.
Notes indicated red by H. Michael Sweeney. As you read, unless you are already familiar with political control technology, you will be moved to dismiss the complaint as the rantings of a mentally disturbed individual. While it is certainly possible that is the case, it is also not only possible, but highly probable that the descriptions are true accounts as the victim is best able to relate in conversational English. Please consider such translation issues as well as the following facts before you make any such decision:1) As testimony to the State of Massachusetts Legislature on a Bill to limit use of electronic weapons reveals, there is NO symptom of schizophrenia (imaginary persecution or other unreal events, realities) which cannot be induced electronically; 2) Therefore, most victims of political control technology seldom have a correct understanding of the exact nature and cause of their targeting, and indeed, specific effort is typically undertaken to insure their beliefs are incorrect (you cannot fight a problem if you fight the wrong cause); 3) As one who has worked with hundreds of such victims around the World, I see select clues within the dialog which align with many similar charges from others within Red China, as well as other countries, including America. I am specifically comparing to cases where, after working with the individuals for a considerable time, tests and defensive strategies verified that targeting was real — though generally different than the victim’s original perceptions and understanding. 4) You will note that many of his prior letters were enjoined by other signers, up to 77 persons. 5) Yesterday, I got four hits to my wordpress pages from Red China (rare). One of the pages hit regarded how easy it is to start a revolution, which featured the 1989 failed Tiananmen Sqaure incident. Another features how to outreach as a targeted individual, my also my main page on political control technology, and another was my contact page. I now believe these were Xin’s visitations. Xin Zhong Qing is a fairly common name in China. There is even a Container Vessel operated by the Red Chinese Army of that name.
United Nations Commission on Human Rights:
My name is xin zhong Qing, Is the Chinese Jiangsu province Nanjing city an ordinary law-abiding civilians. Here, I on you accuse China Security Department “secret agencies ” in a group of spies criminals, they abuse “monitoring” privilege, make high-tech “brain control” technique, remote control my body and spirit, the implementation of more than 40 years, The days and nights of continuous uninterrupted secret torture persecution.
In the Chinese Cultural Revolution ” of 1971 , in the 20th century , I was framed for “5.16 counter- revolutionaries “, were subjected to cruel political persecution. This group of ” secretagencies ” in the secret criminals, in order to force me to, admit that they are “5.16 counter-revolutionaries”. At the same time, in order to stop me openly accused Justice voice, they use high-tech ” brain control ” technology means frenzied , day and night, 24 -hour continuous remote control of my body , the implementation of an extremely cruel persecution and assassination plot secretly tormented.
They are a group of secret agents Alcatraz. To me implemented secretly tormented persecution means extremely brutal, shameless, comparable to the German Hitler fascist concentration camp Gestapo and Japan 731 units of bacteria devil evil, their Monstrous evil, just pale into insignificance by comparison!
They control my body, every minute non-stop manufacturing my body, appear all sorts of pain; itching; extreme cold; heat; numb; vertigo; tremble; Extremely uncomfortable; incontinent, frequent cough vomit nasal bleeding paste the nose, as well as the infamous “sexual torture” and other pain. For over 40 years time, wherever I go where, this secret pain never stopped, and I can’t sleep, normal study, work and life, day and night in very suffering pain, like a living dead!
Their Monstrous evil, not only a violation of China’s constitution and laws to “respect and ensure human rights” provisions, also completely violated the Charter of the United Nations and the “Declaration of human rights” and other relevant safeguard basic human life, survival rights provisions.
Therefore, I had to the Communist Party of China and Chinese government post a lot of complaint letters:
• In the December 3, 2007 issued a “President Hu Jintao to collective letter”(the 77 victim joint)；
• In May 5, 2008 issued a “Chinese” secret organization “open letter”.(the 43 victim joint)；
• In September 7, 2008 issued a “ An Announcement to the Whole World by Chinese Victims”.(the 65 victim joint)；
• In March 6, 2009 issued a “Accountability Mr. Geng Huichang, one of the leaders of the national security sector”. (the 76 victim joint)；
• In March 15, 2010 issued a “China’s civilian population, in fact, no protection of human rights! ”
• In August 16, 2010 issued a ” Ten Questions “Politics and Law Committee of the CPC Central Committee , Zhou Yongkang, secretary ;
• In January 1, 2011 issued a “To the CPC Politburo Standing Committee member of the open letter to all”；
• In April 5, 2011 issue “urged China’s security sector, Geng huichang and others pleaded guilty to the letter!”；
• In July 15, 2011 issued a “Geng Huichang, is China’s brain control criminal gang black Protectionumbrella!”；
• In February 24, 2012 issue”Notice to all Chinese compatriots Book”；
• In August 4, 2012 issued a ” Accountability Zhou Yongkang, Politics and Law Committee of the CPC Central Committee! ‘”And so on
However , I have sent the Many letter of complaint, not only did not get any reply. On the contrary, the arrogance of this gang of secret agent criminals more arrogant , more intensified secret remote control of my physical and mental torture persecution . I am still in the” shouting days days should not ; shouting ground ground should not” suffered torment pain life..
Now, I tell you — the UN Human Rights Commission issued this complaint letter, urging you under the Charter of the United Nations and the “Declaration of human rights” and other relevant human rights documents, To as a member of the United Nations of China National Security Department “secret organization” this group of Spy against human criminals are a Monstrous evil, Must be a serious investigation , and the findings made public . At the same time , Will referred the case to the United Nations Criminal Court, Will this group of secret Spy criminal prosecution, for crimes against humanity!
The following annex, is my day and night, in more than 40 years of uninterrupted suffered this group of secret Spy criminal on my body remote suffering persecution, daily live record fact evidence excerpts (January 1, 2012 — November 30, 2012) :
Yours lofty salute!
China’s Jiangsu Province , Nanjing “mindcontrol”victims :
February 28, 2013
Sender: Nanjing victims ZhongQing Xin(screen name Red Master)
Address: Nanjing Xiaguan District # 94-14 Tung Cheng, a village
623962269 @ qq. Com
Note by H. Michael Sweeney: the first link appears to be being blocked in Red China. Attempts to reply by email also fail.
在上个世纪1971年的中国“文化大革命”中，我被莫须有地诬陷为“5。16分子”，遭到了残酷的政治迫害。这伙“秘密机构”中的特工罪犯，为了迫使我就范，承认自己是“5。16分子”。同时，为了捂住我进行公开揭露控诉抗争的正义声音，丧心病狂地使用高科技“ 脑控” 技术手段，昼夜24小时不停地遥控我身体，对我实施令人发指的秘密折磨迫害和阴谋暗害。
Lessons we have ignored from fallen Empires, both in real history, and in popular literatureby H. Michael Sweeney Permission to duplicate granted provided reproduced in full with all links in tact with credit to the author and proparanoid.wordpress.com
government out of control, a fascist Police State
As it happens, there is a Facebook Group named I AM Brandon Raub. I have joined this group and the commentary there has prompted this article. Please consider this an invite to join, as well. In specific, this post is in response to the analogy made in the Group that we should all say “I AM Brandon Raub!” in the manner of “I am Spartacus!” So lets examine that, and other reasonings:
government out of control, a fascist Police State
Who is Brandon Raub?
Brandon, a highly decorated U.S. Marine, is the first to make national news of about 20 ex military persons targeted by the Federal government in their paranoia that We, The People, might choose to replace our government with one that obeys its own laws. That is to say, restore it to a fully Constitutional behavior. Currently, the Federal Government is outlaw not only to the Constitution and Bill of Rights, but in violation of the Magna Carta and many International conventions on behaviors relating to human rights, both in war and in peace. Don’t take my word for it as blogger, even mainstream knows it true.
On Aug. 16th, 2012, a small army of Gestapo Police, Secret Service, and FBI Agents knocked on Brandon’s door and took him into custody. Central to his arrest was Brandon’s Facebook posts, which I assure you, are far less critical of government than my own, and far less suggestive of dire future alternatives. I talk openly of the threat of revolution, Martial Law, and a Police State, where Brandon was more reserved, and says nothing but that which is patriotic and based in truth.
The difference is, Brandon is a recent retired Marine with significant combat skills, and I am not. Not just Brandon and the 20 others, but tens or even hundreds of thousands of recent veterans of Iraq, Afghanistan, and other deployments. You see, our paranoid government officially thinks ex military are going to become a fountainhead of domestic terrorist activities.
Actually, I think they are probably right to fear patriots, and have been trying to warn all concerned: where the actions of government are illegal and in violation of the Constitution, those with the training and skill to defend the Constitution and sworn to so defend it, ARE LIKELY to do so, if pressed to a point of last resort. The government has only two paths: forge ahead on their course toward a Fascist Police State and press the issue to an explosive tumult, or recant and find salvation in the Law of the Land, and restore Liberty to the ‘Land of the Free,’ a land falling well short of living up to the title.
In summary, and as proof of the problem, the following facts of the matter shall serve:
government out of control, a fascist Police State
a) Brandon was NOT arrested for what he said. He was arrested for ‘resisting arrest,’ but video of the event shows no such resistance. You cannot arrest someone for resisting arrest unless you first arrests them for some other charge. He was not given Miranda rights. He was arrested by local Police, and not Federal agencies. There was no other charge filed;
b) A County Judge dismissed the case stating the Petition for his Detention contained NO FACTS – NO REASON FOR HIM TO BE HELD. The Judge stated this was a violation of his civil liberties;
c) Federal agents still insist his posts are ‘terrorist in nature.’ Read his post, here, and you will see that all patriots are terrorists under government’s defective logic;
Note: Here is a remarkable video interview with Brandon by attorney and author, John Whitehead of the Rutherford Institute, so you can hear Brandon’s words, directly. Within it is the key section of the video of his arrest.
d) Regardless, Brandon was ordered placed in a Federal psychiatric ward for 30 days (but has been released short of that). Concerns were that he would be rendered a mental vegetable by chemical and shock therapies intended to neutralize him permanently, or at the very least become officially labeled as ‘mental’. The government believes that if you dare criticize government, you are mentally ill. That’s the same argument made (last paragraph in this link) in Iron Curtain countries to eliminate ‘intellectuals’ who opposed Soviet iron-fist rule. What does that tell you?
e) Family lawyers have been joined by legal council from The Rutherford Institute in seeking his release, pointing out that the legal document used in his rendition is problematic; that Civil Commitment Statutes are being used to silence individuals engaged in lawful expression of Free Speech. But the current outlaw government clearly has no concerns about Constitutional Rights.
government out of control, a fascist Police State
Say “I AM Brandon Raub!” in the manner of “I am Spartacus!”
