Category Archives: Targeted Individuals
Radio Frequencies and Electromatic Fields can be weaponized for use against ANYONE. With the advent of 5G and the Internet of (smart) Things, almost EVERYONE should worry about RF/EMF effects. THIS MEANS YOU!
Dateline, Oct 30, 2020, from an undisclosed location not too far from wrong. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Hard rocks and harder places…
This is an extremely broad topic which cannot be well discussed here, beyond some basic advice. The problem for TIs is uniquely different from common uses of Technical Security Countermeasures (TSCM) equipment and services. So one problem right off the bat is obtaining useful help (good luck with that). This leads to a do-it-yourself (DIY) alternative by use of low-cost EMF meters, and possibly shielding or other tactical solutions. As result, most pros are ex mil-intel types, which creates a trust barrier with most of the TI community.
Not that it matters: a TI simply cannot afford the cost of their services. Professional TSCM equipment is extremely expensive (a pro might have a million dollars invested) and extremely complex, and requires a lot of experience and the kind of training offered in the military and intelligence communities. So, between trust and cost, and unique needs, a TIs find themselves between a proverbial rock, and hard place, a DIY nightmare. That’s not all.
That help issue trickles down the food chain to the makers and sellers of lower cost solutions, such as EMF meters, which are little brothers to more sophisticated and costly signal analyzers used by pros. Such firms do not and will not support DIY use of their products for TI related needs, and indeed, many pros will not offer their services, either because they fear running afoul with some government operation — or they don’t believe in the whole targeting notion and presume the client mentally ill.
It is possible to hire a PI or some individual who’s gone into business using low cost gear to do ‘mini’ TSCM sweeps, some of whom are aware of and will cater to TI needs, but many of these are charlatans, especially true in those who specialize in select TI issues, such as ‘finding implants.’ Be wary of anyone charging for implant detection using small EMF meters, esp. if charging by the implant found: with many meters, it is possible to cause a false read by simply moving a finger of the hand holding the device toward the front of the meter… for another $50 ‘find.’ “Would you like me to continue searching?”
It would therefore be better for the TI to do their own searches, though even with a decent EMF meter, the odds of finding an implant are extremely nil. EMF meters detect Radio Frequency (RF) and Electro-Magnetic Fields (EMF), which are radiated energy/field readings not given off by implants, as a rule. Most implants receive such signals, and those that transmit them tend to do so by remote command. Even then, it is very briefly, rather than being ‘on’ all the time — defying meter detection.
While there may be exceptions, the type of signal they use is likely to be lost amid the ambient signals present already (i.e., wifi, broadcast radio/TV, cellular, AC wiring, power
lines, amplifiers, etc.). An EMF meter displays the sum total of all such data, and can only identify a source by virtue of increasing in signal strength as it nears the signal source. An implant signal is rather weak. But, implants aside, there are other valuable uses for such a meter, if you have a decent one.
Choosing an EMF meter
First, know that cell phone apps that offer EMF readings are not reading the right kind of EMF. They are not reading any signal which is involved with targeting, but instead, the Earth’s own magnetic field, using sensors in the phone designed for game play to know changes in the phones relative position to prior positions (i.e., steering a car in a driving/racing game). For like cause, avoid ‘Natural’ EMF meters or EMF meters that do not include RF measurement, as they are also reading the Earth, only.
So what you really want is an actual RF/EMF meter. And not just any such meter, but one which is directional in nature when reading RF, and not omnidirectional. AC Magnetic Field readings will be omnidirectional, in virtually any meter, but if the RF sensing is directional, that will not impede usefulness of omnidirectional EMF readings. RF, on the other hand, is barely useful if only omnidirectional. That said, some omnidirectional meters will allow you to install and optional directional antenna… for added cost. One way or another, you want directional.
The type of antenna system described by the maker in specifications or manuals won’t necessarily tell you if it is omnidirectional or directional, they prefer a technical description of the physical antenna design (engineer speak). Omnidirectional (least useful for a TI) are typically described as
ISOTROPIC or TRIAXIAL ( 3– AXIS), and are often visually discernible by a large ball or spherical object at their top. Sometimes it is internal and, therefore, smaller and unseen. That limits the sensitivity, compared to an external. Directional RF meters might have no antenna, a rod antenna (like old brick cell phones), a ‘wand’ at the end of a cable, or a triangular antenna (very useful with distant sources). So, any other technical description other than Isotropic or Triaxial, is good.
My base-line low-cost meter of choice is the TriField TF-2, which I actually used to sell with some value-added features for TI use. That included a user manuals I wrote for such use for the Trifield, and the Micro Alert audible meter (a good companion product). These manuals, along with a copy of this post and many others, are part of my TI Helps Kit available on request to proparanoidgroup at gmail com. I used to charge $10 for the manuals, but the Kit is free, though I do encourage a donation to the Free Will Society to aid severely impacted stalking victims (freewillsociety.wordpress.com) via PayPal to the above email addy.
I compare all other meters to the TriField before considering them desirable, or worth the price for TI needs. It is a directional RF with omnidirectional EMF readings in a simple to use and reliable product at a low cost. You can buy direct (trifleld.com) or find it online from many resellers. Experts in the meter reseller and RF/EMF consulting field also use it as a standard for comparisons, and that is telling. In fact, currently, one such pro who advocates for the TriField is EMF Academy, a valuable resource for information to anyone interested in issues revolving around the topic.
More importantly, they have a newsletter you can subscribe to, and associated with that, is a monthly drawing for one of three TriField meters. If you just visit their site and poke around looking at articles on things like EMF paint and shielded clothing, a popup will offer you the ability to subscribe and enter to win one of the meters. Some of their more expensive and exotic solutions I am currently testing, and will likely write an update report within a month: be sure to FOLLOW my blog so you get a notice. While you do that, also click the LIKE button and leave a comment, if you wish — all at that bottom of each blog post.
There are other features to look for in a meter which could be handy to a TI. An audible tone option, for working in the dark or allowing you to focus on what you are scanning (TF-2). Peak reading indicator and Avg signal strength (TF-2) instead of just a needle or light bar reading that is bouncing around enough to make such things difficult. It would be nice to have the ability to add a special antenna, such as (specifically) a dipole. This may be a round tube, or a flat, triangular antenna for very precise targeted distance source location (useful for DEW sources, typically hundreds to thousands of feet, or even miles away). Some offer a pistol grip or a protective case. These things are nice to have, but not usually critical, if you are willing to walk a bit more to effect the same results.
But the important feature is antenna, and frequency range. Most meters are intended only for cellular and wi-fi operating ranges, which stop (well before 5G) at below 3.5 GHz. One insidious risk of 5G compared to 4G and the current wifi standards, is that it operates at such a high frequency, citizens won’t be able to afford meters designed to check for safety. They may operate at up to 6 GHz. As it happens, DEW weapons are likely operating in similar ‘beyond hope’ ranges. My $12K meter setup can still only see to 12GHz, and some DEW will be above 50 or 60 GHz.
And, it is true that EEG entrainment (mood, sleep control, thought interference), which many TIs call remote neural monitoring (a misnomer), operates at frequencies well below any low-cost meter on the market, unless you are looking at something like my $12K rig… which is exactly why I have it. We are talking human brain operating frequencies, at and below 30Hz. Your ears cannot hear below 30Hz, because if they could, it would confuse your brain, and therefore, that’s also why audio equipment tends to stop at that low end, as well.
Hold the meter level, flat in your hand, so you are looking down to see the reading. If you aim it upward, you are going to flood the meter with radio waves reflecting off the ionosphere, and will always get incorrectly high readings. You wouldn’t even be able to sense a satellite signal, that way; such meters are not designed for anything but environment readings or very near or high-outpt sources. Also, many meters without external antenna will give similar false readings if your hand is touching the ‘head’ or ‘business end’ of the meter, so hold it by the rear half, only. When taking a reading, your purpose may vary, but generally, you are looking for a ‘hot’ or higher-than-average reading among the ambient collective.
Before actually taking readings, consider perp strategies. They likely have excellent surveillance and will know when you are using a meter. It is very likely that they would therefore simply shut down, making any sweeps pointless. This is why a pro TSCM sweep is typically conducted unannounced, anonymously, and with a degree of stealth and cunning. Ideally, it would be best if you arranged for a companion to do the sweeps with as little fanfare or obvious effort, as possible.
This brings in additional problematic factors, such as trust and willingness to help in what is a lengthy and complex set of tedious steps. Or, you might get lucky and find the enemy’s gear is simply left running while they take a nap. For most TI’s, though, it can mean many attempts before being able to acquire useful information from the meter. Failure to find clues of targeting does not mean they never target, does not mean the meter is defective, does not mean you are doing something wrong… it just means that was not likely the right opportunity.
And yet, of course, the other possibilities may yet be true, in the end. While a negative is not necessarily proof of a negative, a positive is its own proof. Even so… you will want multiple positives over time if to have useful evidence. That will also require good documentation, such as video and verbal announcements of what you are doing and seeing, and where the meter is pointing. Have a witness, too. More to follow.
Slowly sweep back and forth, left to right, looking for possible reading jumps or dangerously high readings (hot spots). When you first start, you won’t likely know what is dangerous, or not. There are good online resources to help with that, but they can sometimes seem way too technical, and measurement increments of your meter may not match the measurement increments of a given site. That can result in confusion or misinterpretation, and force some math you might wish to avoid. Here are several sites you can review and compare against your meter, hopefully finding one more directly useful, without involving conversion factors. There are many others out there, and what constitutes unsafe levels is kind of a moving target in constant redefinition, and there is a difference in European, American, and Asian standards, the U.S. being the most lax (natch) of the three.
If you find a hot spot, stop and watch for several seconds to see if it holds relatively steady or was just a random spike. Generally, you will want to repeat scans in each of the meter’s modes of operation (i.e., the TriField has three: AC Magnetic, AC Electric, and RF/Microwave). If you are logging results for legal or comparative purposes, give it at least five seconds and note the reading(s), avg, and peak. If you’ve made an entry, be sure to note the values for each meter setting at that same position/angle. That added information could prove useful at some point.
Hot spots may show up either as a gradual rise and fall as you sweep, or a sudden spike. It may be brief, or hold steady. Brief spikes are not typically useful, but one which holds or is above safe limits is very useful. Note if gradual or sudden, and especially note if it was synchronous with any impact on you or your environment. You will also want to get a compass heading (there are cell phone apps for that, relying on natural EMF, as it happens).
If outside, and you are in something like a depression or valley, or a where there are tall buildings, you may wish to then tip the meter a bit to scan lower and higher in angle, such that you avoid looking directly into the sky (stay below the visual horizon, where rooftops may so redefine it), looking for further increases which may help identify a specific source location of the signal (a cell phone ‘bubble level’ app with off-level degree readouts might help with your notes, as well). If it is a building you are aiming at, try to estimate the floor, and note that. You may want a strong pair of binoculars, a rifle scope, or other strong lens to try to see what is at the suspect location. And it is suspect, only. A hot spot, even if very hot, is not alone a proof of a targeting source… but only reveals a possible suspect location.
If we are talking about finding a surveillance or other targeting device planted somewhere within your location with the meter, there is a similar concern, should you find something. Depending on the device purpose (which you may not be able to discern), and tactical matters dictated by your targeting situation (which may not be obvious), it may be to your advantage to leave it in place. You may wish to contact me (I am interested) via public library computer.
Or, use your best judgment, if worried it might should be removed immediately. Video document its removal and take it directly to a bank and get a safety deposit box to put it in… or take it to a local professional for analysis, per the advice in the next paragraph. Send me still images, in place, and after removal, if removed. Safety first, if it involves AC electrical power, and if it is in a large sealed box, don’t try to open it… such are often booby-trapped to destroy the evidence; very scary fireworks which may require the Fire Department, as it once did in a case I was investigating.
Now, about suspects, we need a warning: If you do establish a suspect, DO NOT confront individuals which you might be able to identify. Instead, try to learn as much about them or the property as possible, and add it to your notes. You should then contact me, or an appropriate professional, such as a private investigator, lawyer, or Agency. I don’t recommend Police, but if you have good readings and symptoms verified by a Doctor as not due a health issue, you might want to contact the FCC or your State’s Environmental Protection Agency, or perhaps your local County Extension Office Agent. Some larger cities may have bio-home or bio-environmental engineers or similar, who could be very good resources, if available. If there is any significant find or action taking, I would like to hear from you, and may be able to suggest ‘next step(s)’ to consider.
To find a surveillance or targeting device in a structure (the TI’s ‘space’) requires comparing readings well away from a suspect source to readings within an inch of it, looking for a large increase (signal strength falls off at the square of the distance). Scan low, scan high, and all around. You will want to be as physically close to surfaces as you can get, without touching, preferably (no harm, no foul, if you do). Every object and surface should be treated as a potential suspect to be tested.
One should establish ‘normal’ levels in a non TI environment (a test control space) similar to the TI’s space, and compare by taking readings at room center or well away from major RF sources (i.e., wifi, computers, tvs, radios, ovens, etc.). It should be a similar sized and designed space in the same neighborhood, between three and six homes away (arranging this can be daunting, if you do not know anyone who fits the bill, who would be willing to participate — try requests based on your own concerns in the neighborhood about high 5G signals, until you find someone who worries about 5G).
This is done in several sets of readings, each — one with those RF sources operating, and one with them turned off, and one with the Mains turned off (no AC power to the space). If subject to significant electronic attacks which can be physically felt or sensed, the TI’s space reading should additionally be undertaken as sets during both times of no sensed attack, and during an attack (which may prove difficult, if under surveillance — the perps may elect to cease the attack once you set up for the readings… which might buy you some peace.) You should also take readings at the power company meter at both spaces at a time of day when major appliances are not in use, and note how fast the meter is changing, and in the TI space, take an additional reading when the mains are turned off.
Finally, you will want to walk around the space on the outside taking reading pointing away from the center of the space, looking for hot spots. Directional is King, here.
To test for bio implants in a person or a tracking device on a vehicle, the best place will be in the country, away from any nearby potential sources for such signals… such that ambient broadcasts and distant cell towers are about all that’s being read. All cell phones and the like should be turned off. Don’t try to find an implant on yourself, have someone else take the readings. Every inch of the body should be scanned, and I suggest wearing a simple nightgown, PJs, or a bathing suit. Feet wide apart, arms held out to the sides. Be willing to get fairly personal. One then verifies by going on past the body in the same direction to insure the reading is dropping, again.
If a vehicle, pop the hood and trunk and doors to scan the interior areas, it being OK to lean into and ‘look about’ with the meter, just trying not to aim directly at the sky. Don’t forget under the seats, fender wells over the tires. It would be nice if you could put the vehicle on jack stands so you could safely get underneath it (where aiming upwards at the undercarriage will be fine). Jacking each corner up as if changing a tire is much more work… but avoid actually going under the car with any more than your arm. You will want three sets of tests, one with the engine running (in Park or Neutral, Emergency Brake set), one with battery connected and the key in the accessory setting, and one with the battery disconnected. That will tell you if any suspect readings are from something drawing power off of the car, or if it is battery operated (which means something bigger, and easier to find in a visual search). So, be sure you have the needed tools.
What do results tell you?
- Where readings are higher during an attack, DEW is all but confirmed, and additional steps (T1, at document end) will be needed. Where they are not, and the attack was sensed, the sensed effects are more likely to be a health issue (all TI symptoms are carefully designed to mimic health issues), and you should seek medical advice, describing only the symptoms, not TI concerns. Get a second opinion using a random Doctor. If no high readings and no sensed attack, try again… and again;
- where readings are higher in the TI space with all power off, than in the control space in like status, it indicates battery operated surveillance is likely, take steps (T2). If the same, it implies that any perp equipment present is drawing power from the house by any number of means, use step (T3). NOTE: it is certainly possible for both to be true;
- where readings are higher when RF/EMF equipment is turned on in the TI space compared to the control space, it implies that the equipment operating is either defective, or perhaps weaponized against you in some manner, take steps (T4); If the same, it implies them safe;
- where readings are higher when the equipment is turned off than in the control space, and the first part of item (2, above) is false, it implies the AC power system has been weaponized, take step (T5);
- where power meter readings are higher in the TI space than the control space, it implies the Meter is relaying a lot of data from perp devices… just good to know, as the other tests will address needed steps. If not different, it implies the meter is not a Smart Meter, or the meter has not been weaponized to relay data. Relay of perp data does not imply the power company is the recipient or participant, though it is always possible;
- where power meter continues to draw power with the mains turned off in the TI space, it means there is the possibility the perps are drawing power off for their devices directly from within the mains junction box (circuit breaker box), and may include electrification of the ground to create high EMF readings in the home, and likely, the embedding of targeting signals within the AC wiring. Take step (T5).
T1 (DEW test). You have had positive space readings within the structure and they point to DEW presence. You now need to do external readings at both spaces by walking around the building site and taking reading pointing directly away from the center of the building or room of concern (don’t sweep left to right — you walking in a hypothetical arc about the center point, instead).
Compare these to the interior readings at the same compass heading. If there is no agreement, the source is likely inside the structure: do a 180 and sweep to confirm, directly along the outer wall surfacwes. If they do agree, compare the average signal strength. If it is a notably higher, then the source is relatively close, and in theory, if there was nothing in the way, and the source was left operating, you could walk toward it until you found it… such as a neighbor’s home. If it is not exactly higher, then it is much further away, and you may want a bicycle or car to chase it down.
T2 (Batteries). Battery operated devices are bigger, and easier to find because they will require a nook or cranny. Do a visual search for anything that is unusual or foreign. Do not remove it. Video the discovery with audio description. It may require some disassembly of door panels, carpeting, dash components, etc., which may mean professional help or tools, in which case, you must be present and video. Contact me with the circumstance and send me still images of the object, that I may suggest the next steps. Do this covertly, such as by use of a public library computer.
T3 (No Battery). That means it is either hidden within an appliance (i.e., TV, stereo, blender) that is always plugged in, or it is wired somehow directly off of an AC power line, perhaps in wall or atic, under floorboards or behind baseboards. If the meter is pointing towards any such appliances. Unplug those items and move them aside, and take readings, again. If the readings fail to match, plug them back in elsewhere, and read again at the new position. If they again match, they need to be dismantled, looking for anything that seems added. You may want to take it to a repair shop, if unhappy at the thought of DIY (some items have voltage capacitors which can cause severe electrical shock even if the item is unplugged). You have to worry about such items on the far side of the wall, as well, by the way.
If the appliances don’t change the readings when removed, or there were no appliances, then we worry about wiring in the walls, floorboard, and ceiling areas. Aim the meter at angles to see if there is any confirming change in readings. If low angles are hotter, you may need to pull the baseboards, wall power outlets, or get under the floor (i.e., basement ceiling area). If high, there may be ceiling molding to be removed, or you may need to worry about something upstairs or in the attic ((where you will be wanting to follow all the house wires, looking for a cut and splice with something dangling (perhaps another long wire to chase down) off of it)). Otherwise, we check light switch wall plates, picture frames, wall hangings, or window sashes, etc., as may be in the line of sight of the reading. Again, be mindful that walls have two sides. Watch out for fiberglass or asbestos insulation… you don’t want to be messing with that without serious protective clothing.
T5 (AC Power Compromised). Consider to contact a Home Bioengineer or a large Electrical Contractor who is capable of doing large-scale power system work (i.e., can contract to build sub stations and the like — which means they know more and have better tools than ‘an electrician’). Go directly to the Power Company if there is no such services in your area. The idea is to complain about dirty power and possibly high ground voltage (say nothing about targeting) and ask for a power quality survey. If they find anything wrong, they should be able to fix it or arrange for the power company to fix it. Simply going to the power company first may not be a great idea, if they have been compromised and are complicit.
See the document on Shielding which is also included with the Helps Kit, or request a copy.
Most everyone is familiar with 9-1-1, 4-1-1, and 6-1-1 numbers in America, but there are other equally valuable three-digit numbers worthy of remembrance or plugging into your contact list. And that includes the equivalent numbers in other countries, when you travel.
Dateline, May, 12, 2020, from an emergency lockdown bunker in an undisclosed locationcopyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. NOTICE: Fascistbook and their ilk (Twitter, et. al) blocks any URL to my blog site. SO, if you wish to POST comment in social media, you may wish to write out the url with spaces between wordpress and com (no dot), instead of supplying a pasted link.
I can’t think of anyone who has not used 9-1-1 to call for help in a law enforcement, fire, or medical emergency, or to report something in need of Police investigation or intervention. Almost everyone with a cell phone knows that 4-1-1 is directory information, and that 6-1-1 is commonly used to reach their carrier regarding issues with their cellular account or the phone, itself. But what about 2-1-1, 8-1-1, and other numbers in the series? Not so much. Even more problematic, is what happens when you are in another country. What numbers do you use, then? This post will answer that, and give you all the numbers for popular North American destinations.
While there is some international cooperation in assigning such numbers, there remain vast differences. The European Union, has its own set of numbers, and while the UK employs some of them, they also have their own set, devised before the EU had existed. Yet Australia, New Zealand, and Canada are slightly to vastly different from England, Canada almost identical to America. Asia and the Middle East is a hodge-podge, while South America is a bit of hodge-podge, but like Canada, also employs 9-1-1 for the main number. Some countries, like Mexico, have sort of ignored the issue (both the government, and citizens – see note), though they are at least using 9-1-1, as of late. Africa is just plain behind the times, you will need a different number everywhere you go, in most cases.
Fortunately, it’s not at all hard to find out what emergency numbers are available when abroad, and it can be done online easily before you travel, at WikipediA, where almost every country is cited. One can also search on ‘emergency phone numbers’ + (country name). Travel agents, airline and cruise ship firms, State Department offices and any Embassy (any nation), will generally have the answer. If already in the country, any citizen should be able to at least give you the key-most emergency number for fire/police/medical… if you both speak a common language.
You can see why programming them into your phone beforehand might be a good idea.When abroad, you should always program the local US Embassy or Consulate number into your phone, as well. And, btw, before you travel, check with your phone company about how to avoid huge phone bills while abroad. It is easy to run up bills into the thousands of dollars, if unaware. There are several things you can do, including purchasing a temporary sim card with a foreign carrier, or special temporary rate plans from your carrier. Just know that your cell carrier may not be interested in telling you about options they can’t make money on, if they do not have partnership arrangements in place, overseas. So your travel agent and the like may be a good second-opinion resource. Image: WikipediA.
The American system would seem to be far more robust than many other three-digit systems. The list shown here also includes Canadian numbers, which do not necessarily apply outside of Alberta, British Columbia, Manitoba, Nova Scotia, Ontario, and Saskatchewan:
America Canada Service
2-1-1 2-1-1 Community health and social services: suicide prevention, welfare programs, access to free services such as for food, housing, legal aid. Includes State, County, public/private entities. An operator will inquire as to need, and provide suggested local contacts.
3-1-1 3-1-1 Frequently available in larger cities, similar to 2-1-1, but Municipal.
4-1-1 4-1-1 Directory Information or ‘operator.’
5-1-1 5-1-1 Available in many areas: automated road condition reports, and a means to report accidents and road hazards not require 9-1-1 help.
6-1-1 6-1-1 Direct contact with the cellular carrier’s customer support.
