Blog Archives

UNEXPECTED PATH TO END T.I. STALKING


There are no truly simple and foolproof paths to end any kind of stalking, but one proven Free Will Society method has led to discovery of an unexpected path which might prove very simple and effective for many T.I. victims of organized or individual stalking.

by H. Michael Sweeneyproparanoid.wordpress.comFacebookproparanoid.net

Dateline, Jan 18, 2021, from beneath the secretary’s desk at the fictional Law Offices of Saul Goodman. copyright © 2021, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. Fair Use Law in play.

Introduction

One unexpected benefit of stalking victims relocating here on the Coast of Washington State with me has created awareness of a new path to escape stalking. It is not really new, but that is, a new way to use an old method previously though useless, based on prior attempts to employ it. It seems we just didn’t know how, but quite by accident, thanks to the Free Will Society’s efforts (FWS) to help severely impacted stalking victims, now we do. That said, I’m not claiming we have exclusive knowledge of it… others may have discovered it before us, and simply failed to share.

If the image is scary, consider the Web site it came from (thought catalog.com), where we find personal testimony of the 26 scariest things stalkers have done.

This discovery amplifies the original reason for T.I.s electing to meet up here with me (and other Members) on several levels. The idea was that there would be safety in numbers able to watch each other’s back, with the eventual hope of caravanning together as a preformed community to a rural property site (farm/ranch) to establish our own intentional community, the Free Will Haven project (FWH). Today, as this is being written, there are four Members of the Society here (one just arriving), along with a larger  number of victims already living here… and a like numbers seriously considering to do so. 

One thing is already true of this: all Tis here have a sense of great improvement in their targeting situation, and if honestly considering, must admit that remaining targeting symptoms may simply be coincidences or knee-jerk assumptions based on expectations ‘learned’ from years of targeting. So, to be clear, coming here has proven beneficial without the new path discussed herein. But it is important to relate it to our efforts, here, because it explains how we learned of it, as well as how to make it work.

To preface further with useful event context, having worked with thousands of victims over several decades, one axiom which has remained constantly true is this: it is not normally a good idea for targeted individuals to share the same domicile, or become romantically involved. That axiom presumes that two or some other small number are doing so as individuals, and not part of a larger community of ONLY victims living in the vacuum of a targeting-free environment, like FWH. In an all TI environment, safe from direct easy access by perps, and given time to get to know other victims and establish relationships normally in the luxury of a non-targeted day-to-day life, it may be possible to find helpmates and romance free of the problems which always arise while targeted actively. Specifically, it almost always ends up where one or even all such persons living together end up accusing one another of being perps in one form or another, and result in bitter breakups with considerable additional damage to everyone’s already frazzled and delicate psyche. In fact, I’ve never seen the axiom fail, though I’m hoping it has, somewhere, for someone.

A perfect example took place when, against my general advice, one of the Members offered cohabitation to aid another homeless Member in seeking to reestablish himself, here. They would share a hotel room, one using a sleeping bag on the floor. It only took about three weeks for an emotional bond to form sufficient to lead to romance, again against my advice, and only a few weeks more to lead to the expected accusations and an unhappy separation. There is only one important detail about all that, and it is the matter which opened the unexpected door to a logical path for other victims.

The male Member, admittedly a PTSD victim as well, threatened violence  in ways rendering him a danger to himself and others… to include myself and the Society. 

There was no choice but to seek a restraining order, and that has proven to be a doorway of great opportunity, particularly here, in Washington State. Before continuing, I must admonish against mentioning organized or gang stalking, mind control, and any DEW or other electronic weaponry when seeking a restraining order. Not unless you have direct proofs to offer… and by proofs, I mean courtroom Perry Mason-quality. What you believe or think true, or have researched online or even found in my books, MEANS NOTHING before a Judge.

For this reason, also, know that your standing before a Judge, especially if the Respondent chooses to use it against you in his defense, can be harmed if you had previously filed Police Reports which involved those same topics. While there can be exceptions, it can be used against you and result in an unfavorable ruling by the Judge… who will likely view you as mentally imbalanced in some way. I have always advised great care in calling Police or writing letters to FBI, Politicians, Media, etc. Any such prior activities will create doubt in your claims, and require significantly stronger proofs if to overcome such doubts.  Ergo, best to keep it simple, and focus on threats of violence or actual violence in need of restraints.

Even so, attempting to secure an Order has potential value even if rejected (for any reason). You can try again another day when your quality of proof improves, and multiple attempts can, in the right circumstances, serve as proofs of another sort in non court venues. But you can’t keep doing that… after a third try, or so, you’ve likely worn out the welcome mat. But one or two can be seen as an excellent historical trail which succinctly documents the nature, depth, and timeline of targeting, esp. when presented with your own argumentative responses to any given rejection by the Court.

Types of Orders and how they work

There are many kinds of restraining orders, and while a lawyer is always a wise partner in any legal action, they are relatively simple to request on one’s own. Most States have a Free Legal Service available for this and other purposes, if you are on fixed income, homeless, etc. We are only concerned with Civil Orders, as opposed to Criminal Orders, which relate to criminal investigative needs. Commonly, there is no Court Cost or Fee to seek any form of Civil Restraining Order, the type useful to a T.I. It is primarily a matter of visiting the County’s Courthouse and requesting the forms, often also available online, and filling them out. Because multiple types of orders can rely upon the same forms, it can mean rather a lot of detailed paperwork (in our case, about a dozen sheets of questions with checkboxes and fill-in-blanks). 

