Blog Archives
UNEXPECTED PATH TO END T.I. STALKING
There are no truly simple and foolproof paths to end any kind of stalking, but one proven Free Will Society method has led to discovery of an unexpected path which might prove very simple and effective for many T.I. victims of organized or individual stalking.
by H. Michael Sweeneyproparanoid.wordpress.comFacebookproparanoid.net
Dateline, Jan 18, 2021, from beneath the secretary’s desk at the fictional Law Offices of Saul Goodman. copyright © 2021, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. Fair Use Law in play.
Introduction
One unexpected benefit of stalking victims relocating here on the Coast of Washington State with me has created awareness of a new path to escape stalking. It is not really new, but that is, a new way to use an old method previously though useless, based on prior attempts to employ it. It seems we just didn’t know how, but quite by accident, thanks to the Free Will Society’s efforts (FWS) to help severely impacted stalking victims, now we do. That said, I’m not claiming we have exclusive knowledge of it… others may have discovered it before us, and simply failed to share.

This discovery amplifies the original reason for T.I.s electing to meet up here with me (and other Members) on several levels. The idea was that there would be safety in numbers able to watch each other’s back, with the eventual hope of caravanning together as a preformed community to a rural property site (farm/ranch) to establish our own intentional community, the Free Will Haven project (FWH). Today, as this is being written, there are four Members of the Society here (one just arriving), along with a larger number of victims already living here… and a like numbers seriously considering to do so.
One thing is already true of this: all Tis here have a sense of great improvement in their targeting situation, and if honestly considering, must admit that remaining targeting symptoms may simply be coincidences or knee-jerk assumptions based on expectations ‘learned’ from years of targeting. So, to be clear, coming here has proven beneficial without the new path discussed herein. But it is important to relate it to our efforts, here, because it explains how we learned of it, as well as how to make it work.
To preface further with useful event context, having worked with thousands of victims over several decades, one axiom which has remained constantly true is this: it is not normally a good idea for targeted individuals to share the same domicile, or become romantically involved. That axiom presumes that two or some other small number are doing so as individuals, and not part of a larger community of ONLY victims living in the vacuum of a targeting-free environment, like FWH. In an all TI environment, safe from direct easy access by perps, and given time to get to know other victims and establish relationships normally in the luxury of a non-targeted day-to-day life, it may be possible to find helpmates and romance free of the problems which always arise while targeted actively. Specifically, it almost always ends up where one or even all such persons living together end up accusing one another of being perps in one form or another, and result in bitter breakups with considerable additional damage to everyone’s already frazzled and delicate psyche. In fact, I’ve never seen the axiom fail, though I’m hoping it has, somewhere, for someone.
A perfect example took place when, against my general advice, one of the Members offered cohabitation to aid another homeless Member in seeking to reestablish himself, here. They would share a hotel room, one using a sleeping bag on the floor. It only took about three weeks for an emotional bond to form sufficient to lead to romance, again against my advice, and only a few weeks more to lead to the expected accusations and an unhappy separation. There is only one important detail about all that, and it is the matter which opened the unexpected door to a logical path for other victims.
The male Member, admittedly a PTSD victim as well, threatened violence in ways rendering him a danger to himself and others… to include myself and the Society.
There was no choice but to seek a restraining order, and that has proven to be a doorway of great opportunity, particularly here, in Washington State. Before continuing, I must admonish against mentioning organized or gang stalking, mind control, and any DEW or other electronic weaponry when seeking a restraining order. Not unless you have direct proofs to offer… and by proofs, I mean courtroom Perry Mason-quality. What you believe or think true, or have researched online or even found in my books, MEANS NOTHING before a Judge.
For this reason, also, know that your standing before a Judge, especially if the Respondent chooses to use it against you in his defense, can be harmed if you had previously filed Police Reports which involved those same topics. While there can be exceptions, it can be used against you and result in an unfavorable ruling by the Judge… who will likely view you as mentally imbalanced in some way. I have always advised great care in calling Police or writing letters to FBI, Politicians, Media, etc. Any such prior activities will create doubt in your claims, and require significantly stronger proofs if to overcome such doubts. Ergo, best to keep it simple, and focus on threats of violence or actual violence in need of restraints.