7-1-1 7-1-1 Reserved, not in use.
8-1-1 In most locations, connects to a centralized information system for utility services, principally to locate underground lines. It is currently not used to report problems, but that may change in the future.
aaaaaa.aa8-1-1 Tied to the national health care system for urgent care requests.
9-1-1 9-1-1 Police, Fire, Medical emergency ONLY. Also good in Mexico*, Bermuda, and the Bahamas.
*Mexico is began implementing 9-1-1 in 2017, but may not be in service in less populated areas, and the person answering may not speak English and a transfer to someone who does may not be very fast. Previously, Mexico had separate 8 digit numbers for fire, police, and ambulance, and those numbers remain in place. The Military has its own phone number for crime-lord response, but Citizens tend to have no faith in any such services, there, because help seldom responds, or they do not trust Police/military. A group called Angeles Verdes (“Green Angels”) offers roadside aid and travel advices, tourist helps, answering in English: dial 0-7-8.
I almost forgot the handy ‘star codes’. It’s amazing how many people don’t know them… or have forgotten them (like me, almost). Star codes are also a three keystroke ‘number’ made up of two numerals preceded by an asterisk keystroke, found just left of ‘zero’ on the dial pad. They are also known as ‘Vertical Service Codes’ (VSC), Custom Local Area Calling Codes (CLASS, or LASS). They allow the you to directly interact with the digital telephone switching system, telling the hardware how to handle a given call situation differently. They can provide improved privacy/security or added feature-benefits in how you use your phone. Like the previous 9-1-1 numbers (save 6-1-1), they generally apply to both cell phones and land lines, though some function only on one or the other.
There are some 33 different codes in all, many in the form of paired codes, one to turn a feature ‘on’, and another for ‘off.’ Many are special functions tied to the type of phone account the subscriber has, or to optional features for an extra charge, and some would seem unlikely to be used very often. Some smart phones internally employ star codes such that the user is unaware, and does not need to know the code, such as when blocking a number. Because of these various variables, you should visit your service provider’s Web site to see which codes are specifically available to you under your service plan, and review your phone’s handbook to see how it might be handling such provisions.
However, there are several very important star codes which apply to everyone, which you should commit to memory, because all phones will work with them, and you don’t always end up using your own phone. Too many of them to detail, here, but there is a handy list at WikipediA. Scan the list and take a bit of time to mouse over the blue (hot link) text on their page, for a popup explanation, as the short description may not prove as useful in your evaluation. Click it if more text than will fit the box is apparent.
Take note of things like anonymous call rejection, call blocking, caller ID controls, and call trace. That last one is used when calls involve threats or are in some way malicious to you, your phone, or the phone company; it reports it to the phone company and can result in a notice being sent to Police and/or a joint investigation through the phone company. If particularly threatening or criminally harmful, you should also file a Police Report, and include the time/date along with the fact that you did use star 57… because Police will not otherwise contact you from just punching in the code, and just pushing the code alone won’t give Police the full story. I use it when I get calls from impossible phone numbers (scammers), and I let an appropriate agency know about it, if warranted.
Dealing with fakes
This is being written directly to TIs. The word ‘you’ is intended to mean the TI reader.
I’ve been helping TIs better their position for more than two decades. It has enabled some to break entirely free, and improved the circumstance of the great bulk of the remainder. Rarely do I strike out entirely, and almost everyone has thanked me for their gains. But there is something wrong in the TI community. In terms of effect, it parallels a virus… an infection.
I diagnose it as an infection of Fake TIs. Just as there are many kinds of targeting and thus many kinds of genuine TIs, there are many kinds of fakes. Identifying them has always been rather difficult, it taking years to even realize there was such variety in type. In the past, it might take significant interaction with a TI to discover if they were sincere, or pretenders, much less divine them as a type.
Only recently have I realized the truth and the solution is far simpler than thought. I’ve had contact with over 12,000 TIs over two decades, and the answer was there, all along… just hard to see… despite the size of the problem. But recent events have proven key to understanding.
Types of fakes, reasons
The enemy! The most obvious, it is also the only type most TIs tend to worry about, which is a mistake. The most insidious fake of all is the deliberate Wolf in Sheep’s clothing, actual perps infiltrating the TI community to accomplish a variety of missions in support of targeting efforts. That may mean they work for a specific program or developer of technology, or it may mean they are there for a specific TI or group of TIs targeted by a specific team or for specific cause, such as ongoing research for statistical analysis. In the latter case, they will be careful to avoid seeming so, and will ‘free range’ their cross hairs as to whom they choose interaction, lest the intended victim sense their purpose. Seldom will they overtly do anything to give themselves away, and in all cases, they are quite likely to maintain multiple online identities such that if one is identified even by mere suspicion, others remain free to continue.
They might be Trolls there to gather intelligence and/or evaluate the progress of the greater programs which lay behind all targeting; quality control analysis, ‘customer feedback.’ It is amazing how vocal a TI will be in public forums, revealing things they should not about their targeting, or what they believe or think about technologies used or perps involved. They act like THX-1138, confessing directly to the intelligence community disguised as religion.
These things are a confirmation that targeting is working as intended, that disinformation is working, and makes it easier for perps to fine tune their program, and grow their psychological profile. How many times have you (if a TI) been hit with requests to share your targeting information in a public forum, or for a public use, such as ‘a law suite’ or ‘appeal to a government or NGO’ to (allegedly) seek their help? How many times are you asked or volunteered because someone else already had done so, to detail the effectiveness or intensity of your targeting? I assure you, that is valuable information to perps.
DON’T be that victim!
Some exist only to sow discord, start arguments, divide and conquer, almost always present wherever TIs congregate, including things requiring Membership. Heaven forbid the TI community or group should actually be able to organize and accomplish good against the evil. When the Free Will Society formed, by the time it had 25 members, it was eventually determined that three of them were, for certain, quietly working in the background to destroy any gain towards our project to establish the ONLY proven long term solution to targeting, our Free Will Haven project. Each was spreading various lies about our effort. Learn more about the project at www.freewillsociety.wordpress.com
Others are a supply conduit of deliberate disinformation designed to distract TIs from truth and keep them in doubt as the true nature of their circumstances; you cannot fight a problem if you don’t have a handle on what that problem is, and how it really works… especially if you are fighting an imagined nature of it shaped for you by the enemy. And yet others are there simply to make a buck, offering some simple ‘cure’ or ‘aid’ for which there is typically scant evidence it really works, and even less that they are at all who they claim to be. They know TIs are desperate enough to risk a few bucks, ‘just in case.’
Innocent fakes. There are numerous psychological issues which drive people who are not exactly paranoiac or schizophrenic, but who are driven non-the-less to pretend to be victims. Call it the sympathy seeker, if you like, because it is attention and sympathy, or feeling special and unique, which they seek. Many soon enough become so entrenched in the role-play that they start to believe that is really who they are… like an actor who starts to believe their own PR, and tries to live up to it until it seems second nature.
Like a hypochondriac, they will tend to adopt whatever new symptom or popular new technology or method of targeting currently seems to them to be in vogue within group discussions… even if it is false disinformation. This, is the harm they represent; they thereby perpetuate falsehoods, though unknowingly, in their ignorance. Disinformation, if to be effective, relies on their doing so. Not much can be done about them, short of exposing them… hard to do, because when it comes to targeting realities, certainty is in short supply. If it were not so, it would be easier to combat.
Mentally ill fakes. Paranoiacs and Schizophrenics. Victims of their own mind are just as dangerous to the TI community, in terms of reliance upon anything they say to be true. They also foment a general disbelief by the public at large in the concepts of targeting, and especially authorities and others a TI should be able to approach for helps. Their mental illness is projected wholesale upon all TIs, and is so effective in result that even significant others, family, and friends, will prefer to believe a TI is mental, than to accept the truth of targeting. It is literally the case of one rotten apple spoiling the bunch, in that respect, and is why TIs are so sensitive to the topic of mental illness.
Yes, there are other factors which make such third-party disbelief the easier choice, but the fact remains: actual Paranoiac and Schizophrenic sufferers do exist among the TI population, and the worst of them give it a black eye. These are the ones trotted out when Congress tries to ‘investigate’ mind control, and they drown the truth of actual testimony in their delusional depictions. Again, exposing them can be difficult, but it is advised that one should not be timid in challenging extremely difficult to believe stories. If enough were to do so, they would go elsewhere.
That said… interestingly, and tragically, in my work with TIs, I’ve found there are actually many cases where someone with a mental issue is also targeted. This is a desirable victim trait when looking for a target dummy for trainees being taught how to employ Political Control Technology and methodology. It makes sense; if a trainee screws up badly and does something which leaves useful evidence, authorities will tend to be disinterested because the person reporting it is known to be mentally ill. They won’t bother to investigate beyond polite lip service.
The target ends up being passed from one set of trainees to another, for life, increasing the likelihood that targeting will in time lead to serious medical harms, or death — because trainees will can easily make serious mistakes when playing with DEW weapons. In some cases, it is intentional ‘joy riding,’ given that many perps are psychopathic sociopaths. Some are themselves victims (programmables), and know not what they do, the effect on the target often the same dangerous end, regardless.
De facto Fakes. This is the category which ultimately led me to discovery of how to identify a fake more easily. They are truly not fakes, but simply act in ways which effect the same traits. It happens two ways, easiest to see in the category of MK Ultra and Monarch style victims; people who have undergone complete captive programming programs akin to Manchurian Candidate, or Jason Bourne techniques (not as fictional as some would wish us to think). The first way has nothing to do with the TI community, and impacts them, alone… and is present in the time frame where they have no understanding whatsoever that they are a victim. They have yet to awaken. They are a complete and successful fake unto themselves, alone; a very sad thing.
And they perhaps never will awaken. Only when something ‘goes wrong’ in the programming or control of the victim can they become aware. When they do, the second means is then in effect; such failure always results in traditional targeting intended to render them ‘mentally ill’ by any third parties they may come in contact with, especially authorities and helpers. That is, of course, the usual targeting modus operandi for all TIs, but it is critical for the MK, because they have trapped in their mind, and at some risk of erupting forth, secrets which can prove… everything. And yet, as an asset, they are far to valuable to simply liquidate, as a rule… unless the knowledge does erupt, in which case they become subject to a Bourne-style solution.
The hidden commonality that makes all fakes easier to spot
This brings us to a stark conclusion, one which has literally risks negating twenty years of my life’s work in trying to help TIs. The one common trait of de facto MK/M fakes is this: they will not help themselves, or they will self-sabotage any efforts at it. That may take a bit of explanation.
‘Will not help themselves’ can mean that they will simply not take advice that is known to be effective. For example, I might offer a simple test which would allow them to identify the type of technology employed against them, and where it is operating from, perhaps even identifying the players involved, thereby. They simply do not undertake the tests, coming up with some lame excuse as to why, even if it requires a lie, to do so. Or, they will claim to have taken the tests, and gotten negative results, and probably so — self sabotaged.
‘Self sabotage’ can be subtle or obtuse, depending on the type of fake TI involved. Obtuse sabotage is when the fake deliberately and knowingly sabotages the effort. It is rather rare, because only the Enemy fake has a reason to do so, and they would only need do so if others were present to observe; they would otherwise simply lie about their efforts. But the MK/M will always sabotage, either knowingly but without understanding why, typically then rationalizing it internally, or unknowingly even to themselves, when executing a programmed function in an alternate personality called forward for the purpose. Fortunately, the number of MK/Ms is relatively low, but sadly, such victims are the hardest of all to help for this reason.
Subtle sabotage is something all kinds of TIs themselves can be unaware of doing. They simply will fail to follow the instructions correctly, or be clumsy when performing the defensive advice such that the enemy will perceive it, and take steps to avoid the effort’s intended goals. That is especially common in the De facto fakes, and those based on mental issues, serious or otherwise. But any TI can sabotage their own efforts this way, as we shall shortly see.
That means that ANY TI can ‘be fake,’ unto themselves and to their cause, and not even know it.
For twenty years, I have wondered why so many TIs seemed so prone to self sabotage, the most common evidence of it being the constant excuses as to why they would not even try a given advice. Usually, it would be claimed it had already been tried, by them, or by someone else. Even when I point out that it must be done correctly (and I give very explicit instruction) and why it can fail if not done just that way, they will continue to resist the advice. Excuses, excuses, excuses.
Come forward in time
The one thing which has proven to completely resolve targeting is the concept which lays behind the Free Will Society and its project, Free Will Haven. This has been widely promoted among the TI community, but to what end? The concept has been tried in a couple of ways (‘beta testing’), and provided proof that it works extremely well:
three TIs have enjoyed a total of some 3,000 continuous targeting free days.
And yet, the primary beta site failed through self sabotage. The principal character involved was a female TI of long suffering. Because she was investing her own money into the project, she was given complete autonomy and control of the effort. Despite specific advice on property selection and how to qualify TIs as co residents, as we had initially agreed, she elected to do things her own way, after all. She even refused my participation in ways which led to a break in communications, about half way through the effort.
In the end, as result, she ended up trying at least four different locations before achieving any level of success. And, unfortunately, by rejecting advice and possible other forms of self sabotage, she made blunders which lead to being evicted from the location. One such blunder was not asking for additional financial help from the Society, because she had forced the break in communications, not just with me, but with the Society members who had earlier provided financial support. Pride and stubbornness is presumed; a form of self sabotage. To this day, she has not responded to outreach. Worse, she continues to work to try yet again, essentially working against the Society’s efforts.
The other important fact that is news which relates to self sabotage, is that the Society was at one point on the threshold of obtaining significant funding towards realization of this dream solution in a way that can help dozens to hundreds of TIs obtain total escape from their targeting. It also would serve as a gateway to even more important goals, such as actually exposing and proving targeting is real, pervasive, and government sponsored, leading to actual successful lawsuits, media and government investigations, and termination of programs with perps and others behind them being jailed.
The stakes could not possibly be any higher for the TI community.
With the help of ATN World News, and a pooling of contacts outside of the TI community, we were well poised for significant investment into the Free Will Haven project through the Society. Millions of dollars worth, in fact: enough to buy land, homes and central services, vehicles, and even to fund relocation of participating TIs, and provide monthly income to some of them. It might even have funded mobile strike teams of TSCM and PI professionals who can covertly investigate, document, and prove targeting cases valid in courts of law and before media.
How much more help than that, can we ask?
And yet, the fake TI rears its ugly head, threatening it all
Before anyone will risk investing millions of dollars into the Free Will Society (and we are finally very well poised to create just that scenario), they will need to see that the TI community is sincere and valid, that it has a serious stakeholder position in seeking a cure. Who would give a bum a hand out of $1,000 without some sign they would use the money to escape being a bum? The only way TIs as stakeholders can be judged worthy is if the TI community unites to some useful degree behind the project, expressed both in terms of membership in the Society, and some level of self-booting financial commitment.
There would seem to be some 300,000 aggregate count ‘members’ in Facebook Groups which relate to targeting issues. There are so many groups that I would not wish to attempt counting them. Frankly, there are too many such groups, and some of them appear to be run by fake TIs of the worst kinds. Be that as it may, ‘members’ in single quotes is used because the typical member of one group tends to also be member of 3-5 other groups, or more. So while that negates the 300,000 figure, it still means that there are many tens of thousands of TIs in the Facebook community. I’m thinking around 70,000 specific individuals.
I and the Free Will Society has repeatedly reached out to virtually every one of these groups. And yet, the Fake TIs have made themselves known by their response, which is that form of subtle self sabotage and refusal to help themselves… the hidden commonality. The Society should have by now many hundreds of Members, perhaps into the thousands. It should have, by now, accumulated at least several to tens of thousands of dollars in contributions toward its proven viable goals. Failed organizations such as FFCHS have previously exceeded these kinds of member and donation numbers several times over, and for fraudulent and/or foolish causes in some cases.
Yet at best, we have had some 40 Members, almost all of whom balked at modest $25 annual dues. At best, we have raised a total of less than $2K in contributions and membership fees. The bulk of that has been because I and one other author have donated 100% of the sales of our ebooks (not the profit, the actual sale price) to the Society. I remind you that I have essentially been homeless for the last three and going on four years, though I now at least have a place to affordably park my Mobile Home — and yet I still made those donations.
What have YOU done? Click ‘like?’ Or is your devotion to your cause so strong that you dared to click ‘share?’ SHAME!
I must conclude that if those are the limits of your action, you are not a genuine TI, but a fake. If you won’t lift a finger to help yourself by helping to establish a stakeholder position suitable to a large investor’s need, then we never will attain the funding needed to realize the effort. Your apathy and lack of participation betrays your own cause as fake. No one else. Not the perps. YOU!
You belie your claims of targeting and your disdain for it, rendering it a moot footnote in terms of importance and validity. If you will not take action to support something proven to work, you have both sabotaged your own best interests, and deliberately refused to help yourself, and you fail to actually be part of the community, supporting the community.
Example: I recently posted on my main FB feed a simple post underscoring much of what this article describes in simpler terms. It was a call to action which specifically chastised simply clicking ‘like’ or ‘share,’ instead of actually doing something. Out of some 3,000 FB friends, there are several hundred who are TIs. What do you suppose the response was?
[[ One like, and one share. ]]
What other reason can there be for that kind of inaction? YOUR inaction? Prove me wrong in my conclusions, or take action, now, TODAY. Here are six simple things a real TI with a serious intent on winning the war would proactively do, given the above facts:
- Join the Free Will Society (.wordpress.com);
- Use the promotional tools provided by the Society to spread the word;
- Donate to the cause (gofundme);
- Yes, LIKE and SHARE things which promote the Society and the project;
- Directly reach out to fellow TIs as individuals and engage in two-way dialog to convince them to do the same six things (evangelize our cause). You will then know who is fake, or not, yourself, experiencing them first hand, as do I;
- Stop doing those things which aid in your targeting.
Unless you do these things, then I must conclude that so many of you are fake, that there is no point whatsoever in attempting to help anyone. And boy, will that make my life a lot easier. And then, you can go back to complaining about how bad things are, and liking and sharing similar miseries posted by others.
I, the Free Will Society, and the future residents of Free Will Haven await your decision. I’ve attempted everything I can think of. Now it is up to you.
One final note: it would seem that the fakes have been using Facebook’s complaint feature to cause facebook to ban me from posting to the TI groups. Anyone who has ever read any of my TI group posts knows that there is nothing in them which approaches any definition of ‘offensiveness’. So, as I can no longer post to such groups, this to, is now up to you. The damage has been done, and now only you can undo it.
YOU are what you’ve been waiting for!
…and I’m no longer interested in trying to help those who won’t help themselves.
Your future, and the future of the Society is in your hands.
Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Color of Law; Police abuse of power in personal agenda
In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.
This is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.
But there is a DO list! Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.
The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.
He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.
The other shoe that usually falls…
Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).
After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’
Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.
NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.
Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.
“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.
In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.
Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’
I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.
The two shoe laces are tied together…
This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.
If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.
In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.
Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.
Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.
So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.
NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.
Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.
Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.
If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.
* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.
So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.
You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.
We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.
Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.
1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.
2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.
3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.
4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.
I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.
It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.
Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.
The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.
What you will learn from this post:
- the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
- with the same fascination with ancient mysticism, occult, and numerology;
- and the same desire to associate their works with symbolism such as the pyramid;
- that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
- said pyramids sharing commonalities in occult alignments and numerological peculiarities;
- where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
- and another complex of pyramids appears to involve hi-tech mind control;
- and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!
The Source of Illumination is darkness…
In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.
It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.
In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.
Here, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.
Square one, the base lines of Cheops
Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.
So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?
There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?
Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’
So let us pause and consider with conscious effort…
Square 2: a review of new pyramids around the World
There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.
I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.
But they did not.
Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.
While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).
At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.
So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.
The problem of useful presentation
But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.
But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.
Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.
Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.
Verbal presentation example
Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.
Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…
And, this is what they believe about these numbers:
In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination. Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.
Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.
The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.
In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.
The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).
A graphical review
Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.
It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.
There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.
And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!
Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’
Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.
We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.
So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.
For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!
Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!
Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…
Scoring is as follows:
- center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
- base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
- Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
- any extended link to an additional pyramid (extended alignment) = alignment score x 5;
- link to Cheops (Cheops alignment) = x 5;
- link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
- link to other historically old sites (Masonic alignment) = x 2;
- 1 point for each alignment and for each pyramid at site;
- magic numbers, angles, dimensions, etc., not part of scoring;
- Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
- maximum score limited to 99
Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.
Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points
Star pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points: 56° 7’19.42″ 3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34
Karlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27
Bickling mausoleum UK 2 alignments w 1 Δ = 13 points: 52°49’9.01″ 1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
Schoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…
Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).
These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.
CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.
Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…
Sauerland, enigma equal to Cheops
Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.
Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.
You do have a pipe of some sort, don’t you… and a whip and hat?
Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.
Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?
I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.
Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.
The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…
This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…
Now, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.
The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.
But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…
Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.
Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?
I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’
Is it a conspiracy?
If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.
“Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable… Of all the means I know to lead men, the most effectual is a concealed mystery.”
This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.
What you will learn reading this post:
- what RFID is, who is behind it, and why you should fear it;
- about Digital Angel, and the bio implant tracking version of RFID;
- why you should fear it, put away petty ideological differences, and unite against it
- what you can do to defend against it;
- the greater strategy RFID is in support of (the ultimate threat).
Invasion of privacy tiny in size, massive in scope
Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.
Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.
RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.
But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.
Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…
Smart Dust, RFID, and the Mark of the Beast
i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.
The Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17 “And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.
This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.
What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.
There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.
Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).
That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real ID‘ program is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’
In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.
But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)
Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’
Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.
And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.
And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.
- RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
- Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
- Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
- Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
- All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
- Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
- Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
- According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
- Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
- One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.
What can you do to defend against it?
Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.
As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.
But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.
There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.
I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.
I also suggest taking advantage of these resources as contingency against the worst:
The history of RFD tells all
It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.
Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).
Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.
From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.
LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.
In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.
The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.
All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.
And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).
Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.
Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…
Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’
Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.
The other shoe drops
As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?
It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon – a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.
Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro. What you will learn reading this post: • all TIs could benefit from professional TSCM electronic sweeps; • that isn’t likely to happen; • the poor-man’s TSCM pro isn’t a pro, and might be a fraud; • there are low-cost meters but improper use can be dangerous in many ways; • there is a solution, and help implementing it — and here it is…
The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.
As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
The way it is
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
Knowing the difference can alter TI tactics
About Death Threats
Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com.
What led to this book? The definitive International conspiracy.
After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.
The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.
The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.
The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.
Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page. But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.
This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.
Why UTC matters to this new book
Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.
Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.
Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.
The plot thickens
I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.
By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).
As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.
An important detail
And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true. There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.
There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.
Stray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.
In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.
The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.
There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.
The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.
The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.
It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.
To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.
After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.
Symptoms, regardless of cause
At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.
Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.
Serious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.
In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.
The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.
Smart Meters and stray voltage; a possible new conspiracy
A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.
Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.
It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.
The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.
Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.
Stray voltage as targeting weapon
Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.
Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.
In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.
In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.
Proving stray voltage
To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.
The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.
Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.
If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s owner/renter’s awareness, even though BOTH are in use — by SOMEONE.
It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.
And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.
What will happen if a natural disaster or social upheaval comes and government cannot, or will not be able to defend you, your home, or your community? When armed marauders or looters come, will you stand alone, or will you have your own local network of helpers: Paladins?
