Are You The VICTIM OF or POTENTIAL PARTICIPANT IN: DOMESTIC TERRORISM
*RESOURCE LINKS for TARGETED INDIVIDUAL
1. A Victim of Domestic Terrorism
1. MY THEORY: GANG STALKING / ORGANIZED STALKING / ELECTRONIC HARASSMENT
2. BE ON THE LOOK OUT FOR:
2. TARGETED INDVIDUAL – WHY SO MUCH PROFILING?
3. GANG STALKING/ORGANIZED STALKING THE TACTICS & TECHNIQUES
3. TARGETS: Labeled
3…. FIRST DEGREE PROVOCATION by VIOLENT RADICALIZED EXTREMISTS
3…COMMUNITY BASED VIOLENT RADICALIZED EXTEREMIST HATE
4 . WHO ARE THE PERPS: M.I.C.E.
4.. DANGERS of GROUP THINK; TURNED VIOLENT RADICAL EXTREMISTS
4…CULTS Turned Into VIOLENT RADICAL EXTERMIST’S
4…MURDER, FIRST DEGREE & GENOCIDE:
4…TERRORISM and SUMMARY/ARBITRARY EXECUTION
4…THE DEAD Target’s..
4.MY PERPS – TIME FOR FAIR GAME
5. DOMINATION OF THE ELECTROMAGNETIC SPECTRUM – TERAHERTZ TECH
5. INFORMATION OPERATIONS ROADMAP
5. NON LETHAL /NON KINETIC fka PSYCHOTRONIC WEAPONS
6. NEUROTECHNOLOGIES & NON CONSENTING HUMAN EXPERIMENTATION
6.. HUMAN SUBJECTS AKA TARGETED INDIVIDUAL’S
6.. IMPLANTED RFID and/or EXTERNAL Bio/Neuro Sensors
6…DR. JOSEF MENGELE’S IN THE 21ST CENTURY AMERICA
6…RIGHT TEMPORAL LOBE – THE MOST TARGETED REGION OF MY BRAIN –
7. OBSTRUCTION OF JUSTICE
7. TREASON and SEDITION
7..THE RULE and COLOR OF LAW –
8. The 14 CHARACTERISTICS OF FASCISM
9. FINAL GOAL
9.5. DAILY LOG
LAW ENFORCEMENT THAT DID NOT…
MONTEREY, CA MOVERS OR NOT – Short Term Rentals or NOT
SOME COMIC RELIEF
THE METHPHOR OF THE BURNT CHICKEN
THE SNITCHES WHO BECOME BITCHES FOR THE STATE
WHAT IDENTIFYING SYMBOL DOES THIS DOMESTIC TERRORIST ORGANIZATION USE?
WHAT IS ORGANIZED STALKING and ELECTRONIC HARASSMENT?
10…..FOR LAW ENFORCEMENT TO INVESTIGATE
5…. PATENING FOR PROFIT – HUMAN BEINGS – DNA, CELLS…
7….ORGANIZED CRIME HELPFUL TIPS – PROVING REMOTE ELECTRONIC HARASSMENT
9.5.3. Daily Log Continue
9.5.1. Daily Log Continue
9.5.2 Daily Log continue
9.5.4… Daily Log Continue
9.5.5…DAILY LOG continue
9.5.6 DAILY LOG Continue
AMERICAN BAR ASSOCIATION COMPLAINT FORM
BIOLOGICAL & TECHNOLOGICAL WEAPONS FIELD TESTING and TRAINING
My recent activity
Are You The VICTIM OF or POTENTIAL PARTICIPANT IN: DOMESTIC TERRORISM >
3. GANG STALKING/ORGANIZED STALKING THE TACTICS & TECHNIQUES a.k.a. VIOLENT RADICALIZED EXTREMIST’S, VIGILANTE DOMESTIC TERRORIST’S, Organized HATE GROUPS, who Deploy and Execute Operations upon and against a Targeted Individual via Tactics, Techniques, and Weaponry handed to them by State and Corporate Sponsored Terrorists
What is violent extremism?
Violent extremism describes the beliefs and actions of people who support or use violence to achieve ideological, religious or political goals. This includes terrorism, other forms of politically motivated violence and some forms of communal violence.
All forms of violent extremism, no matter what their motivation, seek change through fear and intimidation rather than constructive democratic processes.
Targeted Individual’s are coercively forced into what is known as a WAR ZONE, whereby the Terrorist Assassin Operation Team/Teams will psychologically manipulate, and radicalize their trainees’, and citizen recruits into violent radicalized extremist acts, by striking out at the Targeted Individual / Victim in either an, “Unconventional or Conventional Warfare” mentality.
The Targeted Individual is set up to the point of being viewed in a dehumanized manner, as an enemy, and/or adversary, as opposed to another CITIZEN of their respective country, or an equal MEMBER of that SOCIETY.
The Targeted Individual will abide by and continue to use that which is governed by the Rule of Law and respective Constitution in order to obtain within that society a REMEDY to the insidious violence being inflicted upon and against their human lives.
On the other hand, the Terrorist Assassin Operation Team/Teams, their Violent Radicalized Extremist Underlings, and Citizen Recruits rely on using covert, criminal, and felonious means by which to terrorize, intimidate, mob, stalk, torture, sabotage and vandalize person and/or property; in order to destroy every aspect of the the targeted individual human life, hence violating the fundamental and basic precepts that dictate the rules by which All citizen’s and non citizens alike live by within said Civilized Societies. jtk
Unconventional and Conventional Warfare defined:
Unconventional warfare is a form of warfare which is based on the idea that it is possible to destabilize an enemy so much that it concedes even if it has the ability to continue making war. Rather than relying on the brute force tactics of conventional warfare, unconventional warfare is based on using creative, innovative, and usually stealthy tactics so that the enemy never knows what to expect. This style of warfare is also called “nonconventional” or “asymmetrical” warfare, although when the enemy is using unconventional tactics, it is often referred to as “terrorism.”
In conventional warfare, soldiers have a clearly stated objective, and a plan for getting there. In unconventional warfare, however, the goals are usually more nebulous, and soldiers often work independently, in small groups, striking blows at the enemy as they see fit. Any target is fair game in unconventional warfare, from uniformed enemy troops to civilians, as the idea is essentially to collapse the enemy from the inside out, forcing them to capitulate and negotiate a surrender.
