how to get even with gangstalkers

Incidentally, the now-tired term, "conspiracy theorist" was coined by Operation Mockingbird as a means to discredit and gaslight anyone who disagreed with the Warren Commission's final word on the JFK assassination. All protest movements are not only recorded, with its participants catalogued, but these protests are all invariably infiltrated. Some of the institutions that conducted these studies were known to be subversive. The enemy does not necessarily use violence to promote social change. 6. It utilizes civilians and the military, indeed all of society, to target civilian adversaries (aka domestic state enemies, insurgents, extremists, non-state actors, cells of fanatics, citizen terrorists) who value national sovereignty and/or pose some perceived threat to the states interests. Technicians in all fields- telecommunications, electric power, building electrical and alarm systems, and utility employees in all fields use their positions to inflict many absolutely normal-looking problems on targets on an ongoing basis. The machine successfully transmitted images into a CNN reporters mind. Thats one of the rules they have to live by. . Family member by family member. In terms of government/military use of IO, DOD defines IO as: The integrated employment of the core capabilities of electronic warfare, computer network operations, psychological operations, military deception, and operations security, in concert with specific supporting and related capabilities, in influence, disrupt, corrupt or usurp adversarial human and automated decision making while protecting our own., The 1999 Air and Space Power Journal, in an article called What is Information Warfare? states: Information Wafare is any action to deny, exploit, corrupt or destroy the enemys information and its functions; protecting ourselves against those actions and exploiting our own military information functions.. -Passing as side street stop sign, then stopping an uncomfortable distance into oncoming traffic just as target is about to arrive at the side street, causing the target to have to slam on the brakes (this requires Control Center assistance and prompting by walkie-talkie style cell phone. As a community-based agent (CBA) you will have the privilege of working with a team capable of delivering better justice than the official system. Sabotage producing extreme safety hazards is generally not suitable for operations, because of the potential for bringing official investigators to an accident scene. Time it so every time the target opens a window the music starts. TI targeted individual (insurgents, non-state actors (NSAs), dissidents, terrorists, asymmetrical threats, irregular threats, potential enemies, etc.). These weapons are silent and traceless. Arriving at a place known to be a favorite of the target, and simply occupying that place just as the target is about to arrive (restaurants, parks, public facility seating, even bus seats are examples); sometimes just hanging out in such a location at times and places where people dont ordinarily do that. vigilantes and gangstalkers are into blood libel i.e. Psychological effects include loss of concentration, disgust, apathy, sadness, depression, fear, anxiety, and panic attacks. Rarely used, scheduled when the target has acted in a way so as to deserve special punishment, like divulging the name of a criminally acting secret agent. Psychologists are the key to finding ways to maximize feelings of stress and hopelessness in the target, and degrading the targets health, from many individual minor invasive punishment acts. This monitoring is assisted by blog scanning software which will detect and instantly flag posts relating to activities. The history of such practices goes back a long way, as we will get to shortly, to some of the most repressive regimes in history. Recordings should always be done w/o the PERPs knowledge.By alerting Perps of them being recorded will affect how they harass you. We have to trust our allies, he had said. Most of them cant get real jobs, so they become gangstalkers. The initial contact of neighbors to determine their willingness to cooperate is done by senior staff, and incentives to cooperate are often tendered. Internet applications that can convey PsyOp messages include email, websites, and chat rooms. These sorts of things are extremely difficult to prove to law enforcement, which is one of the reasons many are then being. This directional weapon could target specific individuals by producing an audible sound at about 16Hz which turned into infrasound at 2Hz when it coupled with the ears. I saw her and the next thing I know, shes on the phone to the gangstalkeryelling at him that hes not supposed to be talking to me. If you're new to gang stalking, you should watch the gang stalkers, because you're in the learning stage of gang stalking and have to learn how they work. For the stalker - gang stalking is both an addictive behavior, as well as a form of entertainment for the stalkers. What all this means is that the New War is an information war. The Office of Scientific Intelligence of the CIA in coordination with the United States Army Biological Warfare Laboratories used mind-altering drugs such as LSD and scopolamine to extract confessions from subjects and manipulate the subject's mental health. Theyve become so accustomed to tearing you down, they think there is nothing wrong with them (LOL)! You will hear cough non-stop wherever you go. Boy, did it ever. In a typical setup, CBAs may be posted in a parked car where the targets home or apartment can be observed overnight, for example. Police follow orders by e.g. Operations in general are of the active surveillance type. You should maintain composure and act as if you are deaf, dumb and blind. GangStalkers hate spending money, anything UPscale and pla. A type of audiovisual product known as PsyAct includes agents of action who carry out plays in the presence of the TA. My name is Sandra Fields. What is most important is to find your strength and listen to your inner voice, your instincts and do what you need to do to remain resilient in the face of this abuse. One thing not to do is to get a camera such as a Ring Security Camera, as those are shared with law enforcement. Change), You are commenting using your Facebook account. 