What is a Paladin?
“Paladin” is another word for Knight, a kind of soldier of good moral character who in times of Olde served his fellow knights, community, country, and God. P.A.L.A.D.I.N. members are similar, and yet different. They are somewhat modeled after the Paladins in the popular Fallout computer game series, but THIS IS NO GAME. Fallout takes place in a future post apocalyptic World where there is no government, and everyone is struggling to survive, which literally means at times, kill or be killed, perhaps even eaten by others. Several groups compete for control with lust for power as their agenda, but the Paladins were formed in an attempt to maintain order and protect against such threats — a bit like self-organized Police the people come to rely upon.
Almost no one is truly prepared for disaster or civil upheaval. When it strikes, the impact of the disaster is therefore nearly total. All one has to do is look back on Katrina, or any other major disaster or upheaval around the World where local governments were unable or unwilling to respond — to see the value in not having to stand alone in a crises. FEMA and other government ‘help’ in Katrina was less than ‘useless’ for an extended period of time, actually causing more harm than good in many cases. Local law enforcement was either unavailable or, at times, a serious threat to many a resident’s well being. Likewise for the National Guard.
In such events, local governments at any level collapse and become non existent in domino fashion, while regional and national governments play political waiting games. The following is a quote from From Disaster to Lessons Learned: What Went Wrong in the Response to Hurricane Katrina?The Dissolution of Government
As noted earlier, disaster response in the U.S. is predicated on a system of “cascading failure,” in which successively higher levels of government are called in as lower levels are overwhelmed. However, the system requires some government to be in place. When the storm hit, local government in New Orleans, for all intents and purposes, ceased to exist. Both politicians and administrators had evacuated prior to landfall, and what little structure was in place was immediately rendered ineffective. The severity of the disaster also paralyzed state government and stunned federal government officials. A period of many hours passed before coherent calls for help began to travel up and down the system; even then, they were generally unfocused and nonspecific. Mayor Nagin’s media appeals for the federal government to “send everything” were heartfelt, but were so general they were difficult to act upon.
Meanwhile, at higher levels of government, a political showdown was brewing between the White House and Gov. Kathleen Blanco of Louisiana. Louisiana’s National Guard was heavily deployed to Iraq at the time of the storm, and the governor had activated pre-existing agreements with other states to “borrow” National Guard troops prior to landfall. These troops were quickly moved to the area, but the White House wanted to federalize the troops, while Gov. Blanco wanted to keep them under state control. The White House also disputed the timing of the governor’s request to release active-duty military troops into the area, although later evidence showed that the request had come much earlier than initial White House claims.
Even once on site, FEMA and National Guard, et. al., cannot be everywhere at once, and they cannot solve all the problems and threats people face. In some cases, policy or needs dictates result in harm to individual residents, mostly unintentional, but at times, intentional. In the end, almost everyone needs to fend for themselves for a protracted period of time, and that often means defending themselves from each other, or facing general extreme hardships or death, alone.
In Katrina, nearly 2,000 died, and many died at the hands of others (including authorities who opened fire on crowds trying to escape across a bridge). There were, in addition to looters and aggressive authorities, at least one known roving gang of vigilante Whites who had set about to kill Blacks they deemed looters, ‘loosely defined.’ The true number of murders is unknown; few records were kept given the mass casualties, but ‘bullet riddled corpses’ were not hard to find. Where there is no law, lawlessness ensues.
Bad things happen
Disasters are all too common, some worse than others. But imagine an outright siege caused by insurgents, racial violence of the sort this country has recently seen, or even military invasion such as foreseen in Operation Lion Dance; where Chinese flood into America via the Canamex rail system, hiding in container cars which can be parked on any rail siding in America from a laptop. Or perhaps it is simple revolution or civil war born of irreconcilable political differences. There are many such threats, none of which are especially likely, but all of which are specifically possible.
P.A.L.A.D.I.N. stands for Post Apocalyptic Local Area Defense Information Network; the core organization. Do not let the gloomy sounding name deter or fool you. While it certainly could be a possibility that doom and gloom awaits us on a regional, national, or global scale (it is after all forecast by virtually every religion and many experts in military, financial, and political circles), any simple disaster or localized upheaval can result in a crisis government is unable or unwilling to address quickly. It is even possible, some believe, that government might become the cause or actual threat themselves, such as in a military coup. But if having Paladins available to help you fend off a crises in a post apocalyptic tragedy, how much better then that they could be available in a lesser threat, such as a killer quake or storm?
Here are just a few such threats — do you have everything in place to survive? Will you, alone, be able to defend them from those who do not? Or will you be waiting for government to get around to attempting to rescue you, not as a soul in need of help, but a mere politically acceptable (expendable) statistic should they fail?• Sudden Poll Shift — a sudden shift could melt the ice caps and cause serious globally felt quakes • Sudden Ice Age or Ice Cap Melt — choose your favorite scientist and worry with them • Super Volcano — doomsday shroud encircles the planet killing all crops, causing ice age • Super Earthquake — hundreds of thousands or even millions could be homeless and helpless • Asteroid Strike — we’ve already had nearly a half-dozen near misses in the last twenty years • EMP Attack — total loss of all things electric, throwing us into pre industrial age • Solar CME Flare — same as EMP attack, but potentially global in impact • Planet X — we know it’s coming soon, its effects upon Earth could be catastrophic • Nuclear or Bio Terrorism — could render an entire region helpless • Pandemic — we keep coming close to having one, it’s only a matter of time • Financial Collapse — what happens when money has no value or is unavailable? • Civil Insurrection — race war, revolution, response to Martial Law, gun seizure • Military Coup — a top U.S. General has forecast it possible • War or Nuclear War — no nation is immune from invasion or sneak attack • Alien Threat — leaders of several nations and scientists have said it possible • Prophetic End Times Tribulation — seven years a mix of the above, or worse
The P.A.L.A.D.I.N. concept is simple, and addresses an important question: is it better to stand alone trying to protect your home and family against armed marauders or other dangers seeking to take what you need to survive from you, even your very lives… or to be prepared? Prepare a go bag and survival supplies, by all means, but to become a Paladin is to pre establish a local mutual defense network which can protect you and yours, your fellow Paladins, your community, and by extension, your country and way of life. P.A.L.A.D.I.N. is a non militia solution that can effectively become functional equivalent of a small and focused militia — on demand. It does not suffer the overhead and commitment of a militia, nor the political tainting.
Paladins may also elect to engage in general humanitarian missions at any time, for any reason or cause; actively active activists. This includes the possibility of providing aid to stalking victims, the homeless, or anyone being unfairly treated by another group in some way which cannot be well addressed by local authorities. It can even mean choosing to side with civilians against authorities in a non violent protest; whatever the Unit deems appropriate. Were I a Paladin near to the tribal protests in the Dakotas over the oil pipelines, I would have urged my Unit to give on-site support, for instance.
Everyone should join!
Anyone who has much to loose if accosted by armed strangers in a crises should join. Stalking victims and other persons who have experienced unusual targeting should definitely become a Paladin. This will enable you to call upon other Paladins when threats return, and help to document, prosecute, or thwart such targeting. Activists should join Paladin, as it becomes a tool useful in a cause, where you can make good argument to fellow Paladins to engage with you — and enables protection should those opposed to your cause elect illegal harassment campaigns against you (target you). Minorities and others who are consistent victims of gang harassments should also join, as it provides yet one more ally and strengthens your ability to stand against aggression, especially in rioting. Ex military should definitely join as an alternative to a Militia, which often has a bad PR image due to a political or religious bent they may have assumed. All are welcome.
To be a Paladin does not require ownership of a gun, but it is ideal. To own a gun does not require good training or a military background, but it is ideal. Weaponry and combat skills are only important WTSHTF big time, and most gun owners do know how to handle themselves, and they also tend to own more than one weapon, which means that in a pinch, they can share, teach, and lead. The primary requirement is to be of good moral character and to care about your family, your community, and your country. The rest will take care of itself; unity is the key factor.
P.A.L.A.D.I.N. Units of 6 or more Paladins are formed in any given Zip Code once at least half of the members do have arms, and at least one of them has some military or leadership background suitable for acting as Commander. Such leaders are provided with tactical advice on formation and operation of their Unit, and given contact information for any adjacent Units. Paladins can then call upon each other to request aid, or to propose missions to aid others. There are provisions in the formation of Units which allows local Units to join up for improved functionality, and for like hookup with Units in other communities, should regional operations be necessary.
Membership is by default anonymous except between Unit members and adjacent Unit Commanders, but that does not mean members must remain secret. Indeed, public evangelism and recruitment is encouraged (promotional materials will be made available). There is no membership fee to join. However, once a Unit is formed, a small annual membership fee determined by the Unit can be assessed to help fund missions or enhance emergency response capabilities. There can be some small personal expense in order to facilitate Unit functionality, such as the purchase of a Walkie Talkie by each member.
Each Unit is autonomous and stands alone in responsibility; it is not a political body or under the command of a national head, such as myself, even as founder. Therefore, there is no legal liability or risk except for those actions the Unit itself elects to undertake. I am not bound by your actions, nor are yours dictated or bound by mine. You serve only your own Unit member’s best interests and mission goals for public good, and remain subject to all laws in the doing, each member insuring the next does nothing which threatens Unit integrity or viability.
There is no political leaning or bent, nothing which should alarm authorities. In fact, Units should consider making themselves available as volunteers to authorities as emergency helpers or, where law enforcement has such programs, reserve deputies. In such a case, each member is free to participate or abstain, which is generally true in all missions. Units should be prepared to submit to lawful military or law enforcement once order is restored in a crisis, and should maintain records of all actions for use by any needed law enforcement investigations after the fact. That serves both as protection for the Unit and members, as well as a means to prosecute evil doers who may have been confronted by the Unit. Everything is above board and transparent within the Unit, and as private or as public as the Unit itself elects.
TO JOIN: simply email your interest to join to proparanoidgroup at gmail com and provide your City, State, and Zip. This does not obligate you to anything. This will be used to update a database of members maintained anonymously at my Facebook page for the purpose. That page is organized in a way which allows determining if a Unit can yet be formed in a given Zip — your evangelism in recruiting other members is key to that eventuality.
Once a Unit can be formed, members are so advised and connected to one another for the purpose of determining if they should form, and if forming, deciding who will be their Commander. They are also provided with additional support advice on how best to proceed as a functioning unit. Once forming, individual members are then obligated only to commit to the goals established by the Unit for mutual self defense and whatever additional good they may do for community and beyond, in or out of crisis (missions.) Risk and investment are minimal. Rewards can include the possibility of continued life, liberty, and pursuit of happiness — in the face of dire circumstances bent on preventing same.
Other material to consider
The Post Apocalyptic Library is an important collection of life-saving information commonly beyond the average person’s current knowledge base, and which will NOT BE AVAILABLE once disaster strikes. It is a series of links to critical information which can be learned online or downloaded and printed for placement in a go bag or emergency supplies for later use. It is advised that extra copies should be made in advance for handout to others.
The FEMA, Martial Law, and Revolution Database is a collection of materials which seek to educate the public about individual risks and likelihood of events beyond their control, and/or give advice on how best to survive or react. It is an eye opening review of little known facts which may prove quite sobering. Don’t be yet another Sheeple caught totally unaware.
Dropping off the Grid: abandon the Control Matrix. This author has done so for the last three years, and though living a rather spartan life by comparison to what came before, the freedom is enhanced, and the quality of life (happiness) with it. Living simply has proven to be more satisfying — and should be much safer in the event of major troubles. Here is a snapshot of possibilities. I will soon be offering a Seminar or other promotional venue (i.e., video) on the topic.
An Intentional Community is one way to live off the Grid. Here is one example, a low-cost, self-sufficient community based on tiny homes, a project of the Free Will Society I founded to helped stalking victims: it is called Free Will Haven. It has a gofundme. Such a community is by default more or less the functional equivalent of Paladins.
OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What makes you a terrorist when you live in a Police State?
Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.
One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).
OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.
R.A.P. Sheet, H.Michael Sweeney
1976 Wire Tapping, 2 counts, charges dropped for insufficient evidence
1980 Embezzling, charges dropped after resignation from company
1983 Counterfeiting, Drug Smuggling, sentenced
1984 Wire Tapping, charges dropped for insufficient evidence
1985 Shoplifting, 4 counts, sentenced
1987 Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution
1988 Wire Fraud, 3 counts, sentenced
1988 Smuggling, 2 counts (bioweapons, diamonds), sentenced
1990 Espionage, Interception of Electronic Communications, charges dropped by NSA intervention
1991 Bank Robbery, 4 counts, sentenced
1991 Wire Tapping, 4 counts, cold case due to flight to avoid prosecution
1992 Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,
cold case due to flight to avoid prosecution
1993 Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution
1994 Wire Tapping, cold case due to flight to avoid prosecution
1994 Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped
1996 Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution
1998 Wire Tapping, Stalking, cold case due to flight to avoid prosecution
1998 Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced
1999 Possession of Controlled Substance with Intent to Sell, sentenced
2001 Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention
2002 Terrorism, 4 counts, cold case due to flight to avoid prosecution
2004 Bioterrorism, case closed due to lack of evidence
2004 Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered
2016 Armed Robbery, 2 counts, cold case due to flight to avoid prosecution
2016 Bank Robbery, cold case due to flight to avoid prosecution
By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.
Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.
So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.
All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).
We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.
OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.
When I created the Free Will Society to aid stalking victims, one of the lofty goals was to eventually build some form of Safe Haven community for them. That dream now seems on the threshold of coming to pass. The result is Free Will Haven. iWhere can a targeted individual get help? Free Will Haven; Targeting Free Intentional Community for Stalking Victims by H. Michael Sweeney proparanoid.wordpress.com proparanoidpress.com proparanoid.net copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. What is Free Will Haven?
Free Will Haven?
MAJOR UPDATE/REWRITE: Aug. 2017. It’s been three years now since we formed the Free Will Society with the intention to establish a low-cost, self-sustaining, targeting-free intentional community (Free Will Haven) for stalking victims who can’t get a fair shake at life in populated areas. A lot has transpired, some of it really good, some of it bad, and now, it looks like we are ready to ramp things up a bit. So I thought this page should be rewritten, and perhaps, be simplified. Very little of the original post remains, or remains unchanged, and I have added rather a lot about the Beta site which was established and our plans for an even better location. Over 2,500 victim days targeting free! Compare that to over 12,000 stalking victims I’ve had contact with over some 25 years where almost every victim says they can’t get even a few days respite, if not for the stalking, then the fear of it.
Intentional Community? Beta site has been undertaken
Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, needs, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), dba Fellowship for Intentional Communities (Facebook page). The Free Will Society is now a Member organization of the FIC, which gives us access to a mountain of informational resources and other aid not previously enjoyed. Much of this is now available and useful to FWS Members as result.
In Free Will Haven’s case, our goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, Global Warming, Carbon Tax/Credits/Currency, etc.); survivability (in this case, against all forms of surveillance, stalking or targeting of individuals in any manner), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Defensive survivability lays at the heart of the plan, and is based on the many books and online consultancy I have made available as a privacy/security expert to targeted persons for more than 25 years as The Professional Paranoid, the title of my first book.
Low cost is addressed primarily by focusing on portable tiny homes, or RV vehicles for short-to-long-term housing, and communal style co-op sharing of centralized services and site-produced foods and resources. Cottage industry will be encouraged to augment personal incomes, and/or like projects for the collective. It is the goal to allow one to live a decent and enjoyable life-style for less than $500 a month, total outlay (I’m managing on $400), that figure based on purchasing of food and supplies from outside sources. Once self sufficient, costs would decrease accordingly.
I think of FWH as a bit more flexible than a community. I see it as also acting as a short-term hospice for those seeking temporary shelter and healing from their ordeal, and in some cases, a school of defensive arts, and even self-replicating factory. Residents can stay as long as they like. Once fully rested and obtaining stability in their lives through being targeting free for a sufficient period, they might wish to return to society, perhaps under a new identity (we can help with that), or, perhaps, having learned what it takes to establish and operate such a community… go out and create another one, somewhere else. We would like to see several of them nation-wide, and even internationally.What makes Free Will Haven an intentional community?
Tiny homes and RV life style?
A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization.
The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.
You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven.
The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Or, they can be ad-hoc, and built from whatever you can cheaply get your hands on. Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.
I have established a special page chock-full of information about the ins and outs, pros and cons of the almost endless options available in choosing an RV type or style of Tiny Home. It also addresses the lifestyle, itself. RV solutions provide a quick and dirty ‘home’, completely self-contained with everything needed including their own backup generators. Tiny homes tend to be minus some aspects, such as bathrooms, but can include them; its up to the individual. They can end up being more roomy and comfortable than an RV, and seem more ‘homey.’
The Free Will Haven concept encourages use of an RV upon arrival, and the construction/installation of a tiny home (many of which can be portable and towed like a trailer). If electing a tiny home, any RV in hand can then be sold or rented to someone who does not have one, sold for long term, rented for short term. The same can be said for the Tiny Homes should a resident choose to relocate and not take the home with them. There is no reason anyone should feel that becoming a resident has no exit options. Quite the contrary. It increases options.
Beta site effort proves viability
The original Beta effort has resulted in the purchase and operation of a rather off-grid beta site by one of our founding members using their own money. It operated for about two years serving two TIs using most of the basic plan established by the Free Will Society. For whatever reason, the owner/operator of the site elected to abandon reliance upon and participation with FWS, though we had provided money to help pay for installation of electrical power to the site. There are clues it involved personal matters as well as relationship issues.
While there is some mystery as to why a refusal to engage in dialog, it is clear the Beta site was successful in terms of the key-most goals; survivability targeting-free. We are grateful for their effort. The Beta site failed only because of eviction for contract violations of some sort, presumably through miscalculation by the owner/operator in absence of help from the FWS. Due diligence is always upon the purchaser, who was at a disadvantage in many ways in terms of ability to do so. It is a regrettable outcome.
Meanwhile, I myself have been living as a homeless person in a motor home. I have essentially established a semi Beta site of my own where I was the only resident, also in a deeply rural environment. Between my experience and the actual beta site, there has been a total of more than 2500 targeting-free days. It has been a joy for me, and the Beta site operator has come forward publicly to express positive views towards the experience and an intention to attempt yet another effort. In that effort, the operator has affiliated with a new core group with a troubled past with respect to credibility and honesty, and we wish them all better luck.
The concept is proven. 2500 stalking free days!
Now it is time to move forward more earnestly, and do it right, this time.What is a tiny home like in Free Will Haven?
The future: location and logistics?
The original beta site (image) was less roughly 1 acre in size, and rather a long, narrow unimproved property at a high altitude in a colder part of Oregon with a dry clime (annual high of less than 60 degrees). It had no water but was near to a river with drinkable water and fish, and she had a water filtration system. It would support a well at shallow drill depth. It had no power but as it fronted a main highway for the area, it did not cost much to install power. It would support raising crops, and was established with an Airstream trailer (very nice) and several other towable items, and self-assembled Quonset-like structures for storage and greenhouse function. It is not known if a second RV was brought in for the second resident; the Airstream is thought to sleep up to four persons in two different accommodations. Still, it is not a terrible site, actually fairly decent given it was purchased sight unseen and based on a limited budget.
This site was not chosen with the help from or according to the ideal guidelines established by Free Will Haven. Since the purchase was made with the operator’s money and in consideration of their small income, that exercise of control was perhaps expected. The basic-most needs were considered to the extent possible. But While there was some good visual separation between the site and neighbor structures by trees, it was not as private as FWS would prefer. There are two neighbors within about 600 feet of the property (less than a city block). The nearness of a main highway, though also buffered with a lot of trees, is also not a perfect situation. I do like the fact that the rear of area (not shown) is backed with a high bluff which is uninhabitable, and provides security.
We can and should do better. Recently, my Publisher bought some property at auction and invited me to live there rent free. While it turned out not to be possible due to dense forestation requiring expensive work just to get onto the property with a motor home, the method of acquisition was unrealized in previous review of potential sites. Things are looking up.
Compare the the Beta site to this 20 Acre property which represents the ultimate site for meeting goals established for Free Will Haven. The road is a gravel road established for timber harvest and is seldom used by anyone but hunters — residents could hunt on the property if desired! It dead ends at the property, which is a flatland at the top of a hill, and continues into the property as shown for easy access.
It has multiple developable locations and area for growing crops without the need to fell trees. There is NO ONE for miles in any direction. These are the kinds of features preferred in the actual site. Depending on many factors, a really good site could be as small as perhaps 5 acres and still prove satisfactory. Geographic features such a hill can negate concerns about privacy as relate to adjacent properties. There are many such opportunities; cliff faces or steep terrain, rivers, national forests, etc., can all be allies.
This particular location is very inexpensive to purchase despite the larger acreage, simply because there is zero access to commercial power at any cost. That lets it out of consideration, as neither solar nor wind power enjoys economy of scale in the levels required to support a comfortable life style for a given individual, much less a collective. It would take approximately $9,000 per living space for solar, for instance — without a battery system to cover nighttime use (another $4,000). Figures are based on the same power level as the generator output in a typical Motor Home. If one had a few hundred thousand to tie up into an off-grid house, that would be a small bit of the budget. But that’s not your typical stalking victim. I’ll mention here that the weather is much nicer at this location, too, withs highs in the 80s.
The all important factor in any land acquisition, of course, is cost, including what it will take to occupy it successfully. As it happens, there are properties which fit these kinds of requirements which are available at a price I can afford. Sort of. The trick is finding them where the owner will finance with ‘ez credit terms,’ which, fortunately, is not unheard of. I have to be able to handle the monthly payment out of my pitiful social security payments, and have a low enough down payment that I still have money to pay for bringing in power and a water storage system, and a few other items such as a storage shed, and a freezer (a Motor Home typically holds about four days worth of frozen foods).
Alternately… should the Society obtain a large donation or one of our members win the lottery (I buy tickets), I’ve found marvelous properties in Missouri which offer as much as 160 acres fully developed as a farm or ranch capable of producing an income suitable to cover mortgage… for less money than it would cost to buy a house in most big cities. Many of these have rivers, lakes, or ponds and wooded areas full of all manner of wildlife, such as Wild Turkey, Geese, Ducks, Deer, Boar. This allows hunting and fishing right on the property, many of which have hunter’s cabins or blinds in place. But I’m not waiting for $300-500K donations.
I’m scouring land listings for something I can buy NOW. And, I will be starting a new gofundme for anyone willing to help, and/or wishing to participate, perhaps, as resident.
Participation: Membership and Residency
Anyone and everyone is requested to join the Free Will Society, stalking target or no, to support the Free Will Haven project (and other projects planned in the future). Annual membership is $25, currently payable by PayPal to proparanoidgroup at gmail com, adding comment to that effect in the message it requests in the process. Membership gives one access to more detailed information, including the history thus far of the project in detail, and an opportunity to participate in and contribute to the ongoing dialog and direction of the effort. It also gains access to dozens of resource materials from our membership in the Fellowship for Intentional Communities.