PSYCHOLOGICAL MANIPULATION, PSYCHOLOGICAL HARASSMENT, AND PSYCHOLOGICAL TERROR:
In addition to Unconventional and Conventional Warfare is full scale PSYCHOLOGICAL MEANS OF MANIPULATION FOR THE PURPOSE OF CONTROL.
85% of what takes place to the Targeted Individuals is in the forms of Psychological Terrorizing, Psychological Harassment, and Psychological Manipulation.
It appears to be used to BREAK the Targeted Individual down, to the point of suicide. To get these highly functional Target’s to become dysfunctional. It is in line with REVERSE ENGINEERING, whereby the purpose is to with premeditated malice, break down every aspect of the Target’s life. In particular, to break down their cognitive abilities in processing, thinking outside the box, and to GIVE UP on questioning THOSE WHO DARED to Target them to begin with.
Thus, the MAJORITY of what is deployed is in line with Survival Evasion Resistance Escape (SERE) Prisoner of WAR training which, generally Elite Active Military are sent to in order to SURVIVE should they become a captured Prisoner of War, but most of all to see how long it TAKES to LITERALLY BREAK their HUMAN PRISONER’S by using a MYRIAD OF PSYCHOLOGICALLY TRAUMATIZING, TERRORIZING, and HARASSING METHODOLOGIES.
As such, the Target, will be BOMBARDED on a 24/7 basis in Psycho-Traumatology (which examines factors that enhance psychological resilience in the face of traumatic experiences.) and see how their Non Consenting Human Guinea Pigs a.k.a. Targeted Individual can rise above, and SURVIVE though the TORTURE and TERRORISM being inflicted upon and against them.
The more RESILIENT and CAPABLE the Target is at SURVIVAL, the MORE AGGRESSIVE, VIOLENT, TERRORIZING, and TRAUMATIC these ORGANIZED TERRORIST’S will INFLICT, in their TERRORIST CRUSADE TO DESTROY.
ORCHESTRATED NOISE CAMPAIGNS:
Noise campaigns in and around your home –
1. OUTSIDE: Using vehicles, car alarms, car horns, slamming vehicle doors, idling vehicles, loud music coming from these vehicles, Street Theater with neighbors, or strangers talking loud, or amplified sounds generally via hypersonic sound direct speakers – these are directional devices that can are inside the units surrounding the target or placed within the unit/home itself, which can be reversed in either direction.
Hence, if you hear any echos in your home, the device is being reversed so that you voice will carry. If it is coming at you, whereby, people speaking sound louder than usual, or coming from some unknown origin, it is being directed at the Target.
2. INSIDE: If you live in an apartment with connecting walls:
a. If you live below someone, this occupants will be recruited to increase the levels of noise they make. Walking heavier than usual on the floors, dropping heavy objected above your head, and shadowing the moves you make in your apartment. These occupants will also give permission to have their units be used in their absence so that other recruit’s can occupy these units, to continue the 24/7 harassment of the Target.
This hypersonic sound device will also be placed upon Electronics like Refrigerators, Water heaters, anything that produces sounds and/or vibrations, which can be amplified to increase the sound levels. This devices will also be used, so that you think the sounds, voices, walking, is coming from specific area.
There will also be an influx of Fire Engines, Ambulance, and Police Vehicle who will turn on their Siren’s when in close range to the Target’s residence.
Also, gardener’s blowers, and large trucks when in reverse will have a loud beeping.
Regardless – most of it is Amplified via the directional use of HYPERSONIC SOUND –
SLEEP DEPRIVATION –
There will timed loud noise responses, in order to wake you up out of this state of rest and/or sleep. These acoustic harassments can be directional to a vehicle, an acoustic frequency, an amplified household appliance – that will WAKE YOU out of rest or sleep. This is done several times, so as to get the Target in a State that they are unable to fall back asleep. If the Target is employed, they are in a Sleep Deprived State, as such makes them less affective at work, which then allows for the process of giving the false impression of incompetence, something wrong with the Target, as such their ability to work becomes compromised due to their Overt Targeting.
Sleep Deprivation is also used to slowly break the Target down, so as to keep them in a continued vulnerable state, which makes it easier for the Terrorist Architect’s to ATTACK the Target psychologically for the purpose of manipulation, set-ups, entrapment, terrorizing and intimidating the Target.
Take place around your neighborhood. These are recruit’s who have been illegally given you home address, and/or is a Recruited person from within the Geographical neighborhood, who are asked to show up around the Target’s private residence at all hours of the day or night, in particular if the Target is home.
The Street Theater can either be in group formation, using a number of people who will show up near your residence, starting making noise, having loud conversations, and generally the conversations they are having will be specific to the Target.
There will also be solo individual’s who walk dogs, or babies, most of the time the PERPS will be on a Cell Phone – directing their conversation using Keywords that are person to the Target.
Another form of Street Theater is the use of Public Service, and/or Utilities – whereby, you will see an influx of Telecommunication, or Utility vans around the neighborhood.
In addition to the use of Streets and Transportation, whereby there always seem to be road work taking place, so that the Targeted Individual is directed into another area.
Generally, if they are trying to set the Target up to appear dangerous to children, like some type of Pedophile, or dangerous to some type of official they will direct all their so called street traffic to pass by an area like schools or where children are.
In addition, to buildings or residences of Official’s or Leaders’ within community Organization’s to give the false impression that the Target is stalking these people or areas.
This is deployed so as to further victimize the Target by way of SET-UPS and ENTRAPMENT. The Targeted Individual innocently follows the directional signs, generally not realizing that there is another Recruit – taking photos or video at the very moment that Target shows up.
This gives the Architect’s video, or photos showing the Target in some designated set up Area, so that it can be used in their FEAR-MONGERING Recruitment Process.
Another type of STREET THEATER will be used, in the forms of young recruits who will come round the Target so that PHOTOS’ and/or VIDEOS can be taken to once again give the false impression that the Target was doing something nefarious. These young recruit’s are on a mission of Destruction, and will be told to deploy these underhanded Tactics, so that another Recruit can capture a Specific Event, to make the Target look bad.
Example: A young female or male recruit will be told to go up to the Older Male or Female Target, and begin a conversation, or place themselves in a compromising position, so that the Male or Female Target can be photographed, or video taped with the Target – giving the false impression that it was the Targeted Individual who initiated the act.
It is a CRUSADE TO DESTROY, and these Recruits’ Old and Young will do whatever it takes to destroy the Targeted Individual – in particular using orchestrated set-ups and entrapment techniques and methodologies –
Another form of Street Theater – is the use of vehicles on the streets by recruit’s to obstruct traffic, flood the streets with vehicles, and/or deliberately attempt to cause delays, and/or accidents for the Targeted Individual.