Typically, the County Clerks can answer questions should any given item not be understood. We had about six such questions, answered on the spot as we filled them out at the Courthouse. If you will have witness testimony, you will likely need ask for forms for that. Even with Clerk aid, our first attempt was still somehow flawed, but by the time we finished the second attempt, we understood the process rather well. There will be no specific stepwise advice on any of that, here; it will likely vary State by State, as determined by various laws in place which so dictate, and the forms themselves.

There may be variations on the type of Civil Restraining Order from which to choose. The County Clerk’s Office can advise which type is best… or more correctly, which forms best meet your need, based on playing 20 questions. But the one best version is one based on Domestic violence, for reasons covered separately, herein, some of which relate specifically to unusual benefits in Washington State, which may or may not be available in your State.

Domestic violence is generally defined as actual violence or threats of same from anyone you have cohabited with (romantically, or no), be it current or at some time in the past. Many targeted victims complain of family members, roommates, and cohabitation lovers (not one-night stands… but any situation where they had their own key copy) deemed to be a perp. Actually, as we will later discuss, it need not even be that they were a perp, to make an Order of value… that Washington State difference. Restated: there is a potential benefit in a Domestic Violence order against any individual, which can also benefit a victim of stalking by other unnamed and unreferenced persons in the order. It’s like being handed an umbrella; it can cover more than one person in the right circumstances.

Less specific orders (non Domestic Violence) addressing specified aspects of stalking and/or harassment still have value, but only if against named respondents.

Before getting into details, lets take a look at the process, which would not seem to vary much State by State. After you file the request (Petition), a Judge will review the Petition and either reject it for insufficient cause, or find it sufficient to issue a Temporary Restraining Order (likely in the range of ten to fourteen days) pending a Hearing where the Respondent and Petitioner can argue before the Judge as to why it should be rendered Permanent, or Lifted (canceled). This provides due process rights to the Respondent, who must ‘respond’ if feeling the order is unjust. It might take place by phone or only video conferencing, since the advent of COVID. In any event, the petitioner (you) need not confront the respondent in court, if feeling threatened, thereby. Note that should a restraining order be lifted, you should likely be notified and given an opportunity to protest and alter the decision… a matter to be inquired upon when the final order is issued.

The Temporary Order will be served and you will also receive a copy. If violated by Respondent, you call Police and they will take action which might be anything from a warning to an arrest, and the Court will be notified of the violation, which will strengthen the likelihood of a Permanent Order. Once the Judge rules, that notice will also be delivered to both parties, and the protection either continues, or is ended. Simple 1, 2, 3.

What you need before you can file

You need to know the name and address of the Respondent, and ideally, their birth date or estimated year of birth. You need physical description characteristics (estimations OK). For both yourself and the Respondent, you need to have current addresses. This can be a problem if either of you are homeless… specify a Shelter or friend’s address, or a hangout location and so indicate. In like manner, you must know what Law Enforcement Agency responds if either of you were to dial 9-1-1 (determines who will serve legal papers and be most likely to enforce the Order if violated). It can be useful to know if the Respondent has weapons, a criminal past, an income/job, vehicles, or specific items used in targeting you (again, nothing relating to political control technology). In some cases, your Order can request seizure of items potentially used against you, such as guns or a vicious attack Dog. For anything more than guns, it is especially a question for a lawyer, perhaps, and for making a case that the request addresses a valid, significant threat. 

Of utmost importance, you need to be able to describe the perceived threat with examples, but also, if to succeed, supporting proofs. This should include descriptions of emotional states of fear or other harms already experienced, or feared; sell the drama. A Police Report is the ultimate proof, perhaps even if the Police could not verify claims… multiple reports can establish a pattern — so it is possible that any ill-advised calls to Police might still prove useful. If they exist, consider to use them, because if they do and you don’t mention them, that may cause the judge to throw the matter out. 

Ask your Clerk about how to properly handle and submit such third-party proofs, testimonies, and other attachable evidences. Proofs can be in the form of emails or sms messages, video/audio recordings, or eye witness statements which illustrate the most serious threats or harms experienced. Some such proofs like video/audio can simply be cited, with an offer to provide them at a hearing, or perhaps by mounting them online somewhere with a private URL link you can put into the documentation. You would not want to overload the request with too many examples, but you can cite that other examples are available. The important thing is to illustrate each differing kind of threat, abuse, or harm endured for a broader picture. 

Special Benefits of Domestic Violence-based Orders

Victims of Domestic Violence become eligible for special benefits in many States. In Washington State, it can mean emergency housing in a center with greater security than a homeless shelter. It can also mean monthly financial assistance in several categories. Washington even has the functional equivalent of a ‘Witness Protection Program’ which provides the victim with all new identity, and establishes them with either an income and living space or employment in a differing city, as well as a blind mail drop which allows contact by approved persons/businesses without them knowing your true location/current name. 

The Society has a contact in the Washington State program who is very pro Society efforts at a personal level. This provides yet one more set of reasons for Members to consider joining us, here. Should perps follow, the Restraining Order provides additional defensive measures to those already in place here due the safety in numbers and my presence, with my skills set and special TSCM (Technical Security CounterMeasures) equipment. It can, for those able to illustrate Domestic Violence (even if from another community, perhaps even out of State), mean superior protection and other aid well beyond that of the Society. Again, that is true even if it was unrelated to current stalking issues.