Even so, attempting to secure an Order has potential value even if rejected (for any reason). You can try again another day when your quality of proof improves, and multiple attempts can, in the right circumstances, serve as proofs of another sort in non court venues. But you can’t keep doing that… after a third try, or so, you’ve likely worn out the welcome mat. But one or two can be seen as an excellent historical trail which succinctly documents the nature, depth, and timeline of targeting, esp. when presented with your own argumentative responses to any given rejection by the Court.
Types of Orders and how they work
There are many kinds of restraining orders, and while a lawyer is always a wise partner in any legal action, they are relatively simple to request on one’s own. Most States have a Free Legal Service available for this and other purposes, if you are on fixed income, homeless, etc. We are only concerned with Civil Orders, as opposed to Criminal Orders, which relate to criminal investigative needs. Commonly, there is no Court Cost or Fee to seek any form of Civil Restraining Order, the type useful to a T.I. It is primarily a matter of visiting the County’s Courthouse and requesting the forms, often also available online, and filling them out. Because multiple types of orders can rely upon the same forms, it can mean rather a lot of detailed paperwork (in our case, about a dozen sheets of questions with checkboxes and fill-in-blanks).
Typically, the County Clerks can answer questions should any given item not be understood. We had about six such questions, answered on the spot as we filled them out at the Courthouse. If you will have witness testimony, you will likely need ask for forms for that. Even with Clerk aid, our first attempt was still somehow flawed, but by the time we finished the second attempt, we understood the process rather well. There will be no specific stepwise advice on any of that, here; it will likely vary State by State, as determined by various laws in place which so dictate, and the forms themselves.
There may be variations on the type of Civil Restraining Order from which to choose. The County Clerk’s Office can advise which type is best… or more correctly, which forms best meet your need, based on playing 20 questions. But the one best version is one based on Domestic violence, for reasons covered separately, herein, some of which relate specifically to unusual benefits in Washington State, which may or may not be available in your State.
Domestic violence is generally defined as actual violence or threats of same from anyone you have cohabited with (romantically, or no), be it current or at some time in the past. Many targeted victims complain of family members, roommates, and cohabitation lovers (not one-night stands… but any situation where they had their own key copy) deemed to be a perp. Actually, as we will later discuss, it need not even be that they were a perp, to make an Order of value… that Washington State difference. Restated: there is a potential benefit in a Domestic Violence order against any individual, which can also benefit a victim of stalking by other unnamed and unreferenced persons in the order. It’s like being handed an umbrella; it can cover more than one person in the right circumstances.
Less specific orders (non Domestic Violence) addressing specified aspects of stalking and/or harassment still have value, but only if against named respondents.
Before getting into details, lets take a look at the process, which would not seem to vary much State by State. After you file the request (Petition), a Judge will review the Petition and either reject it for insufficient cause, or find it sufficient to issue a Temporary Restraining Order (likely in the range of ten to fourteen days) pending a Hearing where the Respondent and Petitioner can argue before the Judge as to why it should be rendered Permanent, or Lifted (canceled). This provides due process rights to the Respondent, who must ‘respond’ if feeling the order is unjust. It might take place by phone or only video conferencing, since the advent of COVID. In any event, the petitioner (you) need not confront the respondent in court, if feeling threatened, thereby. Note that should a restraining order be lifted, you should likely be notified and given an opportunity to protest and alter the decision… a matter to be inquired upon when the final order is issued.
The Temporary Order will be served and you will also receive a copy. If violated by Respondent, you call Police and they will take action which might be anything from a warning to an arrest, and the Court will be notified of the violation, which will strengthen the likelihood of a Permanent Order. Once the Judge rules, that notice will also be delivered to both parties, and the protection either continues, or is ended. Simple 1, 2, 3.
What you need before you can file
You need to know the name and address of the Respondent, and ideally, their birth date or estimated year of birth. You need physical description characteristics (estimations OK). For both yourself and the Respondent, you need to have current addresses. This can be a problem if either of you are homeless… specify a Shelter or friend’s address, or a hangout location and so indicate. In like manner, you must know what Law Enforcement Agency responds if either of you were to dial 9-1-1 (determines who will serve legal papers and be most likely to enforce the Order if violated). It can be useful to know if the Respondent has weapons, a criminal past, an income/job, vehicles, or specific items used in targeting you (again, nothing relating to political control technology). In some cases, your Order can request seizure of items potentially used against you, such as guns or a vicious attack Dog. For anything more than guns, it is especially a question for a lawyer, perhaps, and for making a case that the request addresses a valid, significant threat.
Of utmost importance, you need to be able to describe the perceived threat with examples, but also, if to succeed, supporting proofs. This should include descriptions of emotional states of fear or other harms already experienced, or feared; sell the drama. A Police Report is the ultimate proof, perhaps even if the Police could not verify claims… multiple reports can establish a pattern — so it is possible that any ill-advised calls to Police might still prove useful. If they exist, consider to use them, because if they do and you don’t mention them, that may cause the judge to throw the matter out.
Ask your Clerk about how to properly handle and submit such third-party proofs, testimonies, and other attachable evidences. Proofs can be in the form of emails or sms messages, video/audio recordings, or eye witness statements which illustrate the most serious threats or harms experienced. Some such proofs like video/audio can simply be cited, with an offer to provide them at a hearing, or perhaps by mounting them online somewhere with a private URL link you can put into the documentation. You would not want to overload the request with too many examples, but you can cite that other examples are available. The important thing is to illustrate each differing kind of threat, abuse, or harm endured for a broader picture.
Special Benefits of Domestic Violence-based Orders
Victims of Domestic Violence become eligible for special benefits in many States. In Washington State, it can mean emergency housing in a center with greater security than a homeless shelter. It can also mean monthly financial assistance in several categories. Washington even has the functional equivalent of a ‘Witness Protection Program’ which provides the victim with all new identity, and establishes them with either an income and living space or employment in a differing city, as well as a blind mail drop which allows contact by approved persons/businesses without them knowing your true location/current name.
The Society has a contact in the Washington State program who is very pro Society efforts at a personal level. This provides yet one more set of reasons for Members to consider joining us, here. Should perps follow, the Restraining Order provides additional defensive measures to those already in place here due the safety in numbers and my presence, with my skills set and special TSCM (Technical Security CounterMeasures) equipment. It can, for those able to illustrate Domestic Violence (even if from another community, perhaps even out of State), mean superior protection and other aid well beyond that of the Society. Again, that is true even if it was unrelated to current stalking issues.
But it is also true, that even if not a Member, and not joining us, here, anyone can use this tool anywhere in the country, for possible relief at one level, or another. Please advise of any such efforts and outcome.
A TI with RF Measuring Device can = Dangerous Conclusions
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.
by H. Michael Sweeney proparanoid.wordpress.com Facebook proparanoid.net
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro. What you will learn reading this post: • all TIs could benefit from professional TSCM electronic sweeps; • that isn’t likely to happen; • the poor-man’s TSCM pro isn’t a pro, and might be a fraud; • there are low-cost meters but improper use can be dangerous in many ways; • there is a solution, and help implementing it — and here it is…The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.

Just some of the gear needed for a professional TSCM sweep completely meeting a TI’s needs.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.

A decent start if you have something in the range of $10K to spend. It is virtually a hand-held spectrum analyzer… that unfortunately does not see military gear.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:

Implant quite similar visually (smaller) to one found in my own leg some 35 years ago. State of the art, today, can be 200 times smaller, translucent, tissue colored, and bond with tissue: invisible to a surgeon and to x-ray. MRI sees only an inconsequential image blemish.
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.
As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.
The Eight Steps of a Stalker, and Defenses
Specifically addresses psychopathic individual stalkers,
but elements apply to organized or gang stalking as well
by H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved edited from original versions in The Professional Paranoid and The Professional Paranoid Defensive Field Guide permissions to reproduce available on request to pppbooks at comcast (net) Dateline Portland, OR Sept 27, 2011Stalking defenses
My Professional Paranoid series of (3) books are a kind of ‘how to’ in the realm of privacy and security issue problem solving. The key to solving a problem is, of course, knowing about it in the first place. Thus all my material includes how to detect the problem. Follows are the things everyone, and especially women, should know about stalking (which is one reason why, for simplicity’s sake, the steps are presented as if a woman is being stalked by a man). But stalking is definitely not limited to female victims or male stalkers. Ask David Letterman, which points additionally to the fact that stalking can be about something other than just sex.
Fame or circumstance can be the prime motivation for stalking, even circumstance as simple as cutting someone off on the freeway. They follow you home, and plot their campaign of insanity against you. And it is a plot, well thought out, and by someone typically of great intellect. For some reason, the psychopath tends to be a brilliant thinking in all respects but the most basic of logic paths associated with social reasoning.
Internet Stalking can also follow the model to a degree, but is commonly a bit harder to detect and significantly harder to deal with while it is a such a remote level, one typically anonymous to the nth degree. The danger is, of course, that the Web stalker may escalate at some point to a physical or real-World stalker.
Stalking defenses
From my books, with minimal editing:
Stalking defenses
A stalker will…
1 Study and learn to know the victim: observe and learn as much as possible before planning the attack.
So be alert, be inconsistent! Observe those at the periphery of your daily doings and keep watch for repeat presence, especially if overly interested in your activities. Try not to establish patterns, and whenever possible, go out of your way to change regular habits.
2 Make contact: find an excuse to get close enough for conversation, if possible, something irresistible to the victim (i.e., involving victim’s pet, hobby, project, etc.):
So end conversations with strangers quickly! Turn cold and hostile if polite excuses fail. If there is any further insistence of any kind, do not warn that you will call for help, DO IT! If needed, follow instructions in item five.
3 Lower victim’s defenses: be friendly and charming, control dialog.
So don’t let them get past step 2! End it! Be especially wary of very charming and flattering, talkative types.
4 Obligate and gain trust: endears himself to the victim, perhaps by some task or favor which indebts the victim, preferably an ongoing task which involves going with the victim to a more private place, such as carrying groceries.
Again, don’t let them get past step 2!
5 Isolate: isolate the victim using trust gained, always ready to counter possible objections by clever whimsy or logic. Seek a place where no one else can hear or see.
So run! Drop everything, scream, and run. Do whatever it takes to draw unwanted attention and then, to play safe, get witnesses contact information. Call Police.
6 Attack! In their mind, this may simply mean ‘romancing you,’ but no matter how gentle, it is an unwanted assault on your person. But many stalkers ‘loose it’ in the moment and violence ends up being the final expression of their feelings. So no matter how gentle it may start, it can quickly escalate to something else.
So defend yourself! Fight back to the best of your ability (hopefully improved with martial arts or weapon’s training). Remember, the perp will expect you to wilt with fear (or succumb to charm), perhaps to break into tears and become a human vegetable. Fight back fiercely, suddenly, and without warning, no holds barred, screaming and kicking all the way. Break windows, knock over furniture, honk horns, anything to draw attention. Do whatever it takes to be his worst nightmare.
7 Eliminate evidence: hide, take, or destroy all evidence, including the victim in worst case scenarios.
So observe everything! Note details about face, clothes, vehicles: get license numbers, scratch skin or pull hair in struggles (get DNA sample, mark them with scars), get a button from clothing, etc.
8 Escape: make good a retreat without detection.
So thwart escape (where safe)! If possible WITHOUT FURTHER CONFRONTATION, get witnesses, damage vehicle to make it stand out and need repair, inflict a wound that will require medical treatment or force a limp, bandage. REPORT THE CRIME. There is no guilt in being a victim, ever. If any law enforcement officer or medical staff member treats you with other than respect, immediately ask to speak to their supervisor and have someone else assigned, file an official complaint, and go public about that treatment, if necessary, to get that person fired or reprimanded. They have no business being in their line of work. You may even wish to consult a lawyer about a suit for emotional damages.
Anyone who feels they are being stalked should at the earliest opportunity to present useful information speak with Police. Useful information would be descriptions, time, place, witnesses, event details. In the absence of too many such informational elements, Police will not even be moved to file a report. The GOAL is to have a report filed, not to have the matter ended, because such information is rarely actual evidence nor is it condemning enough to warrant investigation or arrest.
But it MIGHT result in the deterrence of a Police interview of the suspect, and DOES result in documentation of the problem which, with continued reports, will build a case for stalking to the point where, hopefully, an arrest and prosecution can take place. Without such a history, a single report, even if involving violence, will not necessarily result in arrest. Police need a LOT of information and detail before they can act usefully.
It is also suggested that you email me for additional advice. I offer a free helps kit and two weeks of consulting which can make a big difference in how things progress, as well as the final outcome. Email proparanoid at comcast (net).
End
Related articles
- You: Stalking victims failed by the law (guardian.co.uk)
- Dealing with a Stalker Your Own Personal Terrorist (socyberty.com)
- Profiling a Stalker (lachapelleinteriors.wordpress.com)
- System ‘lets down stalking victims’ (mirror.co.uk)