These are ALL forms of Street Theater.
USE OF CHILDREN TO HELP SPREAD THE FEAR-MONGERING, LIES, AND FURTHER SET UP OF THE TARGETED INDIVIDUAL, WHILE THESE RECRUITED TERRORIST ADULT PERPETRATOR’S ARE SO ZEALOT IN THEIR CRUSADE TO DESTROY THE TARGETED INDIVIDUAL – THEY ARE WILLING TO PSYCHOLOGICALLY MANIPULATE, TERRORIZE, ABUSE, AND BRAINWASH CHILDREN, SO THEY CAN FURTHER THEIR CRUSADE OF DESTRUCTION.
One of the FAVORITE TACTICS used by these State and Corporate Sponsored Terrorist Architect’s, in the COMMUNITY BASED BULLYING, and FEAR-MONGERING of surrounding COMMUNITY MEMBERS is to, in an almost ABUSIVE RITUALISTIC MANNER MANIPULATE and USE UNDERAGE CHILDREN to help SPREAD ADULT LIES about the Targeted Individual in order to FEAR-MONGER the COMMUNITY AT LARGE into active recruitment and participation.
These Recruited Terrorist’s will GO SO FAR as to FABRICATE RENTAL LISTINGS in areas where children go to school in their CRUSADE TO DESTROY and SET THE ADULT TARGET UP, as being some type of threat to these CHILDREN.
This includes having them conduct timed, and orchestrated: YELLING, SCREAMING, SAYING SOMETHING THAT IS TAKING PLACE – when there is nothing, other WHAT THE ADULT TERRORIST PARENT, AND/OR GROWN ADULT PERSON OR PERSON’S ARE GUIDING THESE CHILDREN TO DO, AND WHEN TO DO IT.
It goes beyond ABUSE, it SEEPS INTO THE HEART OF HEINOUS CRIMES AGAINST HUMANITY AND CRIMES AGAINST CHILDREN, into this RITUALISTIC TYPE of PSYCHOLOGICAL MANIPULATION, and BRAINWASHING OF THESE CHILDREN, whose INNOCENCE, INEXPERIENCE, INABILITY TO GRASP ADULT CONSEQUENCES, are being totally MANIPULATED by these RECRUITED GROWN ADULTS WHO KNOW – FULL WELL – these young children do not GRASP the CONSEQUENCES of their ACTS and ACTIONS.
As such, these Adult Parents and/or Adult or Grown Figures these kids TRUST will with PREMEDITATED intent, PREY upon this INNOCENCE, so they can FURTHER FEED THE SEEDS OF FEAR, INTOLERANCE, and HATE INTO the MINDS of these EMPTY SLATES –
What this also PROVES is how these grown ADULTS, WILL FEED THEIR OWN BIGOTRY, INTOLERANCE, FEARS, FEAR-MONGERING, and HATE into these YOUNG MINDS, as opposed to TEACHING them TOLERANCE, PEACE and LOVE.
I BASE THIS ANALYSIS UPON THE FOLLOWING:
It is some of the MOST RITUALISTIC ABUSE OF INNOCENT CHILDREN, that is NOT SATANIC, though they are being scapegoated, and sometimes used to assist in the Destruction of the Target’s human life.
If, one basis A RESIDENTIAL COMMUNITY upon LOGIC, all the COMMUNITIES the Targeted Individual’s reside in, does not have a Predominance of Satanic Churches and/or Satanic Worshipers, that have the SHEER NUMBERS of COMMUNITY RECRUITS – Targeting the Targeted Individual on a Daily Basis, but would in FACT have a PREDOMINANCE of various CHRISTIAN Religious Organization, that dominate said Communities, and who are the easiest to psychologically manipulated, and fear them into a false beliefs that the Target somehow poses a Threat to their Community.
The following from HITLER’ himself – explains how this is done via Religious Faith:
HITLER.’ wrote Hermann Rausching in 1939, ‘HAS A DEEP RESPECT FOR THE CATHOLIC CHURCH and the JESUIT ORDER, NOT BECAUSE OF THEIR CHRISTIAN DOCTRINE, but BECAUSE of the “MACHINERY” they have ELABORATED and CONTROLLED, their HIERARCHICAL SYSTEM, their EXTREMELY CLEVER TACTICS, THEIR KNOWLEDGE OF HUMAN NATURE and their wise use of HUMAN WEAKNESS in RULING OVER BELIEVERS.’
Not that Satanic Members, or any other Organization has not been recruited to participate, but I base my Targeting upon the Communities I have resided within, and the predominance of WHERE these State and Corporate Sponsored Terrorist’s could gain the most foothold, in their CRUSADE to psychologically manipulate a large number of people aka member base that would be willing to deploy terror, intimidation, harassment, and a brainwashed belief in the total destruction to the human life of the Targeted Individual’s – who also happens to reside in these communities.
Therefore, I, as the TARGETED INDIVIDUAL have experienced with sheer DISCONTENT, DISPLEASURE and UTTER DISGUST, how these GROWN RECRUITED ADULT CITIZEN TERRORIST’S – WOULD USE and ABUSE CHILDREN, and UNDERAGE YOUTHS to HELP them DESTROY what these State and Corporate Sponsored Architect’s have placed upon their list for HUMAN EXTERMINATION, in the way of Targeted Individual’s.
MATERIAL PROOF – COURT ORDERS – TRANSPARENCY – DUR PROCESS – AND RIGHTS TO LEGAL COUNCIL – WHEN A TARGET is BEING TARGETED FOR HUMAN DESTRUCTION by ENTIRE COMMUNITIES:
If, these State and Corporate Sponsored Terrorist – LITERALLY HAD EVIDENCE of a TRUE WRONGDOING that they have USED TO AGGRESSIVELY RECRUIT their TERRORIST CITIZEN’S –
1. Why haven’t the POLICE come knocking at the Target’s door, to question, bring in, and/or arrest them based on this so called PROOF that the State and Corporate Sponsored Terrorist Claim to have?
2. Why hasn’t the FBI, CIA, Department of Homeland Security PRESENTED themselves, along with their evidence of any criminal wrongdoing to the Target and legal council they hire of their own volition to said – criminal wrongdoing?
3. Where is the Warrant to conduct these type of operations?
4. Where are any and all documents that claim these Terrorist have the right to do what they are doing to the Targeted Individual, in direct violation of the Targeted Individual’s Right and Liberties?