But it is also true, that even if not a Member, and not joining us, here, anyone can use this tool anywhere in the country, for possible relief at one level, or another. Please advise of any such efforts and outcome. 

freewillsociety.wordpress.com

How TI’s Can Identify & Deal w Low Flying Aircraft


Targeted Individuals and ‘persons of interest’ tend to get nervous when they seem to be dogged by low flying planes or choppers. There is a way to determine if it is coincidence and harmless, or not, and who might be responsible, if actual targeting.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Oct 22, 2020, from an undisclosed location somewhere Right of Center. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

NOTICE: Fascistbook and their ilk (Twister, et. al) blocks any URL to my blog site. SO, if you wish to Share or Post a link in social media, you may wish to write out the url with spaces between wordpress and com (use no dot), instead of supplying a pasted link… or you are wasting your time and helping censors to win.

Zoooooom! Ad nausium

Many TIs find that (often the same) airplane(s) seem to be constantly in the skies overhead as they travel (surveillance, tracking), or overflying their location at extremely low altitudes (harassment). It has happened to me at times, at the heights of my being a ‘person of interest’ to rogue operatives of various Federal Agencies. For me, it included a ‘spat’ with FBI, FAA, and NTSB in the Flight 800 shoot-down investigation, as I was revealing very condemning proofs of a fraudulent cover up. There was also a time when I went head-to-head with a terror cell planning to suicide-crash small private aircraft into a gas stations while refueling from tanker trucks (called Gas Station Tasking by President Bush). They were making daily practice overflights and diving briefly at altitudes so low that you could make out the rivets. And, two of FBI’s top-10 Most Wanted were involved on the ground, face-to-face. The tools I’m reviewing, here, were not available in those days, and its availability is good news to those unaware of it.

The tool I’m speaking of is even available on your smart phone or other web/wifi/cell device, and affords International coverage. Just type in ‘flightradar24.com’, which tracks more than 180,000 aircraft in the air at any given point in time… any planes which can be seen by the global aviation radar network, transponder/radio-tracking stations, and satellites. Their coverage is increasing over time, as well, with excellent coverage in Europe, North America, and SE Asia, Australia/NZ, and major air corridors/destinations. It is a very robust site in terms of features useful to anyone wanting to track a given aircraft (i.e., a commercial flight a loved one is aboard), or anyone involved in aviation. At this time, it does not track military aircraft, likely for good reason (see Tactical Advice for alternatives).

I learned about this site by watching live streaming content on Twitch by a contact who IS targeted by government agencies, and while he was talking, he noted a low flying aircraft buzzing his house (not rare, sez he). Live, while he is already in screen capture mode so I’m seeing his computer screen, within seconds, he was able to identify the aircraft, complete with a picture of it, and owner/operator information. There is more that he could have done, but he laughed it off (the right way to deal with any harassment) and went on with his presentation.

When you first arrive at the site, you are presented with a Map, likely focused on Europe or some part of the globe other than your location. The first time you visit, you might want to click on Create Account, which involves either providing your email addy, or a click on one of the social media giants with whom you may have an account. Then select the ‘BASIC’ plan, which is FREE (or one of the paid plans). Basic will do what you want, by and large, and to a useful level. If you don’t want to set up an account, you do not have to, but if you do, it will remember your location so you don’t have to struggle with getting the map to display your area. That will better insure you spot your plane before it gets too far away on the map, to be certain.

The Tool

The first time, you will have to do that, anyway, but once you have relocated to your greater area and zoomed in (not too close, because at aircraft speeds, the plane you are looking for might be rather distant in a hurry), the site will remember that location and speed you on your way to an answer, if you set up a plan. Unless you are near a major flight corridor, a broader view will not be cluttered with too many planes, and especially if you know the direction of flight, you will have no trouble finding the suspected culprit. And, if there IS more than one plane, clicking on each should allow you to compare the image with what you saw, if you did get a glimpse of it, or heard it well enough to discern engine differences: jet roar, very high-pitched and loud turboprop, or buzzing loud propeller. If like me, you may even to tell if one or multiple engines, and of course, helicopters and their noises vary by size and type, as well: choppity-chop (small), whumpity-whump (large). 

If you mouse over a plane’s icon, it will show you the tail number right there. If you click on it, it will pull up aircraft details as may be available. If it is a commercial aircraft of any sort (flight school, rental, commuter, airline), or an aircraft for which the owner has supplied a picture, the actual airplane should be shown. If not, a manufacturer’s photo or other image of it may appear (likely a different paint scheme/tail number — or no tail number if a marketing image), or perhaps no image. But you will always have the tail number, which is the most useful information if keeping a record (DO MAINTAIN SUCH A LOG) or wanting to escalate the matter officially toward possible actions against the operators (I would not do that unless the same plane was buzzing you repeatedly in a single flight or the like). 

Note: if a plane has blocked out it’s tail number, is flying below radar, and has its transponder turned off or has none, it won’t be on the Map; you won’t have a tail number. In such a case, go to the Tactical Advice section, below, and treat it as if a military aircraft, except that instead of complaining to the military, go to the FAA in like manner. Try to get other eye witnesses, pictures, or videos, if you can, should you be doubted.

