Gang Stalking World

United we stand. Divided they fall.

John St. Clair Akwei vs NASA

Mr. Akwei use to work for NASA. He sued them. He says that they are capable of using remote neural monitoring to do a lot of really nasty things to innocent citizens. His case was from 90/91, so if they had this technology then as he has claimed, imagine what they can do now? Makes you wonder what the rush was to switch to the digital signal with the remote set top boxes, maybe it was not for watching targets in their home. If they have the technology that Akwei claims, then they could watch people in their homes through their brains with the right frequency. Hear what they hear, see what they see, and use the technology to program them. Read the case file, and the accusations, they are quite interesting, when you think about the fact that he says that some of this tech was in used since the 1940’s.

http://www.buergerwelle.de/pdf/akwei.pdf

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.

(Civil Action 92-0449)

John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency’s structure, national security activities, proprietary technology, and covert operations to monitor individual citizens.

————————————————————————–

The NSA’s mission and the NSA’s domestic intelligence operations

Communications Intelligence (COMINT)

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960′s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies. Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security “anti-terrorist” surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.

NSA personnel serve in quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960′s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence remote computer tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or “anti-terrorist” electronic warfare.

Radio and television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in radios and televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.

Detecting EMF fields in humans for surveillance

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment, NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA’s Signals Intelligence use of EMF brain stimulation

NSA Signals Intelligence uses EMF brain stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MK Ultra program of the early 1950′s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can monitor all the electrical activity in the brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link (in military fighter aircraft, for example).

For electronic surveillance purposes, electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations, characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex, bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain-programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940′s. The NSA, Ft. Meade, has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech, 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears), and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.

Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields. The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz, .5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images, and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted brain stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. As previously noted, EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2D screens in the brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. intelligence community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 hz to 50 hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation:

[Brain area-bioelectric resonance/ frequency/ information induced through modulation]

• Motor control cortex/ 10 hz/ motor impulse co-ordination

• Auditory cortex/ 15 hz/ sound which bypasses the ears

• Visual cortex/ 25 hz/ images in the brain, bypassing the eyes

• Somatosensory cortex/ 9 hz/ phantom touch sense

• Thought center/ 20 hz/ imposed subconscious thoughts

This modulated information can be put into the brain at varying intensities, from subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location, inside any building, continuously, anywhere in the country. A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM devices

• NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals, and can send messages through the nervous system to affect their performance.

• [Information missing from original]

• RNM can electronically identify individuals and track them anywhere in the U.S. This equipment is based on a network and is used for domestic intelligence operations, government security, military base security, and in case of bioelectric warfare.

Spotters and walk-bys in metropolitan areas

Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly), following and checking on subjects who have been identified for covert control by NSA personnel.

• Agents working out of offices can be in constant communication with spotters who are keeping track of the NSA’s thousands of surveillance subjects in public.

• NSA Agents in remote offices can instantly identify (using RNM) any individual spotter in public whom is in contact with a surveillance subject.

Chemicals and drugs into residential buildings with hidden NSA-installed and maintained plastic plumbing lines

• The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief overview of proprietary U.S. intelligence/”anti-terrorist” equipment mentioned

• Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers.

• ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

• EMF equipment that gathers information from PC circuit boards by deciphering RF emissions, thereby gaining wireless modem-style entry into any personal computer in the country.

All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research). Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980′s.

————————————————————————–

Resources

These publications have only been discovered since December 1991, after the Plaintiff had already notified authorities (Dept. of Justice and others) of Public Corruption by named NSA employees. When no action was taken against the NSA employees, the Plaintiff researched the intelligence community electronic surveillance technology involved and discovered the following publications:

• The Body Electric-Electromagnetism and the Foundation of Life, by Robert Becker

P. 265/313/318, monitoring neuroelectric information in the brain; EM waves/ESB.

• Cross Currents, by Robert Becker, M.D.

P. 70/78/105/210/216/220/242/299/303, EM ESB; simulating auditory hallucinations; p. 274, remote computer tampering using the RF emissions from the logic board.

• Currents of Death, by Paul Brodeur

P. 27/93, driving brain electrical activity with external EM; magnetophosphenes; Dr. Delgado.

• The Zapping of America, by Paul Brodeur

DoD EM ESB research; simulating auditory hallucinations.

• Of Mice, Men and Molecules, by John H. Heller (1963)

P. 110, bioelectricity; probing the brain with EM waves.

• The 3-Pound Universe, by Judith Hooper

P. 29/132/137, CIA’s EEG research; EEG for surveillance.

• In the Palaces of Memory, by George Johnson

EM emissions from the brain; the brain as an open electromagnetic circuit.

• The Puzzle Palace, by James Bamford

Signals intelligence, most advanced computers in the early Sixties; the U.S. intelligence community – glossary of terms at National Security archives; Radiation Intelligence –information from unintentionally emanated electromagnetic energy, excluding radioactive sources.

• The Search for the “Manchurian Candidate,” by John Marks

P. 327, electrical or radio stimulation to the brain; CIA R&D in bioelectrics.

• Secret Agenda, by Jim Hougan

National Security cult groups.

• Crimes of the Intelligence Community, by Morton Halperin

Surreptitious entries; intelligence agents running operations against government workers.

• War in the Age of Intelligent Machines

NSA computer supremacy; complete control of information; alternate computers, by Time-Life Books.

• The Mind, by Richard Restak, M.D.

P. 258, EEG Systems Inc.; decoding brain EM emanations; tracking thoughts on a computer.

• MedTech, by Lawrence Gallon

Triggering events in the brain directly to auditory cortex signals.

• Cyborg, by D.S. Halacy, Jr. (1965)

Brain-to-computer link research contracts given out by the U.S. govemment.

• Psychiatry and the C.I.A.: Victims of Mind Control, by Harvey M. Weinstein, M.D.

Dr. Cameron; psychic driving; ultraconceptual communications.

• Journey Into Madness: The True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas

P. 127/276/116/168-69, intelligence R&D; Dr. Delgado; psychic driving with radio telemetry.

• Mind Manipulators, by Alan Scheflin and Edward M. Opton

MK ULTRA brain research for information gathering.

• The Brain Changers, by Maya Pines

P. 19, listening to brain EM emissions.

Further Resources

• Modern Bielectricity

Inducing audio in the brain with EM waves; DoD cover-up; EM waves/ESB; remote EEGs.

• Magnetic Stimulation in Clinical Neurophysiology, by Sudhansu Chokroverty

Magneto-phosphenes; images direct to the visual cortex.

• The Mind of Man, by Nigel Calder

U.S. intelligence brain research; Neuroelectric Society conference – 1971; audio direct to the brain with EM waves; two way remote EEG.

• Brain Control, by Elliot S. Valenstein

ESB control of individuals.

• Towards 21st Century, by C.S. Wallia

P. 21, brain stimulation for direct brain-to-brain communication.

• Mind Wars, by Ron McRae (associate of Jack Anderson)

P 62/106/136, research into brain-to-brain electronic communications; remote neural EM detection.

• Mind Tools, by Rudy Rucker

Brain tapping; communication with varying biomagnetic fields. P. 82, U.S. News and world report (01/02/84); p. 88, EM wave brain stimulation; intelligence community high tech.

• Ear Magazine article on extremely low frequency radio emissions in the natural environment; radio emissions from the human body.

• City Paper article on FCC and NSA “complete radio spectrum” listening posts (01/17/92)

• Frontiers in Science, by Edward Hutchings, Jr. (1958)

P. 48

• Beyond Biofeedback, by Elmer and Alyce Green (1977)

P. 118

• The Body Quantum, by Fred Alan Wolf

• Cloning – A Biologist Report, by Robert Gilmore McKinnell

Ethical review of cloning humans.

• Hoover’s FBI, by former agent William Turner

P. 280, routines of electronic surveillance work.

• July 20, 2019, by Arthur C. Clarke

Lida; neurophonics; brain-to-computer link.

• Mega Brain, by Michael Hutchinson

P. 107/108/117/120/123, brain stimulation with EM waves; CIA research and information control.

• The Cult of Information, by Theodore Rosnak (1986)

NSA Directive #145; personal files in computers; computer automated telephone tapping.

• The Body Shop

1968 implantation of an electrode array on the visual cortex for video direct to the brain and other 1960s research into electronically triggering phosphenes in the brain, thus bypassing the eyes.

• Evoked Potentials, by David Regan

Decoding neuroelectric information in the brain.

November 7, 2010 Posted by | Conspiracy, control, Controlled society, Gang Stalking | , , , , , , , , , | 3 Comments

Facebook friend or foe?

Facebook.
CIA government database opperation?

http://www.youtube.com/watch?v=KpLNlSKugHw

What if I said to you, fill out this survey for me. It will have information such as

-Resume
-former jobs
-places you have been
-books you have read
-all your friends
-family
-lovers
-associates
-old schools
=old companies
-who you associate with now
-group affiliations
-religious

It will also have any other personal details that you want to provide.

I am not only going to use this information to profile you, but to help me in profiling those around you. I will use the information to advertise to you, to help you find groups and other people that might be of interest to you, but I will also use it for other purposes, would you say yes?

What if I told you that this information would some day be used to find you, and anyone associated with you, should you speak out against the government?

What If I told you this information would be used to find you should you commit a crime, or just be accused of one, guilty or not.

What if I told you this info would be used to find you, should you ever flee the country, or try to go underground?

Don’t believe it, think again, Facebook is so much more than you expected.

Let’s say something happens and you have to go on the run, who is going to help you? It’s not usually going to be strangers, we are all commented. By giving out who you went to high school, middle school, university with, you have cut off that circle. By giving out the groups you are associated with, you have cut off that circle. By giving out the places you have been, you have cut off that circle. Library records, now they have a way to look for you based on reading habits. Etc.

You are boxing yourself into a corner and don’t even know it. If the day ever comes when something does happen, you blog something someone does not like, you make a comment, you have to pack and leave for any reason, no one will be able to help you, because the information is out there.

The pictures you share, all those biometrically recognisable faces. Everything you put out there is shared, and once the information is out there, it is not getting erased. Once it’s on the net, expect it to be there forever.

I don’t use facebook, but I know others who do. I have heard a couple of fun stories. When people commit crimes or are accused of crimes, wanted for questioning, etc, one of the first things cops do is go to facebook. They find out who people’s friends are, their families, connections are, where they have been, group affiliations etc.

I also had one person who does not use facebook anymore tell me, that when they were on the site, they had a pop up message, I don’t know what it’s called, but apparently you have lists of friends, and they have friends, well the pop up said, based on your list, you might know this person and might want to add them to your friendship list. The person in question who got the pop up, did know the person and it scared this person enough to get them off facebook. They are cross checking and scanning information. Seeing who knows who, who had what affiliations, who went to school with who, who is connected. Connections that you might not even think about, yet they knew.

I am not saying this can only be used for criminals, but I am saying if you value your privacy and the time ever comes when you have to hide, get out of the country, or disagree with the government, are accused of a crime even falsely, you have no place to hide. They know who is a friend of a friend of a friend, who is associated with this group, who went to this place, that, in their past, if you are on the run, where you are likely to go, and who you are likely to connect with, and who those people are connected with.

People nowadays are different than people of the past. Technology can help us, but look at the type of society that we are in. We are coming up on a surveillance society, and because of that, it might be a good idea, to not provide the government database with all your information. Information that you would be peeved off at to realise that others had, if they got it in some other way, but information that you are all too willing to freely give and share.

Use facebook if you want, but just be aware of what you are giving out. It’s not a matter of being I have done nothing wrong, I have nothing to worry about, the time will come where that will not matter. Becareful about what you are putting out there.

Also keep in mind that this information is being aggregated with other lists and other bits of information to paint a very detailed picture of you.

Don’t get me wrong, facebook from what I have heard is a great way to get together groups, etc, but if those groups are all being put together on a government controlled website, is that a good idea for your specific group? Would you go to FBI, or CIA head quarters and hold your meetings there? If so then you have nothing to worry about, or think about.

Yes they also keep trying to get me to use facebook, and I always give the same response.

June 28, 2009 Posted by | CIA, Controlled society, Facebook, Internet | , , , , , , , , , , , , , | Leave a comment

Bus Beheading

So many things to blog. I have been neglecting this story for some time, so here are some quick thoughts.

One about the bus beheading. Tell me if you have heard this before. An event happens the public panics, they agree immediately to have all their rights suspended and agree to draconian tactics they would never have agreed to.

Let’s see, mental detectors, cameras, you can no longer put your stuff on the overheads, and you get patted down? Do I understand this correctly. Greyhound buses have been in existence for years, this was one incident out of how many years of safe travel, and yet all rights previously enjoyed are gone. Remember these changes come after a two year study for greyhound security, and without this incident, do you think people would have willingly submitted to the changes?

http://www.thestar.com/News/Canada/article/547876

[quote] Starting this week, Greyhound passengers in Edmonton, Winnipeg and Calgary are being swept before boarding by hand-held metal detectors.

Passengers are also now required to store their luggage in the cargo hold instead of bringing it onboard, except for small personal items such as purses.

The new measures – which will also follow in other cities – come four months after a young man was stabbed and beheaded onboard a Greyhound bus near Portage la Prairie, Man.

Greyhound spokeswoman Abby Wambaugh says the extra security isn’t because of what happened, but stems from a companywide review that began in 2006.[/quote]

It’s almost too easy to get people to give up their rights without question. But those who give up liberty for a false sense of security shall in the end have neither. The irony of it all.

http://cnews.canoe.ca/CNEWS/Canada/2009/02/23/8499461-cp.html

[quote]The company is now beefing up security measures, including cameras, global positioning units and a panic button that immediately dispatches police to a bus’s location. Drivers are also getting more training in self-defence and conflict resolution.[/quote]

I know after 9/11 they were trying to find a reason to implement similar changes, but people didn’t agree, scare them a little bit, and viola, they will come to you. It’s classic, and from what I can see it works every time. Problem, horrific incident, reaction, solution, already waiting to be rolled out.

http://www.flixster.com/forums/topic/771141030

The bus beading is something I have never had the time to research properly. There were mentions early on that with his history of mental illness, he might have been a good manchurian candidate, but proving it, is another story. People should be looking into this, but they don’t.

http://ca.news.yahoo.com/s/capress/090303/national/bus_beheading_trial
[quote]He didn’t have many friends and was divorced in 2006. Li had “mental problems,” according to those who knew him, but they had not known him to be violent.

His former wife said he used to be gone for long periods of time, took unexplained bus trips and sometimes rambled. He was hospitalized briefly but never sought medical attention. [/quote]

Was he really completely crazy or was something else going on?

Well we now know why he switched seats after the smoke break, but was there a trigger word? Was he really crazy or being controlled? It’s impossible not to speculate when you have an awareness of the history of Canadian mind control experiments, and new technology that might be capable of communicating with a controlled target remotely.

http://cnews.canoe.ca/CNEWS/Politics/2009/03/03/8608416-cp.html

[quote]The voice told Vince Li to get on the bus and sit next to Tim McLean, Dr. Stanley Yaren told Li’s second-degree murder trial Tuesday.

“A voice from God told him Mr. McLean was a force of evil and was about to execute him,” Yaren, a witness for the Crown, told the judge hearing the case.

Li, 40, believed he had to act quickly to protect himself, Yaren said. [/quote]

Tim Mclean the perfect victim. Was he really a random victim? Was his being on the bus and intersecting with Li random, or preplanned. Yeah that get’s into the conspiracy files, but if the questions are not asked, the answers will not surface. Now Li says he thought Tim was a demon?

I believe there is much more to this story, but in the minds of the scared public, the right questions often never get asked, the helpless scared society look to the state for solutions, which usually involve taking away their rights and freedoms, it’s perceived to have been done voluntary, and all the focus shifts to the justice system, and not the possibility of much darker, and much more deliberate forces. In the end, if you don’t look out for your own rights and freedoms, no one else will, and if you agree to so easily give them away, then at the end of the day, maybe your fate is well met.

Those who would give up Essential Liberty to purchase a little Temporary Safety, deserve neither Liberty nor Safety. Benjamin Franklin.

March 11, 2009 Posted by | Awareness | , , , , , , , , , , , , , , , , | 2 Comments

How did they do it?

How did they do it? This is what I am wondering how did they live with the hypocrisy of it all? While the west was busy insulting countries like East Germany for their snitches and informants they were doing the same thing.

This system is not a new thing, we saw an increase of this recently in some of our lives, but just reading about the John Lennon files and and many others I ask the question, how did they live with the hypocrisy of it all?

They had citizen informants while the Stasi had theirs, they were conducting widescale investigations, and this has been ongoing for some time, yet we use to really look down on countries like that. Our country is not like that, we don’t do those things. It’s like the time those tv evangelist got caught with their pants down.

It’s the most irritating thing, knowing what I now know. So I just had to ask that question. How did they do it?
I am revising my earlier statement, though many are a part of the informant system, some do not understand the bigger picture that is ongoing. Eg. They are asked to take part in the operation, but maybe believe that it’s just observation of an individual and have no idea of the wider plague that’s happening. I wouldn’t even know where to begin. How do you tell these people the full scope of what you are aware of, and what they are a part of? It feels so wrong to make them aware. In some ways I would like to leave them in their innocence, but then they will just have this wave wash over them and they won’t know what hit them. It’s six of one, half dozen of the other.
A couple of fun things we can do to mess with them. They use a lot of disinformation with us, so I find that turn around is fair play and it works really well, so use at your own discretion, and use it wisely.

They need time to set up their operation. Eg. Whenever I go someplace really unexpectedly, or do something unexpected, you can tell that it takes them time to get their informants into play, and get the game going. They are not as slick as they seem. Don’t get me wrong, they will be everywhere, but they are not as slick as they think they are.

Eg. I related the story back before I knew what was ongoing. I had called for school in the U.S. and had spoken to a Cathy several times, I was really familiar with her, then I had decided to look at some Canadian school’s, and called, well I spoke to a Cathy, got all my information from Cathy, and as I got off the phone, I realised it was Cathy. The same Cathy that I had been speaking to. Now this was before I knew about Gang Stalking, but at that stage, I knew there was something seriously wrong. Later I would find out that Cathy or Kathy or whatever is or was a common name they would use.

The targets if they arrived at a place and were looking for a target, would also use specific names to pass on the fact they were looking for a specific person. So phone calls, unknown online communications, all surveillance. Expect that if you are communicating with someone who is not an informant today, these people will go behind your back, and make contact with them if they can, and manipulate the situations.

They did this when I owned a business. Contacted all my customers behind my back. One client introduced another client to me, named Cathy, at the time I was really unaware, but that should give you some idea. They tried to get my clients to leave, or introduce people to cause stress to my company. Lot’s of little things i would find out later on. That they had done and been doing for years, before I became aware. They truly are parasitic.

So how can you get at them? How can you win? Well I was thinking about this, and the slaves of the system, the aware that know what is going on, you probably stand a better chance of destroying them internally than most of us, externals. I mean you have the chance to learn and know more about how they operate, if they are chipping you, and others like you. The way the communication system works, the little commands you get from the earphones.
You can chip away at this. I don’t know that the way to win or even fight this is outright rebellion, but I think if you slowly chip away at it, this might be the way to go.

I am not sure what that means yet fully, but that was the answer that came to me. I have been thinking about this a lot. You have to understand, these people will go out of their way to do just about anything to get to the target. Mess up construction projects that go months at a time. Moving into buildings, contacting all your customers, and if you are working with other, your business partners. Etc. They will try to be in control of every aspect of your life.

Eg. When I use to have the phone available with more easy access, they would have a variety of people call, but it would be at such specific times, that you knew it was on behalf of them, that constant need to make contact with the target. If you are not under observation it’s hard to understand this.

That seems to be the best solution. The ones that are inside, you need to find ways to chip away at it. Like a piece of rock. Doesn’t have to be big chunks, just little things over time. Eventually the rock will crumple. See this is what they use on us, but I have been thinking about it, and the same method, should work on them. I am just not sure what this truly means yet, but that’s the answer that came to me.

Anyways, so that was my question. How do they do it? How do they still criticize countries like China, and how could they have criticized countries like East Germany, when the same stuff was ongoing here, and in greater capacity?

Anyways it’s something to think about.

February 11, 2009 Posted by | activism, Awareness, Gang Stalking | , , , , , , , , | 1 Comment