One must be a Member to apply for residency. There is a separate $25 fee to cover the application process, which is required to insure that all residents will be able to benefit without social incompatibilities. It is unfortunately true that there exist people who claim to be stalking victims who are not, for instance. While one can join and apply simultaneously, I advise against. Membership will provide access to a flood of information and direct contact with other members, and could conceivably end up changing a person’s mind about residency. One should be fully informed before deciding.
The application process further educates the applicant toward decisions about if, when, and how to undertake the actual move. It analyzes the applicant’s ability to actually undertake the venture with a reasonable expectation of happy success, fully informing them of what to expect in the way of possible downfall, all based on their precise personal situation. A checklist of things to consider and steps to be taken is reviewed in great detail, critical in determining the true cost of ‘move in.’ Once approved, they need not act immediately, and can work through the checklist at their own pace, as may be dictated by anything from costs to family affairs in need of tending.
How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.
What is a Web Troll?
by H. Michael Sweeney
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How does being a web troll work?
UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.
Are you being targeted by online government trolls
How Social Network Trolls Target, Track, and Psychologically Profile You
Reading this post you will learn…• That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU; • That there are troll profiling and tracking tools or methods which can be recognized; • That there are ways to protect yourself without drawing more unwanted attention; • That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting. Is social media infiltrated by government trolls?
Government and Commercial Trolls
Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.
These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.
The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.
Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.
And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.
How can you spot a social media troll?
Differentiating an innocent graphic from a potential spy tool…
There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.
So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.
Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic. YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:
So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?
When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.
Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”
Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.
Are social media trolls sociopaths or psychopaths?
More Direct Trolls; Psyops and Sociopaths
The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.
Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.
Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.
But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?
Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.
Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).
It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.
Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.
This is also true of the sociopathic/psychopathic ‘cause’ trolls.
Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.
Can trolls lead to real-world targeting?
Dangerous escalations; why we dare not ignore trolls
The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.
And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.
But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’
What should I do if I encounter a social media troll?
What to do with a Troll
I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.
But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.
My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.
Are social media trolls dangerous?
Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it. The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.
And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.
It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.
What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.
Free will: a Tis greatest asset, oft hardest to employby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can you do if you are a targeted individual?
What you will learn reading this in-depth post…
- That belief structures define us, establish our psychology, and our responses to stimuli;
- There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
- Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
- The pitfalls of targeting psychology as it relates to Free Will, and;
- How to use Free Will to thwart targeting and run psyops on the perps.
Where do you get help if you are a targeted individual?
Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…
Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.
Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.
We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.
When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.
Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.
Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon. For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.
This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted. Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows. But that does not mean the information has no power over perps, if realized and properly used.
Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.
The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.
Why won’t people believe it when someone says they are being targeted?
It gets tricky
Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.
Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.
Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.
Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.
Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.
This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’
Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.
Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.
At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.
Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.
Who is responsible for political control technology?
Consequences of false beliefs:
To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.
This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.
But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.
This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).
The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.
I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.
Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.
Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).
And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.
Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.
Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.
The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.
Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.
This is why I no longer participate in group dialogs, polls, petitions, etc.
And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.
How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.
I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.
But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.
What is political control technology?
But then there is FREE WILL
Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.
A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.
Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.
To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.
They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.
- Gang Stalking – We targets are alone. (neverending1.wordpress.com)
We go through life thinking we know who we are and why we do what we do, but like Actors who start believing they are the sum of their Press Clippings and the heroic characters they play, we are frauds. It took a simple but powerful video to teach me the truth, something I once knew, but lost sight of.
I once was lost, but now am found.by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What you will learn reading this post…
- I’m a fool, and have been offering knowledge as if expert and wise, when in fact, I fall short;
- While my advice and opinions are based on truth and logic, I should have offered a better, more useful message;
- That message does not betray my beliefs and life experiences, but instead, explains them, and gives them meaning;
- That it should be the same for you as it was for me, if you will but open your heart and consider it;
Whre can I get help when no one believes my story?
A note of apology: a technical glitch with wordpress refuses to let me format the document correctly, making it a little difficult to separate paragraphs. No matter what I do, it displays as intended in preview mode, but not in actual URL access. I regret any inconvenience.
I’m talking about me, H. Michael Sweeney, aka the Professional Paranoid, activist author, and consultant on privacy/security, and abuse of power topics. People come to me for help all the time, and I’ve started to believe in the value of my advice as much as they hope it to be of value in their desperation. Well, my advice may be good some of the time (more often than not, I have always thought, based on feedback), but even so, I’ve not quite been offering the best advice, in the best possible way.
This self examination also translates to my abuse of power issues of which I so frequently write, as everything I tend to blog about is so much in parallel to the basic aspects of things now clearly revealed to me because of simple but powerful video, that I’m hoping those who read my blog posts as activists, will see that parallel as well. It’s not just about me, its about everything in the World and how we deal with it. Let me explain by first going back in time. Some of you who have read my material before may know some of this, but as Paul Harvey used to say, its time “For the rest of the story…”
Open Letter of Complaint to the United Nations, by Xin Zhong Qing
Received by H. Michael Sweeney direct via email March 18, 2013
PLEASE REPOST. NO COPYRIGHT NOTICE.
Notes indicated red by H. Michael Sweeney. As you read, unless you are already familiar with political control technology, you will be moved to dismiss the complaint as the rantings of a mentally disturbed individual. While it is certainly possible that is the case, it is also not only possible, but highly probable that the descriptions are true accounts as the victim is best able to relate in conversational English. Please consider such translation issues as well as the following facts before you make any such decision:1) As testimony to the State of Massachusetts Legislature on a Bill to limit use of electronic weapons reveals, there is NO symptom of schizophrenia (imaginary persecution or other unreal events, realities) which cannot be induced electronically; 2) Therefore, most victims of political control technology seldom have a correct understanding of the exact nature and cause of their targeting, and indeed, specific effort is typically undertaken to insure their beliefs are incorrect (you cannot fight a problem if you fight the wrong cause); 3) As one who has worked with hundreds of such victims around the World, I see select clues within the dialog which align with many similar charges from others within Red China, as well as other countries, including America. I am specifically comparing to cases where, after working with the individuals for a considerable time, tests and defensive strategies verified that targeting was real — though generally different than the victim’s original perceptions and understanding. 4) You will note that many of his prior letters were enjoined by other signers, up to 77 persons. 5) Yesterday, I got four hits to my wordpress pages from Red China (rare). One of the pages hit regarded how easy it is to start a revolution, which featured the 1989 failed Tiananmen Sqaure incident. Another features how to outreach as a targeted individual, my also my main page on political control technology, and another was my contact page. I now believe these were Xin’s visitations. Xin Zhong Qing is a fairly common name in China. There is even a Container Vessel operated by the Red Chinese Army of that name.
United Nations Commission on Human Rights:
My name is xin zhong Qing, Is the Chinese Jiangsu province Nanjing city an ordinary law-abiding civilians. Here, I on you accuse China Security Department “secret agencies ” in a group of spies criminals, they abuse “monitoring” privilege, make high-tech “brain control” technique, remote control my body and spirit, the implementation of more than 40 years, The days and nights of continuous uninterrupted secret torture persecution.
In the Chinese Cultural Revolution ” of 1971 , in the 20th century , I was framed for “5.16 counter- revolutionaries “, were subjected to cruel political persecution. This group of ” secretagencies ” in the secret criminals, in order to force me to, admit that they are “5.16 counter-revolutionaries”. At the same time, in order to stop me openly accused Justice voice, they use high-tech ” brain control ” technology means frenzied , day and night, 24 -hour continuous remote control of my body , the implementation of an extremely cruel persecution and assassination plot secretly tormented.
They are a group of secret agents Alcatraz. To me implemented secretly tormented persecution means extremely brutal, shameless, comparable to the German Hitler fascist concentration camp Gestapo and Japan 731 units of bacteria devil evil, their Monstrous evil, just pale into insignificance by comparison!
They control my body, every minute non-stop manufacturing my body, appear all sorts of pain; itching; extreme cold; heat; numb; vertigo; tremble; Extremely uncomfortable; incontinent, frequent cough vomit nasal bleeding paste the nose, as well as the infamous “sexual torture” and other pain. For over 40 years time, wherever I go where, this secret pain never stopped, and I can’t sleep, normal study, work and life, day and night in very suffering pain, like a living dead!
Their Monstrous evil, not only a violation of China’s constitution and laws to “respect and ensure human rights” provisions, also completely violated the Charter of the United Nations and the “Declaration of human rights” and other relevant safeguard basic human life, survival rights provisions.
Therefore, I had to the Communist Party of China and Chinese government post a lot of complaint letters:
• In the December 3, 2007 issued a “President Hu Jintao to collective letter”(the 77 victim joint)；
• In May 5, 2008 issued a “Chinese” secret organization “open letter”.(the 43 victim joint)；
• In September 7, 2008 issued a “ An Announcement to the Whole World by Chinese Victims”.(the 65 victim joint)；
• In March 6, 2009 issued a “Accountability Mr. Geng Huichang, one of the leaders of the national security sector”. (the 76 victim joint)；
• In March 15, 2010 issued a “China’s civilian population, in fact, no protection of human rights! ”
• In August 16, 2010 issued a ” Ten Questions “Politics and Law Committee of the CPC Central Committee , Zhou Yongkang, secretary ;
• In January 1, 2011 issued a “To the CPC Politburo Standing Committee member of the open letter to all”；
• In April 5, 2011 issue “urged China’s security sector, Geng huichang and others pleaded guilty to the letter!”；
• In July 15, 2011 issued a “Geng Huichang, is China’s brain control criminal gang black Protectionumbrella!”；
• In February 24, 2012 issue”Notice to all Chinese compatriots Book”；
• In August 4, 2012 issued a ” Accountability Zhou Yongkang, Politics and Law Committee of the CPC Central Committee! ‘”And so on
However , I have sent the Many letter of complaint, not only did not get any reply. On the contrary, the arrogance of this gang of secret agent criminals more arrogant , more intensified secret remote control of my physical and mental torture persecution . I am still in the” shouting days days should not ; shouting ground ground should not” suffered torment pain life..
Now, I tell you — the UN Human Rights Commission issued this complaint letter, urging you under the Charter of the United Nations and the “Declaration of human rights” and other relevant human rights documents, To as a member of the United Nations of China National Security Department “secret organization” this group of Spy against human criminals are a Monstrous evil, Must be a serious investigation , and the findings made public . At the same time , Will referred the case to the United Nations Criminal Court, Will this group of secret Spy criminal prosecution, for crimes against humanity!
The following annex, is my day and night, in more than 40 years of uninterrupted suffered this group of secret Spy criminal on my body remote suffering persecution, daily live record fact evidence excerpts (January 1, 2012 — November 30, 2012) :
Yours lofty salute!
China’s Jiangsu Province , Nanjing “mindcontrol”victims :
February 28, 2013
Sender: Nanjing victims ZhongQing Xin(screen name Red Master)
Address: Nanjing Xiaguan District # 94-14 Tung Cheng, a village
623962269 @ qq. Com
Note by H. Michael Sweeney: the first link appears to be being blocked in Red China. Attempts to reply by email also fail.
在上个世纪1971年的中国“文化大革命”中，我被莫须有地诬陷为“5。16分子”，遭到了残酷的政治迫害。这伙“秘密机构”中的特工罪犯，为了迫使我就范，承认自己是“5。16分子”。同时，为了捂住我进行公开揭露控诉抗争的正义声音，丧心病狂地使用高科技“ 脑控” 技术手段，昼夜24小时不停地遥控我身体，对我实施令人发指的秘密折磨迫害和阴谋暗害。
Lessons we have ignored from fallen Empires, both in real history, and in popular literatureby H. Michael Sweeney Permission to duplicate granted provided reproduced in full with all links in tact with credit to the author and proparanoid.wordpress.com
government out of control, a fascist Police State
As it happens, there is a Facebook Group named I AM Brandon Raub. I have joined this group and the commentary there has prompted this article. Please consider this an invite to join, as well. In specific, this post is in response to the analogy made in the Group that we should all say “I AM Brandon Raub!” in the manner of “I am Spartacus!” So lets examine that, and other reasonings:
government out of control, a fascist Police State
Who is Brandon Raub?
Brandon, a highly decorated U.S. Marine, is the first to make national news of about 20 ex military persons targeted by the Federal government in their paranoia that We, The People, might choose to replace our government with one that obeys its own laws. That is to say, restore it to a fully Constitutional behavior. Currently, the Federal Government is outlaw not only to the Constitution and Bill of Rights, but in violation of the Magna Carta and many International conventions on behaviors relating to human rights, both in war and in peace. Don’t take my word for it as blogger, even mainstream knows it true.
On Aug. 16th, 2012, a small army of Gestapo Police, Secret Service, and FBI Agents knocked on Brandon’s door and took him into custody. Central to his arrest was Brandon’s Facebook posts, which I assure you, are far less critical of government than my own, and far less suggestive of dire future alternatives. I talk openly of the threat of revolution, Martial Law, and a Police State, where Brandon was more reserved, and says nothing but that which is patriotic and based in truth.
The difference is, Brandon is a recent retired Marine with significant combat skills, and I am not. Not just Brandon and the 20 others, but tens or even hundreds of thousands of recent veterans of Iraq, Afghanistan, and other deployments. You see, our paranoid government officially thinks ex military are going to become a fountainhead of domestic terrorist activities.
Actually, I think they are probably right to fear patriots, and have been trying to warn all concerned: where the actions of government are illegal and in violation of the Constitution, those with the training and skill to defend the Constitution and sworn to so defend it, ARE LIKELY to do so, if pressed to a point of last resort. The government has only two paths: forge ahead on their course toward a Fascist Police State and press the issue to an explosive tumult, or recant and find salvation in the Law of the Land, and restore Liberty to the ‘Land of the Free,’ a land falling well short of living up to the title.
In summary, and as proof of the problem, the following facts of the matter shall serve:
government out of control, a fascist Police State
a) Brandon was NOT arrested for what he said. He was arrested for ‘resisting arrest,’ but video of the event shows no such resistance. You cannot arrest someone for resisting arrest unless you first arrests them for some other charge. He was not given Miranda rights. He was arrested by local Police, and not Federal agencies. There was no other charge filed;
b) A County Judge dismissed the case stating the Petition for his Detention contained NO FACTS – NO REASON FOR HIM TO BE HELD. The Judge stated this was a violation of his civil liberties;
c) Federal agents still insist his posts are ‘terrorist in nature.’ Read his post, here, and you will see that all patriots are terrorists under government’s defective logic;
Note: Here is a remarkable video interview with Brandon by attorney and author, John Whitehead of the Rutherford Institute, so you can hear Brandon’s words, directly. Within it is the key section of the video of his arrest.
d) Regardless, Brandon was ordered placed in a Federal psychiatric ward for 30 days (but has been released short of that). Concerns were that he would be rendered a mental vegetable by chemical and shock therapies intended to neutralize him permanently, or at the very least become officially labeled as ‘mental’. The government believes that if you dare criticize government, you are mentally ill. That’s the same argument made (last paragraph in this link) in Iron Curtain countries to eliminate ‘intellectuals’ who opposed Soviet iron-fist rule. What does that tell you?
e) Family lawyers have been joined by legal council from The Rutherford Institute in seeking his release, pointing out that the legal document used in his rendition is problematic; that Civil Commitment Statutes are being used to silence individuals engaged in lawful expression of Free Speech. But the current outlaw government clearly has no concerns about Constitutional Rights.
government out of control, a fascist Police State
Say “I AM Brandon Raub!” in the manner of “I am Spartacus!”
Spartacus, a Roman Gladiator slave, led a revolt of Gladiators and formed an army of other slaves set free by force in the very heartland of the Roman Empire. In the end, as depicted in the popular film, Spartacus, the revolt was suppressed, and the survivors questioned to find Spartacus to be singled out for special punishment.
Spartacus stood up in arrogant defiance, but for naught. One by one, man after man with him stood in his stead and proclaimed as well, “I am Spartacus!” Their love and loyalty for their leader and their cause (Freedom) drove them, and so thwarted the Roman attempt. Well, “I am Brandon Raub in the manner of ‘I am Spartacus’.” I am as guilty as he of ‘terrorism’ for demanding a just government under the Law. I am as guilty as Spartacus for wanting freedom. What say you?
government out of control, a fascist Police State
Say “I AM Brandon Raub!” it in the manner of “I am John Gault!”
Ayn Rand‘s classic Novel (now a two-part film), Atlas Shrugged, shows the classic struggle between the forces of Socialism and Capitalism in their most simplistic and idealistic forms. Ayn had escaped living under USSR’s Socialist government to the U.S., where she found Socialism creeping into government, and wanted to warn us that ‘value given for value received,’ and ‘a man’s sweat and intellect are his own property’ should be preferred to ‘you didn’t build that’ and ‘those that have should give to the have nots.’
In her massive book, a work which profoundly influenced and changed the lives of many readers (including myself), a fictional plot element was the question found scribbled on walls and posted everywhere at large, “Who is John Gault?” There was no one by that name, in truth, but there was a man who lived the role, and the answer to the question was, he was the man “Who will stop the engine of the World;” to end the madness and restore sanity. In the end, those who understood and sought to right the wrongs joined with him in attempting to do so, each of them earning the right to say, “I am John Gault.” Well, “I am Brandon Raub in the manner of ‘I am John Gault’.” I want to stop the engine of errant government. What say you?
government out of control, a fascist Police State
Say “I am Brandon Raub!” in the manner of “I am a Jew!”
History is rife with examples of martyrdom for faith in the face of oppressive governments. Choose any faith you wish. I choose to focus on the Jews of pre WWII Germany, to make the point most evident in The Diary of Anne Frank. That point is best summed up in the oft quoted wisdom from Martin Niemöller, author of Gestapo Defied and, more subsequently made popular by Milton Mayer in his analysis of what went wrong in Germany, They Thought They Were Free. That book, by the way, with substitution of America for Germany, and various political figures and nomenclatures here in America for those of the Third Reich, could just as easily apply to our country, today. Are you so blind as to think otherwise? Read it if you doubt me, and know that I am not alone in the thought. But this is the quote which makes clear my point:
government out of control, a fascist Police State
First they came for the communists, and I did not speak out—
freedom of speech because I was not a communist;
Then they came for the socialists, and I did not speak out—
freedom of speech because I was not a socialist;
Then they came for the trade unionists, and I did not speak out—
freedom of speech because I was not a trade unionist;
Then they came for the Jews, and I did not speak out—
freedom of speech because I was not a Jew;
Then they came for me—
freedom of speech and there was no one left to speak out for me.
Had people spoke out… in unison… Hitler’s power would have been rendered futile, and his evil would have been exposed for all to see. But we all feel we are but an Ant against a man. But no Man could survive or attempt to war with ants if every ant swarmed as one body to defend their home and their right to exist. Well, I say “I AM Brandon Raub in the manner of ‘I am a Jew’!” I stand with my fellow men of good cause to defend their right to be and do as they deem best for them, as I would deem for myself. As if one of their own I lend my voice in unified SHOUT! What say you?
government out of control, a fascist Police State
I am Brandon Raub in the manner of “I am a TI Survivor.”
A TI is a Targeted Individual, which is to say, someone targeted by Political Control Technology (mind control). That can mean any combination of centuries-old methods such as gas lighting, dogging, and street theater (generally described as organized stalking), to modern methods such as Mob Flashing, Web stalking, and high-tech surveillance. Add to the mix bioimplants and electronic weapons which can simulate every known symptom of Schizophrenia, and you have the ultimate tool for rendering a victim a social, political, and financial zero guaranteed to be ignored by (everyone). This is particularly useful when the person is a whistle blower or otherwise knows something which could expose government corruption or evil deeds.
A TI survivor is someone who not only refuses to succumb to these tactics, tools developed and perfected, and employed by the intelligence community and military, and their corporate and other partners, but someone who stands firm and chooses to fight back as best as they can. I have the honor of saying I have stood with and helped TI survivors to survive for several decades, now. I know of no one more courageous.
Now Brandon Raub is also a TI Survivor, and will likely be subject to more exotic forms of such targeting as time goes on. Well, I say I am Brandon Raub in the manner of “I am a TI Survivor!” I refuse to let government get away with mental torture and to use ‘mental illness’ as a political weapon by ‘creating it’ where it does not naturally exist. What say you?
government out of control, a fascist Police State
Who are you, really?
Who do you want to be? A victim of tyranny left standing alone, or a defender of self and of truths profound standing with others of like mind?
Who have you been waiting for? John Gault? YOU are what you’ve been waiting for. You ARE John Gault!
Do you need a Sparticus to lead your resistance? Or does Sparticus need you? Brandon Raub is your Sparticus, and he needs you! You ARE Spartacus!
Do you need to see a whole class of people targeted before you say anything? Then you are too asleep to the facts; they have already come for religious Davidians in Waco, the trade unions are decimated, the far left and the far right, and even the liberals, the Tea Party, and Ron Paul supporters… and now the ex military. All have been conveniently equated as terrorists for the purpose, and subjected to political targeting and harassment by Federal agents. You ARE of Faith!
Do you need to wait until your very mind is under attack? Again, too late. You are under constant attack through disinformation, dumbing down, and wag-the-dog media manipulation (propaganda is mind control). Worse, Command Solo flies your skies, and other technologies which parallel its capabilities bombard our cities with who-knows-what control signals. When you choose to accept sound bites in lieu of researching for yourself, or, to flip the tables, when you choose to accept some blogger’s commentary (yes, including mine) or some other Web source as valid without checking credibility (e.g., useful verifying links), then you are already a victim of mind control. Recognize the truth: You ARE a TI survivor!
And therefore say I; if you are any of these things, then You ARE also Brandon Raub!
government out of control, a fascist Police State
What say you?
- I AM BRANDON RAUB (and so are you) (resourcemagonline.com)
- Why is Ex-Marine Brandon J. Raub Being Held in a Psych Ward and What Does It Say About Today’s America? (reason.com)
- John Whitehead Interviews Detained Marine Vet Brandon Raub (dprogram.net)
- HOT: Statement from Brandon Raub’s Attorneys (economicpolicyjournal.com)
And why they do, anyway, and almost always regret it
Definition: Hook up: reside under the same roof for more than a week.Copyright © 2012, all rights reserved. by H. Michael Sweeney, author of MC Realities: Understanding, Detecting,and Defeating Mind Control and Electronic Weapons of Political Control Technology. Permission to duplicate on-line hereby granted provide it is reproduced in full with all links in tact, and links back to proparanoid.wordpress.com
mind control psychotropic weapons DEW voice to skull
The first thing to understand is who we are talking about; Targeted Individuals. The term is military in origin but is used by the intelligence community and law enforcement. That’s apt, because even though the kind of TIs I’m talking about are not a bona fide target of these groups for some justifiable cause (not terrorists, not criminals, not enemy spies), the technology and methods used in their targeting were developed by the military and intelligence communities, and corporate and collegiate partners.
More critically, the attacks they suffer as result by electronic weapons, gas lighting, street theater, dirty tricks, and psychological warfare, and so on, are more often than not at the hands of those self-same developers, as well as members of law enforcement. Not officially of course. There is no such thing as the boogeyman. Ask any Judge, Psychiatrist, Congressman, or Lawman. They seem content to overlook the fact that the whole of the Political Control Technology employed is applied primarily for the purpose of making the victim seem to be a Paranoidal Schizophrenic.
