Blog Archives
Why am I Being Targeted? A Valuable Question for TIs
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
by H. Michael Sweeney proparanoid.wordpress.com Facebook proparanoid.net
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. What you will learn reading this post: • there are three primary reasons why TIs are targeted; • knowing which it is can result in better defensive/offensive strategies; • it is possible to discern the difference in many cases; • there used to be a fourth kind, but what it really is will surprise you. xThe way it is
Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
x

x
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
x
And so, in order to get those answers, I established my free Helps Kit (proparanoidgroup@gmail.com), and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
x
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.
x
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
x
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
x

x
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
x
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).
Knowing the difference can alter TI tactics
One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
x
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
x
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
x
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
x
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
x
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
x
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
x
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
x
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
x
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
x
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
x
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.
x
About Death Threats
Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
x
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.