1. They dont care about your feelings, dont care about theirs. From commonplace things like the CCTV in your neighbourhood to every swipe of your ATM card you use for consumer purchases, everything is being watched. Examples: target protection can be changed to youth account, or, an overdraft protection feature can be disabled, or simply steal money from the account. Stalkers using bugging devices and spyware to monitor victims. The Stay Behind logo resembles the NATO logo. He replied that he wasnt doing anything to me. One particularly effective type of theft is to remove small value, but often used items from the targets premises. You will receive instructions from your local center as to following the target. Backup all video to a private cloud, preferably one outside of the jurisdiction of the Five Eyes. Triangulating data from cellphone towers and WiFi signals is another tactic that particularly state actors can use to put you essentially under constant surveillance. In any event, the person finds strange things happening around them - patterns begin to emerge, such as being followed, vehicular surveillance outside their homes or on the road with the same cars trailing them, maybe happening at the same time as getting mysterious phone calls for the first time along with all sorts of other strange "coincidences" and so on. TPD Tactical PsyOp Detachment- team of about 13 personnel with a captain and staff sergeant. It is a systemic, patterned set of behaviours for the purposes of destroying or harming someone's life, ruining their relationships, reputation and standing in their community, and harming their health, particularly their mental health, as well as causing financial harm to the Targeted Individual. Frequency determines what kind of damage occurs whereas power determines how much damage occurs. This can be dangerous and is only assigned to very senior agents. [8] ~Targeted Individual Jim Hastings. Smoking, coin-jingling, whistling, or toe-tapping near the target at a location where the target is known to need to stand, as to wait for the bus, or standing right behind a target at a water fountain. Rumor Campaigns- used by PsyOp units to isolate TIs. And, believe me, these people should be on the Government Watch List. For more information, please see our This is a complete guide to the subject, so let's dive into it. It may be a physical meeting place or a virtual one through online networks. If a community-based agent (CBA) has a good track record of intelligently carrying out assignments, and has access to a computer, the CBA may apply to the local Control Center for assignment to discredit work. Intercepts are where community-based agents (CBA) will appear to just coincidentally cross paths, on foot, with the target. -Money is never transferred to the journal subscription or membership in a certain club like opposition to government surveillance. Money simply disappears from the bank with help of cooperating employers. Generally, staged accidents are done in jurisdictions where police strongly support the operations, so that the CBA driver is protected. By doing so, you will frustrate those who seek to harass and annoy you.Moreover, by acting deaf, dumb and blind, you encourage a Perp to \"OVERACT\" and become louder, therefore, making his harassment even more obvious.You should always carry a recording device with you and record this acting out behavior known as DIRECTED CONVERSATION and do so without letting the PERP know that you are recording his behavior.You should then go and document the time, location and the date and describe in detail of the event that just transpired. Suffice it to say that it is possible to apply incentives which cause even people closest to the target to cooperate. This is accomplished by a relentless campaign used to demoralize the TI that will create perpetual feelings of intense fear and hopelessness. Beyond active surveillance, agents perform acts to keep the target uncomfortable, around the clock. An anchor is created when an emotional state is linked to something such as an object, person, sound, smell, place, color, etc. Other types include Computer Attacks and Weather Modification. Were not suppose to know they exist and that no one is doing anything to us. Each CBA surveillance team will be given a cell phone number for reporting target actions and movement to the local Control Center (CC). Go to the doctor immediately. Particular frequencies and modulations will trigger precise chemical reactions in the brain, which produce specific emotions in the targeted individual. I turned around and told him to leave me alone. Otherwise, the adage, "If you see something, say something" still applies. what does hit them with your thingamajig mean?? The sounds originate from within, above, or behind the head and are transmitted