Spartacus, a Roman Gladiator slave, led a revolt of Gladiators and formed an army of other slaves set free by force in the very heartland of the Roman Empire. In the end, as depicted in the popular film, Spartacus, the revolt was suppressed, and the survivors questioned to find Spartacus to be singled out for special punishment.
Spartacus stood up in arrogant defiance, but for naught. One by one, man after man with him stood in his stead and proclaimed as well, “I am Spartacus!” Their love and loyalty for their leader and their cause (Freedom) drove them, and so thwarted the Roman attempt. Well, “I am Brandon Raub in the manner of ‘I am Spartacus’.” I am as guilty as he of ‘terrorism’ for demanding a just government under the Law. I am as guilty as Spartacus for wanting freedom. What say you?
government out of control, a fascist Police State
Say “I AM Brandon Raub!” it in the manner of “I am John Gault!”
Ayn Rand‘s classic Novel (now a two-part film), Atlas Shrugged, shows the classic struggle between the forces of Socialism and Capitalism in their most simplistic and idealistic forms. Ayn had escaped living under USSR’s Socialist government to the U.S., where she found Socialism creeping into government, and wanted to warn us that ‘value given for value received,’ and ‘a man’s sweat and intellect are his own property’ should be preferred to ‘you didn’t build that’ and ‘those that have should give to the have nots.’
In her massive book, a work which profoundly influenced and changed the lives of many readers (including myself), a fictional plot element was the question found scribbled on walls and posted everywhere at large, “Who is John Gault?” There was no one by that name, in truth, but there was a man who lived the role, and the answer to the question was, he was the man “Who will stop the engine of the World;” to end the madness and restore sanity. In the end, those who understood and sought to right the wrongs joined with him in attempting to do so, each of them earning the right to say, “I am John Gault.” Well, “I am Brandon Raub in the manner of ‘I am John Gault’.” I want to stop the engine of errant government. What say you?
government out of control, a fascist Police State
Say “I am Brandon Raub!” in the manner of “I am a Jew!”
History is rife with examples of martyrdom for faith in the face of oppressive governments. Choose any faith you wish. I choose to focus on the Jews of pre WWII Germany, to make the point most evident in The Diary of Anne Frank. That point is best summed up in the oft quoted wisdom from Martin Niemöller, author of Gestapo Defied and, more subsequently made popular by Milton Mayer in his analysis of what went wrong in Germany, They Thought They Were Free. That book, by the way, with substitution of America for Germany, and various political figures and nomenclatures here in America for those of the Third Reich, could just as easily apply to our country, today. Are you so blind as to think otherwise? Read it if you doubt me, and know that I am not alone in the thought. But this is the quote which makes clear my point:
government out of control, a fascist Police State
First they came for the communists, and I did not speak out—
freedom of speech because I was not a communist;
Then they came for the socialists, and I did not speak out—
freedom of speech because I was not a socialist;
Then they came for the trade unionists, and I did not speak out—
freedom of speech because I was not a trade unionist;
Then they came for the Jews, and I did not speak out—
freedom of speech because I was not a Jew;
Then they came for me—
freedom of speech and there was no one left to speak out for me.
Had people spoke out… in unison… Hitler’s power would have been rendered futile, and his evil would have been exposed for all to see. But we all feel we are but an Ant against a man. But no Man could survive or attempt to war with ants if every ant swarmed as one body to defend their home and their right to exist. Well, I say “I AM Brandon Raub in the manner of ‘I am a Jew’!” I stand with my fellow men of good cause to defend their right to be and do as they deem best for them, as I would deem for myself. As if one of their own I lend my voice in unified SHOUT! What say you?
government out of control, a fascist Police State
I am Brandon Raub in the manner of “I am a TI Survivor.”
A TI is a Targeted Individual, which is to say, someone targeted by Political Control Technology (mind control). That can mean any combination of centuries-old methods such as gas lighting, dogging, and street theater (generally described as organized stalking), to modern methods such as Mob Flashing, Web stalking, and high-tech surveillance. Add to the mix bioimplants and electronic weapons which can simulate every known symptom of Schizophrenia, and you have the ultimate tool for rendering a victim a social, political, and financial zero guaranteed to be ignored by (everyone). This is particularly useful when the person is a whistle blower or otherwise knows something which could expose government corruption or evil deeds.
A TI survivor is someone who not only refuses to succumb to these tactics, tools developed and perfected, and employed by the intelligence community and military, and their corporate and other partners, but someone who stands firm and chooses to fight back as best as they can. I have the honor of saying I have stood with and helped TI survivors to survive for several decades, now. I know of no one more courageous.
Now Brandon Raub is also a TI Survivor, and will likely be subject to more exotic forms of such targeting as time goes on. Well, I say I am Brandon Raub in the manner of “I am a TI Survivor!” I refuse to let government get away with mental torture and to use ‘mental illness’ as a political weapon by ‘creating it’ where it does not naturally exist. What say you?
government out of control, a fascist Police State
Who are you, really?
Who do you want to be? A victim of tyranny left standing alone, or a defender of self and of truths profound standing with others of like mind?
Who have you been waiting for? John Gault? YOU are what you’ve been waiting for. You ARE John Gault!
Do you need a Sparticus to lead your resistance? Or does Sparticus need you? Brandon Raub is your Sparticus, and he needs you! You ARE Spartacus!
Do you need to see a whole class of people targeted before you say anything? Then you are too asleep to the facts; they have already come for religious Davidians in Waco, the trade unions are decimated, the far left and the far right, and even the liberals, the Tea Party, and Ron Paul supporters… and now the ex military. All have been conveniently equated as terrorists for the purpose, and subjected to political targeting and harassment by Federal agents. You ARE of Faith!
Do you need to wait until your very mind is under attack? Again, too late. You are under constant attack through disinformation, dumbing down, and wag-the-dog media manipulation (propaganda is mind control). Worse, Command Solo flies your skies, and other technologies which parallel its capabilities bombard our cities with who-knows-what control signals. When you choose to accept sound bites in lieu of researching for yourself, or, to flip the tables, when you choose to accept some blogger’s commentary (yes, including mine) or some other Web source as valid without checking credibility (e.g., useful verifying links), then you are already a victim of mind control. Recognize the truth: You ARE a TI survivor!
And therefore say I; if you are any of these things, then You ARE also Brandon Raub!
government out of control, a fascist Police State
What say you?
- I AM BRANDON RAUB (and so are you) (resourcemagonline.com)
- Why is Ex-Marine Brandon J. Raub Being Held in a Psych Ward and What Does It Say About Today’s America? (reason.com)
- John Whitehead Interviews Detained Marine Vet Brandon Raub (dprogram.net)
- HOT: Statement from Brandon Raub’s Attorneys (economicpolicyjournal.com)
And why they do, anyway, and almost always regret it
Definition: Hook up: reside under the same roof for more than a week.Copyright © 2012, all rights reserved. by H. Michael Sweeney, author of MC Realities: Understanding, Detecting,and Defeating Mind Control and Electronic Weapons of Political Control Technology. Permission to duplicate on-line hereby granted provide it is reproduced in full with all links in tact, and links back to proparanoid.wordpress.com
mind control psychotropic weapons DEW voice to skull
The first thing to understand is who we are talking about; Targeted Individuals. The term is military in origin but is used by the intelligence community and law enforcement. That’s apt, because even though the kind of TIs I’m talking about are not a bona fide target of these groups for some justifiable cause (not terrorists, not criminals, not enemy spies), the technology and methods used in their targeting were developed by the military and intelligence communities, and corporate and collegiate partners.
More critically, the attacks they suffer as result by electronic weapons, gas lighting, street theater, dirty tricks, and psychological warfare, and so on, are more often than not at the hands of those self-same developers, as well as members of law enforcement. Not officially of course. There is no such thing as the boogeyman. Ask any Judge, Psychiatrist, Congressman, or Lawman. They seem content to overlook the fact that the whole of the Political Control Technology employed is applied primarily for the purpose of making the victim seem to be a Paranoidal Schizophrenic.
They certainly overlook the mountain of official government documents and other evidence that every symptom of Schizophrenia can be simulated by such technology.
Enough on that. Well, not really, but to get more, read my book, MC Realities, which is the only self-defense book on topic on the market I’m aware of. What we really want to talk about is the tendency of TIs to want to hook up with other TIs for what they hope will provide a means of mutual support and protection. By ‘hook up,’ of course, I mean close interpersonal relationships which include sharing of housing, with or without romantic intentions.
Well, yes and no to that notion. While there is some useful psychological support value in having someone of kindred spirit to share in burdens born of like difficulties, as a rule (there are exceptions), I have long advised against it in the strongest of terms.
mind control psychotropic weapons DEW voice to skull
Here’s why; what I see as the risks involved.
1) It decreases security rather than increasing it, as it can result in each TI gaining as new enemies those involved in the targeting of the other TI(s). But that is not the worst of it, because where that happens, it becomes such a tangle that if someone like myself comes along to try and resolve the issue, there are suddenly too many clues to sift through to determine anything truly useful in defense or offense — a matter which is tough enough to resolve with just one set of attackers.
2) It almost always turns out that one of the TIs is accused of being a perp (perpetrator) disguised as a TI in order to get closer in and do more damage. More likely all will end up accusing each other, even where no one is guilty. It is the nature of the natural paranoia generated by being targeted which fosters such fears, and any such fears, when unfounded, always grow until some bit of circumstance seems to tender hard evidence when it may simply be coincidence. But it is also true that many times, one or more of the parties actually are perps.
