how to get even with gangstalkers

Create alternate identities and hide out from family and friends. -Knocking on the door for frivolous/nonsensical/wrong address reasons. DE warfare is military action involving the use of DE weapons, devices, and countermeasures to either cause direct damage or destruction of adversary equipment, facilities, and personnel, or to determine, exploit, reduce, or prevent hostile use of the EMS through damage, destruction, and disruption.. He yelled right back at her and told her to f**k off! Electronic harassment can also be used to damage your technology or devices and interfere with your access to phone or internet. People who have already assimilated the cover stories are often not ready to hear the truth. ~Omnisense, Directed energy weapons operate invisibly while the inducible mental limits of directed energy weapons are the limits of consciousness itself, this makes for an incredibly potent environment for illusions of all types. ~Omnisense, NeuroWeaponry & Artificial Intelligence Quotes, The point of the program is to have maximum psychological effect and leave the minimal amount of evidence. Daily meetings are attended by representatives of the military, NGOs, the private sector, and local officials. As long there are ppl in the mall that have iPhones, every time you walk near someone elses iPhone, the bad guy owner of the AirTag will get a LIVE update on your location.". New comments cannot be posted and votes cannot be cast. Another new and alarming way that we are being stalked is with new GPS technologies, such as Apple's AirTag. You will receive instructions from your local center as to following the target. They do a cough thing to let you know that theyre in control of you. It can understand and learn. From about 100 to 140 decibels infrasound causes a variety of biological symptoms. A. having regard to the revelation by several European governments of the existence for 40 years of a clandestine parallel intelligence and armed operations organization in several member states of the community. Store management can stop ordering a targets favorite items. In this setup, the CBA in the car may be instructed to call, using walkie-talkie-style cell phones, another CBA (or team) waiting or patrolling by car nearby to follow the target, or, you may be assigned to follow the target yourself. That was a successful outcome. Your phone is off but youre in a mall. In gang stalking/electronic harassment, PsyOp is synchronized with EW (electronic warfare with directed-energy-weapons), CNO (computer network operations), and all other instruments of national power. . Newer community-based agents will not be assigned to engineer the method, but will assist in passing rumours, which are the main means of destroying a targets public image. Suffice it to say that it is possible to apply incentives which cause even people closest to the target to cooperate. Sabotaging the targets reputation- and all that goes with it, such as ability to earn a living, business and personal relationships- is a very special operations category. -Agents who have excellent persuasive communication skills can be assigned, with careful coaching and preparation from supervisors, to pretend to be a target and get on talk shows known to air targets as the guest. Most of them cant get real jobs, so they become gangstalkers. Infrasound is thought to be superior to ultrasound because it retains its frequency when it hits the body. In any event, the person finds strange things happening around them - patterns begin to emerge, such as being followed, vehicular surveillance outside their homes or on the road with the same cars trailing them, maybe happening at the same time as getting mysterious phone calls for the first time along with all sorts of other strange "coincidences" and so on. They might still cough at you, but theyll think twice before doing it. If you came out and wrote an op-ed critical of the "lone gunman" explanation - you were a "conspiracy theorist". Targeted individuals claim that seemingly ordinary. Whales, elephants, hippopotamuses, and rhinoceros use infrasound to communicate over great distances. That I one of my motivations for writing about this subject, as alifelong friend of mine had her life and marriage ruined by this particular sort of gang stalking by a deranged individual. Insurgents those who try to persuade the populace to accept political change. The reasons why targeted individuals are targeted vary. Frequency determines what kind of damage occurs whereas power determines how much damage occurs. Here are some examples of sabotage a community-based agent (CBA) may be assigned to carry out: -Entering a vehicle, or home, and changing control and radio settings. When they have weakened you enough you will be setup and your reaction will be the reason for your downfall. Rarely used, scheduled when the target has acted in a way so as to deserve special punishment, like divulging the name of a criminally acting secret agent. Electronic harassment, for example, is exactly what it sounds like - the use of technology to harass others to cause harm. The guy at the gas station knows who you are and is reporting every time you fill up your car. What would be later unearthed though freedom of information requests were secret programs such as Operation Northwoods, Operation Mockingbird, COINTELPRO, MKUltra. Based on personal experience. Its a dog-eat-dog world and I believe in giving back what I get. Once the target has been sensitized to the point of realizing they are under surveillance and punishment, they will recognize, and be made appropriately uncomfortable by, the simple act of multiple CBAs just happening to cross paths