They certainly overlook the mountain of official government documents and other evidence that every symptom of Schizophrenia can be simulated by such technology.
Enough on that. Well, not really, but to get more, read my book, MC Realities, which is the only self-defense book on topic on the market I’m aware of. What we really want to talk about is the tendency of TIs to want to hook up with other TIs for what they hope will provide a means of mutual support and protection. By ‘hook up,’ of course, I mean close interpersonal relationships which include sharing of housing, with or without romantic intentions.
Well, yes and no to that notion. While there is some useful psychological support value in having someone of kindred spirit to share in burdens born of like difficulties, as a rule (there are exceptions), I have long advised against it in the strongest of terms.
mind control psychotropic weapons DEW voice to skull
Here’s why; what I see as the risks involved.
1) It decreases security rather than increasing it, as it can result in each TI gaining as new enemies those involved in the targeting of the other TI(s). But that is not the worst of it, because where that happens, it becomes such a tangle that if someone like myself comes along to try and resolve the issue, there are suddenly too many clues to sift through to determine anything truly useful in defense or offense — a matter which is tough enough to resolve with just one set of attackers.
2) It almost always turns out that one of the TIs is accused of being a perp (perpetrator) disguised as a TI in order to get closer in and do more damage. More likely all will end up accusing each other, even where no one is guilty. It is the nature of the natural paranoia generated by being targeted which fosters such fears, and any such fears, when unfounded, always grow until some bit of circumstance seems to tender hard evidence when it may simply be coincidence. But it is also true that many times, one or more of the parties actually are perps.
3) Any defensive strategies tend to become doubly complex and twice as difficult to mange to good end, which means each TI is neutered somewhat in the effort. There can also develop bickering over the best approach which further hampers such efforts.
mind control psychotropic weapons DEW voice to skull
There are reasons why my advice is ignored, and of course, only a small percentage of TI’s even get to hear my advice. For every TI we hear about, there are many, many more who are afraid to tell anyone out of fear of being termed mentally ill. Too — I’m not exactly a household name, so not all the ones who do come forward know I even exist. But here are the reasons my advice is ignored by those who do get to hear it:
a) They are so emotionally victimized that the temptation to find and leverage some small hope for kindred support and understanding overrides logic. In like manner, they are so depressed by the constant lack of privacy and security that the hope of increased security from a helpmate also overrides logic.
b) They foresee a possible savings of money through shared expenses, money being something all TIs tend to have too little of thanks to the targeting, which commonly involves financial dirty tricks such as repeat sabotage of vehicles, cancelling insurance policies, and worse, including getting them fired with rumor mongering.
c) They often feel they have ‘been around the block’ as a TI long enough to spot a perp and have some confidence they are insulated from risk. Wrong. Almost always.
mind control psychotropic weapons DEW voice to skull
A Simple but Tragic Case Example:
A TI client who had suspended my services for a time elected to hook up with another TI. The basis was that they were both ‘on the run’ in hopes of evading targeting, or so it seemed. My client was already mobile because of a need to travel in work duties (a respected person of useful credentials in their chosen field, as it happens). The other TI claimed to have been forced to vacate a Safe House provided by FFCHS (Freedom From Covert Harassment and Surveillance), claiming it unsafe there, and of poor sanitary condition. That was far from the true reason, but there was no means to check it out, and the client did not even attempt it, presuming in error anyone coming through FFCHS must be a legitimate victim.
So it was concluded of mutual benefit that they might travel together and share expenses, defenses, and information about their individual targeting. The first few days went well enough, but before a week had transpired, it ended in disaster. The short version is that it appears the refugee from FFCHS was not only a perp, but a sadistic psychopathic criminal of another sort: he produced a gun, made threats, and later raped his companion multiple times, and then ran off owing money. This took place immediately after I was invited to meet with them, it perhaps being my presence which spooked the perp into flight. Perhaps not.
But he had also gotten access to her email and sent out email in her name, presumably to sabotage relationships, and there was an incident which seems to have been aimed at thwarting me from providing helps, perhaps intended to scare me away (a third-party companion player showed up at our agreed upon meeting place, and their car was later in the day found in my personal parking spot where I live). It did not frighten me (read my books and you will see I’m quite foolish about things which should perhaps frighten me).
But it did not help my being involved, either, as the refugee also tried to convince my client that she should no longer have anything to do with me. After it was made clear our relationship would continue, it was that same night that it all went sour — as described above.
mind control psychotropic weapons DEW voice to skull
Summary lessons learned (hopefully)
Regardless of good intentions and hope, the risks of hooking up for mutual advantage is generally a risky affair. I only know of one instance where it worked out long term, and there were unusual circumstances which included additional third-party, non victim helps. These acted like a checks and balances to help get them over the rough spots. And to repeat, I’m talking about the natural growth of suspicion of each other which transpires even when one of them is not a perp.
By all means, collaborate and share information on-line. Even meet in groups, large or small, to share information and give emotional support. But please try to avoid commitments to share living space and all that goes along with being targeted. It is a trap no matter how it plays out, one which leaves both sides feeling betrayed, hurt, and more frustrated than before, or one side victimized yet again to the same end.
mind control psychotropic weapons DEW voice to skull
I would also like readers to know about the Free Will Society to Aid Targeted Individuals, organized on Facebook as a Group. Please give it a visit. If it helps, also please know that I offer a free Helps Kit, sample newsletter on Political Control Technology, and free 30 days on-line consulting to Tis. Contact me.
Answering them reveals there was no lone gunmanA careful in-depth review by an author who specializes in crimes of the NWO and Intelligence Community, to include MC, by H. Michael Sweeney, Copyright © 2012 all rights reserved. No reproduction permissions will be granted for the first 90 days. Links only, please.
This in-depth article will reveal dozens of startling new investigative issues for the first time, anywhere. The detail required to make concise arguments on a long list of critical elements forces it to be offered in installments. You may wish to subscribe to be sure you do not miss one along the way. Doing so, you will discover:
- Three motives for making James Holmes a Patsy with Fascism as benefactor, and a possible motive for targeting Century Theaters
- Easy link access to the key-most videos and images for each critical point of evidence presented in a logical, easy to follow order.
- Reasoning there were at least three additional helpers involved in a professional black operation backed up by even more supporting players
- Introduction of an actual political REASON for targeting The Dark Knight Rises (TDKR), a reason which supports one of the proposed motives for choosing James Holmes as Patsy
- 25 key questions missed by almost everyone, the answer to any one of which could easily provide reasonable doubt that it was a lone gunman event, or that James even pulled a trigger
- A walk-through narrative portraying an alternate scenario which fits all conflicting facts into a workable reality.
James Holmes was a patsy Part One
James Holmes was a patsy
Introduction: my credentials and methods
The reader, if to have confidence in my commentary, should know my credentials. I write this as an author of seven books (proparanoidpress.com) generally upon topics which relate directly in any analysis of the matters in Aurora. That includes the topic of Political Control Technology (PCT — mind control), which mainstream media and government still refuses to acknowledge as a real and valid topic. This they do despite the blatantly available facts which abound, even to include evidence uncovered by Congressional Investigation. My full bio is available here.
But before we get into the meat of these matters, I want you to please stop and see this one video which is by far the most emotional and heart tugging (in a good way) of witness accounts: Jamie Rohre, telling how he and his family were under fire, and the frantic events and steps taken while worrying about his infants and their Mother from whom he had become separated. They were apparently not married, but the interview reveals that once reunited in the hospital, he immediately proposed, and she accepted. WORTH A WATCH. Good can overcome tragedy when you let it.
James Holmes was a patsy
Motives and Political Hay vs. Justice
I would hope my feeble efforts would raise serious questions for not just citizens, but also in the minds of officials; questions which a moral person should rightly feel in clear need of answering if justice is to be served. Questions which might lead any legal defense team working for James to a useful defense proving him innocent. Unfortunately, I have no reason to believe that is the goal of either the Court or the Police in this matter, and suspect any defense will be guaranteed to be marginal, at best. As common in all prior mass shooting events, assassination plots, and terrorist events, political hay is more important than a statue of a blindfolded lady, or her set of scales.
Motive 1: The most popular motive talked about the Web is the most obvious; the ‘trade your rights for security’ myth, a key step in order to allow a tighter Police State grip on the people. The hay in mass shootings and assassination plots is gun control, which is the key-most step on the way toward a Police State, and the only way it could long survive or even come to power in America. The proof of these remarks is perhaps easiest to illustrate by the ‘coincidence’ that in every shooting or terror event, Congress just happens to have in hand legislation ready for quick approval (but not reading or due debate) which provides a good deal of such hay for their New World Order horses.
In Aurora, it would be found in three forms, the first of which was, rather than a new law, a need to discuss the United Nations Treaty on Small Arms. Constitutionalists and gun owners fear the Treaty would force the 2nd Amendment to be repealed and guns to be confiscated, the approval of which was scheduled to be determined in a matter of mere days after the shooting. Fortunately, the effort failed and the treaty was not signed, but that does not end the matter; the U.N. has simply rescheduled for reconsideration to give them time to attempt to make the treaty more appealing (the US was not the only country to refuse it), and a new a sales pitch (more mass shootings, perhaps, such as the Temple shooting in Wisconsin?). I have already screamed my warning thoughts on the gun-grab topic in a series of posts cited at the end of this post. For the best overview of the treaty with both sides of view, visit the Judge Ben C. Green Law Library.
Motive 2: Less commonly discussed, but also logical; the Web is flush with stories stating James’ Father is a whistle blower set to testify in a Federal matter which would, if found damaging, be a potential motive for using as Patsy, his son. His father developed software used to monitor banking transactions for fraud, and it is said that his program detected and can prove where the trillion dollar losses really went — as criminal profits. Imagine trading a finding of mental incapacitation instead of a death sentence in exchange for favorable testimony. As result, his Father is said to have been scheduled to appear as a witness in a Federal Court as a whistleblower. At this point I would be remiss if not admitting the factual value as a motive is based on early speculation, as there has been no useful verification of any such court appearance. It would take considerable study of his Father’s situation to find facts before I accept it as factual, but it is sufficient a red flag as to deserve such study. Read about that, here.
Even more interesting, as a related mater, is that TDKR plot line is rather a strong parallel to the financial crimes under consideration. It may be EXACTLY THE REASON why James, and why TDKR. There is an excellent review of the film with that view in mind, here, with some useful background info on the software in question. Later, we will see there is also a potential reason why Century Theaters.
Motive 3: Also a matter to be determined more concretely, the third potential motive remains quite consistent with my findings in case after case when working with targeted individuals. I’m talking about victims of PCT, which is what I fear James Holmes is based on the wealth of clues in the greater picture. Such persons are always targeted for a reason. Almost always, that reason is FEAR of what the individual knows about some covert and illegal or immoral government Agency’s doings.
James Holmes, like so many of my clients, worked in projects associated with such an Agency; in his case, DARPA, the Defense Advance Research Project Agency. The work, in fact, specifically dealt with matters relating to Political Control Technology, though that is certainly not how they choose to describe it publicly. Learn more about his work, here.
What I find particularly interesting is that, in Jame’s case, the location where this work was undertaken was only two main intersections away from the shooting, essentially on the same Street. Just as interesting, is that he lived just ten minutes by foot away from work, only a couple of blocks from the theater, also just off of that same street, again. We will find some significance in that, later.
Being a PCT victim or even a threat to the entire PCT program would not in and of itself be a motive to set up an elaborate ploy to have them put away for life. There would be simpler solutions. However, if considered such a threat, it would make them a more logical candidate for Patsy among other candidates for a project which was slated regardless of if it was to be James, or not. Better to kill two birds with one stone than two stones.
With these motives and curiosities in mind, let’s tear into the conflicts inherent within the official story:
James Holmes was a patsy
What we told and can see raises serious questions
“Conspiracy theories” happen when there are obvious questions ignored by officials in government and media (Elephants in the room), where presented facts do not jive one with another. This is always the first hallmark of a cover up in a major story. I should make clear to the reader: there is NEVER a cover up UNLESS there is a CONSPIRACY. A cover up REQUIRES it, in fact, or it becomes impossible to arrange — especially when the “the only person of interest” is behind bars and cannot so arrange. Now, because media has not asked ANY of the questions herein, we must assume such a cover up has begun. Failure to question is a tell-tale hallmark which soon enough results in charges of ‘conspiracy theorists’ when challenged.
So let’s take a look at some of the questions I find most troubling, and address them. I’m not talking about external matters such as reports that FBI pulled a terror warning regarding theater attacks being a possibility. I’m talking about shooting details, doing so because I’m anxious to be called conspiracy theorist one more time, because I love pointing out that’s just a labeling game to avoid discussing issues. So, after I ask all the questions, I’ll present the ONLY plausible scenario which answers all the questions without contradictions, a replay of the crime as a false flag event involving multiple participants.
QUESTION 1: Why did a Judge, within mere hours of the shooting, order all records sealed in this matter as ‘contrary to public interests?’ What facts had been uncovered that early in the investigation which prompted such a concern? It would not be until well into the next day that facts even started to usefully unfold for such an important consideration. I’d like to know who moved for such a ruling, and the reasoning behind their request (stated reasons do not always equate to actual motive). Could it have been a call from Washington D.C., which sparked it?
QUESTION 2: Why was there a training exercise based on the same exact scenario underway at the same time, less than ten minutes away? The Denver Post reports such an exercise indeed took place at the Parker Medical Institute. A common theme in ‘terrorist’ events thought to be a false flag operation, is the holding of a training exercise for exactly the same type event at the same general place and time. This was certainly the case for Sept. 11 and the Subway/Bus bombing in London, for instance, and I seem to recall it being so with the Saran gas attacks in Japan.
QUESTION 3: Why did media first talk about the “lone shooter” effecting his crime by “kicking in the EXIT door?” Like all patsy shooting events, the initial stories given to and relayed by media without question create the all-important ‘first and lasting impression’ in the minds of the public. It would be impossible for anyone to kick in a fire door designed to open outward. In like manner, with the confusion clearly in place, no one could know with confidence at the outset that there was only one shooter, even if true.
No witness could rightly so claim. No Cop would be so foolish as to make such a statement. I would hope no reporter would invent it. But several early news accounts, including one aired on FOX Radio (play the second audio file on the linked page) a single witness identified (in print) only as ‘Pam,’ said exactly that. Why, unless a ‘planted’ statement for Wag-the-Dog* media manipulation? The first known airing was actually from NBC affiliate, Channel 9, on the scene. From their unthinking quote of ‘Pam’, news people everywhere simply repeated the line, just as mindlessly, and as if fact. Isn’t that a great way to get an initial mental image out into the public?
Was Aurora shooting a DOD or CIA operation?James Holmes * An expression whereby news is manipulated by Men in Black to make people think things are much different than they really are, James Holmes popularized and hilariously illustrated in the Book and film of the same name starring Dustin Hoffman, Robert De Niro,
QUESTION 4: Why did ABC News deliberately take James’ Mother’s quote out of context to indicate ‘they had the right person’ in arresting James? She has officially protested through legal counsel that that statement was in confirmation to HER identity upon first contact by phone. Again, media twists words and thereby assures ‘first and lasting impressions,’ a known Wag-the-Dog tactic.
QUESTION 5: Who lobbed gas canisters into the Lobby? At 3:29AM, as part of an interview with Police Chief Dan Oates after capture of James Holmes at the rear of the theater complex, a Channel 9 report reveals a lone gunman entered the lobby and discharged a gas canister and THEN went on the shooting spree. As we will soon see, there are other reasons to believe someone was in the Lobby doing just that. In fact, multiple someones. Did the man in the Lobby have orange hair? No one is telling, no one is asking. Why?
We might reasonably assume the above report an error, an assumption. But in a Web radio interview with witness Tim McGrath who was in theater 8 adjacent to the theater 9 where the shooting took place, we learn that while the shooting took place, there were FLASHES seen with the loud pops described as coming from behind, which would be the lobby/hallway area. It would, after all, be impossible to see any visual signs of activity in the adjacent theater where the shooting took place. So there really was additional activity in the lobby area such as flash bang smoke grenades, as confirmed by the other reports. Moreover, the Police dispatch audio tape appears to reference the front door (Lobby entrance) as being ‘blown out,’ at about 3:50 into the audio.
These events could in no way be undertaken by James Holmes, as he would need to take the time to exit the lobby after throwing canisters and make his way all the way around the building to the back, change clothes, arm himself, and then enter via the EXIT… in time for them to go off in the Lobby and be seen and heard while he is shooting. It makes no sense. How is this possible without at least one accomplice?
QUESTION 6: Who opened the EXIT in theater 9 for James? We now have multiple witnesses who saw someone within the theater open the EXIT door something like 20 minutes before it was used by the shooter. Without stating it in so many words, it is clear Police think it Holmes who opened the door, and then exited the theater through the Lobby to go around to the back where he prepared himself and then used that door.
But there is an oddity, here, because the man opening the door is not described by any witness as having blazing orange hair. Why not? It was not seen on the shooter, either, because of his head covering. Why wear the hair if not intending to show it? We will come back to this question. But we also have to ask, by what logic or reasoning would James not simply take the EXIT directly to his car and then return? Why return into the theater/lobby area, at all, unless it be a different person with yet another assignment to be fulfilled who did so?
QUESTION 7: How did the shooter gain entrance to REAR EXIT of the building at the time of the shooting? We know how he gained entrance to the theater through the EXIT door but that doorway led only to a short hallway serving theater 10 and 9 together, to yet another secure fire door opening to the lot where James’ car was parked. How did that door get opened for James? No one on the Web has addressed this question before me, and I think I know the answer.
Was Aurora shooting a DOD or CIA operation?
The next installment asks these questions:James Holmes • Who warned people not to use the EXIT doors advising the shooter was outside, and why? James Holmes • Why did the shooter waste bullets shooting at a blank wall causing bullets to enter theater 10? James Holmes • Who wore the second gas mask and used the second rifle found at the scene? James Holmes • Why did the shooter not shoot the most logical victim? James Holmes • Why did that victim describe the first weapon used was a Rifle, when another says shotgun – who was indeed shot by a shotgun? James Holmes • And more… PLEASE: Comment (page bottom, or contact me), Rate (at page top), Share/Tweet this article. Visit my Reader Forum to promote your own cause or URL.
- Mind-Controlled Mass Shootings Don’t Change My Mind (proparanoid.wordpress.com)
- Lion Dance (a screenplay): How China Invades the U.S. via the Canamex Highway (proparanoid.wordpress.com)
- Six Dumb Arguments We’re Hearing About the Aurora Shooting [America’s Screaming Conscience] (gawker.com)
A parody of real-life mechanisms in conspiracy cleanup (coverup contingencies)by H. Michael Sweeney permission to duplicate granted provided reproduced in full and all links remain in tact, with credit given to the author and proparanoid.wordpress.com as source.
James holmes is a patsy in a false flag operation
Update Aug. 29, 2012: As result of the popularity of my multi-part post on the Aurora shooting which is the most exhaustive review of facts to date, and because of the revelations the investigation involved in the effort have afforded, this post is woefully inadequate and no longer reflects the true concerns. Therefore, this update is actually a major rewrite to make it more in harmony with the true facts, rather than the early conjecture available on the Web at the time of its first writing. Additions or changes heralded in red. Any original material remains in tact, but in
strike-through text, as I do not wish anyone to feel the material may have been censored for any other cause. Article begins:
Whenever the official story starts to have cracks in it, the cleaners go to work in Wag-the-Dog fashion, and power is applied to the weakest pressure points to make things ‘better for all concerned.’ As one CIA operative (one of the clean-cut train hobos at Dallas in ’63 set to cause a ruckus if the Grassy Knoll escape plan looked like it might be compromised) told me, “History is what we say it is, and it will not be changed by you or anyone else.”
Er… OK. But don’t fault me for trying the truth now and then, and forgive me with any liberties I take in the absence of good solid news reports full of details and hard facts… a matter which always makes me wonder what we are really dealing with…James holmes a mind-controlled patsy? Come the terror at night, or by day, the citizens Plight is, or it may, be which one is right, by what they say, who is guilty of the fright, and how shall we repay? I wrote that with Aurora in mind, but it applies to a long American history of dark bumps in the dark, does it not? James holmes is a patsy in a false flag operation
Added section: Ring: The receiver is lifted, but no greeting is offered, the Executive seated at the expansive desk in a plush office recognizing the calling number.
Voice on line: “The script will be ready on July 20. Adjust your plans accordingly.” The line went dead and the Executive hung up, and then dialed a number of his own.
Executive: “I’m green lighting Drum Roll. Production can begin at once, with a shooting date set for July 20. Make sure the cast and props are ready by then, and there are no problems in the storyboarding and rehearsals.” And then he hangs up.
Note: Double speak is the intelligence community perfected ‘art’ of speaking in the open about something by couching key matters in allegory or parable form. In the above example, we see how someone in the motion picture industry might talk about a film production… that was really something else… Drum Roll being the role played by the drum magazine in the shooting. Storyboarding means contingency planning, and rehearsals means that everyone knows the plan forwards and backwards. The script refers to the scheduled date of the theater shooting exercise which ‘just happened’ to be being held the same day of the shooting some ten minutes away off the same Freeway access as enjoyed by the Century theater. Interesting because high-risk intel ops such as would be true of a false flag operation, tend to employ a similar ‘drill’ for a like event on the same day and in the same city. This provides a cover operation so that if an operative is compromised, they will not be arrested and the plot can be aborted without exposure of the truth. End of added section.
James holmes is a patsy in a false flag operation
Ring: “Hello? News reporter here.”
Recognized voice: “The word’s going out to all our newsies… be sure to point out he had over $20,000 in high-tech equipment,
and have another story by someone else suggest there is reason to believe there were Islamic ties, and be sure to play up the gun violence angle. And be sure not to mention he worked on that DARPA* project to develop super soldiers. That U.N. Treaty must be signed!”
News reporter: “But the shooting just happened. There’s been no time for an investigation, yet. What’s our source?”
Recognized voice: “Don’t worry about that. Just say ‘sources close to the investigation,’ and people won’t be smart enough to know any better… except for the ‘conspiracy buffs’ which you already know how to deal with.”
News reporter: “Right. By simply calling them that and ridiculing them for it. Got to hand it to Walter Cronkite for making that work so well in the JFK thing.”
*D.A.R.P.A. Defense Advanced Research Project Agency
Note: Walter was ex Army intel, and would have been a logical go-to person as part of CIA’s Operation Mockingbird which infiltrated news media with, by various estimates, over 1,000 operatives from CIA or on their payroll under the table. Since JFK, no conspiracy investigation has made good headway because media keeps trotting this excuse to ignore the valid questions of civilian investigators and investigative authors, or Engineers, Pilots, and other professionals who come forward with challenges to the official explanations. As one well known Comedian like to say, “I don’t get no respect, you know?”
James holmes is a patsy in a false flag operation
Ring: “Hello, Police Public Spokesperson.”
Recognized voice: “You have to stop talking about the possibility of the shooter having help. He’s a lone nut, nothing more.”
Police Public Spokesperson: “But people are trying to figure out how he got he got the larger weapons into the theater and all that gear. We already have one witness who’s been quoted as seeing someone open the Emergency Exit for him.”