3) Any defensive strategies tend to become doubly complex and twice as difficult to mange to good end, which means each TI is neutered somewhat in the effort. There can also develop bickering over the best approach which further hampers such efforts.
mind control psychotropic weapons DEW voice to skull
There are reasons why my advice is ignored, and of course, only a small percentage of TI’s even get to hear my advice. For every TI we hear about, there are many, many more who are afraid to tell anyone out of fear of being termed mentally ill. Too — I’m not exactly a household name, so not all the ones who do come forward know I even exist. But here are the reasons my advice is ignored by those who do get to hear it:
a) They are so emotionally victimized that the temptation to find and leverage some small hope for kindred support and understanding overrides logic. In like manner, they are so depressed by the constant lack of privacy and security that the hope of increased security from a helpmate also overrides logic.
b) They foresee a possible savings of money through shared expenses, money being something all TIs tend to have too little of thanks to the targeting, which commonly involves financial dirty tricks such as repeat sabotage of vehicles, cancelling insurance policies, and worse, including getting them fired with rumor mongering.
c) They often feel they have ‘been around the block’ as a TI long enough to spot a perp and have some confidence they are insulated from risk. Wrong. Almost always.
mind control psychotropic weapons DEW voice to skull
A Simple but Tragic Case Example:
A TI client who had suspended my services for a time elected to hook up with another TI. The basis was that they were both ‘on the run’ in hopes of evading targeting, or so it seemed. My client was already mobile because of a need to travel in work duties (a respected person of useful credentials in their chosen field, as it happens). The other TI claimed to have been forced to vacate a Safe House provided by FFCHS (Freedom From Covert Harassment and Surveillance), claiming it unsafe there, and of poor sanitary condition. That was far from the true reason, but there was no means to check it out, and the client did not even attempt it, presuming in error anyone coming through FFCHS must be a legitimate victim.
So it was concluded of mutual benefit that they might travel together and share expenses, defenses, and information about their individual targeting. The first few days went well enough, but before a week had transpired, it ended in disaster. The short version is that it appears the refugee from FFCHS was not only a perp, but a sadistic psychopathic criminal of another sort: he produced a gun, made threats, and later raped his companion multiple times, and then ran off owing money. This took place immediately after I was invited to meet with them, it perhaps being my presence which spooked the perp into flight. Perhaps not.
But he had also gotten access to her email and sent out email in her name, presumably to sabotage relationships, and there was an incident which seems to have been aimed at thwarting me from providing helps, perhaps intended to scare me away (a third-party companion player showed up at our agreed upon meeting place, and their car was later in the day found in my personal parking spot where I live). It did not frighten me (read my books and you will see I’m quite foolish about things which should perhaps frighten me).
But it did not help my being involved, either, as the refugee also tried to convince my client that she should no longer have anything to do with me. After it was made clear our relationship would continue, it was that same night that it all went sour — as described above.
mind control psychotropic weapons DEW voice to skull
Summary lessons learned (hopefully)
Regardless of good intentions and hope, the risks of hooking up for mutual advantage is generally a risky affair. I only know of one instance where it worked out long term, and there were unusual circumstances which included additional third-party, non victim helps. These acted like a checks and balances to help get them over the rough spots. And to repeat, I’m talking about the natural growth of suspicion of each other which transpires even when one of them is not a perp.
By all means, collaborate and share information on-line. Even meet in groups, large or small, to share information and give emotional support. But please try to avoid commitments to share living space and all that goes along with being targeted. It is a trap no matter how it plays out, one which leaves both sides feeling betrayed, hurt, and more frustrated than before, or one side victimized yet again to the same end.
mind control psychotropic weapons DEW voice to skull
I would also like readers to know about the Free Will Society to Aid Targeted Individuals, organized on Facebook as a Group. Please give it a visit. If it helps, also please know that I offer a free Helps Kit, sample newsletter on Political Control Technology, and free 30 days on-line consulting to Tis. Contact me.
A parody of real-life mechanisms in conspiracy cleanup (coverup contingencies)by H. Michael Sweeney permission to duplicate granted provided reproduced in full and all links remain in tact, with credit given to the author and proparanoid.wordpress.com as source.
James holmes is a patsy in a false flag operation
Update Aug. 29, 2012: As result of the popularity of my multi-part post on the Aurora shooting which is the most exhaustive review of facts to date, and because of the revelations the investigation involved in the effort have afforded, this post is woefully inadequate and no longer reflects the true concerns. Therefore, this update is actually a major rewrite to make it more in harmony with the true facts, rather than the early conjecture available on the Web at the time of its first writing. Additions or changes heralded in red. Any original material remains in tact, but in
strike-through text, as I do not wish anyone to feel the material may have been censored for any other cause. Article begins:
Whenever the official story starts to have cracks in it, the cleaners go to work in Wag-the-Dog fashion, and power is applied to the weakest pressure points to make things ‘better for all concerned.’ As one CIA operative (one of the clean-cut train hobos at Dallas in ’63 set to cause a ruckus if the Grassy Knoll escape plan looked like it might be compromised) told me, “History is what we say it is, and it will not be changed by you or anyone else.”
Er… OK. But don’t fault me for trying the truth now and then, and forgive me with any liberties I take in the absence of good solid news reports full of details and hard facts… a matter which always makes me wonder what we are really dealing with…James holmes a mind-controlled patsy? Come the terror at night, or by day, the citizens Plight is, or it may, be which one is right, by what they say, who is guilty of the fright, and how shall we repay? I wrote that with Aurora in mind, but it applies to a long American history of dark bumps in the dark, does it not? James holmes is a patsy in a false flag operation
Added section: Ring: The receiver is lifted, but no greeting is offered, the Executive seated at the expansive desk in a plush office recognizing the calling number.
Voice on line: “The script will be ready on July 20. Adjust your plans accordingly.” The line went dead and the Executive hung up, and then dialed a number of his own.
Executive: “I’m green lighting Drum Roll. Production can begin at once, with a shooting date set for July 20. Make sure the cast and props are ready by then, and there are no problems in the storyboarding and rehearsals.” And then he hangs up.
Note: Double speak is the intelligence community perfected ‘art’ of speaking in the open about something by couching key matters in allegory or parable form. In the above example, we see how someone in the motion picture industry might talk about a film production… that was really something else… Drum Roll being the role played by the drum magazine in the shooting. Storyboarding means contingency planning, and rehearsals means that everyone knows the plan forwards and backwards. The script refers to the scheduled date of the theater shooting exercise which ‘just happened’ to be being held the same day of the shooting some ten minutes away off the same Freeway access as enjoyed by the Century theater. Interesting because high-risk intel ops such as would be true of a false flag operation, tend to employ a similar ‘drill’ for a like event on the same day and in the same city. This provides a cover operation so that if an operative is compromised, they will not be arrested and the plot can be aborted without exposure of the truth. End of added section.
James holmes is a patsy in a false flag operation
Ring: “Hello? News reporter here.”
Recognized voice: “The word’s going out to all our newsies… be sure to point out he had over $20,000 in high-tech equipment,
and have another story by someone else suggest there is reason to believe there were Islamic ties, and be sure to play up the gun violence angle. And be sure not to mention he worked on that DARPA* project to develop super soldiers. That U.N. Treaty must be signed!”
News reporter: “But the shooting just happened. There’s been no time for an investigation, yet. What’s our source?”
Recognized voice: “Don’t worry about that. Just say ‘sources close to the investigation,’ and people won’t be smart enough to know any better… except for the ‘conspiracy buffs’ which you already know how to deal with.”
News reporter: “Right. By simply calling them that and ridiculing them for it. Got to hand it to Walter Cronkite for making that work so well in the JFK thing.”
*D.A.R.P.A. Defense Advanced Research Project Agency
Note: Walter was ex Army intel, and would have been a logical go-to person as part of CIA’s Operation Mockingbird which infiltrated news media with, by various estimates, over 1,000 operatives from CIA or on their payroll under the table. Since JFK, no conspiracy investigation has made good headway because media keeps trotting this excuse to ignore the valid questions of civilian investigators and investigative authors, or Engineers, Pilots, and other professionals who come forward with challenges to the official explanations. As one well known Comedian like to say, “I don’t get no respect, you know?”
James holmes is a patsy in a false flag operation
Ring: “Hello, Police Public Spokesperson.”
Recognized voice: “You have to stop talking about the possibility of the shooter having help. He’s a lone nut, nothing more.”
Police Public Spokesperson: “But people are trying to figure out how he got he got the larger weapons into the theater and all that gear. We already have one witness who’s been quoted as seeing someone open the Emergency Exit for him.”
Recognized voice: “Don’t worry about him. We have that covered. And don’t worry about what people think. We tell them what to think. Just do as I say.”
Police Public Spokesperson: “O.K. If you say so. Has everyone else in the loop here been so advised, or do I need to have an excuse to pass along?”
Recognized voice: “The key people are our people. We have it all covered, just like L.A. with the RFK matter.”
Note: In Robert Kennedy’s assassination, the Radio Dispatcher who controlled what Cops did that day and the Chief of Police were ex CIA. No wonder cops did not pursue the Woman in the Polka Dot dress, and the L.A.P.D. destroyed all the evidence which indicated more shots were fired than contained in Sirhan Sirhan’s gun, and did not protest that the fatal wounds came from the other side of his body where Thane Ceaser, a security staffer to a CIA involved military contractor had been walking directly behind Robert at the time of the shooting.
James holmes is a patsy in a false flag operation
Door shuts behind the lone interrorgator (spelling on purpose), and he takes a seat before the exhausted man at the desk. Interrorgator: “You told our people at the theater that you saw
someone open the Exit Door for the shooter a second smoke grenade thrown from the opposite direction?”
Eyewitness: “Yes. I couldn’t see who
because it was silhouettes against the movie screen might have thrown it.”
Interrorgator: “That’s impossible. We know the shooter was a lone gunman, and had no help. We have lots of people lined up who are going to be saying they saw it differently.”
Eyewitness: “I know what I saw. I was not more than ten feet away, and
he crossed in it flew right in front of me.”
Interrorgator: “That’s not what you saw. The confusion and fear of the shooting has simply confused your memory. All you saw was
someone getting up to take a leak or buy some popcorn. He never opened the door was some action on the theater screen from the movie… your mind has simply played a trick on you and filled in the blanks.”