5. Why doesn’t the Targeted Individual have these Documents in their possession to take them to proper legal council in order to go over these allege documents the State and Corporate Sponsored Terrorist’s Claim to have – and as such – have the Target’s legal council have their attorney’s challenge any and all claims made against them?
6. if, the TARGET is SO GUILTY of CRIMINAL WRONGDOING, NEFARIOUS ACTS, ACCUSED OF BEING SOME TYPE OF MENACE TO SOCIETY – WHY IS THE TARGET STILL WALKING FREE UPON THE STREETS?
7. If, the Target has broken the law in any way shape or from, it stands to reason, like all CRIMINAL’S they would be arrested for the crimes they are accused of having committed?
8. Why is it that the majority of Targeted Individual’s have been OVERTLY TARGETED by the COMMUNITIES they RESIDE within, yet continue to use the legal system and law enforcement to put a stop to their Terrorist Targeting – hence, stay within the laws of the land, in order to ensure their safety – after all if they are being accused of some criminal activities, and/or criminal acts – WHY WOULD THEY USE THE LEGAL SYSTEM and LAW for HELP?
9. If, the Target is supposed to be an ENEMY OF THE STATE, AN ENEMY COMBATANT – WHY is the COMMUNITY TOLD TO KEEP SILENT? TO CONDUCT THEIR ACTIVITIES IN HIDING? TO USE PSYCHOLOGICAL TACTICS TO TERRORIZE?
10. What is the POINT COVERT TARGETING FOR YEARS of A TARGETED INDIVIDUAL? If the Target has not done anything criminal in the YEARS of their OVERT – IN-YOUR-FACE Targeting – CHANCES are THE ONLY REASON FOR THE COMMUNITY TO CONTINUE – IS TO ENTRAP AND SET UP THE TARGET – but NOT BECAUSE THE TARGET DURING ALL OF THEIR OVERT TARGETING by these TERRORIST RECRUIT’S – HAS BROKEN THE LAWS of the LAND –
11. Why all the SECRECY? If it were a LEGAL and LEGITIMATE Sting operation, why has does it TAKE, YEAR, AFTER YEAR, AFTER YEAR. AFTER YEAR., AFTER YEAR – in my case – OVERTLY CLOSE TO SIX YEARS – for other Targeted Individual – TEN or MORE. If this is the case – WHY SO MANY YEARS OF OVER TARGETING ? if these State and Corporate Sponsored Terrorist’s have NOT SUCCEEDED in getting a true CRIMINAL CONVICTION against the Targeted Individual – chances are – IT IS BECAUSE THE TARGET has DONE NOTHING CRIMINALLY WRONG?
12. If, there is continued Community Targeting for years on end, it PROVES that those within this State and Corporate Sponsored Terrorist organization NEVER HAD ANYTHING of LEGAL VALIDITY to BEGIN WITH – OTHER THAN WORDS AND FABRICATED DOCUMENTS. – OTHERWISE – would not ONE THINK – the TARGET would have been ARRESTED or LOCKED UP – YEAR – UPON YEARS – AGO –
If, the Target has stayed afloat, and within the laws over the years of their Overt, In-Your-Face Community Based Targeting, Terrorizing, Harassment, and Bullying – what is the point of continuing? Unless, those conducting these Covert Operations have FAILED to PROVE over the YEARS of OVERT TARGETING – anything OTHER THAN the TARGET STAYS WITHIN THE LAWS and SEEKS OUT the JUSTICE SYSTEM, LEGAL COUNCIL and LAW ENFORCEMENT to GET THE CRIMINAL ACTIVITIES TO STOP.
12. Is it possible the Reason to Target the Individual is not because they have done anything wrong, have committed some heinous crime, had committed some nefarious act – otherwise – would they NOT ALREADY been PRESENTED all the INFORMATION, not behind their backs, not to other people, not to the group of recruits, not to the community, but to the PERSON who is being TARGETED – so the TARGET could take this information to LEGAL COUNCIL to find out how to proceed, what to do, how to contest?
13. Why has it taken for me up to ten years of CONTINUED SURVEILLANCE and/or Targeting, in both a Covert and Overt Surveillance, Stalking and Targeting manner, FOR IT TO BE NECESSARY TO CONTINUE?
After all, if these State and Corporate Sponsored Terrorist were not able to come up with MATERIAL EVIDENCE to have me, or any other TARGET ARRESTED, after years, upon years of COVERT and WARRANTLESS spying upon every aspect of their private, professional, and personal lives – and the only thing they could come up with – WAS A PSYCHOLOGICAL PROTOCOL ON HOW TO FURTHER VICTIMIZE AND TERRORIZE THE TARGET, and has TO DATE not been able to get the TARGETED INDIVIDUAL’S CRIMINALLY CONVICTED OF ANYTHING – other than within the OVERT STAGES of IN-YOUR-FACE TARGETING – which are USED BY THEIR TERRORIST CITIZEN RECRUITS in order to further demonize, victimize, set up and in a premeditated manner entrap the Solo Targeted Individual.
To break this down for anyone who has half a brain, and the ability to think for themselves – if the TARGET were that HORRIBLE of a PERSON, or HAD COMMITTED such CRIMES – the ARCHITECT’S behind the COVERT STAGES OF PROFILING and WARRANTLESS STALKING and SURVEILLANCE – would HAVE IN THEIR COVERT STAGES – actually HAD MATERIAL EVIDENCE –
14. What is the POINT if the COMMUNITY believes the TARGET is GUILTY based on the EVIDENCE the these State and Corporate Sponsored Terrorist’s have presented to the COMMUNITY – but NEVER PRESENTED to the TARGETED INDIVIDUAL who is being VICTIMIZED by the SLANDER and LIBEL being SPREAD THROUGHOUT the community.