with them. The most important thing to do is remain vigilant and calm, and not to question your own sanity. These weapons are mounted on platforms which can be a missile, aircraft, ship, vehicle, suitcase, radio, etc. These opportunities are great ways to discredit targets by talking about UFOs, things like black helicopters following you, foil beanies, satellites parked just above your home, and perhaps events normally considered paranormal like seeing (things that) appear and disappear. Some of the potential motivations behind flagging someone for organized stalking are: With our world today, it seems no one really knows what is going on, other than the media and authorities lying to us and distorting our perceptions. Triggers/themes are understood at the strategic, operational, and tactical levels of the campaign and they are passed to various commanders of particular AO if the TA moves towards that portion of the battlespace. TPT conducts mission assessment, determines distribution priorities, and tracks the various products that have been distributed throughout the AO. He wears a diamond stud in his right ear and that was my answer. Both community-based agent (CBA) visual surveillance and advanced electronic surveillance are used. PREDATORY GANGSTALKING. EC operator can apply music in adjacent apartments with exceptionally powerful bass, directed at the targets unit. I will pay attention to you and try to be less confrontational. It protects your health and self-esteem. The targets associates will simply refuse to believe that anyone but the target is responsible. Fortunately, experience shows that co-opting friends and family is surprisingly easy, once they are informed about the targets criminal record. Many emergency services employees have a strong sense of community service and willingness to cooperate in this, or by people posing as Jehovahs Witnesses. The US Army lists them as a type of MOOTW. Each CBA surveillance team will be given a cell phone number for reporting target actions and movement to the local Control Center (CC). The CBA doing this work will immediately reply with comments like Someone isnt taking their medication or target name has provided absolutely no evidence. The CBA will then report the post to higher level supervisors for possibly more detailed responses. The transmitters use pulse-modulated waves at extremely low average power levels. Agents of action follow general scripts that can be modified as needed. There are some things you can do to make them crazy. This new war involves international, interagency cooperation between the military, federal and local law enforcement, non-governmental organizations (NGOs), intergovernmental organizations (IGOs), the civilian population/private voluntary organizations (PVOs), and private government contractors. These same tactics have been borrowed and are now deployed regularly. He imitated me chewing like a cow. Transcribe and forward such a letter to the editor to the supervisor, along with your proposed response. This is normally done in special shifts and under scheduling and control at a higher level than your local CC. Time it so every time the target opens a window the music starts. 2. Some have tried to get control of Norwegian Stay Behind (armies) already years ago. PsyActs can occur during rallies, rumor campaigns, group meetings, lectures, theatre, plays, speeches, dances, banquets, fiestas, festivals, religious activities, talks with individuals during interviews on talk radio shows, and other social activities. Take the utmost care of your health, mentally and physically, ensuring you get proper sleep, exercise and leisure, as an outlet for you such as a hobby or pet can help immensely. But if you're an old-timer, the best thing to do is ignore them, ignore them, ignore them, ignore them, ignore them. Thats why theyre out there harassing you. Thefts have to be carefully considered and authorized by your local Center, unless you have authorization, do not steal. Plus you get to see one of my dumbass gangstalkers who followed me around - an ugly fucker. Themes are presented in a performance similar to a play or movie production. If they stink, say something out loud about the bad odor. Triangulating data from cellphone towers and WiFi signals is another tactic that particularly state actors can use to put you essentially under constant surveillance. Seek out your most trusted friends while you do as much as you can do document and record these patterns and occurrences and get concrete evidence to use in legal criminal proceedings against the individuals and also in civil litigation. In 1972 France was using infrasonic generators which operated at 7 Hz on its civilian population. GIG uses existing commercial satellite and ground-based systems as well as GIG nodes such as aircraft, vehicles, and ships equipped with DR (JTRS). The Canadian government also carried out these experiments in Montreal in the 1960s. and our Setting up quality cameras to cover your residence inside and out to capture all angles and output the video to the cloud for backup. Go to the doctor immediately. -For a CBA vehicle convoy, boxing in the target during a commute, forcing the target to travel at a lower speed than the target wants to travel. These gangstalkersare nothing but losers. So assuming 25 rands and hour Amounts to R438 000/year. Every single channel of communication the TA uses for information is interfered with. This includes destruction of hardware and software (degrading, attacking) and spoofing (deceiving). Excellent communications skills are required. It is a special honor for CBAs to be chosen for target discreditation work. You can can get on the gangstalkers' nerves. Targets