Eyewitness: “No. I’m certain.”
Interrorgator: “Listen, kid. I’m going to lay it on the line for you.” Grabs him by the collar and jerks him halfway across the table. “I’m telling you, and you’d better listen up real careful like, you didn’t see that, you were confused. If you tell anyone you saw that, something bad might happen to you. There are a lot of people upset about this, and some of them have tempers and are looking for someone to go after. They don’t think very clearly, and I’m trying to keep you from getting seriously hurt… or your family for the matter. Do I make myself clear?”
Eyewitness: “You’re threatening me? With those people watching behind the mirror with cameras?”
Interrorgator: “You’re Goddamn right I’m threatening you.” Slaps face. “I sent those people on break and killed the camera, but in five more minutes, I’m going to call them back and we are going to be asking you the same question I started with, and you had better damn well tell me you were confused, or you and yours have NO F***ING FUTURE.” Shoves him back into his seat. “Do we agree on that, or not? Because if not, I can’t protect you!”
Eyewitness: “O.K. O.K. You win. I’m confused. I didn’t see anything except someone going to get popcorn.”
Note: Something almost identical to this happened to witnesses at JFK, RFK, and MLK, as well as the Flight 80o shoot down. Witnesses are often ‘told what they saw’ and told they were ‘confused by events,’ to allow investigators to later say their initial statements were not useful because of duress under stress impacting their memory.
James holmes is a patsy in a false flag operation
Ring: “Hello, Fire Department.”
Police Department: “We need you to take a Ladder Truck over to the shooter’s place and look in the window for us.”
Fire Department: “Why? We’ve never done anything like that before. What’s going on?”
Police Department: “We just want to make sure its not booby trapped. You need to tell us if it is so you we can send the Bomb Squad out.”
Fire Department: “Did the shooter say something to make you think there’s a bomb?”
Police Department: “Uh… sure. Yea. Something like that.”
Fire Department: “Well why not just send the bomb squad.”
Police Department: “Well, uh… I’m just doing what I’m told. I think they want high visibility with the press. Uh… you know… to make everyone look good. You will look good. We will look good… on TV… our small community will look good on national TV.”
Fire Department: “Whatever you say, Chief.”
Note: At a disadvantage with no concrete facts, there may have been a legitimate reason for asking the Fire Department to participate. Yet they did eventually send the Bomb Squad in and the first thing done was to use robots. Did the robots go in the window? Not that I’ve seen on video. No, they went in the front door. How do we know this? Because we have video of the bomb squad breaking out a portion of the window which would have needed to be removed if using the window for insertion of robots… doing so from the inside after the robots had finished. So why would there not have been a booby trap on the door blowing the robot away? That’s the FIRST thing I’d booby trap if of a mind to booby trap anything.
James holmes is a patsy in a false flag operation
Ring: “Bomb squad.”
Familiar Voice: “Be sure to blow a lot of stuff up at the practice demolition site afterwards.”
Bomb squad: “Why not just use the portable unit we always take with us? There’s nothing here large enough to require the demolition site.”
Familiar Voice: “TV coverage. Want to look good on TV, don’t you? Besides, the order comes from the top.”
Bomb squad: “Fine. We can have the rookies get in some practice at the same time.”
Note: The portable units (Mobile Explosion Containment Units) can contain significant blasts, but are not necessarily used for on-site demolition of bombs. They would perhaps prefer to instead transport explosives to a demolition site, as the units provide increased safety for such transport. However, some devices might be judged unsafe for transport, and should perhaps be destroyed at the crime scene. WHEN MULTIPLE DEVICES are found, there are several interesting possibilities which drove my inclusion of this portion of the dialogs.
a) The devices were too large to detonate on site. But we know that is not the case because we saw them on TV and they were small explosions (keep in mind that they use explosive devices to explode the bombs, so whatever blast you see is necessarily larger than the bomb by itself would have been.) Further, had this been the case, they should have likely been too large for collective transport, exceeding the safe operating limits of the mobile unit. But they were not shown making multiple trips to accommodate multiple bombs, so we again know this was not the case.
b) Despite the number of devices, their cumulative potential for damage is collectively within the ability of the chamber’s ability to safely transport through populated streets. IN SUCH A CASE, the bombs would normally be disposed of at the bomb squad’s facilities as a SINGLE BLAST. But we saw video on the news of multiple blasts in close proximity. This CONFIRMS they were not big blasts individually, and should have been done as a single blast. Why not? I can think of only one reason: Publicity stunt.
James holmes is a patsy in a false flag operation
Added section: Ring: “Executive speaking.”
Voice on line: “There’s been a problem with that special script for Drum Roll. It hasn’t been received by the Publicist.”
Executive: “Well where the hell is it, then?”
Voice: “We think it might be lost in the mail room for some reason.”
Executive: “Well get the… ah, you know… the ‘Director of Security’… to go search for it, then. That’s an important matter useful to Advertising and Promoting Drum Roll to the viewing public.”
Voice: “How do I do that? What do I tell them is the reason?”
Executive: Pauses. “I don’t know. It’s your job to solve problems like this.” Pauses again. “But try this; tell the Publicist to call the Director and complain about a suspicious package… and use that to get Security involved. Use your imagination.” Slams the receiver with a curse.
Note: Director of Security is their contact in the Police Dept. The Publicist is the Psychologist, or someone acting on her behalf. For some strange reason, the Psychologist indeed contacted Police about a strange package which showed up on her desk with no name on it, which turned out to be nothing but a text book being returned by a student. The explanation was concern, after the news about the bombs in James’ apartment, that it might be a bomb from James — in which case I wonder how James managed to put it on her desk while he was under arrest. For an even stranger reason, Police then searched the entire mail room to find the ‘script’ James allegedly mailed explaining in detail his plan to shoot up the theater. Strangest of all is that it was sent 8 days prior to the shooting. End of added section.
Next dialog, and the last, most telling of all…
Interrogator: “O.K., James. You want to tell us why you did it?”
James: “Did what? Why I am under arrest?”
Note: Jame’s reaction after the shooting is no different than Sirhan Sirhan (RFK), Jack Ruby (Oswald), David Chapman (John Lennon), Arthur Bremer (George Wallace), Squeaky Fromme (Reagan), and John Hinkley (Reagan), and others: No attempt to escape, in many cases going limp or calmly waiting nearby for arrest. Many of them have no recollection of the event, or have a single line of ‘political’ thought on it which they repeat, or start to explain and then just at the critical moment, change the subject.
These are all known methods of dissociation symptomatic of programmed Manchurian Candidates who are incapable of ‘confessing’ the truth, as they genuinely are not aware of it. In this case, we know he simply waited in his car and put up no resistance. What we don’t really know is if he has told the Police anything at all, but must presume not, or it would have been all over the news in some form or another.
So I’m taking the liberty and risk to assume, here. Please forgive any Ass made out of You and Me thereby. If I’m way off base, I’d be just as happy with the thought you may have gotten some entrainment value from it… because if I’m not off base, we are all going to end up mad enough to bring down the government and lynch some people.
James holmes is a patsy in a false flag operation
Please rate this article at page top, tweet/share, and comment. All comments welcome, good or bad.
- Official Formula For Conspiracy Coverups (proparanoid.wordpress.com)
How to know, what to do about it
by H. Michael Sweeney
This is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)
This post is a companion to a post on cell phone security made just hours earlier. Unless you want me to repeat that introduction, you should quick like a bunny hop over to and read it, first, as it sets the stage. I’ll wait right here…
Good. Now that we are on the same page, it seems pretty clear that if a person is being monitored in their phone calls, then there is a good chance they are under what’s called a full surveillance net. That means that in addition to your phones, everything from your mail and computer communications, and your travels away from home, not to mention everything you do in your home, including sex, are likely being monitored.
Only a Police State is paranoid enough to watch people like that… and perhaps voyeurs. One could argue then, I suppose, that sexually repressed people tend to be the ones who apply for and take these kinds of jobs with the intelligence agencies. Take a look at CIA spooks David Ferrie and Clay Shaw of JFK assassination fame, for instance. That may be why TSA has so many perverts groping people. I don’t know. Sorry, couldn’t resist.
Methods of being followed
Watch the Will Smith/Gene Hackman movie, Enemy of the State, and you quickly learn there are all kinds of ways: satellite surveillance, tracking devices, helicopters, cars, on foot, and even by microphone relay and telephone calls (where we left off). Now, with all that sophistication comes an associated cost factor, which tends to favor use of low tech except for the greatest of national security risks or fears. So you, as mere ‘suspect’ in some government imagined conspiracy to blow up your underware because you think for yourself and talk openly in an attempt to get others to use their minds, are more likely to be followed by car or tracking device than the more exotic means available.
Funny thing about tracking devices, though, is there is almost always a car following that signal. You won’t see it, but it’s almost certainly there. The purpose of the device CAN be simply to make and keep a record of your travels for later consideration, but usually, they prefer to be close enough at hand so that once you stop at a location, they can show up and see WHY you stopped… since the satellite isn’t going to be watching for them. So for my purposes, it’s the same as being followed by car.
The only difference is, you won’t see them in the rearview, but like the folks you do find there repeatedly, you will see them at destination if you are alert and can find a good observation post you can use with some useful patience. I’ve even found them there waiting for me. That was a fun story, just part of a five year running war with the paranoids, but I’ll save it for another time, perhaps. But other than them showing up like that, we need another way to know for sure.
How to detect being followed
First, how NOT too, would be more in order. Don’t keep looking for it, and don’t assume a car you see with great frequency is a bad guy. You are by and large a creature of habit taking the same routes to get to any given repeat location at roughly repeat times of day. So is everyone else. So I don’t get nervous because a certain rusty Chevy is within a few cars of me several times a week. Actually, I don’t get nervous even if I do think them following me, because I don’t want it known that I know. So I don’t spend all my time looking up at the mirror. If you insist on that, get a rearview camera ‘so you don’t back up over some kids,’ and glance at that furiously.