to the inner ear via bone conduction (thermal expansion). document.getElementById( "ak_js_1" ).setAttribute( "value", ( new Date() ).getTime() ); Enter your email address to follow this blog and receive notifications of new posts by email. PsyActs psychological actions- aka F2C- are audiovisual products consisting of agents of action who deliver messages to a TA (target audience or individual). (LogOut/ These same tactics have been borrowed and are now deployed regularly. The person is targeted for being a drug addict. He yelled right back at her and told her to f**k off! -Medical lab technicians can substitute blood samples, or otherwise falsify results making the target appear to have absolutely no reason for their complaints. The Canadian government also carried out these experiments in Montreal in the 1960s. Excellent communications skills are required. I find that speaking politely is always the best policy. Thankfully with the rise of various video platforms and alternative tech, there are many good outlets for you to turn the tables on your stalkers and expose them for the rest of the world to see. Most companies and academic institutions have personnel whose job it is to address such problems. Target selection is done by senior Control Center (CC) staff or higher levels. This technology has interacted with quite a large amount of people, however it is almost always misidentified as other sources[8]. The targets associates will simply refuse to believe that anyone but the target is responsible. That I one of my motivations for writing about this subject, as alifelong friend of mine had her life and marriage ruined by this particular sort of gang stalking by a deranged individual. Now every time he sees me he doesnt dare say a thing. Some of the most common tactics of Community Stalking are: electronic harassment, constant surveillance, mental manipulation, sabotage, investigation and disclosure, aka "doxxing" of personal information, trauma-based manipulation and other purposeful interferences with one's daily life such as noise and disruptions in one's daily routine and The person is unkowingly part of an experiment. They may wrap themselves in nationalism.CMO Civilian-Military Operations- combines military, federal agencies, NGOs, civilian organizations and authorities, and the civilian population. -Where the target owns substantial land, noxious activities can be arranged and built for next to the property. But no sane person will work for this slave wage. On November 22, 1990, the European Union forbade Operation Gladio, but although Norway follows most EU decisions, this one is omitted. Primary elements include the source, the rumor, and the receiver-repeater (R2). They feel better by putting someone down. Whales, elephants, hippopotamuses, and rhinoceros use infrasound to communicate over great distances. The CFR states: These weapons must be deployed coherently in synergistic coordination with information/psychological warfare technologies. Similarly, NATO, in their 2004 and 2006 reports, Non-Lethal Weapons and Future Peace Enforcement Operations and Human Effets of Non-Lethal Technologies indicates that NLW should be used in combination to increase their effectiveness. Scheduled when the target has acted in a way so as to deserve special punishment. Keep in touch. Try to keep in mind that the majority of what us TIs call "gangstalking" is actually the subtle manipulation of the minds of those around you, including your own. Just go with the flow and give them hell. 4GW is more or less synonymous with unconventional warfare (UW), irregular warfare (IR), asymmetric warfare (AW), low-intensity conflict (LIC), military operations other than war (MOOTW), and network-centric warfare (NCW). At first, to break them down and get them to comply, and then it's used to train them by showing them what to do to others when they become gang stalkers. Agents must take great care that each and every act of punishment is DENIABLE. This article was updated on January 3, 2023. In the 1950s and 60s, with the growth of technology, mass media and inroad of politics in our lives, governments engaged in various nefarious "Operations" against their own people. The CBA doing this work will immediately reply with comments like Someone isnt taking their medication or target name has provided absolutely no evidence. The CBA will then report the post to higher level supervisors for possibly more detailed responses. Gang Stalkers are broken down and trained in the following ways: 1. Some real-world tips on how to deal with your gangstalkers. Are they involved in gangstalking? Repetition is a common tactic employed by gangstalkers. A bad actor puts one on you or your car and then can track you. The DOD stated: Some IW activities, such as terrorism and transnational crime, violate international law. There, in the distance, was a monitor in a red car watching the stalker. The reason for that is that if you upload, your tormentors will know that you are recording them. By playing deaf, dumb and blind, the Perp will have a tendency to OVERACT and become louder which is advantageous for recording. -Repair trades people can keep getting it wrong necessitating many recalls, be late, be messy, over-bill the target, and even damage things which were OK. One important punishment function of surveillance is to sensitize the target. They cause a variety of effects, including tiredness, dizziness, nausea, vomiting, abdominal pain, convulsions, epileptic seizures, temporary paralysis, vibration of internal organs, cooking of organs, cataracts, burning