are never told they are under surveillance or being punished. In one case, a dump, an auto race track, and a prison were built adjacent to a target who owned a large farm in an area of natural beauty. Like sabotaging the targets reputation, discrediting their public statements, web sites, media appearances, letters to the editor and the like are done under the supervision of psychologists and psychiatrists on their staff. Condemns the clandestine creation of manipulative and operational networks and calls for full investigation into the nature, structure, aims and all other aspects of the clandestine organizations or any splinter group, their use of illegal interference in the international political affairs of the countries concerned, the problem of terrorism in Europe and the possible collusion of the secret services of Member States or third countries; There are other tactics which are not strictly part of the categories discussed so far: -IMPORTANT: Community-based agents (CBAs) are strictly forbidden from adding anyone to the list of targets. There has never been a better time to be a spy - from the NSA, FBI, CIA, MI5/MI6, CSIS, and so on, joined at the hip with Big Tech, we're all under surveillance to one degree or another. Your local Control Center will supply this help, and will bring specialists in from a distance in the case of rural areas. If you are being harassed over the phone, contact your . Intercepting CBAs may be asked to perform one of the following forms of intercept: 2. In PO, themes are used to transmit painful stimuli (also called triggers) through all his/her channels of communication which a TA (TI) has been sensitized to. 3. You can can get on the gangstalkersnerves. are used. So what you can do theoretically, is you can target an individuals brain, they may have auditory hallucinations where they hear things, which is actually quite common with microwaves. DEW- Directed Energy Weapons- used to damage or destroy people, equipment, and facilities, include microwave, millimeter waves, lasers, bright lights, holographic projections, and acoustic weapons (audible, infrasound, and ultrasound). -Wounding or killing the targets pet. And every time I succeed in getting them really angry. As a community-based agent (CBA) you will have the privilege of working with a team capable of delivering better justice than the official system. Especially effective when the target is in bed or having a meal. An anchor is created when an emotional state is linked to something such as an object, person, sound, smell, place, color, etc. It is used to deal with domestic threats in the New War. You are being lured. Repetition is a common tactic employed by gangstalkers. What is most important is to find your strength and listen to your inner voice, your instincts and do what you need to do to remain resilient in the face of this abuse. You are only giving them more reason to believe that what they are doing to you is just. By 1973, the British was using the Squawk Box in Northern Ireland. DOD defines them as: weapons that are explicitly designed and primarily employed so as to incapacitates personnel or material, while minimizing fatalities, permanent injury to personnel and undesired damage to property and the environment. It will eventually escalate to the point that you will be pushed into saying or doing something you will regret. Another CBA or CBA team may pick up the visible following, but once you have broken away, they advise that you are clear and ready for the next assignment. Backup all video to a private cloud, preferably one outside of the jurisdiction of the Five Eyes. Surveillance is the foundation of all operations. Ultimate goal of PsyOp is to modify the behavior of the TA by destroying their will using a relentless attack consisting of painful triggers. The machine successfully transmitted images into a CNN reporters mind. Ideal for cooperating neighbor children. It is not a conspiracy or paranoid belief to see a surveillance van on your street. PolWar- Political Warfare- a translation of the German term, weltanschuauugskrieg (worldview warfare), which means the scientific application of terror and propaganda as a way of securing ideological victory over an enemy. Gang Stalking: This is used on gang stalkers in training. Yep, it was a gradual process. Words like sets, props, performance, theatre, actors, cast, script, audience, etc. The DOD describes this as an attrition-based approach: Attrition is the product or gradual erosion of the will. Archived post. Some of the most common tactics of Community Stalking are: electronic harassment, constant surveillance, mental manipulation, sabotage, investigation and disclosure, aka "doxxing" of personal information, trauma-based manipulation and other purposeful interferences with one's daily life such as noise and disruptions in one's daily routine and vandalism and similar acts. These discrediting topics must be a total surprise to the host, only mentioned after the show is in progress. They will say that you or they never said something that you clearly . If they talk back, theyre acknowledging their existence. Gangstalkers twist the truth, but they also flat-out lie.They will say that you look or sound sick. The Air Force mentioned that an enemys internet could be spoofed to conceal one of its weather attacks: Spoofing options create virtual weather in the enemys sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs.. One guy was imitating me limping. It seems to be more weapons research than medical research. This stuff is very real and happens to innocent people every day, perhaps even someone you know. By playing deaf, dumb and blind, the Perp will have a tendency to