Just be aware of cars around you all the time, with NORMAL use of mirrors and glances out windows. Don’t be looking like you are on the lookout. Trust your instincts, and if you ‘feel’ like you are being followed, you may just be. At such times, or when you THINK perhaps a given car is just a little too familiar (or a driver), find something about the vehicle or driver you can identify later, and make a mental note, or a verbal note to a VOX (voice activated) pocket recorder, or a written note to a memo pad, or even a photograph. Note time, place, and descriptor.
The descriptor is going to be whatever thing is easy to recall. It might be a dent or rust spot, an odd paint job, a bumper sticker, or, where nothing else works, the license plate. Now there is a trick to remembering plates (more correctly, making them memorable) that I like to use when part of the sequence is alphabetic. RTU 035 is the plate of a vehicle associated with a CIA operative (more correctly, a retired Marine Forward Observer hired to ‘observe’ me by CIA). I glanced at that plate and forever now can recall it by my memory trick.
Simply make up some nonsense acronym out of the alpha portion and repeat it to yourself a few times while looking at the vehicle, not the plate – you want to associate the plate with the color, make, model, etc., not some rectangular piece of metal that might be replaced at some point. So in my example, I said ‘Rat-Tailed U-boat 035, Rat-Tailed U-boat 035, Rat-Tailed U-boat 035.’ Done deal. Next vehicle, please.
You can do the same with drivers. I enjoyed making up names for them, too: Pug Face (looked like a boxer who didn’t retire soon enough); The Professor (very dignified); The Liddy Man (wore a Liddy mustache and similar hair line; The Cuban (you get the idea). You will often see these people in multiple vehicles over time. It really gets interesting when you see the same groups of people in the same cars others of the group had earlier driven. And above all else, the most important clue… when you see the same people or cars at differing parts of town on the same day… especially if in those groups. Been there, done that.
But I did also employ both audio and paper, and photographs, as situations allowed or required (such as when there is not a lot of time and the situation is fluid). At days end, I would compile these all into a database, and once a week, for those repeat offenders (that’s the important clue), I’d go down to the Department of Motor Vehicles and run the plates to see who owned them.
Can’t do that any more here in Oregon, they made it illegal. Most states won’t allow it unless you are law enforcement. No problem. Lots of friends and relatives in law enforcement. Don’t have any? Make it happen, but you need to become GOOD friends because to help, they risk getting into trouble. It’s very helpful if you are both politically incorrect, at least privately (cops don’t get very vocal about that in public, it tends to cause unemployment).
Benefits and reasons for detection
There are some serious reasons beyond merely confirming suspicions. Example: Amazing thing about the DMV reports was, for me, that more than half the plates were reported either as stolen, non existent, or blocked by law enforcement. Actually, they didn’t tell me the later part, they just said non existent. But all I had to do was lean a bit and read it for myself on their CRT screen. Point is, such reports give you a clue as to who is involved. If you don’t get a lot of stolen/non existing plates, then you are probably dealing with private investigators, corporate goons, or some kind of group of idiot citizens thinking themselves above the law. Else, its government of some kind.
In my book I go into a lot more depth with some intermediate steps designed to better identify your players, and to give yourself tactical advantages. In fact, overall, its one of the larger sections of the book, and its followed by whole sections on offensive and defensive actions that fit into any knowledge gained about who is involved. That’s because, when you know who, you know why, and when you know all that, you know their limitations and what to expect from them when you do X. You start to control events forcing them to react to you instead of you being a mere bug under an unseen microscope subject to their manipulations.
And, it talks about their manipulations, and how to deal with them. They will attempt manipulations, mostly to see your reactions as part of establishing a psychological profile (another reason for cameras in the bedroom, I suppose). So one trick I talk a lot about, is ACT, don’t REACT. Learn to control responses: consider if the situation might be observed and a reaction expected or hoped for, and then decide if you want to confuse their profile by acting differently, or not. Then ACT in the decided upon manner, forcing them to react to YOU (incorrectly react, at that).
The other tactic I discuss at length worth mentioning, here, is that sometimes it is valuable to deliberately blow their tail by letting them know you know they are there, and who they are. They have to report that to their superior and they and/or their vehicle need to be replaced. Very embarrassing and a great chuckle to be had by all. It should cause escalation of methods used to follow you to levels harder to detect, at least by the time you’ve blown two or three tails in a row. Ideally, you do not want to escalate to that point where you can no longer detect the next level, so you would stop using this ploy when you felt that point was near (for most people, that’s going to be the first level, so this will be a moot dialog).
But for others, it has great advantage, because the book tells you how to use that information to better determine just who is following you. For example, at one point I was able to determine it included bounty hunters working with Clackamas County Corrections, and was able to thereby identify the Corrections Officers involved, as well as eventually find the high Sheriff himself (some decades back, of course — the current Sheriff is not a known CIA in-place asset) was involved.
I happened to catch him unaware on video following me on foot near where I worked, and that allowed me to identify him from a coincidentally convenient interview conducted on TV that very week. Subsequently, I openly took pictures of him when he drove past me in a car with Federal plates (neat trick for a County guy, eh?). Never had much trouble with HIM after blowing his invisibility, and in point of fact, after filing a complaint, he ‘retired’ from his elected post. The bounty hunters relocated, too.
The escalation which followed (that was the purpose, recall)? They advanced to use of trucks and vehicles belonging to and driven by employees of an electrical contractor which was later identified as a CIA front operating under 17 names in four States. So that told me my problem was NOT with the Sheriff’s department, but a much bigger fish. The whole story came out well in the end, as I was able to gain enough proofs to force them to stop bothering me, and even to pay me for damages.
Those proofs included not just my own problems with them, but documenting their spying on local government and high tech industry here in the Silicon Forest… letting themselves in wee hours of the morning past high security locks, using flashlights, and presumably, collecting and replacing recorded tapes. It’s all in my book, as well as another book, Fatal Rebirth, which better explains their growing paranoia since 1947 and on into the future. Ever heard of the Unified Conspiracy Theory? Check it out.
Then you will know why I make them so paranoid. Seriously, though; email me if you are having these kinds of issue: proparanoid at century link net.
How to prevent gross violations of your privacy by the Police State
by H. Michael Sweeney
Updated 6/17: two changes in red
Note: This is a complex topic and thus is a lengthy post of a somewhat technical nature, and though it is based on knowledge of the U.S. communications network, most things found here generally apply World Wide. Given the complexity, it will not be useful to undertake reading it unless you have time to devote free of distraction, as it is too important for hit-and-miss reading. It is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)
I’ll start with an inflammatory statement, which I’m fond of doing if it criticizes our errant government. We live in a Corporate Police State. This, I’m arbitrarily defining for the purpose of this article, is a form of government which partners with corporations against the clients of both. As Citizen, you are client to Government (you pay them taxes, they sell you societal infrastructure), and in this case, you are also client to your cell phone service provider. No client should be ever stand for being abused by those with whom they do business; they should stop doing business with them, or find ways to fight back and neutralize the abuse.
The Police State part arises whenever you have a government which applies surveillance and perhaps targeting with Political Control Technology (PCT) of citizens over political issues due to government’s paranoia; they fear the power of individual free thinkers who dare to have and express opinions contrary to their own. And, frankly, they should fear it, because the more Police State-like a government waxes, the more such persons they create, and the more likely such persons will become active in working to replace government. As other posts on my blog site reveal, when governments defeat traditional forms of redress, that could mean outright armed rebellion, if they persist and grow worse over time. Governments get what they create for themselves.
What has your government earned for themselves from you? Acceptance of abuse or defiance and protest against it? Your answer then defines you as being either a common dumb and obedient Sheeple or being someone who is more aware and thus deemed politically incorrect, and therefore liable to being spied upon by government through your cell phone. Here’s how they do it, how to detect it (when possible), and what to do about it.
Threat One: Listening in
A cell phone can be listened in upon by several means with varying degrees of usefulness, and in ways which almost make irrelevant any dialog about warrants, roving, blanket, or otherwise. Dialog on warrants would justify is own blog because as a topic, it is its own area of political spying abuse. So there will only be brief references, here.
While the information below talks about detection methods, most are not detectible usefully. At best, you may need to rely on situational evidence, such as people seeming to know things only possible by having overheard a conversation, or habitually ‘coincidentally’ showing up while you travel. It is all about being alert to your situation and surroundings. That is the price of politically incorrect (in a Police State). Here are the means:
a) If covert access to your phone was possible, it could have been cloned. Not all phones can be easily cloned, and some older phones may resist altogether, depending on who is doing the cloning (their sophistication). That means any use of the phone will be ‘duplicated’ on another phone somewhere as if the user thereof were inside your own head. This cannot be detected by you (assuming the user has set to mute) and, while the phone company could detect it in real time, they don’t try. It cannot be detected after the fact. Anyone using the tech would not likely rely upon a warrant, but it is possible that one could be involved. The technology to clone is hobby grade and above and thus almost anyone can construct the means to clone most phones.
b) Some cell phones have an undocumented diagnostics mode accessed by a keystroke sequence which lets the user hear all cell phone calls going on near to the tower at the moment, in random rotation. Since the number of users at a given instant could be just a handful, that often allows sensitive information to be gleaned, especially if one recognizes a voice. These codes are generally available on the Web, so anyone can use them, and no warrant is required. There is no means to detect its use.
c) The NSA (National Security Agency) worked with the phone industry to develop the modern digital telephone system which includes cellular technology as well as land-line phones. This has become a de facto World standard. The design incorporates command codes sent at ultra high-speed along the network mixed in amongst other call signal data. Phones generally cannot detect these codes (with some exception), but they do respond to them, and that is how they can be manipulated. The range of capabilities (and thus, the threat level) is broad:
1) Calls can be remotely listened to by NSA by computerized systems looking for keywords, in which case the call is escalated (see next). This cannot be detected and NSA routinely listens into almost all call traffic regardless of who the caller or recipient might be. This is under the umbrella of Operation Echelon, one of the earliest paranoiac efforts of the Cold War era intelligence community. Its been going on for decades.