15. Why has it taken so long to GET THE TARGET? If they are truly GUILTY of some HEINOUS CRIME –
14. Has it NOT OCCURRED to anyone, most of all the Recruit’s that if the Target in their Covert Surveillance and now some up to ten years of Targeting continue to walk freely upon the streets – that MAYBE – just MAYBE – it is because the TARGET IS INNOCENT – of what these State and Corporate Sponsored Terrorist want their Recruited Target audience to see and believe.
as having TRULY COMMITTED – WHERE ARE THE POLICE, WHERE ARE THE FEDERAL AGENCIES COMING AND KNOCKING ON THE DOORS OF THE TARGETED INDIVIDUALS – WHERE ARE THE WARRANTS – WHERE ARE THE CRIMINAL CHARGES – WHERE ARE ALL THE SO CALLED LEGAL DOCUMENTS – THAT THIS TERRORIST ORGANIZATION – HAS PRESENTED TO THESE COMMUNITIES – THAT STATE THEY HAVE THE LEGAL RIGHTS AND/OR ENTITLEMENT OVER THE PRIVACY OF THE TARGET’S HUMAN LIFE – WHY DOESN’T THE TARGETED INDIVIDUAL’ HAVE THESE DOCUMENTS IN THEIR POSSESSION, SO THEY CAN TAKE THESE DOCUMENTS TO LEGAL COUNCIL TO BE CONTESTED IN A LEGAL COURT OF LAW –
WHY IS THERE COMPLETE NECESSITY FOR SILENCE AND/OR DOING WHAT THEY ARE DOING something the Targeted Individual has been ACCUSED of HAVING COMMITTED – they would BE ARRESTED, LEGALLY QUESTIONED, THERE WOULD BE A WARRANT FOR THEIR BEING BROUGHT IN FOR QUESTIONING, THEY WOULD HAVE A COURT HEARING – THEY WOULD HAVE LEGAL COUNCIL FOR FULL TRANSPARENT DISCLOSURE OF WHAT THEY ARE BEING ACCUSED OF – SINCE THESE TERRORIST’S – AND THEIR TERRORIST RECRUIT’S HAVE NOTHING – other THAN THEIR FABRICATED AND SET UP TACTICS to ENTRAP – WHAT THEY HAVE IS NOTHING –
As such – THE TACTICS USED BY THESE TERRORIST’S AND THEIR TERRORIST RECRUITS – IS BASED ON THINGS THAT CANNOT BE USED IN A COURT OF LAW – THAT CANNOT BE USED TO
FLASH MOBBING, CROWDING, FLOATING BOX, and USE of COLOR
When in a public setting, the Target will be crowded by an influx of Recruits’. Generally this is done by a Civilian Snitch, via Text, Twitter, and other Social Networking capabilities to let their Recruit’s know WHERE THE TARGET IT.
Once the, CALL TO ACTION goes out, other Citizen Snitch Recruit’s will then begin showing up in these public settings. The best way to test out this theory – when you walk into the Retail Outlet, check out the flow of public traffic, to include the flow of traffic at the cash register.
As you shop, you will begin to notice this Retail Store begins to have an influx of people showing up, who appear to recognize who you are, but who are TOTAL STRANGER to you.
Be on the look out for some of the Terrorist Psychological Tactics these Citizen Snitches will deploy in public settings:
Stare at you, point, whisper and/or giggle as you walk past them.
Have directed conversations either with the person they are with (group), or on a cell phone and use keywords as they pass, to let you know they are Citizen Snitches for the State
This will also be done in the next isle, where the Snitches, due to their anonymity of being hidden will be in the next isle, and begin directing their conversations to something that is personal to you, generally it is ridicule – the Citizen Snitches like to use Ridicule and Slander.
Make some comment about the Target’s state of mind, or what just transpired.
Crowd you while you shop, suddenly an influx of people in the same isles – and no matter where you shop the Citizen Snitches will seek you out, almost like HUNTING the Target –
At Check Out, you will find FLASH/Mobbing-Crowding taking places as well. What this means, when you walked in, all registers had one or no customers’ – by the time you are ready to check out – every register is crowded with Citizen Snitches. This is done to let the Target know they will cause premeditated delays, that they are the Citizen Snitches, and most of all it is used as a Psychological Intimidation Techniques –
Take note: If a Citizen Snitch is behind you, or near you as you are checking out, these Citizen Snitches will take note of EVERYTHING you purchase, to include how much you just spent. From this point this private information becomes PUBLICLY KNOWN, and is immediately spread via Text, Twitter, and/or Social Network to their Terrorist Coalition of the Willing. This psychological intimidation tactic is used further TERRORIZE the Target, so that the when the Target shows up in another retail store, takes a walk, goes outside to pick up their mail – the next Set of Citizen Snitches will use those items purchased, and/or amount spent as directed KEYWORDS within their conversation, when they pass the Target in the next Retail store, on a walk, or when the Target simply goes outside to get their mail. The Snitches will show up in a Synchronized manner, and then begin the process of Community Based Bullying and Intimidation.
THIS TYPE OF FLASH Mobbing-Crowding, and Neighborhood STALKING is done whenever the Target goes out in public settings. It is done with Malicious Intent, and used as a Terror and Intimidation Tactic.
If, the Target is under, Warrantless and Due Process Free Cyber, Internet, and Telecommunication Surveillance – to include video and audio surveillance in the privacy of your home. The Target will find if they put together a shopping or grocery list, or go online to see if a Retail Store has something in stock – the items on that list, or search will be Conveniently off the shelf, not in stock, or awaiting arrival.
This will include online searches, if the Target purchases items online. For example – you go online to see if there is an Olympus 710 Voice Recorder on Amazon. You see that they sell it, and you log the price down for future reference. The next day you decide you want to purchase that item – suddenly the price of that Olympus 710 Voice recorder goes up $30 from the day before. It Stops you from purchasing it, after time, you spot check this item, and you notice the price dropped $20 – but will never be the price the Target first witnessed.
Think of these Terrorist Psychological Intimidation Tactics in terms of purchasing – IF IT IS SOMETHING THAT TARGET WANTS – NEEDS – the CITIZEN SNITCHES to INCLUDE EMPLOYEE’S WHO WORK IN THESE RETAIL STORES who are also recruited to Target the Target. Thus, it is like a Crap Shoot for the Target, because the Terrorist Tactics deployed and executed against the Target can be any number of protocol’s.
Is the FBI term for VEHICLE SURVEILLANCE of a Target. This is deployed every single time a Target gets into their vehicle and drives to their designated local. The Target will be Vehicle Mobbed – whereby, a series of Citizen Snitches, upon recognition of the Target’s vehicle on the Road, will begin Crowding the Target on the road, box them in so that the Target is surrounded on the Road. The following Tactics will then be deployed.