Once selected, with a small delay, the flight path of the aircraft will show up as a yellow-green line, which will tell you its point of origin… sometimes helpful in getting information about the owners, esp. if other methods fail (Note: in the example image, YKM is the Airport indicator: Yakima; another way to know point of origin, and to the right of that, you find the destination airport). A harassing/following aircraft will likely originate from a nearby airport, so if you see it originated from or destined for a location several hundreds of miles away, it is likely a coincidental matter involving no targeting.

If your Log shows a common origin for one or more planes, but you are unable to determine the owner, that runway facility is the targeteer’s base of operations, and a drive out to the site (if practical) may allow you to find where it is parked and associate it with a business or other entity — perhaps with photo in hand, asking around for info. You can also elect to follow it until it arrives at destination, which if actually an overflight as part of your targeting, will likely be the point of origin. If not, it was likely mere coincidence, even if multiple sightings or patterns are revealed in your Log. After all, businesses and even private pilots have patterns in their work, too. This is especially true of flight-school aircraft, as exampled in the image, doing touch-and-go landing practice, Ironically, right over where I once lived, in Yakima, Wa.

The Basic plan limits you pretty much to the above. But if you elect the Silver Plan ($10 a year), there are more features, including removal of the annoying pop up ads which block part of the view and often can’t seem to be removed when you click the x box. A couple of the other features could be extremely helpful if you are frequently harassed by aircraft: ALERTS will let you tag a given tail number and be alerted when it is in flight, and allow tracking; HISTORY of a given aircraft can be tracked backwards in time for up to 90 days, including ground time; DETAILS provides complete Registration information, serial number, and other data to include speed, altitude, and much more. There are additional things which may or may not prove useful to a particular situation. There are also more expensive plan options with increased feature levels and whole new features.

Tactical Advice

If you keep a good log such that you feel you can demonstrate one or more specific aircraft/operators are involved in harassment, there are things you can do which could provide some level of relief and/or satisfaction, perhaps to include an investigation or legal actions to your advantage. Such legal actions might be  something you would wish to consider (with good counsel of an attorney), but they might also be initiated by FAA or some other agency without any expense or direct involvement by you. The tail number is often enough to achieve that, because FAA, FBI, and Police all have the means to take it from there. But if you needed to take action of some sort of your own against an operator, legal or otherwise, you would need to identify the operator. If the Tool is not providing that information for a given aircraft, its not a roadblock.

Often, just typing the tail number along with ‘tail number’ into your browser will likely pull up FAA registration information. If that fails, you can normally go directly to registry.faa.gov and type it in, there. Sometimes, the answer will still be less than useful. CIA aircraft are often not identified as such, for instance, and may instead be registered to a business or private individual, or return nada. However, there are people who track CIA aircraft independently for various reasons. Sometimes, just adding ‘CIA’ to your web search via tail number will give you a hit. Otherwise, you would want to focus on trying to find out who operates the aircraft at its home airport (business name, most likely an innocent sounding front). Sometimes, it’s an obvious military/intelligence company ‘contractor,’ perhaps so identified publicly on their Web site or literature. But also, my book, The Professional Paranoid, details how to research such firms to see if they fit the profile of a CIA front.

Some aircraft defy identification… military aircraft, for instance, are invisible to the Tool. Often, they may be black, unmarked, or moving too fast to see any markings. But assuming you have the time, location, and direction of travel, and some general description (i.e., small helicopter), the FAA should be able to identify it. If you get a decent look, you can do online searches of US military aircraft at military.com and find the exact type (i.e., MH6 – a small tactical helicopter). FAA might not give you a lot of information about it, perhaps none, but they might tell you something like it being an Army training flight (and it might or might not be the official and true answer, of course… their answer might simply be presumptive, far easier than actually trying to find out the true answer). You may find answers vary in detail over time. That’s not hints of something nefarious, it is just likely a lack of interest vs. a more friendly or service-minded person at the other end. But just confirming its existence is good. Put whatever answers you get into your Log. 

Once you seem to have enough instances suggesting a pattern, you will also likely have established the base of operations (i.e., a local Air National Guard unit). They will have a Public Relations Officer, and they won’t know you from Adam. Give them a call, giving a random phony name, and say you are a photographer would would like to photograph (type of aircraft of concern) in flight, and wonder if there are training flight paths or operational flight paths anywhere in your (county) that you might be able to position yourself, and if there are particular days or hours that would be best hunting. I’d tell you to record that call, but that would be illegal almost everywhere, so take good notes, including name of contact, time and date, length of call, and their answers. 

Wait some time and continue to grow the Log, while at the same time, going to any selected flight path per the ‘good hunting’ suggestions as to time/days, and get a sense of the frequency of flights, there, in a separate Log. Compare both Logs: if much greater frequency in targeting than in training, get the Base Commander’s name (should be online at the base web site), and write a formal and simple (non-targeting oriented) complaint of constant ‘noisy’ overflights with a detailed history of time/date/aircraft types from your Log. They will probably acknowledge with a presumptive reply about training flights, the easy and usually correct response. Respond with your prior research through the PR Officer citing the difference, and ask for an investigation of the discrepancy, and the name of the person authorizing or ordering the flights ever your home, and official reasons for those ‘apparently non-training’ flights. 