2) Calls can be rerouted to a secondary location for recording and live listen-in capability. This allows thoughtful analysis of call content. This feature can be ‘preset’ so that all calls to or from a given number are recorded, which is exactly how they would choose to target the politically incorrect or a criminal suspect. A warrant is required by the phone company to set it up but anyone who knows the codes can bypass asking the phone company to do it. Virtually the entire military-industrial-intelligence complex knows the codes, and therefore, so do many individuals. It requires special black boxes anyone could build from scratch.
There is a subtle way to detect this form of eavesdropping on inbound calls, but it requires happenstance or deliberate query. If anyone mentions that it took a long time for you to answer the phone but at your end it only rang a few times, the call was rerouted and the caller heard extra rings while the secondary phone system took time to answer, initiate the recording process, and then pass the call along to you. This does not tell you if it is you or the caller who’s the target of the listen in, but you can query on outbound calls as to how many rings they heard at their end, and if calling several numbers at random with consistent results, you have your answer.
Another clue (very rare) can be when a call seems not to hang up and you continue to hear what is going on at the other end. That is a malfunction at the recording site which causes the call not to be released, and the line is held open. It is usually true that the other phone in the conversation was a land line. This brings us to the next threat:
3) The microphone of the phone can be turned on without the need of a phone call being placed or answered. The phone is then a ‘bug’ you carry with you. This can be detected in many cases by paying attention to battery consumption. If your battery life on a charge is normally many hours to days even with general use of the phone, but suddenly it dies or nears death within significantly fewer hours with the same level or less usage, it is being listened in, upon. This happens to me whenever I’ve announced I’m leaving the house, especially if to meet someone. Funny that the battery which normally lasts 2-3 days will crap out in six hours with a fresh charge, but return to the normal performance the following day.
4) I’ll mention as an additional capability less commonly employed is the ability to spoof a destination or point of origin call. You could dial, for instance, the Police to call for help, and someone else could intercept the call and pretend to be Police and sending help. Very useful when their own people are breaking into your home to cause you harm. The reverse is also possible, a call could come in from someone you know but be someone pretending to be calling from that number for some strategic value.
5) The original design did not anticipate the introduction of cameras into the system, but it is widely believed that it has been modified and may therefore allow the camera of the phone to be remotely activated with no means of detection. This has (since the original post) been verified as easy to achieve on all phones other than iPhones, and even iPhones are susceptible to more sophisticated conversions for the purpose.
There is no way to detect these spoofs at the time unless there is a flaw in their verbal dialog which triggers your suspicion and you are able to quickly devise a test question. This function generally relies upon black boxes, again, but are of hobby grade. I’ve received such a call as part of a break-in incident, the proof of it in the after-the-fact means of detecting the spoof, which is that such calls do not show up on the phone bill. That also means, of course, you have no proof for any legal recourse.
d) A more exotic use of the system as a dirty trick is that such systems can play tricks on you with respect to radio shows, where you are a guest speaker. These are often detectible as there will be a call to you just prior to (turns it on), and just after the show (turns it off) which entails an obnoxious squeal of digital codes which are similar to a Fax tone, yet clearly NOT a fax tone. I’ve been hit with this three times, and in each instance the effect was different, as was the tone set employed.
The first time was when I was one of the top three on-line civilian investigators (as media and government would prefer, ‘conspiracy theorist’) who was revealing new information never before known that served as proof of a missile bringing down Flight 800. I was guesting on Coast to Coast with George Noorey. The moment I announced I had this new information and began to speak of it, the show was sabotaged in the entire region of New York and Long Island where Flight 800 went down. It was a hot topic there moreso than elsewhere, because there were so many eye witnesses, not to mention investigators which we would presume government would prefer did not hear something that might redirect their investigation. The sabotage was truly clever; listeners in that area stopped hearing Art Bell’s show, and instead got an old recorded Art Linkletter show, ‘Kids Say the Darndest Things’, as confirmed to me by listeners afterward. As soon as the topic changed back off of Flight 800, the got Art Bell again.
On another show hosted by the late Michael Corbin, the effect was different. Callers were complaining that they could hear the host, but not me. The Engineer confirmed everything was correct, and the prior guest had been heard just fine with no changes in the set up, as was true of the next guest. More interestingly, my voice also did not record and so the show could not be offered on-line via download. An effective censorship. A similar third instance rendered the entire audio dead to listeners. The digital system is very powerful, it seems, especially when other digital equipment such as found at radio stations, is involved.
Threat Two: tracking you by cell phone
Your cell phone is constantly saying to the phone network, more or less, ‘Here I am, anything for me?’ Each cell phone tower nearby relays it to the phone company to find out. If anyone wanted to know your location, all they need do is figure out which tower(s) have your signal. This is supposed to require a warrant, or permission of the phone account owner (i.e., a parent trying to find a child), depending on company policy and service features (some do not allow owner access). But as the ACLU informs us, they often freely give this information out to law enforcement without a warrant. You see TV show cops and the folks at NCIS get at it all the time, as media is trying to train you to think it’s a good thing that should be allowed.
The above is true for all cell phones regardless of age or features, and provides an accuracy of varying usefulness dependant upon the number of towers and other factors. It can be as broad as a 4-6 mile radius, or as narrow as a few hundred feet when circumstances are right. The new GPS equipped phones will rat on you automatically to within about 50-200 feet in most cases. No way to detect any of this, of course, and a phone call does not need to be in progress. It merely needs to be turned on.
Threat Three: EEG functions
Cell phones are based on low wattage microwave signals in a relatively high frequency bands in the range of hundreds of Megaherz (millions of cycles per second) to several Gigaherz (billions). The human brain operates at ELF frequencies below 15 Herz (15 cyles). The difference does not deter those intending the need from using the phone in unique ways against their target.
A cell phone, like any other phone, can be used with voice-stress analysis to detect lies almost as usefully as if an EEG monitor were attached to the user’s head for the purpose. Anyone can buy the gear needed for a few hundred bucks, which lights up when you lie. They can be as small as and made to look like an ordinary deluxe ball-point pen, but are more commonly larger as size tends to relate to accuracy.
But a worst threat exists for Targeted Individuals (TI’s). These are persons who are commonly assaulted daily by a wide-range of Political Control Technology (PCT) in order to render them social, financial, and political zeros, usually by trying to make them seem delusional Schizophrenics. It is a form of mental, and in some cases, actual painful physical torture, as many forms of electronic weapons can be involved. The cell phone can easily become such a weapon.
In addition to all the other potential cell-phone abuses, which will be in constant use on the typical TI, they must worry about EEG manipulation. Signal processing methods used by the kinds of sophisticated agencies or firms (most commonly the intelligence community, military, and their corporat contractors) who employ PCT, can allow a cell phone’s signal to be embedded with a modulated signal in the same range as the brain’s own EEG.
When the phone is placed to the ear, it is close enough that the weak microwave signal with the embedded ELF signal, is still stronger than the normal EEG signal put out by the brain. When the brain is subjected to any signal simulating a given EEG signal that is stronger than its own, it adopts the external signal as its own. This is called ‘entrainment,’ and it is instantaneous.
This technology allows mood manipulation as well as manipulation of select physiological sensations such as feeling fatigued and in need of sleep, nausea, and headaches. Generally, such signals are mixed and alternate between extremes to emotionally and physically exhaust the victim, making them irritable and less than fully functional.
This threat is not normally detectible except by extremely expensive and sophisticated signal analysis by experts using costly special equipment. However, one very alert to how they feel before, during, and after use of a cell phone may detect or have a sense that this kind of abuse is being used against them. The threat also applies to cordless land-line phones, by the way.
Now, while the method is quite workable when the phone is at the ear, it can have a gradual, lessened effect if a few feet away. It is thought, by the way, that the use of an earpiece does not deter the method because the earpiece is also communicating with the phone at Gigaherz levels (Bluetooth).
Note: Another way Targeted Individuals are threatened by cell phones is Mob Flash. The victim’s picture and suggested things to do (called Street Theater) or say if they see them (usually described as a harmless joke associated with a birthday or similar) are sent to everyone in the same cell phone tower’s range. When you see people looking at a cell phone and then doing the same sort of thing, that evidences the practice. I suggest you have fun with them at their own expense and formulate an unexpected nonsense response. Booga booga!
Threat Four: the Software Mod threat
All of the above threats to one degree or another, including remotely activating its camera, can also come from yet another source; software mods to your phone. Even very old cell phones with seemingly no programability can be modded. It can be achieved by covert access to your phone, or by a phone call to the phone using a black box (which tend to show very odd phone numbers as the calling source), or even by a virus attached to a text message. Most phones do, after all, use Microsoft OS, which is quite prone to virus catching.
The obvious exception is iPhone, which wile not susceptible to such virus attacks, can still be modded by the other means. Regardless of the phone, unless a technician, you cannot detect the mod’s presence, and even technicians have doubtful capabilities. The only safe solution is to periodically have your carrier wipe your phone’s memory and download your approved apps and phone lists, etc., fresh.
For all but the Mod threat, above, simply deny them their signals, and limit the phone’s usefulness as a weapon against you. Most people use the phone for relatively infrequent inbound or outbound calls. Anyone who uses it more frequently should also read up on the threat of cancer, which is so significant, that I refuse to put one to my head, and use speaker phone, only, unless absolute privacy is required, in which case I defer the call to another time and place, if possible. Frankly, the cellular industry is headed toward that time when class action lawsuits threaten to bankrupt them, as happened in the Asbestos and Tobacco industries. It’s exactly that bad.
Therefore, the simple solution is to turn the phone off when not in use. Power it up once in a while to see if you missed a call, and call them back. Your threat of tracking is limited to quite narrow windows of opportunity and tells them at best where you are the time of the call, which does not tell them how you got there or where you will be going next. Some newer phones ignore the power switch for tracking purposes, and it is thought they also allow listen in even when turned off.
This feature is not documented so we can’t say a specific phone is or is not a threat, but you should presume it so if built after 2005, and instead of turning it off, remove the battery. One indicator it may be an issue is if the phone stays lit up briefly after full completion of the power down (where it normally would not), or briefly lights up for no reason at all when not in use (someone has polled the phone with some sort of signal).