Speed up in order to get on the tail of the Target, and begin tailgating you
Pull up next to the Target’s vehicle and begin snapping photos of the Target
While boxed in, the Citizen Snitches will slow down suddenly, or slow the entire flow of traffic
While on a narrow road, a Citizen Snitch who is far enough ahead, will pull over, wait for the Target to approach and then suddenly open their car door
While the Target is at speed, and a Citizen Snitch is at a cross Stop, the Citizen Snitch will wait for the Target to approach, and then suddenly pull out
Some of the Citizen Snitches will remove back brake lights, pull out in front of the Target, and then if the Target is too close, will not know that the Citizen Snitch is braking. Pay close attention to this Tactic it is new for these Terrorist.
The difference between legal forms of vehicle surveillance, and what the Citizen Snitch Recruits do – is that these Citizen Snitches are doing it for malicious, harmful purposes, and in order to Premeditatedly cause the Target to get into an accident. There are more than enough stories from Targeted Individual’s who have been in vehicle accidents, that were generally caused by these type of Terrorist Road Tactics.
Every human being has a Breaking Point, the Terrorist Architect’s are fully aware of this.
The Above Tactics are aggressively deployed and executed on a 24/7 basis by their arsenal of Citizen Snitch Recruits, at the behest of their Terrorist Leader’s.
What these psychological tactics do is break down the Target to the point of their NEGATIVE RESPONSES at the ORGANIZED TERRORISM and TERRORIST ACTIVITIES being DEPLOYED AGAINST THEIR HUMAN LIVES.
Whenever the Target reacts the Terrorist Architect’s EXPLOIT these NEGATIVE REACTIONS to FUTHER VICTIMIZE, SLANDER, SMEAR, and DEMONIZE the Target who has been PSYCHOLOGICALLY TORTURED, TERRORIZED, AND INTIMIDATED by the ABOVE TACTICS being used BY COMMUNITY SNITCH RECRUITS who believe they are NOW ABOVE THE LAW, and HAVE THE RIGHT TO VIOLATE EVERY ASPECT OF THE TARGET’S HUMAN LIFE.
The use of COLOR:
You will also find the use of COLOR in order to LET THE TARGETED VICTIM know that these INDIVIDUAL’S are FULLY INDOCTRINATED into the FOLD of this STATE and CORPORATE SPONSORED DOMESTIC TERRORIST ORGANIZATION. It is also being used as a PSYCHOLOGICAL MEANS to give the TARGET the FALSE IMPRESSION that EVERYONE is RECRUITED into the INDOCTRINATION PROCESS, and that as a TARGET you STAND ALONE, which is UNTRUE.
The use of COLOR is to:
1. Terrorize the Target into letting them KNOW of the CIVILIAN COLLABORATIVE EFFORTS taking place UPON and AGAINST their HUMAN LIVES.
2. As a CALL SIGN to let other INDOCTRINATED, and BRAINWASHED CULT MEMBERS’ for this STATE and CORPORATE SPONSORED DOMESTIC TERRORIST ORGANIZATION KNOW – they are WORKING AS A TEAM to DESTROY THE HUMAN LIFE of the SOLO TARGETED INDIVIDUAL.
3. As a way to psychologically CONDITION the Targeted Victim of this Domestic Terrorist Organization –
HERE ARE SOME ARTICLES ABOUT HOW A TARGET’S PRIVATE INFORMATION IS SENT OUT WIDE TO LIKE MINDED PEOPLE – AND HOW SUCH ACTS CAN HAVE A DETRIMENTAL AFFECT ON THOSE BEING TARGETED:
Utah concludes state resources were used in immigrant list
The 30-page document — which included addresses, phone numbers and birth dates for about 1,300 people it said were in the country illegally, in addition to Social Security data and medical information for a small number, such as “baby due 4/4/10” — was distributed to a wide range of news organizations and state law enforcement agencies Monday. None of the recipients has released the actual list of names, almost all of which are of Latino origin.
Anti-abortion protesters target clinic’s landlord outside child’s Md.
Some held a large banner that showed his photo, his full name, his phone number and the words “Please STOP the Child Killing.” Others held posters showing aborted fetuses.
IF THE TARGET LIFTS THEIR VEIL OF FEAR AT THESE TERRORIST TACTICS BEING DEPLOYED AND EXECUTED BY THESE COMMUNITY BASED BULLIES AND SNITCHES – IF A CITIZEN SNITCH OR COMMUNITY BASED BULLY IS CONFRONTED FACE ON – IN EVERY SINGLE INSTANCE – THEY ARE GIVEN A SET OF DOUBLE-SPEAK TALKING POINTS – TO ONCE AGAIN – ATTEMPT TO PLACE THE BURDEN AND BLAME UPON THE TARGET – DON’T FALL FOR IT – STAND YOUR GROUND – AND LET THEM KNOW – THEY ARE VIOLATING YOUR RIGHTS –
Links Doublespeak’s Definition
We hear and read doublespeak every day, but what, exactly, is doublespeak? Webster’s dictionary defines doublespeak with these words: evasive, ambiguous, high-flown language intended to deceive or confuse.
In his bestselling book Doublespeak, William Lutz notes that doublespeak is not an accident or a “slip of the tongue.” Instead, it is a deliberate, calculated misuse of language.
Specific Attributes of Doublespeak
Lutz provides several defining attributes of doublespeak:
pretends to communicate
makes the bad seem good
avoids or shifts responsibility
makes the negative appear positive
creates a false verbal map of the world
limits, conceals, corrupts, and prevents thought
makes the unpleasant appear attractive or tolerable
creates incongruity between reality and what is said or not said
History of the Word “Doublespeak”
As these attributes indicate, doublespeak can be seen as analogous to doublethink and Newspeak, concepts created by George Orwell in 1984. Using doublethink, a person could hold two opposing ideas in his or her mind at the same time, fully believing in both ideas. “Newspeak” was the official language used to express the ideas of doublethink.
In most all cases of Targeting, the Perpetrator’s of the Crimes will use DOUBLE-SPEAK, to portray themselves as the Victims of the Target, but who are FULLY AWARE they were the one’s committing the crimes against the Targeted Individual to begin with, this is used so as to shift burden, blame, and responsibility of the criminal acts and actions they were willing to commit against another human being, in deprivation of that Target’s fundamental and Basic Rights and Liberties.
LOCAL FIRE AND POLICE – you will find RECRUITS from both CITY AGENCIES – who will actively participate in the Harassment Campaign. They will use their sirens as they pass your residence, show up at all hours of the morning, idling their Fire Engines, only to find it was some bogus call, no ambulance or fire –
THEY ARE NOT THE VICTIM’S – THEY ARE THE PERPETRATOR’S OF THE CRIMES –
There is much discussion within the Targeted Individual Group/Communities about Neighbors being involved in the Harassment Process.
