The age-old adage First Do No Harm should be the tempering goal of not only medicine, but government and industry, especially when they team up to deploy new technologies, set policies and serve the people.

This blog exists to reveal and analyze areas in which these powerful groups are failing to "first do no harm."

Saturday, September 12, 2015

What is this "targeted individual" business, anyhow?


Targeted Individuals, a department of defense term, are people who locals deem unfit for society, in one way or another. Some are whistle-blowers; some are dissidents, like anti-war demonstrators; some have a beef with one corporation or another; some just have different political or religious ideologies then the norm; some are targeted for reasons of lust and greed, and some are targets of convenience. They are targeted by means of gang-stalking, b & e’s, harassment, poisonings (biological and/or chemical), remote electronic harassment (messing with radios and tv’s, etc., remotely), vandalism, character assassinations, staged accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted Individuals).

This Youtube comment explains what the TI experience on a daily basis. However, it must be noted that the people/groups behind a particular case vary, government, industry, agenda-driven groups, people with resources and power.


One of the most in-depth descriptions I’ve seen: What TI's are experiencing is the cyber-aspect of rogue factions of the federal government's post-2000 COINTELPRO Domestic Intelligence (DOMINT) Operation, which is based on strategic and tactical techniques comprised of the following Counter Intelligence tenets: Destroy, Deny, Degrade, Disrupt, Deceive. Federal, state and local law enforcement - combined with EMS, first responders, neighborhood watch programs and private citizens (often paid with federal tax dollars through private security companies) have organized into groups - with international contacts (through classified branches of federal law enforcement and intel agencies), which target individuals who have been deemed a "domestic threat." This includes but is not limited to activists, minorities, whistle-blowers, alpha-male or -female leader-types, scholars or anyone who speaks out about wrongdoing - or thinks/acts "outside of the box."

The techniques being utilized are a melange of tactical/strategic procedures culled from the playbooks of the Stasi, the KGB, and Mao Tse Tung's Red Squads. A program is in place which frames, isolates and destroys a target financially, socially and professionally via slander, framing for non-existent criminal activities and on-line harassment which extends into the physical realm when the "target" goes to shop, church or any public location. This is what "Gang Stalking" is.

"Gang Stalking" is actually a misnomer. "TI's" or "Targeted Individuals" are whistle-blowers, good Samaritans, minorities, artists, activists and any others from different groups of people who have been labeled as a "domestic threat." They aren't being mobbed and harassed by random groups of citizens or 'gangs' (although it may seem like that to them). They are being followed and harassed by civilian groups who have been hired by Private Security Companies, the owner(s) of which did or still do have classified security clearance and may have been in the employ of Federal Law Enforcement/Intelligence and/or ex-military intel, in addition to shadow federal agencies with fat budgets and unknown agendas.

Local citizens (often with criminal backgrounds, unemployed and/or with little education) are "tasked" to follow people around in public. You aren't alone. Several million US citizens are on the threat list and certain rogue factions of the US government have tasked neighbors and fellow citizens to track and harass individuals on the list. This is coordinated with local and state law enforcement agencies (often through Data Fusion Centers) and in many cases the "target's" vehicles (and/or cellphones) have geo-locational systems attached/activated in order to keep tabs on the location of the "threat." (you).

Mao Tse Tung was an expert at playing groups against each other - little energy expenditure, minimum manpower loss and widespread damage to the targets. That is why many of the street-level perpetrators are individuals with low self-esteem and often little or no education. Their lack of goals and a future makes it easier for those higher up in the command chain to control them as well. Indeed, in some ways the "perps" are also being victimized in this operation - which does unfortunately span continents and nation-states.

The harassment is fine-tuned to each individual by the information which is remotely and illegally harvested from their computers, e-mails, phone conversations, medical records, and purchase histories (supermarkets, Amazon, E-Bay, etc.) - so there is evidence of great complicity at many governmental levels (state, local, federal and international).. The cyber-breaches require a substantial degree of technological know-how (at the minimum local Law Enforcement - but more prevalently state and federal), but be aware that your meta-data, purchases and internet habits (pornography viewing, YouTube views, news articles of interest) are relayed to your "minders" on a local level.

The information is illegally harvested without your consent and without any reason/due process and then distributed to the people (perps) you come into contact with on a daily basis. The offhand/casual remarks you hear are not coincidental. Your recent purchase of a book or estimate of an on-line search for a property to purchase were mentioned in front of you to (1) attempt to destabilize you and (2) to give you a sense (regardless of legality) to how pervasively your privacy has been invaded, and (3) question your own sanity. Don't question your sanity.

The sad fact is that today's technology used by the government (two to three decades in advance of what we are aware of) has been used against some of the most moral and humanitarian citizens in the United States. Without the dissent of moral and god-fearing people, this program will arch its claws further into the lives of common Americans - and this is what one of the goals is.