There are some who say that phones after 2009 also ignore battery removal. I have no confirmation, but you can also avoid power off and battery removal, as well as this added potential worry by simply placing the phone in a foil wrapper, even if just an empty foil-lined potato chip bag. And, by the way, put your credit cards in there to prevent people from using black boxes to steal your credit by cloning your card’s smart card chip. I use a foil lined oversized phone case to keep everything, including cash, and do not even own a wallet.
Deterring a listen-in threat is a different matter. Obviously, if you are using the phone, it is at risk. If you have a reason to suspect listen-in, it is likely because of a specific topic of sensitivity. Simply arrange in advance with persons with whom you likely need to speak openly about such topics to employ a simple code in conversations. A simple key word or phrase might mean ‘watch what you say,’ and then additional keywords might be translated as key sensitive elements of conversation. For example, you might agree that a given person’s name will simply be ‘Mr. Smith’ when, in fact, its not.
But don’t forget that there are two kinds of things one can say over the phone: things which are true, and things which are not. Thus if you suspect or know your phone is being used against you, try to avoid letting on that you so believe. That will give you the luxury of providing deliberate disinformation to any listening in. I’ll leave the usefulness of that up to your imagination, and suggest only that the person on the phone with you should likely have a means of knowing when you are using the ploy. Again, a keyword or phrase might help.
Where defense against listen-in seems impractical, simply avoid talking in specifics altogether, or offer to call them back later when you can do so from a phone thought more secure, such as a pay phone. Of course, the problem there, is, that government may be looking for your voiceprint with NSA’s help, so that any call you make is listened into. But land lines and topics like that will have to wait for another post… or you could get my book.
Seriously – email me if you have these kinds of issue: proparanoidgroup at gmail com.
Next post in this series: In the Rearview Mirror: When You Think You’re Followed
Specifically addresses psychopathic individual stalkers,
but elements apply to organized or gang stalking as wellby H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved edited from original versions in The Professional Paranoid and The Professional Paranoid Defensive Field Guide permissions to reproduce available on request to pppbooks at comcast (net) Dateline Portland, OR Sept 27, 2011
My Professional Paranoid series of (3) books are a kind of ‘how to’ in the realm of privacy and security issue problem solving. The key to solving a problem is, of course, knowing about it in the first place. Thus all my material includes how to detect the problem. Follows are the things everyone, and especially women, should know about stalking (which is one reason why, for simplicity’s sake, the steps are presented as if a woman is being stalked by a man). But stalking is definitely not limited to female victims or male stalkers. Ask David Letterman, which points additionally to the fact that stalking can be about something other than just sex.
Fame or circumstance can be the prime motivation for stalking, even circumstance as simple as cutting someone off on the freeway. They follow you home, and plot their campaign of insanity against you. And it is a plot, well thought out, and by someone typically of great intellect. For some reason, the psychopath tends to be a brilliant thinking in all respects but the most basic of logic paths associated with social reasoning.
Internet Stalking can also follow the model to a degree, but is commonly a bit harder to detect and significantly harder to deal with while it is a such a remote level, one typically anonymous to the nth degree. The danger is, of course, that the Web stalker may escalate at some point to a physical or real-World stalker.
From my books, with minimal editing:
A stalker will…
1 Study and learn to know the victim: observe and learn as much as possible before planning the attack.
So be alert, be inconsistent! Observe those at the periphery of your daily doings and keep watch for repeat presence, especially if overly interested in your activities. Try not to establish patterns, and whenever possible, go out of your way to change regular habits.
2 Make contact: find an excuse to get close enough for conversation, if possible, something irresistible to the victim (i.e., involving victim’s pet, hobby, project, etc.):
So end conversations with strangers quickly! Turn cold and hostile if polite excuses fail. If there is any further insistence of any kind, do not warn that you will call for help, DO IT! If needed, follow instructions in item five.
3 Lower victim’s defenses: be friendly and charming, control dialog.
So don’t let them get past step 2! End it! Be especially wary of very charming and flattering, talkative types.
4 Obligate and gain trust: endears himself to the victim, perhaps by some task or favor which indebts the victim, preferably an ongoing task which involves going with the victim to a more private place, such as carrying groceries.
Again, don’t let them get past step 2!
5 Isolate: isolate the victim using trust gained, always ready to counter possible objections by clever whimsy or logic. Seek a place where no one else can hear or see.
So run! Drop everything, scream, and run. Do whatever it takes to draw unwanted attention and then, to play safe, get witnesses contact information. Call Police.
6 Attack! In their mind, this may simply mean ‘romancing you,’ but no matter how gentle, it is an unwanted assault on your person. But many stalkers ‘loose it’ in the moment and violence ends up being the final expression of their feelings. So no matter how gentle it may start, it can quickly escalate to something else.
So defend yourself! Fight back to the best of your ability (hopefully improved with martial arts or weapon’s training). Remember, the perp will expect you to wilt with fear (or succumb to charm), perhaps to break into tears and become a human vegetable. Fight back fiercely, suddenly, and without warning, no holds barred, screaming and kicking all the way. Break windows, knock over furniture, honk horns, anything to draw attention. Do whatever it takes to be his worst nightmare.
7 Eliminate evidence: hide, take, or destroy all evidence, including the victim in worst case scenarios.
So observe everything! Note details about face, clothes, vehicles: get license numbers, scratch skin or pull hair in struggles (get DNA sample, mark them with scars), get a button from clothing, etc.
8 Escape: make good a retreat without detection.
So thwart escape (where safe)! If possible WITHOUT FURTHER CONFRONTATION, get witnesses, damage vehicle to make it stand out and need repair, inflict a wound that will require medical treatment or force a limp, bandage. REPORT THE CRIME. There is no guilt in being a victim, ever. If any law enforcement officer or medical staff member treats you with other than respect, immediately ask to speak to their supervisor and have someone else assigned, file an official complaint, and go public about that treatment, if necessary, to get that person fired or reprimanded. They have no business being in their line of work. You may even wish to consult a lawyer about a suit for emotional damages.
Anyone who feels they are being stalked should at the earliest opportunity to present useful information speak with Police. Useful information would be descriptions, time, place, witnesses, event details. In the absence of too many such informational elements, Police will not even be moved to file a report. The GOAL is to have a report filed, not to have the matter ended, because such information is rarely actual evidence nor is it condemning enough to warrant investigation or arrest.
But it MIGHT result in the deterrence of a Police interview of the suspect, and DOES result in documentation of the problem which, with continued reports, will build a case for stalking to the point where, hopefully, an arrest and prosecution can take place. Without such a history, a single report, even if involving violence, will not necessarily result in arrest. Police need a LOT of information and detail before they can act usefully.
It is also suggested that you email me for additional advice. I offer a free helps kit and two weeks of consulting which can make a big difference in how things progress, as well as the final outcome. Email proparanoid at comcast (net).
- You: Stalking victims failed by the law (guardian.co.uk)
- Dealing with a Stalker Your Own Personal Terrorist (socyberty.com)
- Profiling a Stalker (lachapelleinteriors.wordpress.com)
- System ‘lets down stalking victims’ (mirror.co.uk)
by H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net)
Dateline Portland, OR July 20, 2011 Updated July 27, 2012
Calling the Cops or Writing your Congressman can Backfire
But there are ways it can work better
This is being written for the TIs among us. It will become the seed basis for a new chapter in the next edition of my book, MC Realities.
I get three kinds of people who contact me for help: a) Targeted Individuals; b) persons claiming to be targeted individuals but who are actually part of the targeteers (new word); and c) persons who are either paranoiac and/or schizophrenic and wrongly believe they are targeted individuals. In any grouping of TIs, these three types of persons exist (e.g., my clients, groups such as the Free Will Society to Aid Targeted Individuals, and gatherings such as Conspiracy Con 2011 held in Santa Clara last June). I make no initial judgements on the viability of claims or beliefs, nor conclusions as to the type of TI with whom I am actually dealing. Such things become evident in time. Moreover, what good am I to anyone I if I judge them the same way as everyone else, and turn them away on a mere conclusion based on brief contact?
I cannot, for if I simply dismissed them based on a degree of incredulous description or conflicting facts or details, I might make a serious mistake. For one reason, a TI can be made to believe almost any unreal or incorrect thing, and commonly do as direct result of the targeting process. It renders them unable to fight the correct fight, and it also makes them less believable if they choose to speak of their problems to others. Which is exactly what this article is about; the problems and solutions in making such dialogs yield good results. For another, of course, we both miss a possible chance at improving their situation, perhaps ending the torture entirely, sometimes even with compensation or remuneration for their losses. A fellow can always use some more pocket change.
The problem in attempting to talk about targeting to any other person, even another TI, is that their credibility can easily be strained, were it to exist in the first place. As a rule, it does not pre exist except perhaps with another TI or someone like myself (though to my knowledge, I’m the only one of my kind doing quite what I do). Even a friend or loved one will tend to follow the thought patterns evidenced in LEA (Law Enforcement Agencies), officials, and medical practitioners, which is to presume the TI in need of mental health care. Sad, but true (the thinking, not the reality — at least when involving an actual TI).
My first advice to new clients is almost always “Do not go to Police, government, or professionals with this problem.” The answer I get is almost always, “I already have.” The description of results is almost always, “they did not help, they think I’m crazy.” Well, to a degree they were crazy… crazy to believe they would be believed and get help. But the reason for such conclusions on the part of would-be helpers can at least potentially be negated. There are ways to do it which establish improved believability and increase the likelihood of actual useful helps, or at least obtaining next-step advice.
Sadly, most such contacts are not equipped, willing, or able to help in any useful direct way. The kinds of helps truly useful are found elsewhere, and have an extremely high and unreachable price tag: a good Technical Security CounterMeasures (TSCM) and Private Investigator investigation can easily cost $50K, and there are no guarantees it will produce good result without more than one attempt. Should the ‘perps’ engaged in targeting get wind, they can simply shut down operations while the investigation takes place. Further, there are plenty of con men out there looking to make a quick buck pretending to be such experts when they are not – the first clue being they charge a fraction of the price. It costs what it costs. Anything less, is less.
If one MUST talk to others, there are a few basic rules of behavior and procedure which can make a good deal of difference, even with LEA and medical professionals, who are otherwise quite trained and disposed to presume mental illness. There are steps to take, all well before opening one’s mouth. Let’s call them tips, since they are hardly sequential steps.