Through my own experience, I have found in particular, living below a resident, they are in fact recruited, to harass the Target.
Generally, this is done by shadowing the moves a target makes in their residence I.E. flushing when you flush, hear footsteps following around your residence, whatever moves you make within the privacy of your home, will be shadowed by the upstairs unit, or a device that is set up within that upstairs unit, which will echo the sounds you make.
Loud and amplified noises, and other timed acoustic events, generally when target is sleeping, so as to wake them from sleep, and also placing equipment and devices in their homes in order to illegally survey, monitor, track, and/or amplify any sounds from your residence unit, which can be remotely accessed, and used by outside sources.
They will also allow stranger within said Terrorist Organization, to occupy and use their residence, while they are at work, or away, in order to train, experiment with, and/or use the weapons system for the purpose of intimidating, terrorizing, and harassing the Targeted Individual.
The same goes for other units within, who will also be recruited, and given access to cyber capabilities, in order to without warrant, and illegally monitor what the Target may be doing within the privacy of their home via cable, internet, and telecommunications. They will also be queued with keywords to use when the Target is within hearing distance, so that they can repeat what the target may have been doing in the privacy of their home, to include what they were watching on television, websites they were viewing, to what they are reading, and then mimicking that very show, website, chapter of the book, etc. back to the Target to let them know or give the impression that they are MONITORING every move the Target makes.
Once again, these Tactics are used for the purpose of Psychologically Terrorizing, Intimidating, and Harassing the Targeted Individual.
Most all of this is done, for the purpose of furthering the Architectural Operations, in the human intelligence terror, intimidation, and harassment tactic protocols.
SET UPS – you will find being the victim of Organized Terrorist Stalking –
The Perpetrator’s of all crimes being committed against you as a Targeted Individual – are in many cases the same people who will then turn around in a Double-Speak and pretend to be the victims of the insidious violence a Targeted Individual is being forced to endure.
The truth, these are well organized double-speak tactic that are used to further victimize the Targeted Individual, these so called – PERP VICTIMS are simply ACTORS who are used to further set up and destroy the target in order to meet their FINAL OBJECTIVES.
· Public, workplace, and vehicle crowding or mobbing?
Slander, Disrespect, Deceive, Laugh At, Mock, Provoke, a Target?
* Invade the Privacy and Space of a Target by Stalking, Crowding, Mobbing, Following, or Giving the Targets Local Away if seen in a public setting?
The following is an article about what most all Targeted Individual’s have literally and formally complained to all proper authorities about – MOBBING in Public places and it being for MALICIOUS PURPOSES – and instead of being heard, were ridiculed and labled – WELL these PROPER AUTHORITIES can NOW TAKE THAT LABEL DOWN – it has been CONFIRMED – that OUR REQUEST FOR PROTECTION – was for VALID REASONS –
For flash mobsters, crowd size a tempting cover
“They’re gathering with an intent behind it — not just to enjoy the event,” Shaker Heights Police Chief D. Scott Lee said. “All too often, some of the intent is malicious.”
· Participate in Whisper, Noise, Harassment, or Set Up Campaigns?
· Use Keywords without knowing what they mean or what it represents while you pass the Target?
· Provide Unpleasant, Unfriendly, Misleading, Evasive, and Fraudulent Information or Service?
* Lie about the Target to others, or make up stories in order to further the negative false impression about a Target?
· Were you given the Address, Vehicle ID, Phone Number, Email, or Photo of the Target, in order to Complete Tasks?
· Were you asked to show up near the Target’s home in your vehicle, or by foot, or to join a flash mob in a public place where the Target is?
* Were you given access to a Social Network or Website that depicted the Target in such a negative light, it compelled you to join forces?
*Were you asked to sign a Non Disclosure Confidentiality Statement?
*Do you TRULY KNOW all the LEGAL REASON WHY you were asked to participate?
* Do you have copies of any and all documents presented to you, and did you take them to an unbiased outside source to VALIDATE, VERIFY and VET the LEGITIMACY of said DOCUMENTS?
Sudden Increase and Influx of noise, traffic, and people near your home, where it did not happen before?
These Tactics are considered ACOUSTIC HARASSMENT, STREET THEATER, AND THE USE OF THE COMMUNITY TO ASSIST IN THE HARASSMENT PHASES.
Harassment can be done in a couple of ways:
1. Increased Noise timed noise in your surroundings, in particular at your private residence.
Neighbors playing loud Bass driven music, generally the speakers will be in line with Hypersonic Sound Devices – which when focused targeted sound. This means the sound can be directed at a specific target, and as such can be increased when target at you, but anyone not within its range will not hear the sound.
Neighbors will also increase the sounds they make in their apartment. In particular if you live below them. They will time their n noise response, by walking heavily on the floor, to increase the harassment campaign. They will also do something called shadowing – whereby, every move you make within the privacy of you home will be SHADOWED LOUDLY. If you get up to use the restroom, you will hear footsteps following you to the restroom. If you flush the toilet, the neighborhood recruit will do the same. If you get up to go to the kitchen you will hear the upstairs neighbor do the same. If you turn on the faucet, you will hear the faucet being turned on.
These are PSYCHOLOGICAL TERROR TACTICS used by these NEIGHBORHOOD RECRUITS – in order to facilitate and harbor the Architect’s whose job it is to TERRORIZE, TORTURE AND MURDER THE TARGETED INDIVIDUAL.
On the streets you will have TIMED LOUD RESPONSES – where the Privacy of You HOME ADDRESS will be given to these Citizen Recruits. These recruits will be asked what type of vehicle they drive, in particular, vehicles that make the loudest noise, they will be assigned the task of driving near the Target’s home, idling their vehicle, and making sure the Targets are aware of their presence. Recruits will also be told whenever they are in the neighborhood of the Target/s address, they will be told to simply drive by.
Much of this is done in the very early mornings when you are asleep, or in the middle of the night, generally after you have turned out the light, and are ready for sleep. During this time, you will hear much traffic, car doors slamming, alarms going on and off, honking of horns, people talking, and laughing. Banging on the walls, or loud sounds around your room that will literally wake you out of a sleep –
2. ACOUSTIC HARASSMENT using DIRECT ENERGY WEAPONIZED TECHNOLOGIES –
This type of Acoustic harassment is generally in the forms of extreme High and Low Frequencies, Piezoelectric Vibro-Acoustics, Radio Frequencies – The FOLLOWING is a list of Frequencies that can effect the Biological and Neurological make up of the Targeted Individual.