OVERACT and become louder which is advantageous for recording. This is especially effective in the automobile repair trade. Privacy Policy. This directional weapon could target specific individuals by producing an audible sound at about 16Hz which turned into infrasound at 2Hz when it coupled with the ears. From 1 to 250 Hz the pain/damage threshold seems to increase with frequency as well as power. The CFR states: These weapons must be deployed coherently in synergistic coordination with information/psychological warfare technologies. Similarly, NATO, in their 2004 and 2006 reports, Non-Lethal Weapons and Future Peace Enforcement Operations and Human Effets of Non-Lethal Technologies indicates that NLW should be used in combination to increase their effectiveness. On November 22, 1990, the European Union forbade Operation Gladio, but although Norway follows most EU decisions, this one is omitted. If the perpetrator had access to your phone or computer, they could most probably be tapped with spyware or a tracking device. 5. -Police can frequently pull the target over for frivolous reasons. Bank accounts are hacked for the payment and a new bill arrives for the already paid bill by the target, and the receipt of payment is stolen. It's heavy, and a little hard to accept at first, but once you have a broad enough understanding of these crimes, you'll see what I mean. The US Military states that the goal is overwhelm the target by attacking all five senses, plus motor and cognitive functions. Joint resolution replacing B3-2021, 2058, 2068, 2087/90. Once the anchor is established, whatever the individual was exposed to during the anchoring process becomes the stimulus (trigger) that will provoke the emotion. As a fellow human undergoing the same trials as you, may I make a suggestion? Dr. Kildes Chapter 18 text is followed by these appendices: Appendix 1: Key words and phrases, taken directly from this manual. I find that speaking politely is always the best policy. These self-described "targeted individuals" say they are being monitored, harassed, and stalked 24/7 by governments and other organizations. In early 1990s, Russia developed a 10 Hz VLF modulator adjustable up to lethal levels, capable of targeting individuals over hundreds of meters, causing pain, nausea, and vomiting. CMOC Civilian-Military Operations Centers- is established in the civilian sector for exchanging ideas. vigilantes and gangstalkers are into blood libel i.e. If possible -- change jobs. Just go with the flow and give them hell. (Because vehicle intercepts can be dangerous, CBA assigned to vehicle intercept duty must successfully complete a special training course prior to actual assignment.) 6. GIG is connected to all communications systems used by coalition and allied forces. As an agent, you will be trained in how to do this. The key to successful punishment by trades people is that while the target is very likely to know they are being punished, these punishment acts must appear to the general public as lifes normal breaks.. Another thing, these gangstalkerscannot answer you back. The pentagon said it was too sensitive a subject to comment on. From commonplace things like the CCTV in your neighbourhood to every swipe of your ATM card you use for consumer purchases, everything is being watched. I havent seen him since. The History of Organized Stalking:CIA's COINTELPRO, MKUltra, Red Squads, & the Stasi. Smoking, coin-jingling, whistling, or toe-tapping near the target at a location where the target is known to need to stand, as to wait for the bus, or standing right behind a target at a water fountain. Annual Cost of Stalkers Only = 2 voices X 24 hours X 365 days X hourly rate (hourly rate = big mystery) So lets start with 1 Rand an hour Amounts to R17 520/year. From now on, I willl let them lower themselves. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that werent there, etc. But since the weapons testing of neurological disruptor technology has begun on the general population beginning in the early 60s and then stepped up to full throttle in 1976, the scope of what is considered mentally ill had to be reprogrammed into a broader definition for the general population. ~Department of Defense Whistleblower: From the Out of Print Book The Matrix Deciphered, My name is Dr. John Hall, Im a medical Doctor from Texas. Get better friends and hangouts. In terms of activities of the internal enemy, official sources suggest the act of simpoly conveying information alone can be described as IO. At first, to break them down and get them to comply, and then it's used to train them by showing them what to do to others when they become gang stalkers. It can be applied from hundreds of meters away from a target using man-portable transmitters. Some of these are the exact same groups promoting the use of PsyOp on civilians. Today it is out of control, and a new, much bigger Stay Behind 2 is active in Norway. They are not disclosing the use of NLP, Direct-Energy Weapons, Electronic Harassment and Covert surveillance. After reading about the Stasi, guess where the US government and other "Five Eyes" nations got this model from? Agents must pass their initial training and demonstrate a high level of commitment to maintain community safety, and the ability to operate deniably, before they will be considered for advanced electronic punishment training. It might seem a harsh thing to do, but look at how they treat you. He quickly walked away. The worst part of this is, if you dont have an iPhone, youll never know if youre being tracked.

City Of Warsaw Water Department, Articles H

how to get even with gangstalkers

how to get even with gangstalkers

how to get even with gangstalkers