The very first step is to be armed with factual information which establishes the validity and existence of targeting technology, and its use on Citizens at large in the past. A very good source (sorry for the plug) is my third book in the series, The Professional Paranoid Defensive Field Guide, which contains a wealth of information which should be mandatory reading for any TI about to open their mouth, or not. This gives them factual ammunition which can be cited to back up the notion of a potential for truth in the TI’s claims. Key among such proofs and citations in the books are lists of documented Political Control Technology among which can be found many capable of producing each and every symptom of schizophrenia in a TI. You therefore establish plausibility. If you do not obtain it by such attempt, there is no point in continuing on unless you also have good evidence, which is the next step to consider.
political control technology
Tip 2: have useful evidence
An almost impossible goal, but quite key to being believed. LEA, unfortunately, requires a much higher standard of evidence before they can actually respond, but lesser levels of evidence can at least forestall notions of mental issues being involved. Fortunately, the medical community may be far more easily convinced by lesser evidence, since their goal does not involve actions which put them into potential conflict with targeteers, as would be the case for Police. For the record, LEA requires courtroom quality evidence which is seldom available. I talk to countless victims who claim to have such evidence, but in over a decade, there has been perhaps only three instances where such evidence was actually that good… but further suffered the problem of easily being neutered by alternative explanations. Targeteers are simply too good at what they do to make the kinds of mistakes needed to provide superior evidence.
But fortunately, there are kinds of evidence which can be useful for establishing some credibility. Video or audio of strange doings, if clear and if context is visually present, can be useful. Eye witness reports are quite useful. Lists of repetitive events, such as noting the same license plate at odd times and places in your life, or the discovery of a listening device, or even proof of tampering or sabotage in the form of a repairman’s statement… or the like… can be useful. While all can have alternative explanations, they take away from the ‘suffer’s schizophrenia notion’ and moves toward ‘ could be paranoia’ (worst case result), or shows enough of a pattern of questionable matters to exceed probabilities and shift thinking toward actual belief in the possibility of actual targeting. The later is where you want to end up, of course..
Lesser evidence and general event histories should only be mentioned in passing as existing, but add a phrase such as, “I’m not sure what that means,” “I know it proves nothing,” “I don’t know if that’s a clue, or not,” or some other diluting statement. You mention it to add ‘bulk’ to the evidence even though it has no ‘substance.’ It makes you sound more rational and cautious in your thinking by volunteering the disclaimer as to value. NEVER say you KNOW something as fact based on observations of this sort, as that immediately destroys you in their eyes as not being rational.
Tip 3: make a proper presentation
This is essentially a matter of learning to religiously apply dos and don’ts in framing descriptions of your problem and associated experiences:
Do NOT use terms or phrases like “they or them,” which sounds conspiracyish (new word). Do not presume who they might be (e.g., they are NOT government, military, CIA, Masons, etc.) Instead say “person or persons unknown”. It is not your job to identify the perps, only to establish they exist and are a mystery worthy of a look see. There are many such conspiracy related terminologies and references which should be avoided at all costs. Instead use generic terms which leave it open and enforces the mystery element.
Do NOT make statements of fact, draw conclusions, or claim to know something is true. Remember, you could be made to believe any unreal thing, so your conclusions and beliefs are NOT useful at this point, at all. Instead imply the possibility of such things using qualifying expressions (see next).
DO use qualifier terms to show your own uncertainty or a willingness to accept alternate explanations (being rational would demand this kind of thinking). Things like “I reasoned this might mean,” “I wondered if it was possible that,” “If that was true, then it might mean,” and so forth. Use these as verbal vehicles to explore possibilities in personal dialogs, and if they probe you for conspiratorial beliefs, it is OK to admit “Well, that thought has crossed my mind…” but temper it again with reason; “but there isn’t enough evidence, yet. That’s one reason I need your help.”
DO stop briefly and ask a question of the listener in an attempt to get an sense of useful agreement. Its a check to see how you are doing and to make sure you don’t walk over a cliff by going on and on beyond their plausibility threshold. Baby steps here — don’t go for the gold. “Was that an unresonable assumption on my part?” “Am I crazy to think about it in those terms?” “Does that seem like a lot of coincidence to you, too?” This works in written material as well as conversations, though you don’t enjoy an answer, but it shows the reader you are considerate of their beliefs, which again shows you as a reasoning person.
political control technology
Tip 4: choose your listener carefully
There is a reason you are selecting a given listener. Make sure you understand what it is, and tell them up front in generic terms what it is you are trying to accomplish. “I’m very concerned about some strange events that lead me to believe someone is doing strange things to me… a kind of harassment.” Conclude your presentation with precise request for specific actions you hope they can take to help you. Don’t aim too high. They can volunteer more if warranted. “Could someone look at my video and give me advice?” is a lot better than “I want these people investigated and jailed!”
When it comes to a given listener from among many in a possible group, such as when choosing a lawyer or other professional, I usually advise going out of your primary community to any nearby smallish city of about 40-50K population, and seek a minority person relatively new in the trade. This increases the likelihood of their being hungry for business, and decreases the likelihood of their being co opted. When it comes to family members, co workers, and neighbors, church members, etc., you want to evaluate what you know about them as well as what might go wrong should they absolutely disbelieve. Are they likely to say inappropriate or unwanted things to others, or remain quiet as you prefer?
Most important of all, if as you proceed in any verbal presentations, you are getting signs that the listener is not buying what you are selling, if you have already produced your biggest guns… thank them for your time and excuse yourself. Do not let them detain you with encouragements. This is a case where anything you do say will be held against you. As there will likely be an official record, you need to cut and run and avoid that record being overly negative. “Possible paranoiac tendencies.” is better than “Exhibits Schizophrenic behavior.” Better to seek out an alternate listener for another day. If they are in the same agency, you are likely doomed to a repeat failure as commentaries of the first listener will be made available to the second… so an alternate agency may be in order, or at least some means to reverse whatever is believed to have caused the negative view (e.g., evidence). That’s another reason your pitch should be as good as it can be the first time ’round, which means well thought out — exactly why you are reading this.
Tip 5: rehearse an organized presentation
If you feel you are under surveillance (you are, most likely), you may want to prepare a written outline or index card set and read them quietly to yourself while imagining to be speaking. Open with an introduction by name and a brief generic description of who you are and where you are in life – a bit like describing your life situation to an old High-School chum met randomly on the street. “I’m a homemaker with two kids holding down a job as a secretary for a military contractor, etc.” Follow with a brief explanation of your targeting in VERY generic and brief terms and the up front request for help from step 4.
Outline your basic problem with somewhat more details (e.g., gangstalking, EW targeting symptoms, etc.)., without giving precise examples and AVOID THOSE TERMS in favor of generic symptoms or observations. Once you start talking the terminology you will likely be at a disadvantage and need to ‘educate’ them in the terms and that will again paint you as a conspiracy nut. Introduce evidence availability along the way, including the Field Guide proofs as may be appropriate, and likewise with the baby-step questions of agreement. Close with the specific request for help. It is more than OK to work from your notes or index cards in the actual presentation. That shows methodical and organized thinking, as opposed to emotional response. Express your feelings about this or that at key points in the presentation, perhaps in the form of an agreement question, “I felt like I was being treated like a criminal. Wouldn’t you feel that way if it happened to you?”
political control technology
Tip 6: be prepared to answer questions
Try to make a list of likely questions and prepare ready-made answers. Do expect unexpected questions, at unexpected times. It is OK not to quickly answer, but if you are a bit at a loss for words, express it with something neutral, such as “Well, I hadn’t thought about that, much,” or “That’s an interesting question. Hmm.” Don’t get flustered or nervous. It is also OK to say you don’t know, or that you are unsure but have a theory or belief.
Tip 7: be honest but constrained
Be as honest and direct as you can while still observing the above points. It is OK to withhold things which are not directly related to the precise element under discussion if they risk damage to credibility. For example, talking about general targeting observations and symptoms when describing gang stalking and suspected (use that word a lot) electronic weapons does not require you to admit to hearing voices, which is the one thing most likely to get you judged up front as mental — despite the fact there are many technologies known to create the effect, including some now being used commercially, such as Quad S or Silent Sound commonly found in museum tours and the like. Your goal is to paint enough of a picture to provide a useful image of an existing and real problem, not to provide complete disclosure at the risk of blowing away any possible acceptance of its reality. You want them interested enough to want to go to the next step with you, not so well informed as to want to send you packing due the limitations of their own belief structures.
In the end, that’s really what it is about. You need to overcome their existing belief structures sufficiently to hear you out and conclude a possibility exists sufficient enough that the next step seems appropriate, even if for no other reason than curiosity. That’s where mystery comes to be valuable. You may even want to include in your opening statement something to the effect of, “What I’m about to tell you will probably sound like nonsense. So I’m asking you to please briefly suspend your belief structure just as if sitting down to watch a sci-fi movie. But what I have to say is no fiction, it just sounds implausible on the face of it.”
Regardless of if using these seven tips, or not, I sincerely wish you the best possible outcome in any outreach effort. Please ask for my free Helps Kit if a TI or a helper to a TI. Anyone can ask for my free sample newsletter on Political Control Technology. Email me at proparanoid at comcast (net).
- How do you act smart in front of other people (wiki.answers.com) An 8th tip, perhaps? Couldn’t hurt.
- Reason seen as a Weapon, not a Path to Truth (dinmerican.wordpress.com) Sometimes things are not as they seem on the surface, and ‘help’ is worse than the bite in need of mending. You can spot clues that this is happening, and walk away.
- 1 Cor 4:16 Wherefore I beseech you, be ye followers of me. (Bloodofthelamb.wordpress.com) The one person who, if you follow him, will ALWAYS listen, care, and do the right thing.
- Technical Surveillance Threat Series, “Cellular Threats”. (comsecllc.blogspot.com) A bit of an insight into the World of TSCM.
- See also Granite Island Group, one of the few such TSCM specialists I personally would choose — contributors to my books, The Professional Paranoid and The Professional Paranoid Defensive Field Guide.