Recognized voice: “Don’t worry about him. We have that covered. And don’t worry about what people think. We tell them what to think. Just do as I say.”
Police Public Spokesperson: “O.K. If you say so. Has everyone else in the loop here been so advised, or do I need to have an excuse to pass along?”
Recognized voice: “The key people are our people. We have it all covered, just like L.A. with the RFK matter.”
Note: In Robert Kennedy’s assassination, the Radio Dispatcher who controlled what Cops did that day and the Chief of Police were ex CIA. No wonder cops did not pursue the Woman in the Polka Dot dress, and the L.A.P.D. destroyed all the evidence which indicated more shots were fired than contained in Sirhan Sirhan’s gun, and did not protest that the fatal wounds came from the other side of his body where Thane Ceaser, a security staffer to a CIA involved military contractor had been walking directly behind Robert at the time of the shooting.
James holmes is a patsy in a false flag operation
Door shuts behind the lone interrorgator (spelling on purpose), and he takes a seat before the exhausted man at the desk. Interrorgator: “You told our people at the theater that you saw
someone open the Exit Door for the shooter a second smoke grenade thrown from the opposite direction?”
Eyewitness: “Yes. I couldn’t see who
because it was silhouettes against the movie screen might have thrown it.”
Interrorgator: “That’s impossible. We know the shooter was a lone gunman, and had no help. We have lots of people lined up who are going to be saying they saw it differently.”
Eyewitness: “I know what I saw. I was not more than ten feet away, and
he crossed in it flew right in front of me.”
Interrorgator: “That’s not what you saw. The confusion and fear of the shooting has simply confused your memory. All you saw was
someone getting up to take a leak or buy some popcorn. He never opened the door was some action on the theater screen from the movie… your mind has simply played a trick on you and filled in the blanks.”
Eyewitness: “No. I’m certain.”
Interrorgator: “Listen, kid. I’m going to lay it on the line for you.” Grabs him by the collar and jerks him halfway across the table. “I’m telling you, and you’d better listen up real careful like, you didn’t see that, you were confused. If you tell anyone you saw that, something bad might happen to you. There are a lot of people upset about this, and some of them have tempers and are looking for someone to go after. They don’t think very clearly, and I’m trying to keep you from getting seriously hurt… or your family for the matter. Do I make myself clear?”
Eyewitness: “You’re threatening me? With those people watching behind the mirror with cameras?”
Interrorgator: “You’re Goddamn right I’m threatening you.” Slaps face. “I sent those people on break and killed the camera, but in five more minutes, I’m going to call them back and we are going to be asking you the same question I started with, and you had better damn well tell me you were confused, or you and yours have NO F***ING FUTURE.” Shoves him back into his seat. “Do we agree on that, or not? Because if not, I can’t protect you!”
Eyewitness: “O.K. O.K. You win. I’m confused. I didn’t see anything except someone going to get popcorn.”
Note: Something almost identical to this happened to witnesses at JFK, RFK, and MLK, as well as the Flight 80o shoot down. Witnesses are often ‘told what they saw’ and told they were ‘confused by events,’ to allow investigators to later say their initial statements were not useful because of duress under stress impacting their memory.
James holmes is a patsy in a false flag operation
Ring: “Hello, Fire Department.”
Police Department: “We need you to take a Ladder Truck over to the shooter’s place and look in the window for us.”
Fire Department: “Why? We’ve never done anything like that before. What’s going on?”
Police Department: “We just want to make sure its not booby trapped. You need to tell us if it is so you we can send the Bomb Squad out.”
Fire Department: “Did the shooter say something to make you think there’s a bomb?”
Police Department: “Uh… sure. Yea. Something like that.”
Fire Department: “Well why not just send the bomb squad.”
Police Department: “Well, uh… I’m just doing what I’m told. I think they want high visibility with the press. Uh… you know… to make everyone look good. You will look good. We will look good… on TV… our small community will look good on national TV.”
Fire Department: “Whatever you say, Chief.”
Note: At a disadvantage with no concrete facts, there may have been a legitimate reason for asking the Fire Department to participate. Yet they did eventually send the Bomb Squad in and the first thing done was to use robots. Did the robots go in the window? Not that I’ve seen on video. No, they went in the front door. How do we know this? Because we have video of the bomb squad breaking out a portion of the window which would have needed to be removed if using the window for insertion of robots… doing so from the inside after the robots had finished. So why would there not have been a booby trap on the door blowing the robot away? That’s the FIRST thing I’d booby trap if of a mind to booby trap anything.
James holmes is a patsy in a false flag operation
Ring: “Bomb squad.”
Familiar Voice: “Be sure to blow a lot of stuff up at the practice demolition site afterwards.”
Bomb squad: “Why not just use the portable unit we always take with us? There’s nothing here large enough to require the demolition site.”
Familiar Voice: “TV coverage. Want to look good on TV, don’t you? Besides, the order comes from the top.”
Bomb squad: “Fine. We can have the rookies get in some practice at the same time.”
Note: The portable units (Mobile Explosion Containment Units) can contain significant blasts, but are not necessarily used for on-site demolition of bombs. They would perhaps prefer to instead transport explosives to a demolition site, as the units provide increased safety for such transport. However, some devices might be judged unsafe for transport, and should perhaps be destroyed at the crime scene. WHEN MULTIPLE DEVICES are found, there are several interesting possibilities which drove my inclusion of this portion of the dialogs.
a) The devices were too large to detonate on site. But we know that is not the case because we saw them on TV and they were small explosions (keep in mind that they use explosive devices to explode the bombs, so whatever blast you see is necessarily larger than the bomb by itself would have been.) Further, had this been the case, they should have likely been too large for collective transport, exceeding the safe operating limits of the mobile unit. But they were not shown making multiple trips to accommodate multiple bombs, so we again know this was not the case.
b) Despite the number of devices, their cumulative potential for damage is collectively within the ability of the chamber’s ability to safely transport through populated streets. IN SUCH A CASE, the bombs would normally be disposed of at the bomb squad’s facilities as a SINGLE BLAST. But we saw video on the news of multiple blasts in close proximity. This CONFIRMS they were not big blasts individually, and should have been done as a single blast. Why not? I can think of only one reason: Publicity stunt.
James holmes is a patsy in a false flag operation
Added section: Ring: “Executive speaking.”
Voice on line: “There’s been a problem with that special script for Drum Roll. It hasn’t been received by the Publicist.”
Executive: “Well where the hell is it, then?”
Voice: “We think it might be lost in the mail room for some reason.”
Executive: “Well get the… ah, you know… the ‘Director of Security’… to go search for it, then. That’s an important matter useful to Advertising and Promoting Drum Roll to the viewing public.”
Voice: “How do I do that? What do I tell them is the reason?”
Executive: Pauses. “I don’t know. It’s your job to solve problems like this.” Pauses again. “But try this; tell the Publicist to call the Director and complain about a suspicious package… and use that to get Security involved. Use your imagination.” Slams the receiver with a curse.
Note: Director of Security is their contact in the Police Dept. The Publicist is the Psychologist, or someone acting on her behalf. For some strange reason, the Psychologist indeed contacted Police about a strange package which showed up on her desk with no name on it, which turned out to be nothing but a text book being returned by a student. The explanation was concern, after the news about the bombs in James’ apartment, that it might be a bomb from James — in which case I wonder how James managed to put it on her desk while he was under arrest. For an even stranger reason, Police then searched the entire mail room to find the ‘script’ James allegedly mailed explaining in detail his plan to shoot up the theater. Strangest of all is that it was sent 8 days prior to the shooting. End of added section.
Next dialog, and the last, most telling of all…
Interrogator: “O.K., James. You want to tell us why you did it?”
James: “Did what? Why I am under arrest?”
Note: Jame’s reaction after the shooting is no different than Sirhan Sirhan (RFK), Jack Ruby (Oswald), David Chapman (John Lennon), Arthur Bremer (George Wallace), Squeaky Fromme (Reagan), and John Hinkley (Reagan), and others: No attempt to escape, in many cases going limp or calmly waiting nearby for arrest. Many of them have no recollection of the event, or have a single line of ‘political’ thought on it which they repeat, or start to explain and then just at the critical moment, change the subject.
These are all known methods of dissociation symptomatic of programmed Manchurian Candidates who are incapable of ‘confessing’ the truth, as they genuinely are not aware of it. In this case, we know he simply waited in his car and put up no resistance. What we don’t really know is if he has told the Police anything at all, but must presume not, or it would have been all over the news in some form or another.
So I’m taking the liberty and risk to assume, here. Please forgive any Ass made out of You and Me thereby. If I’m way off base, I’d be just as happy with the thought you may have gotten some entrainment value from it… because if I’m not off base, we are all going to end up mad enough to bring down the government and lynch some people.
James holmes is a patsy in a false flag operation
Please rate this article at page top, tweet/share, and comment. All comments welcome, good or bad.
- Official Formula For Conspiracy Coverups (proparanoid.wordpress.com)
Not even the aircrew knows what they are telling you to think
by H. Michael Sweeney
Note: in preparation of this article, which updates and corrects some prior material I’ve posted in the past, I had intended to copy material already posted at my proparanoid.net Website, only to discover it appears to have been hacked (my host service stopped using Macintosh, it seems). The entire article relating to Command Solo has vanished, links and all. I wonder who would have a motive for excising only Command Solo information? No matter, it is also in my book, M.C. Realities: Understanding, Detecting, and Defeating Electronic Weapons and Methodologies of Political Control Technology.
A plane like no other, an admitted weapon against free-will thought
It’s a specially modified Hercules C-130 called Command Solo, and the U.S.A.F. currently operates a fleet of 7 of them (predecessors, Coronet Solo, entered service as early as 1978). They are based out of the 193rd Special Operations Wing stationed at what used to be Olmstead AFB, now part of the Harrisburg International Airport at Middletown, PA. Costing up to $110M each, they are the ultimate tool in government’s arsenal of Political Control Technology (PCT) used to subvert God’s gift of self determination. Official USAF info, here. Notice my photo is better than theirs.
Assigned to the Air National Guard, they frequently fly training missions over U.S. Soil, and no one who might feel a twinge of guilt, not even the aircrew, knows what messages they beam down to the ground. It’s all a super sophisticated programmed system with nothing but indicators and meters to show how things are operating. See inset picture.
Officially, it ‘intercepts and blocks existing broadcasts and replaces them with whatever information is deemed necessary to achieve mission goals,’ and operates in the ‘AM, FM, and UHF/VHF TV bands employing medium and high frequency, very high frequency, and ultra high frequency.’ The problem with these statements is that they avoid discussing yet two other capabilities, one being subliminal message embedding, and the other being the use of low frequency and extra low frequency, ELF. This is the darker potential of Command Solo:
All such psyops methodology is based on principles of mind control developed by CIA and the DOD, and even research by NASA, many of the same technologies used selectively on Targeted Individuals by operatives on the ground to make them seem Schizophrenic, though victims of that level of mind control also ‘enjoy’ other special PCT treatments as well, to include low-tech methods such as organized stalking, sometimes called dogging, or street theater.
It is not simply conspiracy theory or conjecture. The Air Force has admitted Command Solo’s use of such tech with startling results in sanctioned operations abroad, and further admits they are allowed to use it here in America in certain circumstances. But the problem is, there is no way to police or monitor its use, detect it in use, nor know what the content may be.
How it works
Overt messaging: The least offensive possible use, whereby simple and direct propaganda is broadcast. The plane can even fly low altitude missions of this type and use loudspeakers capable of overcoming the plane’s engine noise by use of sound canceling technology. But this does not bother me in the least.
Subliminal messaging: The aircraft flies at altitude, loitering in large circles for endless hours, perhaps even employing in-flight refueling to increase time on station. There it picks up citizen broadcast radio and TV signals, and replaces or rebroadcasts them at amplified levels. It can work on select, whole groups, or even all locally available signals. How nice of them to provide improved reception quality for those listeners and viewers lucky enough to be below.
But there is a price to pay for the audience. The broadcast signals contain a few added elements of information embedded within the audio tracks. It is not known to be the case, but it is also presumed additional subliminals could be contained within the video. Subliminals are simple, brief, and repeated messages in a form not consciously discernible by the listener/viewer, but which, by repetition, are perceived and communicated subconsciously.
To my knowledge, the first known use that made the news about visual subliminals was in the motion picture industry when one frame in 24 (one frame every second) would have superimposed upon the image a single word, such as ‘popcorn,’ usually just before the intermission. This could also be achieved by the use of a second projector with all black film save the ‘word’ frames where the word was clear and transmitted white light in superimposition.
Alfred Hitchcock had the word ‘fear’ added directly to the film Psycho just before the scary parts. That was the use which became public, and revealed the fuller use to the public’s dismay, and soon enough sparked laws prohibiting its use altogether. We must suppose such laws are adhered to, as there is no easy way to know, for sure. All TV and film is candidate for suspect, and only frame-by-frame review would prove anything useful.
In audio subliminal messaging, a method known as ‘back tracking’ or ‘back masking’ gets a lot of attention in media, today… where the sound played backwards has a ‘secret message’, usually dark or evil. In some cases, the audio content may mirror the same information both forwards and backwards, such as is claimed for the famous ‘That’s one small step for man…’ moon-walk line, which backwards, says, ‘Man will space walk.’
The subconscious mind is said to ‘hear’ these messages quite well, but the phenomenon tends to happen naturally without engineering. While it is possible to engineer it, and many songs employ it for special effect, in my opinion, employing it for mind control purposes is less useful and less practical than employing a much more common method.
The simpler and earlier known method is to simply embed the message directly into the audio at inaudible levels and at frequencies or pitches sympathetic to the existing audio such that it seems part of the intended content. This method allows complex messages to be absorbed, and is well known as a means of teaching topical information or improving mental performance or even physiological attributes of people while awake or sleep. As long as the user of such content is informed of the existence and nature of subliminals, it is legal. Command Solo employs this later technology, but of course, there is no content warning.
EEG entrainment: There is currently no hard proof Command Solo employs EEG entrainment, though photographs (see image) of the plane reveal design elements which indicate the needed transmitters are installed. I’ve had the example photograph with annotations on line for nearly two decades and to date no one has protested the allegations with technical proofs or basis (or at all, for the matter, save possibly the protest inherent in the hacking thereof, which strangely left the image in tact — through removal of the image would have more quickly revealed the hack had taken place.)
The brain operates at extremely low frequencies (ELF) below 15 cycles per second (15 Hz). EEG (ElectroEncephaloGram) readings at multiple locations on the skull can be used to monitor brain activity by capturing these signals and converting them to printed readouts of squiggly lines for medical review. However, a given type of thought or mood, or even general physiological state (e.g. headaches, nausea, pain) will result in specifically unique EEG patterns as a collective. The EEG squigglies are indeed a de facto brain wave frequency map of such states.
Where such a frequency map is rebroadcast by traditional radio in the same frequencies but at stronger levels than the brain itself generates, the brain will adopt them as its own. This is called entrainment. Command Solo employs what I claim are special ELF transmitters to broadcast such frequency maps to a broad area to impact the thoughts of people below. Like the subliminals, this is presumed to impact anyone within several hundreds, perhaps thousands of square miles, though it must fade in potency as distance from the plane increases.
Therefore, by broadcasting subliminals such as ‘I should surrender if I get the chance…’ along with EEG states of mind such as ‘fear’ and ‘nausea,’ it is possible to perform quite a mind f*** of anyone unfortunate enough to be in the plane’s range of operation.
Follows is are excerpts from an article by Judy Wall, who was publisher of Resonance, a newsletter for members of MENSA (the high-IQ society) who specifically are involved in bioelectromagnetics study or research; a scientific paper. She also wrote investigative material for the magazine, Nexus, an international magazine covering technology as well as social phenomenon and their impact on mental and physical health. From Issue 7, volume 5 of Nexus, we find:
According to the (USAF provided) fact sheet: Missions are flown at maximum altitudes possible to ensure optimum propagation patterns… A typical mission consists of a single ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel…
In a phone call to the USAF Special Operations Command Public Affairs Office, I questioned the legitimacy of using these subliminal broadcasts against civilian populations. I was told that it was all perfectly legal, having been approved by the U.S. Congress (!) …the Air National Guard of the individual states in the U.S. can also operate Commando Solo aircraft, should the Governor of a state request assistance. That means the PsyOps mind control technology can be directed against U.S. citizens.
…On July 21, 1994, the US Department of Defense proposed that non lethal weapons be used not only against declared enemies, but against anyone engaged in activities that the DOD opposed. That could include almost anybody and anything. Note that the mind control technology is classified under non lethal weapons.
USAF General John Jumper ‘predicts that the military will have the tools to make potential enemies see, hear, and believe things that do not exist’ and that ‘The same idea was contained in a 15 volume study by the USAF Scientific Advisory Board, issued in 1996, on how to maintain US air and space superiority on the battlefields of the 21st century.’
Wall went on to report confirmation that Command Solo was employed in Iraq and specifically to sway Bosnian elections. The U.S.A.F. admitted to her that Command Solo played a significant role in getting Iraqi troops to surrender en mass, even sometimes to model airplanes (UAV – Unmanned Ariel Vehicles), and to sway elections in Bosnia to insure a Coalition approved leader was installed for the purpose of maintaining political control and stability of the region.
Additional thoughts (mine, not theirs)
This technology was first deployed in 1978. What happened in 1978? The World’s first mind control cult mass suicide: 909 persons at Johnstown, a CIA established cult started called The People’s Temple, led by Jim Jones. The cult, located in Guyana, was frequently overflown at surveillance distances by C-130 aircraft.
The significantly upgraded (EEG) version was introduced in 1980. What happened in 1980? Iranians stormed the Russian Embassy in Teheran; 63 religious Zealots seize the Grand Mosque in Mecca and are beheaded; Bani Sadr, the most pro American of candidates is elected as President of the new government in Iran (this is at the time Iran held 6 American hostages); unarmed farmers storm, occupy, and burn the Spanish Embassy in Guatamala, a key event to Democracy being established a few years later.
These events prove nothing concretely, but themes appear with a frequency to cause one to wonder, ‘what if?’
A logical question arises:
How do we know what information is contained in Command Solo when over U.S. soil? The answer is, we don’t. The aircrews do not, either. Nor does Congress, or perhaps even those who should know at the Pentagon. Perhaps only the preparer of the preprogrammed digital tapes used to modify and retransmit knows, and it is conceivable even that person does not know, likely ordering it by a code number which does not reveal content. It may simply be marked ‘Training Use Only.’ But somewhere, someone knows, and they won’t be talking about it honestly if it contains messages to sway our political opinions and social viewpoints, or our votes and other key actions.
Now, does that sound like a democracy in action, or more like a military police state growing its power? You know my answer, best summed up by the wish that the right to bear arms might ought to include Stinger missiles. I’d like to see these aircraft permanently grounded, along with the 30,000 Global Hawk drones they want to fly over U.S. soil to ‘protect us from terrorists.’
WE are the terrorists, because our ability to think for ourselves is threat to the security of the 1% who seek total control; we strike terror into their hearts every time someone like me makes public the truth, and someone like you chooses to read, share, like, and rate (page top) that message. We know this fear to be true for many reasons, as cited in my other posts on related topics.
That’s why its called PCT in the first place, an abomination before God in defiance and subversion of His gift of Free Will and self determination we were promised by the Constitution as ‘the pursuit of happiness.’ Where, exactly, do you live, again?
Buy now, be happy. Trust government, vote for X, and be safe. Spend money, be happy. Believe TV news, fear terrorism. Borrow money, be happy. Fear terrorism, Vote for X, and be safe. Watch TV, be happy. Ban guns, be safe. Buy now, be happy. Trust government, vote for X, and be safe. Spend money, be happy. Believe TV news, fear terrorism. Borrow money, be happy. Fear terrorism, Vote for X, and be safe. Watch TV, be happy. Ban guns, be safe.
- Real Scientific Evidence for Subliminal Messaging: A Rising Tide (whatispsychology.biz)
- Timeline of Masonic/Illuminati/Mind Control Evolutions (proparanoid.wordpress.com)
- Can subliminal messages in movies be used to manipulate you? Like in FIGHT CLUB? (businessinsider.com)
The NWO can’t have my gun until I first get rid of the bullets
Update March 7 2013: Did the FBI undertake a covert ops to check out my gun collection (see image below, which I’ve posted both here and at my Facebook pages). Today and a few days ago, five individuals claiming to be insurance company employees entered a) my apartment; b) my daughter’s apartment; c) her husband’s father’s and brother’s apartment… claiming to do an insurance evaluation for the Landlord. They seemed to be focused on wanting to find and check out the water heater…
And so they looked in my bedroom (my office)… and then the closet… my (other) daughter’s bedroom and then the closet… the kitchen/dining area… the living room… and the master bedroom… and then the closet (where they FOUND the water heater)… and then continued looking for it in the other bathroom, the deck, and the deck closet… and then the attic storage area. It was OK, though, because they asked permission before opening any door, just like a law enforcement Officer would do when they had no warrant.
Having found the water heater behind a wall of stored items in the closet, all they could see of it was that it existed, as evidenced by about 12 square inches of tank wall and a couple of water pipes. I’m sure that was all they needed to answer their important insurance questions, because they didn’t ask anything about it, take pictures of it, or move anything to get a closer look. Yep. Insurance work is getting easier all the time thanks to the marvels of digital photography…
which, while they did not use it on the water heater, it being so important to them, and all, they did use it take pictures of other important things, mostly with deft hand-movements that concealed the camera from view. When I said something about the deck rotting after catching one of them using the camera, he even took a picture of the deck! Very important to water heater evaluations, yes?
Now would be a good time to mention that the woman looked very much like a known FBI agent from the Portland Office. Only the last time I saw her was when I was targeted by FBI for writing about Flight 800 friendly fire shoot down. I got visits from ONI, as well, and even one MI-6 chap who issued a death threat, and indeed over the next couple of months there were attempts on my life (not by him, but by local LEA, one of whom had been driving a car with license plates blocked out of Langley with DVM).
But I might be wrong. Might not be her. Kind of hard to tell because she had PUT ON SO MUCH WEIGHT! Any more and she would have a hard time passing the physical requirements. Kind of weird seeing someone who used to have a waist line now shaped more like a kite, and thinking them FBI. Kind of makes you loose confidence in government’s management capabilities, does it not?
Now is also a good time to mention that one of the men was seen wearing an old T-shirt from a known local CIA front… the one with all the technical toys hanging on his tool belt, and a clipboard. Anyone with the old T-shirt (the new ones are different) is usually an EX employee turned private contractor for hire. That front’s specialty is covert surveillance and eavesdropping. So if they left anything here, they had better real quick find a way to come and collect it before I can find it (I CAN VERY LIKELY find it), and end up filing a law suit, or at the very least go public with documentation of it.
The kicker? The image is NOT even mine, though I wish it was. It is a random image pulled from the Web for whom no original owner is evident (probably their wish). But FBI would rather do the knee-jerk, fear-based, jump-to-conclusion elaborate covert ops thing than bother to do a little research. Obama does not have enough money to pay for (anything we citizens need) but can spend $20,000 to convince the Landlord to go along with a phony insurance inspection ploy instead of $2 for a Google search? LMAO.