There will likely be resistance and side-stepping, to which you should counter by asking if you should instead be contacting the Pentagon through your Senator, because it feels like intentional harassment. Oops! They wouldn’t like that. And, if it is the aircraft shown below, contact me each and every time you see it; it is a known mind control operations aircraft, called Command Solo —- note the unusual antenna configuration. In any threat about a Senator, if this plane is involved, do specifically mention ‘Command Solo psychological operations aircraft.’ If you must, contact your Senator, and cc local media. Oops!! This outreach should not get into your targeting, but you can say ‘it feels like deliberate harassment, given the sidestepping and misinformation in official answers.’ It would help if you could find neighbors willing to add their names to any such outreach. If the overflights bug you, they likely bug them, too. For more information about outreach tips, read this.

  • This post is, in .pdf form, part of the authors’ Free Helps Kit available to stalking victims, which contains many, many more such files, as well as a victim’s workbook which has proven very helpful towards determining the who, what, how, and why of their targeting. Email proparanoidgroup at gmail com to obtain the Kit, which also provides information about the Free Will Society to aid severely impacted stalking victims.

COVID Advice for Stalking Victims


Many victims of stalking are already socially isolated, so in many respects, the current virus-imposed ‘social distancing’ situation can be a benefit to them, as well as a threat. There are ways to tip the balance, to become a survivor of both targeting, and COVID19…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Mar, 25, 2020, from the Left Coast of America, socially distant from everyone

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Stalking victims are no stranger to the topic of conspiracies, and boy, are there a lot of conspiracy theories surrounding the COVID19 virus. Among them are themes portending a Global New World Order takeover, global population reduction, martial law, forced vaccination and disarming of citizens, international intrigues and threats of war, and much, much more. Some of that, unfortunately, is backed up by legitimate fact-based concerns, but the bulk of it is conjecture, at best. I’ve written as much in a blog on that topic, already. While I believe it is good to be wary and keep an eye on such things, I also try to practice what God teaches, which is to live for today, plan for tomorrow, and hope for the future. It is especially important advice for a stalking victim who is severely impacted.

Tricky that, and far too easy to fail in the trying (I must admit to such failure). Trickier even more, perhaps, is putting that advice into practical terms specific to the virus situation we all find ourselves in, today, and its importance in relation to stalking concerns. Clearly, we need to focus on what we know will help us through, TODAY, here and now, and better prepare us for any possible Tomorrow, that we may hope for a better Future, thereby. And our ‘today’ was already in a not-too-great a condition, as targeting survivors.

I like that word, survivors. Use it often, when you speak of yourself.

 

Practical matters, matter

Being stuck at home in a defensive posture is nothing new to individuals severely impacted by malicious targeting. Their incomes have already been devastated, often by an inability to earn and income because of their stalking, and just as often, by deliberate sabotage of their financial underpinnings in various dirty tricks. So when the government talks about a relief check in the mail, they may be taking hope. But there are caveats not commonly being mentioned in the fake news of the day, who are still focused on pushing virus and political fears ever higher. They are not our friends of bygone days of actual journalism.

For one thing, a simple one sentence mention in passing on one radio interview, casually mentioned that the checks would only be sent to persons who had filed a 2018 tax return, on the basis of that return’s indication of income. Most Tis are on some form of limited fixed income such that they don’t need to file taxes. The radio indicated that persons who were on SS/Dissability, or ‘off the grid’ with respect to taxes, would not be seeing checks. It was suggested that filing a late return, even if no taxes due, might set the stage for relief, if showing an income in need of ‘relief’ due to negative virus impacts upon the nation’s economy.

If any income could be shown at all, above and beyond the fixed, it could make a big difference. Better still, if it was a such that it would have resulted in taxes, but for the deductions. Self-employed incomes, for instance, might have depreciation allowances and business expenses which collectively negate the profits derived (you are taxed only on your net gains).  Personal deductions, either the standard or itemized variety, can also offset such income and eliminate actual tax liability. If you have children, the Earned Income Credit may help you to gain actual ‘Tax refunds’ even if you paid no taxes, at all. Keep in mind that I’m no tax consultant; due diligence is advised, which may mean relying upon a professional.

Tactical matters, matter

Stalkers are people, too, and if their efforts involve going out in public in order to harass a stalking victim, they are at increased risk of contracting COVID 19, themselves. That would certainly take them out of the picture for at least awhile, and possibly permanently. But just the fear of such risks may also inhibit at least some of their actions aimed at their victims. How much more likely might they be to keep their distance, if you began exhibiting symptoms, yourself? It’s easy to fake a cough, and complain about a fever, and the like. Some form of public complaint or warning might be in order, even if just a social media mention. Guarantee you, your social media friends include your stalker enemy in disguise, and they read everything you post very carefully…

Stalking is a ‘game’ that two can play. There is a stark difference between being a victim who has only the option of reflexive responses born of victim recoil, and who is doing exactly what their assailants want them to do, and one who elects to take charge of their situation and employ both defensive and offensive tactics, and become a survivor. I have written extensively on this in my books, and in various blog posts. While all situational assessments can vary, and establish different tactical considerations, there is much which remains the same across the board. For those who do not have my books, a less detailed summary of the most useful advice can be found here: https://proparanoid.wordpress.com/2016/10/30/ti-defense-30-tips-to-help-fight-back/