The recruits will also be asked to show up on foot. They generally work in groups, or solos with children or dogs these recruits will be asked to use KEYWORDS or KEY PHRASES only known to the Target. This could be a private phone conversation with another person about an issue, an event, a meeting etc – it could be while online and checking financial statements, it could be a credit card bill you received in the mail that has your balance, and balance due, it can be a private place where you hide, valuables in a particular box, hidden within other boxes – All of this knowledge will then be used by the Team/Teams, and they will then ask the Civilian Recruits to use any number of KEYWORDS or PHRASES – that apply to that private, personal, or hidden information.
The Recruits may not know the entire context of why they are being asked to use KEYWORDS or PHRASE – they are only told what they need to know, and because they are broken by these Teams, – they tend to do what they are told without questions.
Needless to say, if you are not aware of such insidiously violent tactics it will cause you much stress, anxiety, fear and terror. It is the POINT of these TEAM/TEAMS to DO EXACTLY THAT – while USING their Recruited Civilian Underlings.
LIVING SITUATION – HOME/APARTMENT
You will find that NEIGHBORS are in fact RECRUITED to assist in the process of Organized Stalking. At this time it is my belief that these Biometric surveillance equipment still need to have devices set up in close enough range to be able to work. which means someone with a connecting wall will be asked if they can place a pieces of equipment in their residence. This could be as small as a 12 x 12 flat object that looks like a speaker – which can be place against the wall of a unit to project sounds, acoustic frequencies, etc –
They will be told one of the various scenarios about the Targeted Individual – and as such – will then do their part when told to do so.
IF YOU HAVE A ROOMMATE BEWARE –
After 25 plus years of friendship, of a person I had trusted when My GO LIVE, Overt phases started, and who was fully aware of my situation – said he did not have an issue.
What has happened is not only has he used the privacy of my concerns about my targeting against me,. he made sure he shared that information with the landlord on several occasions.
He walked out of the signed lease agreement and chose not to pay. He has never paid on time his share of the rent, and returned only to remove items from this unit, without saying a word, although he had kept the landlord abreast of all his moves.
After over $1400 in non payment of his share of the rent, and due to his absence/ I chose for my own protection of not knowing what was going on, and the FACT that I had assets in the common living area chose to change one of the locks on the outside doors, by first asking the Landlord if I could do this. He said no at first and then told me I could do whatever I wanted. At that point because
In this time frame the Ex-Friend who tries to blame me for the real reasons of bouncing checks, not paying his full amount ever, tried to reverse the blame game by stating it was all my fault, that he had moved, and would be coming to move the rest of his things out. At that time I told him he was responsible for his share of the rent, from which he agreed and then came ten days later to drop of more money.
During this time., the Ex-Roommate, was in contact with the Landlord once again, and during the course of this conversation the Landlord told this person that the moment I changed the locks, the ex-roommate no longer had to pay me a dime.
I contacted a lawyer and was told that I could play hardball and demand a court order in order for this person to enter the privacy of this unit.
It would appear that the landlord has been playing both of us during this entire process. and that he has in fact been siding with the ex-roommate if not altogether guiding him on how he could best financially screw me over.
The latest is that if I move and the ex-roommate does not remove his items, the landlord will CHARGE ME for the removal of said items – in addition, the landlord took the ex-roommates share of the deposit to pay for a back rent that ex-roommate never paid – and as such has once again left the financial burden on me.
THIS IS A WAY IN WHICH THE ARCHITECT’S WILL HAVE PEOPLE YOU KNOW SCREW YOU OVER, USE REVERSE PSYCHOLOGY TO PLACE THE BURDEN AND BLAME ON YOU – WHEN WHAT TOOK PLACE WAS A CLEAR INDICATION OF HOW THIS PERSON DID NOT EVERY PAY FOR HIS SHARE OF THE RENT ON TIME, AND HOW THE LANDLORD CHOSE TO SIDE WITH THE EX-ROOMMATE AND THEN GUIDE THAT PERSON ON HOW BEST TO SCREW ME OVER FINANCIALLY – BUT WHAT IT SHOWS IS HOW THESE TERRORIST’S ARE THAT BENT ON DESTRUCTION AND FINANCIAL RUIN OF A SET UP TARGETED INDIVIDUAL’S HUMAN LIFE.
WHY SO MUCH PROFILING
ONE OF THE GOALS OF THE PROFILING I CAME TO REALIZE IS TO TRAIN THEIR OPERATIVES, NOT RECRUITS – ON HOW TO BECOME THE PERSON – THEY ARE TARGETING –
There have been two significant documenting that have in fact shown me – that these TEAM/TEAMS are in fact PROFILING TO THE POINT OF BECOMING THE TARGET THEMSELVES.
THE FOLLOWING ARE TWO INCIDENTS – WHEREBY, THE POSTING OF ANOTHER PERSON – WHO APPEARS TO LOOK VERY MUCH LIKE ME – WAS POSTED ON YOU TUBE – in what appears to be DISCREDITING – This female – IS NOT ME –
The OTHER EVENT – was VOCAL IMITATIONS – that came from the following link, whereby the Female on the phone, not only sounded very much like me, but also the female spearker mannerisms, emphasis on words, and the words used in sentence form – are all words and/or sentence I have used in some context over the years I have been targeted – be it COVERTLY or OVERTLY –
This shows that vocals are being recorded, then studied by the impersonator/operative in order to get the almost exact mannerism of the Targeted Individual. This shows that these Team/Teams that are working are doing so at the highest levels of the United States Government Intelligence and other Private Security firms working on behalf on their behalf.
These IMPERSONATORS – can then be used to SET UP THE TARGET BY COMMITTING CRIMINAL OR NEFARIOUS ACTS, AND ANY NUMBER OF OTHER NEGATIVE FALSE LIGHT ACTIONS in order to FURTHER VICTIMIZE, DISCREDIT, AND CHARACTER ASSASSINATE THE TARGETED INDIVIDUAL
It is now my belief that these TEAM/TEAMS doing such work – are in fact A VERY WELL FUNDED TERRORIST ORGANIZATION –
the voice can be heard at: 2:22.27 two hours, twenty two minutes and twenty seven seconds –
HERE ARE TWO EXAMPLES OF SOMEONE IMPERSONATING ME, and if you did not know me, or even did – YOU MIGHT THINK THESE TWO CRIMINAL IMPERSONATORS – WERE ME – which they ARE NOT.