End of update – though I’d like you to know there are a series of companion posts which happen to also be my most popular posts (use My Posts menu item and select Top Ten).
Is FBI targeting people who have gun collections?
by H. Michael Sweeney
I may not speak for all gun owners, but i’m betting my sentiments are not at all isolated nor inconsequential. Look up the word consequence, to fully understand my meaning.
I hope the bluntness and inflammatory nature of my remarks are not lost on anyone. I deeply regret any need to write this, and in such tone, in the face of the unimaginable grief and wounds to the heart and soul of those who lost loved ones in Aurora. And though I’m sure they will not appreciate my remarks in the least, I cannot remain silent: I am incensed by the tragedy, doubly so because I see the darkness which surely drove it, and thrice so because it just happened to be within minutes of what is believed by many to be the intended new Capitol of the NewStates of America, also of that same darkness.
The shock value is for the Sheeple who need to listen up for a change and actually notice what’s happening around them outside of the sound bites they are fed daily. The NWO cares not for 71, 7,100, or 71,000,000 of us, if our loss will further their cause. We are but mere pawns who are allowed to pay for our own victimization that they may remain the 1% in power.
It’s also a warning to the governments of the World, including the United Nations and United States, that gun owners are the last people who give a damn about false flag terrorism as impacting our decisions on gun ownership. So if you want our guns, get yours, and come and try to get ours, if you can. A piece of paper, no matter whos’ signature is on it, or what flowery, tear jerking, politically correct words appear above it, will be of zero meaning to most of us, because we know why you want the guns, which brings us to the last reason for my blunt words.
Because it’s also battle cry for the rest of us, because we are so fed up with the BS that you spew forth so endlessly as if yours was the only side of the coin. We suffer from what I call too many Fascists Syndrome. You folks in power can have your Police State, but a piece of paper won’t get our guns, FIRST. You will have to take your chances after the fact, and we will see what happens when you try to go for it. You will have to get the answer to the age old question you’ve been afraid to openly ask, the hard way. And that question is…
Will we resist you, or won’t we?
You have feared the answer for decades, ever since the military Coupe your elders failed to make good on in 1933. The fear of what the answer might be to that question is all that has slowed you down, isn’t it? YOU, by the way, define the answer to that question, yourself. You define it by your actions. You would have no fear and not even need ask the question in that ‘kinder and gentler government’ you promised a few years ago, but woe unto you for the kind of government you are intent upon building, today. You risk much with every step closer to goal you take.
The Camel has a weight limit, and even we know not the final straw
What do I know that I should dare confront you so firmly? Because for decades I have researched you, and have written seven books about you. In particular, I’ve studied your preoccupation with Political Control Technology, that evil originally called mind control. There is one aspect of that, the Manchurian Candidate being a suitable (though technically incorrect) descriptor; a programmable killer, or agent, one capable of executing any foul instruction and being unable to later recall the deed, much less the instructions. MPD/DID through RSA torture is the proper term, along with hypnosis and chemical catalysts. Psychological magic mixed with Satanic methods of ancient times.
Words that should scare even you: Aritchoke, MK-Ultra, Often, Chikwit, NAOMI, and on and on. Patsies and real killers created by assembly line, rendered sleepers into society for activation on need, and often targeted with other forms of PCT to make them seem conveniently crazy should you need to call them into play. Am I crazy to say these things, or too close to the truth for you to dare even acknowledge I said them?
That is modus operandi, is it not? Ignore accusations as it tends to make people think there is nothing to them, and make the accuser go away once they get tired? Sorry, it’s been twenty years and I’m still talking, still accusing, and I am in no way alone. As result of our persistence, more and more Sheeple wake up each day, especially among the programmed sleepers. Fear us, for we are Legion! And guess what? We don’t even fear you enough to be anonymous about it.
Down to cases: to be specific, I accuse…
…that virtually every mass shooting incident has been a programmed shooter since the Texas Tower sniper felled 48 people, killing 16, in over an hour and a half of terror in 1966. And, as if some CIA operation gone wrong, media just magically stopped talking about it and kind of swept it under the carpet. Examine as many of this kind of incident as you wish, and please, by all means, lets include assassination attempts.
It is almost impossible to find an exception where the shooter was not under psychiatric care, commonly involving hypnosis and or drugs associated with CIA mind control research. At times, actual ties to CIA MC scientists or similar clues are found. Can you say, ‘Catcher in the Rye?’ How about Dr. William J. Bryan. Ring a bell? Manchurian, indeed!
It is almost impossible to find such an event where, if the shooter was captured alive, they were able to recall the incident. Why? Because of complete dissociation and honest lack of memory of the event, a known CIA methodology associated with mind control of the type in question.
It is ludicrous to the point of absurdity that any Sheeple remain unaware of the consistent ‘coincidence’ that Congress always seems to have legislation in hand ready to vote upon which ‘protects us’ from just such events as quickly as they happen, and quickly ‘strengthening gun laws.’ Gee, I have not noticed much improvement.
It was by this means that you have gotten us to register our weapons, which is something we should never have done, because now you know who and where we are, for that day when you come to collect our bullets. And you know, things still have not improved much with that law, have they?
It was by this means that you banned whole categories of weapons which would make any such effort more difficult for you, because you might end up collecting the bullets too quickly for your taste. And still no improvement in sight. Imagine that.
It was by this means that you made the good name of the NRA, of which I am not a member, and do not represent or speak for, but whom I respect, to seem to many Sheeple some dark kind of conspiracy, when in fact, it is YOU who conspire, and you who deceives. Still no improvement. Do you really think these laws through when you write them? Ever heard of logic?
And, it was by this means that you used even greater terrors to establish whole new agencies to spy upon us and to assault us with little dirty tricks in hopes of guiding us to the Sheeple category, but — SURPRISE! You instead created more of us and made us more adamant than ever. As I said, it is YOU that determines your fate, your actions which dictate the answer to your rightly asked question.
So, especially those of you in Congress, please keep that age-old question in mind when it comes time to consider outrageous gun or ammo taxes, and especially the U.N. sponsored international gun grab that gives up some more national sovereignty to the New World Order at the expense of the Constitution. Set the stage for a one World government and leader… who is that, again? The Antichrist? You really think we will allow that, do you?
Remember theses questions, and remember this: you can fool some of the people all of the time (the Sheeple), but you can’t fool the rest of us at any time, because Fascists are to us a known entity, and we do not listen to anything they say, except to hold it against them at their tribunal!
But what am I saying? I don’t even own a gun. But I assure you that I will, and millions more with me, if you force the matter to a head. Act wisely, for no one can easily stop what you might unleash through unbridled arrogance and lust for power.
How to know, what to do about it
by H. Michael Sweeney
This is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)
This post is a companion to a post on cell phone security made just hours earlier. Unless you want me to repeat that introduction, you should quick like a bunny hop over to and read it, first, as it sets the stage. I’ll wait right here…
Good. Now that we are on the same page, it seems pretty clear that if a person is being monitored in their phone calls, then there is a good chance they are under what’s called a full surveillance net. That means that in addition to your phones, everything from your mail and computer communications, and your travels away from home, not to mention everything you do in your home, including sex, are likely being monitored.
Only a Police State is paranoid enough to watch people like that… and perhaps voyeurs. One could argue then, I suppose, that sexually repressed people tend to be the ones who apply for and take these kinds of jobs with the intelligence agencies. Take a look at CIA spooks David Ferrie and Clay Shaw of JFK assassination fame, for instance. That may be why TSA has so many perverts groping people. I don’t know. Sorry, couldn’t resist.
Methods of being followed
Watch the Will Smith/Gene Hackman movie, Enemy of the State, and you quickly learn there are all kinds of ways: satellite surveillance, tracking devices, helicopters, cars, on foot, and even by microphone relay and telephone calls (where we left off). Now, with all that sophistication comes an associated cost factor, which tends to favor use of low tech except for the greatest of national security risks or fears. So you, as mere ‘suspect’ in some government imagined conspiracy to blow up your underware because you think for yourself and talk openly in an attempt to get others to use their minds, are more likely to be followed by car or tracking device than the more exotic means available.
Funny thing about tracking devices, though, is there is almost always a car following that signal. You won’t see it, but it’s almost certainly there. The purpose of the device CAN be simply to make and keep a record of your travels for later consideration, but usually, they prefer to be close enough at hand so that once you stop at a location, they can show up and see WHY you stopped… since the satellite isn’t going to be watching for them. So for my purposes, it’s the same as being followed by car.
The only difference is, you won’t see them in the rearview, but like the folks you do find there repeatedly, you will see them at destination if you are alert and can find a good observation post you can use with some useful patience. I’ve even found them there waiting for me. That was a fun story, just part of a five year running war with the paranoids, but I’ll save it for another time, perhaps. But other than them showing up like that, we need another way to know for sure.
How to detect being followed
First, how NOT too, would be more in order. Don’t keep looking for it, and don’t assume a car you see with great frequency is a bad guy. You are by and large a creature of habit taking the same routes to get to any given repeat location at roughly repeat times of day. So is everyone else. So I don’t get nervous because a certain rusty Chevy is within a few cars of me several times a week. Actually, I don’t get nervous even if I do think them following me, because I don’t want it known that I know. So I don’t spend all my time looking up at the mirror. If you insist on that, get a rearview camera ‘so you don’t back up over some kids,’ and glance at that furiously.
Just be aware of cars around you all the time, with NORMAL use of mirrors and glances out windows. Don’t be looking like you are on the lookout. Trust your instincts, and if you ‘feel’ like you are being followed, you may just be. At such times, or when you THINK perhaps a given car is just a little too familiar (or a driver), find something about the vehicle or driver you can identify later, and make a mental note, or a verbal note to a VOX (voice activated) pocket recorder, or a written note to a memo pad, or even a photograph. Note time, place, and descriptor.
The descriptor is going to be whatever thing is easy to recall. It might be a dent or rust spot, an odd paint job, a bumper sticker, or, where nothing else works, the license plate. Now there is a trick to remembering plates (more correctly, making them memorable) that I like to use when part of the sequence is alphabetic. RTU 035 is the plate of a vehicle associated with a CIA operative (more correctly, a retired Marine Forward Observer hired to ‘observe’ me by CIA). I glanced at that plate and forever now can recall it by my memory trick.
Simply make up some nonsense acronym out of the alpha portion and repeat it to yourself a few times while looking at the vehicle, not the plate – you want to associate the plate with the color, make, model, etc., not some rectangular piece of metal that might be replaced at some point. So in my example, I said ‘Rat-Tailed U-boat 035, Rat-Tailed U-boat 035, Rat-Tailed U-boat 035.’ Done deal. Next vehicle, please.
You can do the same with drivers. I enjoyed making up names for them, too: Pug Face (looked like a boxer who didn’t retire soon enough); The Professor (very dignified); The Liddy Man (wore a Liddy mustache and similar hair line; The Cuban (you get the idea). You will often see these people in multiple vehicles over time. It really gets interesting when you see the same groups of people in the same cars others of the group had earlier driven. And above all else, the most important clue… when you see the same people or cars at differing parts of town on the same day… especially if in those groups. Been there, done that.
But I did also employ both audio and paper, and photographs, as situations allowed or required (such as when there is not a lot of time and the situation is fluid). At days end, I would compile these all into a database, and once a week, for those repeat offenders (that’s the important clue), I’d go down to the Department of Motor Vehicles and run the plates to see who owned them.
Can’t do that any more here in Oregon, they made it illegal. Most states won’t allow it unless you are law enforcement. No problem. Lots of friends and relatives in law enforcement. Don’t have any? Make it happen, but you need to become GOOD friends because to help, they risk getting into trouble. It’s very helpful if you are both politically incorrect, at least privately (cops don’t get very vocal about that in public, it tends to cause unemployment).
Benefits and reasons for detection
There are some serious reasons beyond merely confirming suspicions. Example: Amazing thing about the DMV reports was, for me, that more than half the plates were reported either as stolen, non existent, or blocked by law enforcement. Actually, they didn’t tell me the later part, they just said non existent. But all I had to do was lean a bit and read it for myself on their CRT screen. Point is, such reports give you a clue as to who is involved. If you don’t get a lot of stolen/non existing plates, then you are probably dealing with private investigators, corporate goons, or some kind of group of idiot citizens thinking themselves above the law. Else, its government of some kind.
In my book I go into a lot more depth with some intermediate steps designed to better identify your players, and to give yourself tactical advantages. In fact, overall, its one of the larger sections of the book, and its followed by whole sections on offensive and defensive actions that fit into any knowledge gained about who is involved. That’s because, when you know who, you know why, and when you know all that, you know their limitations and what to expect from them when you do X. You start to control events forcing them to react to you instead of you being a mere bug under an unseen microscope subject to their manipulations.
And, it talks about their manipulations, and how to deal with them. They will attempt manipulations, mostly to see your reactions as part of establishing a psychological profile (another reason for cameras in the bedroom, I suppose). So one trick I talk a lot about, is ACT, don’t REACT. Learn to control responses: consider if the situation might be observed and a reaction expected or hoped for, and then decide if you want to confuse their profile by acting differently, or not. Then ACT in the decided upon manner, forcing them to react to YOU (incorrectly react, at that).
The other tactic I discuss at length worth mentioning, here, is that sometimes it is valuable to deliberately blow their tail by letting them know you know they are there, and who they are. They have to report that to their superior and they and/or their vehicle need to be replaced. Very embarrassing and a great chuckle to be had by all. It should cause escalation of methods used to follow you to levels harder to detect, at least by the time you’ve blown two or three tails in a row. Ideally, you do not want to escalate to that point where you can no longer detect the next level, so you would stop using this ploy when you felt that point was near (for most people, that’s going to be the first level, so this will be a moot dialog).
But for others, it has great advantage, because the book tells you how to use that information to better determine just who is following you. For example, at one point I was able to determine it included bounty hunters working with Clackamas County Corrections, and was able to thereby identify the Corrections Officers involved, as well as eventually find the high Sheriff himself (some decades back, of course — the current Sheriff is not a known CIA in-place asset) was involved.
I happened to catch him unaware on video following me on foot near where I worked, and that allowed me to identify him from a coincidentally convenient interview conducted on TV that very week. Subsequently, I openly took pictures of him when he drove past me in a car with Federal plates (neat trick for a County guy, eh?). Never had much trouble with HIM after blowing his invisibility, and in point of fact, after filing a complaint, he ‘retired’ from his elected post. The bounty hunters relocated, too.
The escalation which followed (that was the purpose, recall)? They advanced to use of trucks and vehicles belonging to and driven by employees of an electrical contractor which was later identified as a CIA front operating under 17 names in four States. So that told me my problem was NOT with the Sheriff’s department, but a much bigger fish. The whole story came out well in the end, as I was able to gain enough proofs to force them to stop bothering me, and even to pay me for damages.
Those proofs included not just my own problems with them, but documenting their spying on local government and high tech industry here in the Silicon Forest… letting themselves in wee hours of the morning past high security locks, using flashlights, and presumably, collecting and replacing recorded tapes. It’s all in my book, as well as another book, Fatal Rebirth, which better explains their growing paranoia since 1947 and on into the future. Ever heard of the Unified Conspiracy Theory? Check it out.
Then you will know why I make them so paranoid. Seriously, though; email me if you are having these kinds of issue: proparanoid at century link net.
How to prevent gross violations of your privacy by the Police State
by H. Michael Sweeney
Updated 6/17: two changes in red
Note: This is a complex topic and thus is a lengthy post of a somewhat technical nature, and though it is based on knowledge of the U.S. communications network, most things found here generally apply World Wide. Given the complexity, it will not be useful to undertake reading it unless you have time to devote free of distraction, as it is too important for hit-and-miss reading. It is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)
I’ll start with an inflammatory statement, which I’m fond of doing if it criticizes our errant government. We live in a Corporate Police State. This, I’m arbitrarily defining for the purpose of this article, is a form of government which partners with corporations against the clients of both. As Citizen, you are client to Government (you pay them taxes, they sell you societal infrastructure), and in this case, you are also client to your cell phone service provider. No client should be ever stand for being abused by those with whom they do business; they should stop doing business with them, or find ways to fight back and neutralize the abuse.
The Police State part arises whenever you have a government which applies surveillance and perhaps targeting with Political Control Technology (PCT) of citizens over political issues due to government’s paranoia; they fear the power of individual free thinkers who dare to have and express opinions contrary to their own. And, frankly, they should fear it, because the more Police State-like a government waxes, the more such persons they create, and the more likely such persons will become active in working to replace government. As other posts on my blog site reveal, when governments defeat traditional forms of redress, that could mean outright armed rebellion, if they persist and grow worse over time. Governments get what they create for themselves.
What has your government earned for themselves from you? Acceptance of abuse or defiance and protest against it? Your answer then defines you as being either a common dumb and obedient Sheeple or being someone who is more aware and thus deemed politically incorrect, and therefore liable to being spied upon by government through your cell phone. Here’s how they do it, how to detect it (when possible), and what to do about it.
Threat One: Listening in
A cell phone can be listened in upon by several means with varying degrees of usefulness, and in ways which almost make irrelevant any dialog about warrants, roving, blanket, or otherwise. Dialog on warrants would justify is own blog because as a topic, it is its own area of political spying abuse. So there will only be brief references, here.
While the information below talks about detection methods, most are not detectible usefully. At best, you may need to rely on situational evidence, such as people seeming to know things only possible by having overheard a conversation, or habitually ‘coincidentally’ showing up while you travel. It is all about being alert to your situation and surroundings. That is the price of politically incorrect (in a Police State). Here are the means:
a) If covert access to your phone was possible, it could have been cloned. Not all phones can be easily cloned, and some older phones may resist altogether, depending on who is doing the cloning (their sophistication). That means any use of the phone will be ‘duplicated’ on another phone somewhere as if the user thereof were inside your own head. This cannot be detected by you (assuming the user has set to mute) and, while the phone company could detect it in real time, they don’t try. It cannot be detected after the fact. Anyone using the tech would not likely rely upon a warrant, but it is possible that one could be involved. The technology to clone is hobby grade and above and thus almost anyone can construct the means to clone most phones.
b) Some cell phones have an undocumented diagnostics mode accessed by a keystroke sequence which lets the user hear all cell phone calls going on near to the tower at the moment, in random rotation. Since the number of users at a given instant could be just a handful, that often allows sensitive information to be gleaned, especially if one recognizes a voice. These codes are generally available on the Web, so anyone can use them, and no warrant is required. There is no means to detect its use.
c) The NSA (National Security Agency) worked with the phone industry to develop the modern digital telephone system which includes cellular technology as well as land-line phones. This has become a de facto World standard. The design incorporates command codes sent at ultra high-speed along the network mixed in amongst other call signal data. Phones generally cannot detect these codes (with some exception), but they do respond to them, and that is how they can be manipulated. The range of capabilities (and thus, the threat level) is broad:
1) Calls can be remotely listened to by NSA by computerized systems looking for keywords, in which case the call is escalated (see next). This cannot be detected and NSA routinely listens into almost all call traffic regardless of who the caller or recipient might be. This is under the umbrella of Operation Echelon, one of the earliest paranoiac efforts of the Cold War era intelligence community. Its been going on for decades.
2) Calls can be rerouted to a secondary location for recording and live listen-in capability. This allows thoughtful analysis of call content. This feature can be ‘preset’ so that all calls to or from a given number are recorded, which is exactly how they would choose to target the politically incorrect or a criminal suspect. A warrant is required by the phone company to set it up but anyone who knows the codes can bypass asking the phone company to do it. Virtually the entire military-industrial-intelligence complex knows the codes, and therefore, so do many individuals. It requires special black boxes anyone could build from scratch.
There is a subtle way to detect this form of eavesdropping on inbound calls, but it requires happenstance or deliberate query. If anyone mentions that it took a long time for you to answer the phone but at your end it only rang a few times, the call was rerouted and the caller heard extra rings while the secondary phone system took time to answer, initiate the recording process, and then pass the call along to you. This does not tell you if it is you or the caller who’s the target of the listen in, but you can query on outbound calls as to how many rings they heard at their end, and if calling several numbers at random with consistent results, you have your answer.
Another clue (very rare) can be when a call seems not to hang up and you continue to hear what is going on at the other end. That is a malfunction at the recording site which causes the call not to be released, and the line is held open. It is usually true that the other phone in the conversation was a land line. This brings us to the next threat:
3) The microphone of the phone can be turned on without the need of a phone call being placed or answered. The phone is then a ‘bug’ you carry with you. This can be detected in many cases by paying attention to battery consumption. If your battery life on a charge is normally many hours to days even with general use of the phone, but suddenly it dies or nears death within significantly fewer hours with the same level or less usage, it is being listened in, upon. This happens to me whenever I’ve announced I’m leaving the house, especially if to meet someone. Funny that the battery which normally lasts 2-3 days will crap out in six hours with a fresh charge, but return to the normal performance the following day.
4) I’ll mention as an additional capability less commonly employed is the ability to spoof a destination or point of origin call. You could dial, for instance, the Police to call for help, and someone else could intercept the call and pretend to be Police and sending help. Very useful when their own people are breaking into your home to cause you harm. The reverse is also possible, a call could come in from someone you know but be someone pretending to be calling from that number for some strategic value.
5) The original design did not anticipate the introduction of cameras into the system, but it is widely believed that it has been modified and may therefore allow the camera of the phone to be remotely activated with no means of detection. This has (since the original post) been verified as easy to achieve on all phones other than iPhones, and even iPhones are susceptible to more sophisticated conversions for the purpose.
There is no way to detect these spoofs at the time unless there is a flaw in their verbal dialog which triggers your suspicion and you are able to quickly devise a test question. This function generally relies upon black boxes, again, but are of hobby grade. I’ve received such a call as part of a break-in incident, the proof of it in the after-the-fact means of detecting the spoof, which is that such calls do not show up on the phone bill. That also means, of course, you have no proof for any legal recourse.
d) A more exotic use of the system as a dirty trick is that such systems can play tricks on you with respect to radio shows, where you are a guest speaker. These are often detectible as there will be a call to you just prior to (turns it on), and just after the show (turns it off) which entails an obnoxious squeal of digital codes which are similar to a Fax tone, yet clearly NOT a fax tone. I’ve been hit with this three times, and in each instance the effect was different, as was the tone set employed.
The first time was when I was one of the top three on-line civilian investigators (as media and government would prefer, ‘conspiracy theorist’) who was revealing new information never before known that served as proof of a missile bringing down Flight 800. I was guesting on Coast to Coast with George Noorey. The moment I announced I had this new information and began to speak of it, the show was sabotaged in the entire region of New York and Long Island where Flight 800 went down. It was a hot topic there moreso than elsewhere, because there were so many eye witnesses, not to mention investigators which we would presume government would prefer did not hear something that might redirect their investigation. The sabotage was truly clever; listeners in that area stopped hearing Art Bell’s show, and instead got an old recorded Art Linkletter show, ‘Kids Say the Darndest Things’, as confirmed to me by listeners afterward. As soon as the topic changed back off of Flight 800, the got Art Bell again.