As always, I still remain available for additional advice at proparanoidgroup at gmail com, where I offer a free Helps Kit and can answer simple direct generic questions. I also offer a new Skype-based personal dialog service. That is a for-fee service, 100% of which goes to the Free Will Society to aid stalking victims, as does all sales of my ebooks. More recently, I have created a ‘shopping list‘ of suggested Amazon items which represent various stalking defensive/offensive solutions. While I selected items I would find very good for the purpose, they are not necessarily the perfect choice for everyone, but if taken as generic suggestion, one can compare with alternatives, and choose wisely. Neither is it specifically meant to advise using Amazon to purchase. However, I learned that if you apply for the ‘Amazon card,’ and spend $800 or more with them in a single purchase, you get 12 months same as cash terms. That made a difference, for me, and might for you, if the offer is still valid.

Not on that list, is firearms. My books address that topic with some caution, and caution is indeed due. My position for stalking victims is, that the nature of the targeting (methods employed) may or may not warrant a weapon for self defense. There is a fine line between deterrence of physical assault benefits, and creating a risk by virtue of a gun in one’s possession. Without proper care and knowledge, and skill in use (practice), the liability and inherent risks aspect can far outweigh the tactical protection it is supposed to represent, especially because stalking methods may involve a way to make the possession itself a weapon against you. For instance, the new unconstitutional and draconian Red Flag and concealed carry laws could end up getting you in dutch with Police, and see  your weapon confiscated based on nothing more than an anonymous complaint of ‘brandishing.’ And, it is absolutely true that someone who is depressed or under tremendous emotional/mental strain due to (anything, including stalking), may not be the best person to have access to a gun; a bad decision or moment could prove a terrible disaster, by inappropriate use.

Big lines at gun shops right now, and for good reason

But the virus situation poses a whole new concern and reason for needing protection. As we have already seen with shortages, the potential for violence is often triggered by things as simple as toilet paper. If the future is a long-term shut down of America and beyond, the risk of civil unrest, military takeover, revolution, or even invasion may not end up being far-fetched ideas. If food supplies or utility systems are shut down and/or rationed, roving gangs of looters and criminals armed to the teeth will come. Would you be ready and able to repel them, or end up just another red stain on the ground and a statistic? I at least advise one to investigate the possibility of gun ownership. Visit a gun store and talk with their staff for suggestions on what might make a good choice, and then find a shooting range which rents guns on premise, and take a firearms safety course which lets you experience the weapon, and overcome any fears of safe handling. Make sure that, in all of that, you have a clear understanding of your gun rights and gun laws in your State. THEN, and only then, will you be armed with the knowledge needed to better decide.

It is important that you act sooner, rather than later. Some local governments are already attempting to completely shut down access to firearms and munitions, and that alone, is a bad sign. When the government tells you you don’t need or can’t have a gun, that is exactly when and why you need one. Talk to your Sheriff’s Department or local Police (non emergency phone number), about shooting ranges and safety programs they may offer, sponsor, or recommend. Most Sheriffs support the 2nd Amendment, and some offer Auxiliary Police/Deputy programs where you are given access to AR weapons and training, and positioned to be available as reserve support in a crisis. Being called does not mean you must report, but if the SHTF, standing together against tyranny or unrest is exactly what will be needed to end the threat.

There are also community ride-along programs. While many TI’s avoid Police for having found them problematic in many unpleasant ways, getting to know as many local Officers as possible is one way to negate or minimize any such concerns. And, it can prepare you for a better response in a bad situation. It is at least something to consider.

 

Logistical matters, matter

While it is possible that this crises will turn the corner and the threat level be reduced to ‘normal,’ in a matter of a few weeks, the potential for long-term issues is very real. I urge everyone, not just stalking victims, to grow their critical supply reserves to ‘Prepper’ levels. I, for instance, have a two week supply of perishables (things which expire or go stale quickly), which I can do without, if needed, backed up with a 30 day supply of non perishable foods (canned and dry foods, mixes, etc.), itself backed up by a 90 day supply of actual Prepper foods which can be stored for years. I regularly rob from the backup materials at both levels, and replace with fresh in a rotation method so that no supply ever reaches an point where the shelf-life is exceeded. I mean, what is the Prepper movement about, if not survival?

Visit this link for great advice on Prepper shopping and as a gateway to the wide-world of Prepping, in general

I would normally need to visit the store once a week. I can now easily avoid going at all, for perhaps 120 days. However, one would not wish to attempt achieving or replacing such supply levels in a single shopping effort, because that might be considered as ‘hording,’ and I expect there will in time (already so in some communities) when there will be keen eyes and a harsh responses by government, if reported. So I suggest, and am myself deliberately increasing normal purchase levels and visits before the virus spread is truly pandemic in scope, and and plan on tapering off as I ‘get ahead’ of the consumption rate. You can buy as if for a family of five, even if living alone, and double down even on that, without raising eyebrows. You might even find case lot sales, and there is no reason you can’t hit multiple stores at the same time, or go back every few days. Of course, finances can become part of the equation, which is why that relief check could be important.