sensation on the skin, hyperthermia (heating of body), headaches, loss of short-term memory, interruption of cognitive processes, cardiac arrest, and cancer. Physical sabotage is an especially effective form of punishment when it is carefully limited to low value items, below the value where police will take the report seriously. This multinational force (MNF), involving NATO (North Atlantic Treaty Organization) and the UN, is termed civilian-military operations (CMO). The triggers are part of a behavior modification program called NLP (neuro-linguistic programming) which uses anchors and triggers to promote change. For the community-level CBA, the work of sabotaging the reputation of the target takes the form of simply carrying out instructions from your Control Center as to what you say to whom, how, and when. There is cooperation with military intelligence, Stay behind, NATO, and foreign intelligence agencies also against their own population. That is labeling someone paranoid schizophrenic or mentally ill. Once that label has been attached to someone, almost all testimony will be disbelieved. and our Fortunately, experience shows that co-opting friends and family is surprisingly easy, once they are informed about the targets criminal record. However, it is possible to stage an accident so only the target knows it was staged. Do a thorough check of your car; take it to a mechanic if you have to. You have to learn to look at gangstalkers as people with lots of faults. Rumours consist mainly of lies. Victims can feel isolated, wondering if there is help for people who are being gang stalked, or if they will lose control of their lives or minds. Ever be able to get rid of your gang stalkers, trust me because I thought I could tried so many different ways on how to get rid of my organised gang stalking group nothing worked n. Early PsyOp research was done by a small private network of think tanks, foundations, and academic institutions, which went into partnership with government agencies and kept most of the results of their studies secret. Every target will have at least one CBA watching them (at) all times, even while at home and asleep. Joint resolution replacing B3-2021, 2058, 2068, 2087/90. The stunned engineer said that, given three weeks time, he could scale up the machine to use on a whole town, causing them to do things against their better judgement, see and hear things that werent there, etc. The Air Force mentioned that an enemys internet could be spoofed to conceal one of its weather attacks: Spoofing options create virtual weather in the enemys sensory and information systems, making it more likely for them to make decisions producing results of our choosing rather than theirs.. Archived post. The military has employed this tactic since the 60s to get rebellious soldiers and others locked up in mental hospitals. Answer (1 of 8): First of all your a target individual and for the length of time I have been one.. You will never? (In the US, this means the controlling faction is FEMA, DOJ, CIA, and other federal agencies (FBI, DHS, etc.). Actions to be reported include, but are not limited to: Some of these observations will be performed by the Electronic Corps (EC), but CBAs should attempt to make and report as many detailed observations of target activity as possible. Taxi drivers can delay arriving when called by the target, especially when going to the airport. I will pay attention to you and try to be less confrontational. I can positively say I'm being gangstalked by my brother My mother my father And most likely my . So drive them crazy! This section will give some examples of ways community-based agents (CBAs) with specific trades or situations in the community can apply deniable punishment to targets. If possible -- change jobs. Your phone is off but youre in a mall. In 1975, Dr. Joseph Sharp proved that correct modulation of microwave energy can result in wireless and receiverless transmission of audible speech. What is the purpose of the stalking to begin with? The next time I saw him, he was about to say the same thing he always says, but I shut him up right away. In this case, your supervisor will assign you to call in to the show, and instruct you as to appropriate things to say, such as rebutting the targets claims, pretending to be a target calling and making wacko statements such as UFOs are harassing me, or pulling the discussion away from real activities and to something like media mind control.. Remember, these effects were achieved by civilians over 30 years ago! Order within 22 hrs 50 mins Select delivery location Law Enforcement Intelligence Units are more elaborate than their first inception as "Red Squads" over 100 years ago to fight subversive political movements. This means that should the target complain to police, (or) any other officials, or friends, neighbors, family members, or doctors, the nature of the punishment must be seen as the targets overactive imagination or better yet, an indication the target is mentally ill. (The system) has worked for years to recruit the medical establishment to help maintain deniability, and today, most targets (are) immediately labeled as mentally ill and often forced onto anti-psychotic medication when they complain. Instead, close, active surveillance and other activities, happening far to frequently to be written off as lifes normal breaks, will eventually cause the target to realize they are under surveillance and punishment.

Small Business Conference Nashville, Tn, Taika Waititi Father Paintings, John Roberts Fayetteville Ar, Articles H