On another show hosted by the late Michael Corbin, the effect was different. Callers were complaining that they could hear the host, but not me. The Engineer confirmed everything was correct, and the prior guest had been heard just fine with no changes in the set up, as was true of the next guest. More interestingly, my voice also did not record and so the show could not be offered on-line via download. An effective censorship. A similar third instance rendered the entire audio dead to listeners. The digital system is very powerful, it seems, especially when other digital equipment such as found at radio stations, is involved.
Threat Two: tracking you by cell phone
Your cell phone is constantly saying to the phone network, more or less, ‘Here I am, anything for me?’ Each cell phone tower nearby relays it to the phone company to find out. If anyone wanted to know your location, all they need do is figure out which tower(s) have your signal. This is supposed to require a warrant, or permission of the phone account owner (i.e., a parent trying to find a child), depending on company policy and service features (some do not allow owner access). But as the ACLU informs us, they often freely give this information out to law enforcement without a warrant. You see TV show cops and the folks at NCIS get at it all the time, as media is trying to train you to think it’s a good thing that should be allowed.
The above is true for all cell phones regardless of age or features, and provides an accuracy of varying usefulness dependant upon the number of towers and other factors. It can be as broad as a 4-6 mile radius, or as narrow as a few hundred feet when circumstances are right. The new GPS equipped phones will rat on you automatically to within about 50-200 feet in most cases. No way to detect any of this, of course, and a phone call does not need to be in progress. It merely needs to be turned on.
Threat Three: EEG functions
Cell phones are based on low wattage microwave signals in a relatively high frequency bands in the range of hundreds of Megaherz (millions of cycles per second) to several Gigaherz (billions). The human brain operates at ELF frequencies below 15 Herz (15 cyles). The difference does not deter those intending the need from using the phone in unique ways against their target.
A cell phone, like any other phone, can be used with voice-stress analysis to detect lies almost as usefully as if an EEG monitor were attached to the user’s head for the purpose. Anyone can buy the gear needed for a few hundred bucks, which lights up when you lie. They can be as small as and made to look like an ordinary deluxe ball-point pen, but are more commonly larger as size tends to relate to accuracy.
But a worst threat exists for Targeted Individuals (TI’s). These are persons who are commonly assaulted daily by a wide-range of Political Control Technology (PCT) in order to render them social, financial, and political zeros, usually by trying to make them seem delusional Schizophrenics. It is a form of mental, and in some cases, actual painful physical torture, as many forms of electronic weapons can be involved. The cell phone can easily become such a weapon.
In addition to all the other potential cell-phone abuses, which will be in constant use on the typical TI, they must worry about EEG manipulation. Signal processing methods used by the kinds of sophisticated agencies or firms (most commonly the intelligence community, military, and their corporat contractors) who employ PCT, can allow a cell phone’s signal to be embedded with a modulated signal in the same range as the brain’s own EEG.
When the phone is placed to the ear, it is close enough that the weak microwave signal with the embedded ELF signal, is still stronger than the normal EEG signal put out by the brain. When the brain is subjected to any signal simulating a given EEG signal that is stronger than its own, it adopts the external signal as its own. This is called ‘entrainment,’ and it is instantaneous.
This technology allows mood manipulation as well as manipulation of select physiological sensations such as feeling fatigued and in need of sleep, nausea, and headaches. Generally, such signals are mixed and alternate between extremes to emotionally and physically exhaust the victim, making them irritable and less than fully functional.
This threat is not normally detectible except by extremely expensive and sophisticated signal analysis by experts using costly special equipment. However, one very alert to how they feel before, during, and after use of a cell phone may detect or have a sense that this kind of abuse is being used against them. The threat also applies to cordless land-line phones, by the way.
Now, while the method is quite workable when the phone is at the ear, it can have a gradual, lessened effect if a few feet away. It is thought, by the way, that the use of an earpiece does not deter the method because the earpiece is also communicating with the phone at Gigaherz levels (Bluetooth).
Note: Another way Targeted Individuals are threatened by cell phones is Mob Flash. The victim’s picture and suggested things to do (called Street Theater) or say if they see them (usually described as a harmless joke associated with a birthday or similar) are sent to everyone in the same cell phone tower’s range. When you see people looking at a cell phone and then doing the same sort of thing, that evidences the practice. I suggest you have fun with them at their own expense and formulate an unexpected nonsense response. Booga booga!
Threat Four: the Software Mod threat
All of the above threats to one degree or another, including remotely activating its camera, can also come from yet another source; software mods to your phone. Even very old cell phones with seemingly no programability can be modded. It can be achieved by covert access to your phone, or by a phone call to the phone using a black box (which tend to show very odd phone numbers as the calling source), or even by a virus attached to a text message. Most phones do, after all, use Microsoft OS, which is quite prone to virus catching.
The obvious exception is iPhone, which wile not susceptible to such virus attacks, can still be modded by the other means. Regardless of the phone, unless a technician, you cannot detect the mod’s presence, and even technicians have doubtful capabilities. The only safe solution is to periodically have your carrier wipe your phone’s memory and download your approved apps and phone lists, etc., fresh.
For all but the Mod threat, above, simply deny them their signals, and limit the phone’s usefulness as a weapon against you. Most people use the phone for relatively infrequent inbound or outbound calls. Anyone who uses it more frequently should also read up on the threat of cancer, which is so significant, that I refuse to put one to my head, and use speaker phone, only, unless absolute privacy is required, in which case I defer the call to another time and place, if possible. Frankly, the cellular industry is headed toward that time when class action lawsuits threaten to bankrupt them, as happened in the Asbestos and Tobacco industries. It’s exactly that bad.
Therefore, the simple solution is to turn the phone off when not in use. Power it up once in a while to see if you missed a call, and call them back. Your threat of tracking is limited to quite narrow windows of opportunity and tells them at best where you are the time of the call, which does not tell them how you got there or where you will be going next. Some newer phones ignore the power switch for tracking purposes, and it is thought they also allow listen in even when turned off.
This feature is not documented so we can’t say a specific phone is or is not a threat, but you should presume it so if built after 2005, and instead of turning it off, remove the battery. One indicator it may be an issue is if the phone stays lit up briefly after full completion of the power down (where it normally would not), or briefly lights up for no reason at all when not in use (someone has polled the phone with some sort of signal).
There are some who say that phones after 2009 also ignore battery removal. I have no confirmation, but you can also avoid power off and battery removal, as well as this added potential worry by simply placing the phone in a foil wrapper, even if just an empty foil-lined potato chip bag. And, by the way, put your credit cards in there to prevent people from using black boxes to steal your credit by cloning your card’s smart card chip. I use a foil lined oversized phone case to keep everything, including cash, and do not even own a wallet.
Deterring a listen-in threat is a different matter. Obviously, if you are using the phone, it is at risk. If you have a reason to suspect listen-in, it is likely because of a specific topic of sensitivity. Simply arrange in advance with persons with whom you likely need to speak openly about such topics to employ a simple code in conversations. A simple key word or phrase might mean ‘watch what you say,’ and then additional keywords might be translated as key sensitive elements of conversation. For example, you might agree that a given person’s name will simply be ‘Mr. Smith’ when, in fact, its not.
But don’t forget that there are two kinds of things one can say over the phone: things which are true, and things which are not. Thus if you suspect or know your phone is being used against you, try to avoid letting on that you so believe. That will give you the luxury of providing deliberate disinformation to any listening in. I’ll leave the usefulness of that up to your imagination, and suggest only that the person on the phone with you should likely have a means of knowing when you are using the ploy. Again, a keyword or phrase might help.
Where defense against listen-in seems impractical, simply avoid talking in specifics altogether, or offer to call them back later when you can do so from a phone thought more secure, such as a pay phone. Of course, the problem there, is, that government may be looking for your voiceprint with NSA’s help, so that any call you make is listened into. But land lines and topics like that will have to wait for another post… or you could get my book.
Seriously – email me if you have these kinds of issue: proparanoidgroup at gmail com.
Next post in this series: In the Rearview Mirror: When You Think You’re Followed
What activists, militia, gun owners, and EVERYBODY ELSE should expect
by H. Michael Sweeney
Regardless of your beliefs of your political stand, Kevin Bacon had it right when he uttered the line in the film, JFK; ‘The Fascists are coming back…’ When they do, they won’t announce it beforehand, they will simply execute the End Game scenario as I wrote of in my book set, Fatal Rebirth. That book, if it helps with your giving me any credence, predicted the World Trade Center being brought down by jet liners and resulting in a series of Middle East oil wars… and several other unfortunate events including an assassination attempt on a Presidential candidate, ALL OF WHICH came to pass.
So I have just one word to those who do not believe Martial Law or Revolution are in their near future… ‘fool.’ Sure, I could be the fool. But I’d rather be a fool who is prepared for something which does not come to pass than the fool who was warned but choose to be unprepared when it did come to pass. With that in mind, here is my best advice on what to do to be prepared, with three different levels of preparadness for three kinds of people — from ordinary folk to the nastiest criminal and terrorist.
In the last post of this II part series, I outlined some significant warning signs that we are headed in this direction. If you agree the risk exists, the next step is to figure out which level of preparedness is right for you…
Level III candidates:
a) Is anyone in your family likely on a list? Anyone who is an Activist or outspoken politically on the Web, or in the real World, a Militia member, a registered gun owner, or who is a member of select ‘extremist’ political or religious groups (you probably have a good idea of who you are, and yes, that includes Constitutionalists, right wing, left wing, and wingless groups), is on a list.
b) If anyone in your family was ever given the treatment by any Federal Agency other than IRS (e.g., FBI, HSA, TSA, CIA,DOJ) for ANY reason, valid or not, you are on a list.
c) d) If you are currently a Targeted Individual, you are on a list.
d) If you the sort of person who, if shooting broke out tomorrow, would likely join in the fray against government, even if not thinking yourself on a list currently, should consider yourself level III or you may be neutralized before you can act.
e) If you are an illegal or in the United States on a Visa, and you would intend to stay, you may wish consider yourself a level III, because depending on where you are from, you may be in for harsh and harmful treatment.
f) If you are a criminal or a terrorist, you should consider yourself in this group. But you can please ignore me and get caught, please, because I’m not attempting to warn you to protect you, but to warn others they are going to be treated as if they were you, because government fears them more than you.
Level II candidates:
Everyone who is not Level III but who is also not employed by or associated with a government agency, military contractor, critical service sector (banks, fuels, transportation, utilities, etc.), or not independently wealthy persons of influence and power, be it corporate, political, or public image (famous people). This means the overwhelming bulk of us.
Level I candidates:
Everyone else; those who are so associated or wealthy; the 1% and people they love.
How you should prepare
Level I and above: You must presume an inability to travel, work, or access your finances. Banks will be closed. We are talking long term. You should prepare ‘Earthquake kits’ or similar of foods, emergency items, water, and cash in low denominations. Careful. FEMA will be in charge and will consider more than one week’s supply ‘hording,’ which is will be seen as a Federal offense which can result in detention and confiscation of personal property. Does your wife can fruits or vegetables? Better not have too many in the pantry.
Be prepared to have your home ransacked in a door-to-door search looking for illicit items, stolen goods, weapons, pornography, or horded stocks. You will be asked if you have such things and if you answer ‘no,’ but they find some, you will be detained. If you answer yes, be prepared to provide immediate access.
You will likely have advance warning of at least a half hour, during which you can put breakables in a safe place and perhaps pull drawers out and place them on tables so they won’t dump them on the floors to inspect the innards of the furnishings. UNLOCK everything if you don’t want locks smashed.
Be prepared for all medications in opened containers to be taken ‘for analysis,’ so you will want to have a supply of new-sealed medicines in reserve, at least a month’s supply. Some such things like insulin would not be an issue, but pills could be anything despite what the label says.
Any politically incorrect materials could subject you to detainment. They will likely want access to your computers and make a copy of hard drive contents. It will do you no good to erase questionable items unless you are quite expert in the field and have the correct software tools. Anything questionable found could result in detention and confiscation of the computer. It, or anything else taken will never be seen again.
If you have a dog or pet, put it n a cage lest it escape in terror or be shot as a presumed threat. Chaining is only going to be potentially useful if the radius does not encompass a walkway or access to a structure, but don’t count on it. There is additionally the risk of their own dogs seeking confrontation (even encouraged to do so) with yours. There will be dogs, so stand where they tell you to stand and do not make sudden moves.
In some cases those doing the searching will not be trained Police or military, but gang members or bounty hunters, or other persons who have been given cart blanch to do whatever they want, including theft of valuables. A a safe deposit box would be advised. If you have a wall safe, I’d not put anything truly valuable beyond personal documents there. You will be asked to open it, or risk having it blown open.
Stay tuned to the emergency radio and TV channels… the only thing which will be working. While you cannot trust everything you hear, there, it is best to obey any instructions tendered. Remain polite and obedient regardless of any personal affront you may experience. Be dressed when they come as they may choose not to let you dress or cover yourself if naked, especially if female. Lone females should invite a neighbor over for protection against risk of possible sexual abuse.
Level II and above: While level I persons will generally be afforded some degree of politeness and some hope of being given a chance to resolve issues which might arise (such as uncovering pornography not admitted to when asked), everyone on Level II is considered expendable, and in the way, a nuisance. You must be prepared to be even more tolerant and cooperative, as if a prisoner of war (close to the truth).
You should plan on hiding anything you do not wish to be taken, such as valuables, reserve supplies, or weapons, especially since you will be more likely to be searched by gang members or by unethical agents than Level I. See special tactical section on how to hide things. There will likely be ‘tests’ of your character and political thinking in the form of abusive behaviors and odd unnerving questions. There may be stress analysis lie detection in use based on audible response, so try to be truthful as best suits your needs.
Level III: You may wish to consider the prior advice for your family members, but any persons who fit the criteria to justify this Level should not stick around. See Tactical Advice section on Escape Plans. If the reason for such justification was terribly serious (e.g., being a known Anarchist or politically incorrect person such as myself), you should consider taking immediate family members with you, or at least having an alternate plan for their safe evacuation of the area. Make clear there will be no contact between you and them for a considerable length of time, and that when it does happen, it will be by unexpected means to which they should not react to at all with surprise. For example, they should not call out your name. They should not discuss it with other family members without care from surveillance. I suggest a copy of my book, The Professional Paranoid which offers a long list of specific issues such as this and appropriate strategies.
Special Tactical Issues:
Hiding things: You should not expect to be able to hide anything in your home safely. Not only might they employ dogs, but metal detectors, through-the-wall viewers, FLIR, IR, and Ground Radar systems. Merchandise of late is rife with RFID tags which send out what is effectively ‘here I am’ signals on radio request, and identifies the item. Anything buried at a depth of less than 80 feet is liable to detection, depending on its size, shape, and materials, and type of detection system and operator skill. Anything that absorbs and retains heat with a different coefficient than the items within which it is hidden will be more easily seen. So what can you do?
Depending on the nature of the item(s) there are some general strategies which can be useful. Small things like CDR discs or similar can sometimes be disguised or hidden in a way not likely to be seen electronically or visually, but I prefer to take no chances and instead hide things off the property and at distance. Items underwater and additionally concealed within an irregularly shaped bundle of various content tend to be invisible, so still waters can be useful. Indoors, there are often spaces in public buildings where one can hide small things and be assured not even the cleaning staff will encounter them, such as on top of overhead ducts, within vents, in the crevices of stairwells, etc. These would be low-traffic places such as emergency exits, back stairwells, etc.
Running: Establish your route and destination in advance, and consider variations for daytime vs. nighttime, as well as for circumstances. If there are troops on patrol and checkpoints, for instance, you need far more stealth options. False I.D. is illegal. Having found someone else’s I.D. and having it in your possession is only questionable. Using one or the other is one’s own discretion, be it real I.D. or something from your computer, but sometimes, walking right through the enemy’s door is better than trying to go around it. Of course, being proficient in a Martial Art is not a bad idea, either. Just remember that a Karate chop cannot outrun a hail of bullets. The best defensive martial arts courses money can buy today is Isreali Krav Maga. For extra money, they will sometimes teach you offensive tactics.
Once you have a route, especially if requiring days of travel, hide key supplies or items along the route in advance. Have more than one location for each so that if you cannot access one for a given reason, you have an alternative. As far as destinations go, the Book Set Fatal Rebirth has some very interesting ideas about how to modify and bolster structures to resist assault, as well as how to create perimeters of protection in layered form. Similar considerations on layered defense are covered in my first book, The Professional Paranoid. But the best modification is an emergency exit to a hidden remote point and yet another escape route prepared in advance.
Fighting, defensive or otherwise: If there is ever a revolution to restore government from a military coup or similar as so many of us fear is on the horizon (because, for the most part, that Congress is too blind to see the error of their ways in belief that the Constitution has no function despite their oaths to support and defend it), one must have a battle plan. What follows are just a few of the initial things which can be found in Fatal Rebirth, which goes well beyond this short article to include Rules of Engagement and an actual Battle Plan. Of course, that book was mere fiction, albeit one written for the ‘far out and unlikely propositions’ of ‘what if they took over the country and we had to take it back?’
I have a lot more to say about such things in Fatal Rebirth, all of it legal advice. But this forum does not allow it to be shared quite so freely without risk of prompting retaliation. I may already have said too much. So be it.
Please look out for each other, even those who refuse to understand, including where possible those who follow orders persecute you. Know your enemy and their weakness. It is their mind. Attack that and you win without bloodshed.
- Military Viewpoint: We are Six People Away From Revolution (proparanoid.wordpress.com)
- Citizen’s Viewpoint: We are ONE Person Away From Revolution (proparanoid.wordpress.com)
- Will Obama impose martial law? (wnd.com)
- Compare 1776 to 2012 and Tell Me Where You Think You Live (proparanoid.wordpress.com)
- Pentagon Source Alludes to MARTIAL LAW Around July 1st 2012 (zionistoutrage.com)
- Are Feds Preparing for Martial Law? (godfatherpolitics.com)
- Dan Feidt: Military Prepares for Martial Law Takeover (VIDEO) (animalsclubfreedom.typepad.com)
- Will Obama Attempt To Declare Martial Law Before November Election? (pakalertpress.com)
- Media Beast To America: Bow Down To Military Police, Your New Lord And Savior (disquietreservations.blogspot.com)
Included list of 250 terms and technologies of Political Control Technology
Edited excerpt from book MC Realities: Understanding, Detecting, and Defeating Political Control Technologiesby H.Michael Sweeney, copyright©2006 proparanoidpress, all rights reserved reproduction by request and approval only, to pppbooks at century link net
I write to the honorable legislative committees as a friend of the State and of all its citizens, volunteering the material contained herein as an expert witness on electronic weapons, electronic harassment and related technologies of political control. It is hoped that this material will be entered into the public record at your hearings and become useful in your final determinations…
Because of my knowledge on topic after a decade of helping victims of such technology, I must protest at the committee’s choice of language in the bill with respect to the first sentence… referencing control of these weapons only in the hands of the public by means of the phrase ‘no person’. This is to miss the entire purpose and intent of these weapons, and to fail to address the virtually sole possessor and users of the worst of the technology, which is government itself. The public does not need legislation to protect itself from itself, but from its own government. Language must specifically and clearly include government agencies and government personnel of all manner, Federal, State, and local…
In like manner, your definition of weapons is far too simple and narrow to avoid legal confusions. For example, the very same technology which is found in radar guns and FLIR can be used as a weapon of political control or harassment by mere abuse thereof. How will you protect against such abuses? How will anyone be able to determine by the wording of this Bill when the technology and application are legal and appropriate and when they are abusive and invasive?
The victim is not protected if the burden of proof rests on such simplistic language. The abuser, especially if governmentally authorized to access such technologies for normal uses, is not at risk where such loop holes exist. Your language must define and articulate to the complexities of the matter, which are illustrated by the technology reviewed in my (included) materials on topic. Merely adding ‘definitions’ section should address these concerns.
Finally, your legislation makes no provision for detection and enforcement. Can you imagine the local police arresting someone because a neighbor claims to have symptoms of attack? Without a means of detection, there can be no enforcement; all which remains is mere lip service, legislation not to protect the people from the weapons, but to protect the establishment from the people. The primary question is this: Is there anyone in our national or state governments who will stand up for the Constitution, support the Bill of Rights, live by the morally correct principles of humanity and of God, and resist the evil which stares you squarely in the face?
The challenge before your committee and, ultimately, for your entire legislative body, is not only formidable, but it is absolutely pivotal to determining the future of this nation…
Until one empowered sector of our own society, such as yourselves, makes an official protest and stand against this growing draconian onslaught, those things for which our nation stands come closer and closer to being silently crushed within a velvet totalitarian glove. Without such understanding… without laws to protect citizens from the dangers involved… and without any means of enforcing those laws… political control will be assured. The price for such control will be dear. It will be the surrender of that thing godly men call ‘free will’, and which the patriot calls ‘freedom and the pursuit of happiness.’
…May I propose three key concepts or points which should be a part of your deliberations?
1) The first is that any such legislation should be broadened to cover most, if not all non lethal weapons, not just electronic. The very same people who developed electronic weapons were responsible for the development of other non lethal weapons, and for the same unsavory reason: political control. All such weapons further have the same attendant risks to life and liberty and lend themselves to the same abuses and excessive draconian applications.
Perhaps just as important, a review of all such weapons makes the relationship between the weapon, the intended use, and the greater political control strategy which drove its development that much easier to grasp. In support of this notion, my report herein addresses the full spectrum of non lethal weapons, the greater portion of which are, perhaps surprisingly, the more hi-tech electronic variety.
2) The second point I would like to make is that your considerations and final findings must include and provide for public awareness. Only by educating the citizens of the realities of the existence and use of these technologies, can your efforts be well served. If the citizens do not understand the technology and the symptoms it generates, they cannot report the crime or well defend against it. In like manner, your law enforcement, the legal system, media, and the professional communities must also be educated, or the victims will have no place to turn without being labeled as insane.
Of even more value, such promotion and education will, more than any threat of punishments, deter actual use of the technology in the first place. All such technology is currently used in an extremely covert manner. The last thing an attacker using electronic weapons wants, is to be discovered. Such discovery puts not just the mission at risk, but also puts at risk the entire infrastructure of the non lethal weapons industry, and their leadership both in and out of government. Education will, in my opinion, prove to be your best weapon, in the end. But education in and of itself does not provide an adequate deterrence, because unless an attack can be proven, it is merely an accusation which, due to the sophisticated nature of the attack, can too easily be ignored by unconvinced authorities.
3) Therefore, the third and final point, perhaps the most important, is that if you are to have any true success in this matter, you must necessarily include funding for the exotic equipment required to detect and analyze the telltale electromagnetic fields, energy bursts, and radio frequency signatures which are the calling cards of these technologies. In fact, I remind you, it is precisely the output of these detectable indicators which makes this matter one of general concern to the population at large.
The leakage, overshoot, and reflection of these signals, energies, and fields created by these weapons have a great potential for harmful physical, mental and physiological effects on all citizens within a given radius of the intended principle target under attack. The collateral damage to these citizens is not now understood, nor can it be so understood until the actual weapons are captured and tested by independent laboratories. Even the most conservative estimates talk about dire health consequences associated with these weapons. If a particular cell phone can be found by scientists to cause a brain tumor, then what must we face when the signal strengths are many hundreds or even thousands of times stronger, and