Transportation issues can be tricky. I’ve learned that a decent bicycle can be more useful than a car, and far cheaper. I use an electric bike, which helps with my handicap and age concerns. It allows me, a 74 year old who was at risk of his legs being amputated, to peddle 20 miles an hour (and save my legs from that threat, by restoring blood circulation). With a basket, I can haul away as many as 12 bags of groceries. I have a giant bag which fits my basket, which is waterproof, and insulated for both hot and cold items, simultaneously. If you would like to explore such a possibility, let me know (at the above email) and I can turn you onto learning more, with a way to save $50 on one of the best but least expensive (sold direct from factory, cutting out middle men) bikes on the market… with a lot of models to choose from.

Tactically, speaking, once more… a TI is less likely to be stalked by car, if on a bike of some sort; a car cannot go that slow, and if a stalker elects a bike, they will stand out like a sore thumb, easier to spot and deal with. IN FACT, I have an idea which could be managed through the Free Will Society, which would allow almost anyone reading this to earn extra money during the ‘shutdown’ while also performing a needed public service which can help reduce the virus threat. If not too handicapped or aged to use a bike (the electric can be used without peddling, at all — it has a throttle), it has the potential to be as lucrative as, say, a Uber driver opportunity, with like selectivity as to how much and when you choose to work. Better still, it will help fund the Free Will Society at the same time. If that sounds interesting, contact me for exploratory dialog.

 

Medical matters, matter

There is a lot more information out there on COVID19 than can be assimilated, and worse, most of it is NOT in a useful form. If you have a simple question, finding the answer is a minefield full of background material, political correctness and maneuvering, legally and medically obscure wording, historical data facts and figures, and fear mongering… making it extremely hard to find an answer. When I had symptoms described in MSM, I naturally wanted some more details… but after six of the most logical Web sites left me in a daze, it turned out that the best medical answers were found elsewhere, and revealed my symptoms were not at all a concern. Ironically, it happened to be a stalking victim and follower of the Free Will Society who turned me on to it, and provided a link I find very useful. It is a blog post citing/linking to an actual medical practitioner ale to speak in lay terms and to provide simple graphics for at a glance understanding. Take note, CDC, your slip is showing.

The real problem in a given targeted individual’s situation, is that every symptom of targeting is also a symptom of a possible medical condition or health issue. That’s useful to stalkers, because they know they can inflict such woes upon their victim, any attempt at getting help results in an easy dismissal of concerns: “You should consult a Doctor, about that.” And indeed, you SHOULD, because it might just be truly a medical issue, in which case it can be dealt with… far more easily than trying to solve targeting, we would hope. You need that clean bill of health, before asking anyone for help with stalking related symptoms.

So the same thing is true with COVID19 symptoms. You not only want to make sure that is or is not what it represents… but if it does not, to make certain it is not a symptom resulting from targeting. So a good Doctor relationship, now, more than ever, is important. Unfortunately, many stalking victims talk about reasons they cannot find or work with their Doctor. In my first ‘how-to’ book on personal privacy and security, I talk about how to find a good professional for any need (Doctor, Lawyer, etc.). Pretty simple: I suggest looking for someone who is relatively recent to the trade, with almost brand-new credentials hanging on their wall. They should be of a minority race, such as Hispanic or Asian, perhaps a woman. 

Such persons are less likely to be tainted or jaded by the system, and more eager to adhere to high moral/ethical standards. This makes them more resistant to corrupting forces, and they will be hungry for clients, and more willing to cater to their needs, than someone who has more clients than they can handle, and who has been hammered by pressures and problems from all sides for decades on end. 

 

Political matters, don’t matter

At least, they should not. It is up to you and me to insure that is the case, because political division is just another means of targeting for control. Again, I admit failure in that, myself (sigh). While we should all agree to stand firm against the march of the globalist agenda (often behind organized stalking in one way or another), and though that often filters down to national and local politics, party-line politics should never come between a survivor and an otherwise would-be ally, such as another survivor or a possible helpmate. Don’t play that game… your plate is already full with enough battles for a lifetime… and likely, you’ve already had a lifetime’s worth of it. Enough!

A TI with RF Measuring Device can = Dangerous Conclusions


Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro.
 
What you will learn reading this post:
• all TIs could benefit from professional TSCM electronic sweeps;
• that isn’t likely to happen;
• the poor-man’s TSCM pro isn’t a pro, and might be a fraud;
• there are low-cost meters but improper use can be dangerous in many ways;
• there is a solution, and help implementing it — and here it is…
 

The way it is

A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.

Just some of the gear needed for a professional TSCM sweep completely meeting a TI’s needs.

Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).

Sigh. Add to Christmas wish list, and hope Santa is generous.

The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.

So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.

The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.

A decent start if you have something in the range of $10K to spend. It is virtually a hand-held spectrum analyzer… that unfortunately does not see military gear.

Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.

Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly.  And there is another common risk…

All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.

Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.

Don’t give up too fast… all is not lost

Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:

Implant quite similar visually (smaller) to one found in my own leg some 35 years ago. State of the art, today, can be 200 times smaller, translucent, tissue colored, and bond with tissue: invisible to a surgeon and to x-ray. MRI sees only an inconsequential image blemish.

a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;

b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;

c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;

d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.

e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;

f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);

g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.

Now as to the other key requirement, proper use

Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.

As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).

These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.

I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.

I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.

Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage).  That, alone is a $12 value. By all means, donate more, if so moved.

Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂

The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).

The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).

Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.

As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.