These rogue government factions are not "sweeping up" surface meta data for future reference in the case of an emergency (or court order). American citizens are being subject to a systemic and systematic rape of their most personal information and files (psychological and behavioral systems of records) are being/have been created on anyone who has ever owned a firearm or called the local government to complain about air or water quality, equal employment opportunity or corruption of local, state or federal government officials.

We are living in a McCarthyesque or Kafkaesque system in which we are raped for all of our personal data in a sadistic fashion. The perpetrators have no limits and no oversight. You, I and many others have been tried and adjudicated guilty without probable cause, without due process and without a day in court. In a way the operational procedures parallel what the Chinese Government has done to their "Falun Gong" dissidents, yet in the US - and via its proxies should an American travel abroad - it is done in a much more discreet and vicious fashion which can cost the target his life and/or liberty.

What many TI's have experienced with their computer is the tip of the iceberg. What Snowden did not reference was how all of the illegally accessed information was used against American citizens. There is no due process prior to the information access and the activities/goals of these extra-judicial operations are illegal and would certainly qualify to be prosecuted under RICO statutes were they ever to come to light.

Secondly, your being a "good" citizen, or patriotic, or harboring no ill-intent for others and our country (USA) does not make a bit of difference. Unfortunately the goal is destruction of an individual - not simply "behavior modification." If you travel to a foreign country, these rogue factions in the US will notify foreign governments that you are a "potential threat" and you will be monitored or harassed in the country you are visiting/living in by the internal security apparatus of that foreign country. AND BTW, your constitutional rights will be violated and all of your personal information (and misinformation) will be released to foreign governments in order to motivate them to be extra-vigilant with you and possibly trigger a "proxy detention."

These people play with your life like you are an inconsequential toy, and there is no oversight to their activities, and the individuals involved in this program are unhinged and totally out of control. Once again, this is not simply a behavioral modification program - the end result is to silently destroy the individual on all levels - professionally, financially, socially, mentally, spiritually and physically. One thing T.I.’s can do is wear a small body cam and post footage of the perps on YouTube - along with their Zip Code(s) of operation.


Surveillance occurs 24/7:

Edward Snowden on the most shocking way the NSA spies on people 2014


 




Existing TECHNOLOGY is used to ID and monitor individuals (and their thoughts) remotely:
Detecting EMF Fields in Humans for Surveillance - Apparatus and method for remotely monitoring and altering brain waves (27/12/02) Detecting EMF Fields in Humans for Surveillance. A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance.


In-person harassment (gang-stalking) is a part of targeted people's daily lives:

Gang Stalking ~ From a Christian's perspective




Eleanor White Discusses Organized Stalking and Technological Harassment With Victim Sueann Campbell




No comments:

Post a Comment

Saturday, September 12, 2015

What is this "targeted individual" business, anyhow?


Targeted Individuals, a department of defense term, are people who locals deem unfit for society, in one way or another. Some are whistle-blowers; some are dissidents, like anti-war demonstrators; some have a beef with one corporation or another; some just have different political or religious ideologies then the norm; some are targeted for reasons of lust and greed, and some are targets of convenience. They are targeted by means of gang-stalking, b & e’s, harassment, poisonings (biological and/or chemical), remote electronic harassment (messing with radios and tv’s, etc., remotely), vandalism, character assassinations, staged accidents, etc. Harassment is on-going, in and outside the home (About Gang-Stalking, Cause Stalking, And Targeted Individuals).

This Youtube comment explains what the TI experience on a daily basis. However, it must be noted that the people/groups behind a particular case vary, government, industry, agenda-driven groups, people with resources and power.


One of the most in-depth descriptions I’ve seen: What TI's are experiencing is the cyber-aspect of rogue factions of the federal government's post-2000 COINTELPRO Domestic Intelligence (DOMINT) Operation, which is based on strategic and tactical techniques comprised of the following Counter Intelligence tenets: Destroy, Deny, Degrade, Disrupt, Deceive. Federal, state and local law enforcement - combined with EMS, first responders, neighborhood watch programs and private citizens (often paid with federal tax dollars through private security companies) have organized into groups - with international contacts (through classified branches of federal law enforcement and intel agencies), which target individuals who have been deemed a "domestic threat." This includes but is not limited to activists, minorities, whistle-blowers, alpha-male or -female leader-types, scholars or anyone who speaks out about wrongdoing - or thinks/acts "outside of the box."

The techniques being utilized are a melange of tactical/strategic procedures culled from the playbooks of the Stasi, the KGB, and Mao Tse Tung's Red Squads. A program is in place which frames, isolates and destroys a target financially, socially and professionally via slander, framing for non-existent criminal activities and on-line harassment which extends into the physical realm when the "target" goes to shop, church or any public location. This is what "Gang Stalking" is.

"Gang Stalking" is actually a misnomer. "TI's" or "Targeted Individuals" are whistle-blowers, good Samaritans, minorities, artists, activists and any others from different groups of people who have been labeled as a "domestic threat." They aren't being mobbed and harassed by random groups of citizens or 'gangs' (although it may seem like that to them). They are being followed and harassed by civilian groups who have been hired by Private Security Companies, the owner(s) of which did or still do have classified security clearance and may have been in the employ of Federal Law Enforcement/Intelligence and/or ex-military intel, in addition to shadow federal agencies with fat budgets and unknown agendas.

Local citizens (often with criminal backgrounds, unemployed and/or with little education) are "tasked" to follow people around in public. You aren't alone. Several million US citizens are on the threat list and certain rogue factions of the US government have tasked neighbors and fellow citizens to track and harass individuals on the list. This is coordinated with local and state law enforcement agencies (often through Data Fusion Centers) and in many cases the "target's" vehicles (and/or cellphones) have geo-locational systems attached/activated in order to keep tabs on the location of the "threat." (you).

Mao Tse Tung was an expert at playing groups against each other - little energy expenditure, minimum manpower loss and widespread damage to the targets. That is why many of the street-level perpetrators are individuals with low self-esteem and often little or no education. Their lack of goals and a future makes it easier for those higher up in the command chain to control them as well. Indeed, in some ways the "perps" are also being victimized in this operation - which does unfortunately span continents and nation-states.

The harassment is fine-tuned to each individual by the information which is remotely and illegally harvested from their computers, e-mails, phone conversations, medical records, and purchase histories (supermarkets, Amazon, E-Bay, etc.) - so there is evidence of great complicity at many governmental levels (state, local, federal and international).. The cyber-breaches require a substantial degree of technological know-how (at the minimum local Law Enforcement - but more prevalently state and federal), but be aware that your meta-data, purchases and internet habits (pornography viewing, YouTube views, news articles of interest) are relayed to your "minders" on a local level.

The information is illegally harvested without your consent and without any reason/due process and then distributed to the people (perps) you come into contact with on a daily basis. The offhand/casual remarks you hear are not coincidental. Your recent purchase of a book or estimate of an on-line search for a property to purchase were mentioned in front of you to (1) attempt to destabilize you and (2) to give you a sense (regardless of legality) to how pervasively your privacy has been invaded, and (3) question your own sanity. Don't question your sanity.

The sad fact is that today's technology used by the government (two to three decades in advance of what we are aware of) has been used against some of the most moral and humanitarian citizens in the United States. Without the dissent of moral and god-fearing people, this program will arch its claws further into the lives of common Americans - and this is what one of the goals is.

These rogue government factions are not "sweeping up" surface meta data for future reference in the case of an emergency (or court order). American citizens are being subject to a systemic and systematic rape of their most personal information and files (psychological and behavioral systems of records) are being/have been created on anyone who has ever owned a firearm or called the local government to complain about air or water quality, equal employment opportunity or corruption of local, state or federal government officials.

We are living in a McCarthyesque or Kafkaesque system in which we are raped for all of our personal data in a sadistic fashion. The perpetrators have no limits and no oversight. You, I and many others have been tried and adjudicated guilty without probable cause, without due process and without a day in court. In a way the operational procedures parallel what the Chinese Government has done to their "Falun Gong" dissidents, yet in the US - and via its proxies should an American travel abroad - it is done in a much more discreet and vicious fashion which can cost the target his life and/or liberty.

What many TI's have experienced with their computer is the tip of the iceberg. What Snowden did not reference was how all of the illegally accessed information was used against American citizens. There is no due process prior to the information access and the activities/goals of these extra-judicial operations are illegal and would certainly qualify to be prosecuted under RICO statutes were they ever to come to light.

Secondly, your being a "good" citizen, or patriotic, or harboring no ill-intent for others and our country (USA) does not make a bit of difference. Unfortunately the goal is destruction of an individual - not simply "behavior modification." If you travel to a foreign country, these rogue factions in the US will notify foreign governments that you are a "potential threat" and you will be monitored or harassed in the country you are visiting/living in by the internal security apparatus of that foreign country. AND BTW, your constitutional rights will be violated and all of your personal information (and misinformation) will be released to foreign governments in order to motivate them to be extra-vigilant with you and possibly trigger a "proxy detention."

These people play with your life like you are an inconsequential toy, and there is no oversight to their activities, and the individuals involved in this program are unhinged and totally out of control. Once again, this is not simply a behavioral modification program - the end result is to silently destroy the individual on all levels - professionally, financially, socially, mentally, spiritually and physically. One thing T.I.’s can do is wear a small body cam and post footage of the perps on YouTube - along with their Zip Code(s) of operation.


Surveillance occurs 24/7:

Edward Snowden on the most shocking way the NSA spies on people 2014


 




Existing TECHNOLOGY is used to ID and monitor individuals (and their thoughts) remotely:
Detecting EMF Fields in Humans for Surveillance - Apparatus and method for remotely monitoring and altering brain waves (27/12/02) Detecting EMF Fields in Humans for Surveillance. A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance.


In-person harassment (gang-stalking) is a part of targeted people's daily lives:

Gang Stalking ~ From a Christian's perspective




Eleanor White Discusses Organized Stalking and Technological Harassment With Victim Sueann Campbell




No comments:

Post a Comment