The Eight Steps of a Stalker, and Defenses


Specifically addresses psychopathic individual stalkers,

but elements apply to organized or gang stalking as well

by H. Michael Sweeney,
copyright © 2011, ProparanoidPress, all rights reserved
edited from original versions in The Professional Paranoid and The Professional Paranoid Defensive Field Guide
permissions to reproduce available on request to pppbooks at comcast (net)
 
Dateline Portland, OR Sept 27, 2011

Stalking defenses

My Professional Paranoid series of (3) books are a kind of ‘how to’ in the realm of privacy and security issue problem solving. The key to solving a problem is, of course, knowing about it in the first place. Thus all my material includes how to detect the problem. Follows are the things everyone, and especially women, should know about stalking (which is one reason why, for simplicity’s sake, the steps are presented as if a woman is being stalked by a man). But stalking is definitely not limited to female victims or male stalkers. Ask David Letterman, which points additionally to the fact that stalking can be about something other than just sex.

Fame or circumstance can be the prime motivation for stalking, even circumstance as simple as cutting someone off on the freeway. They follow you home, and plot their campaign of insanity against you. And it is a plot, well thought out, and by someone typically of great intellect. For some reason, the psychopath tends to be a brilliant thinking in all respects but the most basic of logic paths associated with social reasoning.

Internet Stalking can also follow the model to a degree, but is commonly a bit harder to detect and significantly harder to deal with while it is a such a remote level, one typically anonymous to the nth degree. The danger is, of course, that the Web stalker may escalate at some point to a physical or real-World stalker.

Stalking defenses

From my books, with minimal editing:

Stalking defenses

A stalker will…

1 Study and learn to know the victim: observe and learn as much as possible before planning the attack.

So be alert, be inconsistent! Observe those at the periphery of your daily doings and keep watch for repeat presence, especially if overly interested in your activities. Try not to establish patterns, and whenever possible, go out of your way to change regular habits.

2 Make contact: find an excuse to get close enough for conversation, if possible, something irresistible to the victim (i.e., involving victim’s pet, hobby, project, etc.):

So end conversations with strangers quickly! Turn cold and hostile if polite excuses fail. If there is any further insistence of any kind, do not warn that you will call for help, DO IT! If needed, follow instructions in item five.

3 Lower victim’s defenses: be friendly and charming, control dialog.

So don’t let them get past step 2! End it! Be especially wary of very charming and flattering, talkative types.

4 Obligate and gain trust: endears himself to the victim, perhaps by some task or favor which indebts the victim, preferably an ongoing task which involves going with the victim to a more private place, such as carrying groceries.

Again, don’t let them get past step 2!

5 Isolate: isolate the victim using trust gained, always ready to counter possible objections by clever whimsy or logic. Seek a place where no one else can hear or see.

So run! Drop everything, scream, and run. Do whatever it takes to draw unwanted attention and then, to play safe, get witnesses contact information. Call Police.

6 Attack! In their mind, this may simply mean ‘romancing you,’ but no matter how gentle, it is an unwanted assault on your person. But many stalkers ‘loose it’ in the moment and violence ends up being the final expression of their feelings. So no matter how gentle it may start, it can quickly escalate to something else.

So defend yourself! Fight back to the best of your ability (hopefully improved with martial arts or weapon’s training). Remember, the perp will expect you to wilt with fear (or succumb to charm), perhaps to break into tears and become a human vegetable. Fight back fiercely, suddenly, and without warning, no holds barred, screaming and kicking all the way. Break windows, knock over furniture, honk horns, anything to draw attention. Do whatever it takes to be his worst nightmare.

7 Eliminate evidence: hide, take, or destroy all evidence, including the victim in worst case scenarios.

So observe everything! Note details about face, clothes, vehicles: get license numbers, scratch skin or pull hair in struggles (get DNA sample, mark them with scars), get a button from clothing, etc.

8 Escape: make good a retreat without detection.

So thwart escape (where safe)! If possible WITHOUT FURTHER CONFRONTATION, get witnesses, damage vehicle to make it stand out and need repair, inflict a wound that will require medical treatment or force a limp, bandage. REPORT THE CRIME. There is no guilt in being a victim, ever. If any law enforcement officer or medical staff member treats you with other than respect, immediately ask to speak to their supervisor and have someone else assigned, file an official complaint, and go public about that treatment, if necessary, to get that person fired or reprimanded. They have no business being in their line of work. You may even wish to consult a lawyer about a suit for emotional damages.

Anyone who feels they are being stalked should at the earliest opportunity to present useful information speak with Police. Useful information would be descriptions, time, place, witnesses, event details. In the absence of too many such informational elements, Police will not even be moved to file a report. The GOAL is to have a report filed, not to have the matter ended, because such information is rarely actual evidence nor is it condemning enough to warrant investigation or arrest.

But it MIGHT result in the deterrence of a Police interview of the suspect, and DOES result in documentation of the problem which, with continued reports, will build a case for stalking to the point where, hopefully, an arrest and prosecution can take place. Without such a history, a single report, even if involving violence, will not necessarily result in arrest. Police need a LOT of information and detail before they can act usefully.

It is also suggested that you email me for additional advice. I offer a free helps kit and two weeks of consulting which can make a big difference in how things progress, as well as the final outcome. Email proparanoid at comcast (net).

End

%d bloggers like this: