Compiled By Dr. Eric T. Karlstrom, Emeritus Professor of Geography, CSUS; August 8, 2022, updated Dec. 16, 2023
I. Twenty-three quotes from “targeted individuals” (TIs) and others from posts/articles/videos on this website.
The statements by 23 “experts” below succinctly describe most, but not all, aspects of the highly complex and diabolical no-touch civilian torture-murder program that I now refer to as “Global Government Gangstalking Genocide Gestapo-Gulag,” or G6. Corresponding posts provide extensive supporting information, insight, and documentation.
-
Key terms (in order of mention in 22 statements below) reveal key components and players involved in this clandestine civilian torture-murder program:
cognitive warfare; gangstalking; no-touch torture program; non-lethal (directed energy and neuro) weapons; New World Order; targeted individuals; perpetrators; agents provocateur; NSA (National Security Agency); FBI COINTELPRO (COunter INTELligence PROgram); DHS (Department of Homeland Security); Terrorism Watch List (TWL); National Fusion Center Association (NFCA)’s “kill contracts on civilians” for their enrollment in weapons testing (gases, poisons, directed energy weapons, nano-particles, secretive medical chips, and even networks of chips, etc.); Pentagon torture protocols 1-5; Infragard (former FBI) “private security contractors;” “counter-terrorism;” national security threats to “critical infrastructure” (i.e., banks, corporations, etc.); domestic police intelligence units; privatization of total surveillance; “covert ops;” “the collect (data);” IO (Information Operations); PSYOPs (PSYchological OPerationS); MISO (Military Information Support Operations); MILDEC (MILitary DECeption); OPSEC (OPerational SECurity); CNO (Computer Network Operations; EW (Electronic Warfare); “targeted “enemy,” “targeted individual” (TI); “targeted audience” (TA); black operations; Tetra Systems read and modify brainwaves, subconscious thought processes; 4G and 5G electronic weapons systems; microchips and implants; DoD; drones, planes, or satellite systems connected to air-to-air missile defense systems for air-to-surface, air-to-ground, ground-to-ground vehicles’ surveillance and electromagnetic attacks; US NORTHCOM; NATO; child-human-sex traffic systems catalogues; closed-circuit viewing of rape and torture for elite to get off; funding through crypto-currency; amazon.com collecting DNA samples and DNA data bases; voice-to-skull (V2K)-hive mind frequency weapons; IDF (Israeli Defense Forces); SIS (Security Industry Services); entire homeless population in Seattle as nonconsensual test subjects; HUMINT (Human Intelligence); coup by Central Banking/Warfare System; “Mr. Global’s” Covert Social Credit System and control grid as HUGE business; AI (Artificial Intelligence) and software; biological warfare; nonconsensual biomedical experiments as war crimes, crimes against humanity; CIA’s Operation Paperclip (importation of thousands of Nazi scientists); Dr. Joseph Mengele (“Auschwitz Angel of Death”); DoD/CIA’s mind control Projects BLUEBIRD, ARTICHOKE, MKULTRA; human behavioral control through psychedelic and hallucinogenic drugs (LSD, mescaline, etc.), electroshock, radiation, magnetic fields, sound waves, sleep deprivation, parapsychology, psychological/sociological/anthropological methods, harassment substances, paramilitary devices and materials; MKDELTA (governs use of MKULTRA techniques deployed to harass, discredit, or disable people); Operation OFTEN’s application of occultic forces; CIA torture and neuroscience-based mind control and nonlethal weapons research; 3 principle elements of no-touch torture: ‘sensory-deprivation’ (Dr. Donald O. Hebb), ‘self-inflicted pain’ (Drs. Biderman, Janis, Wolff, and Hinkle), and ‘anyone can torture’ (Dr. Stanley Milgram) and other contributing psychologists/psychiatrists of American Psychiatric Association and American Psychological Association; torture at Abu Ghraib; Chilean torture victims under (U.S. installed puppet) Gen Pinochet; psychological torture as “total theatre;” President Bush’s fourteen-page top-secret directive to CIA, ordering them to hunt, capture, imprison, and interrogate (torture) suspects around the world; CIA Phoenix (torture-murder) Program in Vietnam; CIA black budget-National Director of Intelligence (NDI); billions-of-dollars of sophisticated satellite systems operated by Shriever Air Force Base; CIA-CFR (Council on Foreign Relations)-Federal Reserve-United Nations goal to control population of U.S.; Aspen Institute of Homeland Security Group and House Permanent Select Committee on Intelligence plan to deploy offensive measures against “single adversaries” (2012); RAND Corporation; Neocortical Warfare (NW) targets brain of “enemy” by regular, irregular, civilian, and Special Forces; brain as next “battlespace;” DoD tracking of neurological (brain) signatures of key targeted individuals provides NEUROINT (Neuro Intelligence) to force multiply human intelligence (HUMINT), signals intelligence (SIGINT), and communications intelligence (COMINT); deep surveillance, “whole of nation approach in neurowarfare” “soft” (non-lethal) and “hard” (lethal) neurotechnologies; Havana Syndrome; “Dark Networks” supply chains for “Bad Guy Hunting-Targeting” business by US SOCOM (Special Operations Command); 1994 “Violent Crime Control and Law Enforcement Act” (“VCCLEA”) established the Office of Community Oriented Policing Services (“COPS”) within US Department of Justice (DOJ); Pentagon’s clandestine Signature Reduction” (SIGREDUX) as “largest undercover force the world has ever known,” including some 60,000 soldiers, civilians and contractors operating under false names, on the ground and in cyberspace, with special operations forces (SOFs) and military intelligence specialists comprising majority of personnel, 130 private companies administering it, and annual budget of nearly $1 billion.
1) Ben Norton, From: “Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries” (Behind NATO’s ‘cognitive warfare’: ‘Battle for your brain’ waged by Western militaries (by Ben Norton, October 8, 2021))
“Western governments in the NATO military alliance are developing tactics of “cognitive warfare” (CW) using the supposed threats of China and Russia to justify waging a “battle for your brain” in the “human domain,” to “make everyone a weapon.”
The US-led NATO military cartel has tested novel modes of hybrid warfare against its self-declared adversaries (webmaster: i.e., so-called “targeted individuals”), including economic warfare, cyber warfare, information warfare, and psychological warfare. Now, NATO is spinning out an entirely new kind of combat it has branded cognitive warfare. Described as the “weaponization of brain sciences,” the new method involves “hacking the individual” by exploiting “the vulnerabilities of the human brain” in order to implement more sophisticated “social engineering.”
This document (“Cognitive Warfare”) shows that figures in the NATO military cartel increasingly see their own domestic population as a threat, fearing civilians to be potential Chinese or Russian sleeper cells, dastardly “fifth columns” that challenge the stability of “Western liberal democracies.”
NATO’s development of novel forms of hybrid warfare come at a time when member states’ military campaigns are targeting domestic populations on an unprecedented level.
(Francois) Du Cluzel (former French military officer, co-creator and manager of NATO Innovation Hub (iHub)) defined cognitive warfare as the “art of using technologies to alter the cognition of human targets.” Those technologies incorporate the fields of NBIC – nanotechnology, biotechnology, information technology, and cognitive science. All together, “it makes a kind of very dangerous cocktail that can further manipulate the brain,” he said.
For NATO, research on cognitive warfare is not just defensive; it is very much offensive as well. “Developing capabilities to harm the cognitive abilities of opponents will be a necessity,” du Cluzel’s report stated clearly. “In other words, NATO will need to get the ability to safeguard her decision making process and disrupt the adversary’s one.”
And anyone could be a target of these cognitive warfare operations: “Any user of modern information technologies is a potential target. It targets the whole of a nation’s human capital,” the report ominously added.
“As well as the potential execution of a cognitive war to complement a military conflict, it can also be conducted alone, without any link to an engagement of the armed forces,” the study went on. “Moreover, cognitive warfare is potentially endless since there can be no peace treaty or surrender for this type of conflict.”
This weaponization of neuroS/T (Science/Technology) can and will be fatal. The research can “be utilised to mitigate aggression and foster cognitions and emotions of affiliation or passivity; induce morbidity, disability or suffering; and ‘neutralise’ potential opponents or incur mortality” – in other words, to maim and kill people.”
2) Ted Gunderson (Ex-FBI Agent)
“Gangstalking” is actually a self-harm term for a government no-touch torture program.”
3) Mark M. Rich (author and Targeted Individual, TI): From: Overview/Summary of Gangstalking Institutions and Techniques (From “The Hidden Evil; The financial Elite’s Covert War Against the Civilian Population” by M. M. Rich, 2008):
“(Gangstalking/electronic torture) is a very cleverly disguised program of torture and murder…
In a January 2007 issue of the Washington Post, Dr. (Col. John B.) Alexander said that “nonlethal” weapons should be used to “electronically neuter” people. In his article, “New Weapons For a New World Order” (The Boston Globe, March, 1993), he wrote:
The United States must be able to protect national interests and values, even in ambiguous circumstances.”
According to former intelligence officer, Julianne McKinney’s 1992 report, the pattern of directed-energy attacks and gang stalking is the same all over the world… this program is being used to silently neutralize all people that the New World Order believes will be troublesome to their rule. In particular, this includes intelligent, independent, freethinking, incorruptible, nonconformists.
The control mechanisms in the Soviet Union, which included the targeting of the civilian population, was only made possible by the citizens who stalked and harassed people in public. The KGB’s success, added McKinney, “depended on the extensive use of informant networks and agents provocateurs….” McKinney stated: “I think that once full control is established over a major percentage of the population, and enough of the population is silent and unwilling to stick their necks out, that we inevitably would be heading toward a holocaust.”
4) Karen Melton Stewart (Ex-NSA Whistleblower and TI):
“I used to work for the National Security Agency, the NSA. Post-9/11 laws are being purposefully misinterpreted to say that since we, the USA, reserve the right to kill terrorists anywhere anytime, that if we lower the criteria to less than probable cause in regard to the Terrorist Watch List, which was done in 2013, then thousands of random people can be put on the TWL (Terrorist Watch List), no questions asked. DHS (Department of Homeland Security) has made a separate, for-profit DHS entity (National Fusion Center Association) and is selling “kill contracts” on innocent people to buddies in the military-industrial complex to torture and kill to test on humans weapons like gases, poisons, directed energy weapons, nano-particles, secretive medical chips, and even networks of chips that according to the Pentagon comes in torture protocol 1 through 5, at least.
Another protocol being used is to order law enforcement to write off anybody who complains of stalking harassment and being tortured as crazy and they are forbidden to help the person denied constitutional rights. InfraGard vigilantes under the auspices of the FBI and the Fusion Centers are paid to stalk and harass the victims so that the harassment mimicks what one-dimensional psychologists immediately assume is schizophrenia, delusions, paranoia, when it is not. This constant harassment was perfected by the former East German communist secret police, the Stasi, as psychological warfare to destroy dissidents. Since there are millions of dollars to be made using non-consensual human experimentation even to lethality, this program is viciously covered up with an intricate network of paid conspirators.”
5) Craig Tuck (New Zealand International Human Rights Lawyer, lawyer for Suzie Dawson, politician, activist, journalist, and TI); From: Episode 5: Opening the Five Eyes: “The Control Orders” (Suzie Dawson, 10/20/19):
“Activists all over the world are being targeted by the intelligence services for their activities. For their work in challenging the status quo they are being made to pay a high price. These are ordinary civilians. Our mothers and fathers, brothers and sisters, sons and daughters, and friends. Untrained and non-military they are being targeted by the most advanced military machine this planet has ever seen.
In this video, Suzie Dawson lifts the lid on the human cost of speaking truth to power. Suzie is a journalist and activist from New Zealand. Her work shown a bright light on the abuses of intelligence services. They aggressively targeted her in retribution for it. She has been living in exile for more than three years.”
6) Suzie Dawson (New Zealand politician, journalist, activist, and TI); From: TIs: Meet Your Stalkers; Episode 2- Opening The Five Eyes: Exposing the Spies; Suzie Dawson (9/29/19); Transcription, Graphics, & Stalking Perps’ CVs
“Almost everything we are talking about comes under the umbrella of “counter-terrorism.” But they expand their definition of counter-terrorism to mean any threat to national security. Then they expand what a threat to national security is to include threats to “critical infrastructure,” which includes private corporations, banks, credit card companies, etc. So if you are a threat to critical infrastructure, like a bank, you become a threat to national security. Then all the apparatus of the state is used to target you.
Government departments justify spying on their own citizens as being part of “risk management.” We’ve seen the invoices of governments hiring private intelligence agencies to spy on “threats” (targets) on the ground. This is put on the general ledger as a security expense. Hence, the targeting of citizens around the world who oppose some government policy or activity; we are being deemed a risk either to the government or to the police and security state, or to corporate entities. And then these military Fusion Centers, are trading in our data and pushing them up through the military networks.
… The domestic police intelligence units and the government departments and corporate entities don’t like to do dirty work themselves, so they hire private intelligence and private security contractors. And those contractors are the ones that hire teams of people that go and stalk, target, interfere with, sabotage, and destroy the lives of whoever is deemed to be a risk to the state. They are literally billing the government. So the government is identifying who should be targeted and then these are the goons that are actually doing it.
The privatization of surveillance means they must have perpetual growth and expand the number of targeted individuals. As more and more people are being targeted, there will be greater and greater awareness that this is happening. If we don’t stop this, eventually it will be standard operating procedure that everybody is targeted. The expanding watch lists are a kind of ponzi scheme.”
7) Elizabeth Mueller (Activist, massage therapist, and TI from Virginia); From TIs: Meet Your Stalkers; Episode 2- Opening The Five Eyes: Exposing the Spies; Suzie Dawson (9/29/19); Transcription, Graphics, & Stalking Perps’ CVs
“It’s mind boggling how many people are involved in targeting one person. It’s quite terrifying actually. It’s like a full-scale military operation. There is somebody directing these operations. They can be psychological operations. It can be smearing people, stalking their mail, and physically breaking in. They want to be always learning more and more about you. It’s called “The Collect:” they want to collect information about how to control you. They disseminate the information back to the team. And they keep running missions. It can be constant. Targets will have people doing these ops against them all day long. If they break into your house, they report back…. How many people have they employed to do this useless work? Is half the country paid to spy on the other half?”
8) Camille Piona (TI); From Today’s COINTELPRO: The Deployment of Civilian-Military Information Operations Against Civilians (pdf by Camille Piona) W/ Relevant Laws Violated:
“Five components of CIA/military “information operations” comprise the protocol of the present gangstalking of millions of American whistleblowers, dissidents and other civilians. (These are) 1) PSYOPS (psychological operations), 2) MILDEC (military deception), 3) OPSEC (Operations Security), 4) CNO (Computer Network Operations), and 5 EW (electronic warfare).
(Regarding PSYOPS): Note the U.S. Army PSYOPS insignia above. PSYchological OPerationS accomplishes this by strategically conveying selected information about the targeted “enemy” to a target audience, to motivate the target audience to behave in a certain way toward the “enemy.” Of the three different types of PSYOPS—white, gray, and black—black operations are the ones being perpetrated on the targeted civilians deemed “enemies of the state,” the aim of which is to break up every relationship by getting everyone to fear and despise the “enemy,” thus systematically isolating the victim and removing all support.
The “M.O.” used to accomplish this is the disclosure of “sensitive material” about the “enemy” that contains a “credible threat” attributed to a private party. Ostensibly, it is being disclosed to “warn” the target audience for their “protection.” In reality, the “sensitive disclosure” has been specifically crafted to foment disaffection, discontent, and opposition within the “enemy’s” own circles, deconditioning any previous experience of the “enemy” as a pleasant person of sound mind, and conditioning a new perception of the “enemy” as severely disturbed, repulsive and noxious. The target audience, having been made to fear and despise the “enemy,” is further persuaded to distance themselves from the “enemy.” The source and originator of the operation, the US government, must deny their involvement and be perceived as a disinterested, benevolent party merely passing on reports of danger obtained from private individuals.
Prior to the operation, the black operatives extensively profile and assess the attitudes and vulnerabilities of their target audience and tailor the most effective approach. The lies crafted prey upon the specific fears of each target audience, depending on what the operatives would determine these specific fears to be. In every case, the “enemy” is portrayed as mentally ill and “unstable,” and as vengeful and posing a serious threat toward the person whom they have ostensibly come by to “warn.” Another name of PSYOPs is MISO (Military Information Support Operations).
They accomplish their “PERSUADE, INFLUENCE, CHANGE” strategy by concocting vilifying lies and weaving them skillfully into real factual and biographical information, fabricating “evidence” by taking words and actions out of context using spliced together audio, video, and confidential documents, and accentuating any “sins” they’ve been able to dig up. It all gets edited together in a defamatory manner designed to be as damaging as possible, the finished product then being used to break up all of the victim’s relationships, toward the goal of isolating the victim and removing all support.
Black operatives are, by definition, professional liars- their job is to tailor lies to achieve a covert goal. Thus, to an employer, they might portray the victim as a thief. To a new boyfriend, they might portray the victim as a prostitute with untreated venereal disease. Around children, they might portray the victim as a pedophile. As you can can imagine, such tactics very effectively prompt the “targeted audience” to cast the victim out of their lives.
Two characterizations are always given—the targeted individual is portrayed as BOTH criminally-minded AND as having a history of serious mental illness. You can always tell a black operation by this dual portrayal along with “the need to disclose sensitive confidential information” about the targeted individual to all of his or her relationships.
The nefarious art paints a “credible” picture of extraordinary severity that can be made of anyone. It is then presented to the victim’s employer, landlord, doctor, lawyer, pastor, family members—everyone in the victim’s life—each getting a tailored “warning” of a “serious threat” that the victim poses to them. The target audience has their perception radically “changed” as a result of the diabolically skillful presentation. It achieves its covert aim: to get everyone in the victim’s life to fear and despise the victim—and to get everyone to cast the victim out of their lives.
This eventually renders the targeted individuals friendless, jobless, homeless, penniless, isolated and indigent— soon forgotten by the friends and family who have cast them out, and shunned everywhere they turn for help. Only then can the final phase begin: the targeted individuals are “disappeared” in the middle of the night—either executed in cold blood, or accused of a spectacular crime and taken captive to a prison or psychiatric hospital.
Wake up, Christians—“one taken, one left behind” is NOT about a “rapture.”
9) Jeffrey Madore (Electronics and Radio Communications Expert, TI): From: Jeffrey Madore (TI and Electronics Expert) Explains Organized Gangstalking “Human Research” Torture-Murder Program; 2015-17 Video Transcriptions and Comments
“This (electronic) technology, the equipment they are using on me, is manufactured by a company called Tetra Systems. You point it at a person, it receives their brainwaves and it converts those into visual and audible information, speech, subconscious thought process, etc. It’s just very invasive. It can also be used to put subliminal suggestions on a person’s mind. It can alter mood, and all kinds of things. So someone who is very talented with this equipment can query another person with it, and that person won’t know they are being queried. And they’ll start thinking through whatever topic they were directed into thinking about and information can be gathered very quickly. With this equipment, you can direct them to talk about any subject and they won’t know they are being directed. And so very quickly a lot of information can be gathered for the purpose of blackmail and beyond. So this equipment, I am suspecting, is being used for espionage.
I would like to see these (“nonlethal,” electronic) weapons classified as weapons. I don’t think you can violate a person more than to violate their very central nervous system, their very mind, to steal what’s there, and to place something there artificially, attempting to control and ultimately bringing on torment and torture that leads to death. I don’t think you can commit a worse crime against a human than human research.”
10) Amy Holem (U.S. Military Police Veteran, Digital Forensics Investigator, TI); From: Amy Holem (Digital Forensic Investigator): Protestors, Whistleblowers & Dissidents Cooked By Radio Waves On Stew Peters Show (7/28/22), Sons of Liberty (5/26/22), and Frank Allen Massachusetts (5/1/21):
“4G and 5G and electromagnetic weapons systems have been used since 1932. So it’s been over 80 years that they have been developing these technologies. I have helped over 3500 victims worldwide. Over 2500 within the US. and over 1200 in other countries. The DoD and the FBI have a list of people who have been chipped and implanted. A lot of those lists go down to using the DHS Fusion Centers to local police officers to target and harass them (the targeted individuals) and to use these different types of technologies. Most of them are deployed through either drones, planes, or satellite systems that are actually connected to air-to-air missile defense systems, for air-to-surface, air-to-ground, ground-to-ground vehicles that are used to attack the victims on a daily basis.
You don’t have to be chipped or implanted to be attacked by these frequencies. In fact, our own bodies produce frequencies. So technically, they can zone in on those personal frequencies and hit you with those radio waves. A lot of this is being done through sub-carrier waves and AM and FM radio broadcasting systems. Your cell towers, radio towers are all used to attack you. They are basically using US NORTHCOM systems along with NATO and they are selling the links to the child-human sex trafficking rings using third party contractors. So they gain access to these links to the satellite systems. And they use a catalogue system of the victims, and they pick and choose the victims that they either want to child-human sex traffic, rape, torture to get off, and they are using cryptocurrency and a bunch of other different methods to attack the victims.
I have audio evidence. When I do the audio analysis of the victims, I capture communications within their videos and audios that they send me to analyze. So I capture all the radio frequencies and telecommunications of these criminal network systems.”
(Webmaster Comment: One TI calls this “torture voyeurism”.)
11) Bryan Kofron (Former Security Specialist, Whistleblower, and TI); From: Former Security Specialist Bryan Kofron talks Targeted Individuals w/ Ella Free (8/27/17):
“Amazon.com was/is collecting DNA samples from employees and others and storing them with the DNA data base of millions of Americans. The main way they are now researching and developing the voice-to-skull/hive mind frequency weapons for emotional manipulation and behavior modification is to tune directly into the resonant frequency of the DNA of the target that they are using the technology against.
I was assigned to an IDF (Israeli Defense Forces?!) facility that stores the servers that the DNA data bases are stored on. Working with the people who were experimenting on the SIS employees and the homeless population in Seattle, I learned that what was stored on those servers was the DNA profiles of the people that were being tortured and abused; experimented upon by this technology. And that the way that the technology worked was to actually tap into the resonant frequency of the DNA itself. One of the uses of Amazon’s DNA data bases was to fine-tune this technology on each individual to provide total bio-hacking capabilities on an individual.
(In my job at Security Industry Specialists (SIS) in Seattle, WA), I was involved in the monitoring of the test subjects (“targeted individuals”). Unfortunately, the test subjects are under the influence of this technology. So they literally cannot get away and cannot do anything that they are not permitted to do by the technology… It’s very, very scary the amount of control that the program has over the test subjects. They are very much slaves with very little autonomy. Free will is taken almost completely away from them…
… I was human intelligence (HUMINT); oftentimes I was under cover (in plain clothes). I now suspect, of course, that I (too) might have actually been under the influence of this technology while I was working there. That they may have actually been looking through my eyes and hearing through my ears (too) when I was on assignment. There are no physical symptoms so I cannot confirm this. But that is exactly what this technology is used for. It is used to look through eyes and ears so that basically every walking human being in the city of Seattle is a walking-talking camera and a walking-talking audio microphone that can be seen through and heard through.
This is not just a program that is run by Amazon and SIS. The federal government is involved… We’re talking about the entire city of Seattle. I became aware of the scale of the program and the point of it, which was ultimately to research and develop this technology so that it could be used against: 1) other TIs across the country and primarily, 2) for highly classified military and intelligence applications. It is the testing on live human test subjects that is beyond any ability to comprehend or tolerate. The fact it is so widespread. It is being done to people against their will and without their knowledge. It’s outrageous and it needs to be stopped.”
12) Catherine Austin Fitts (former Assistant Director of HUD, TI for 12 years); From: Organized Stalking/Mind Control & “Covert Social Credit System” Are “Risk Management” In “Secret Global Government’s” “Control Grid” & Coup Against Humanity: Catherine Austin Fitts, 3 Interviews (Brilliant)- 1/28 and 2/13/22– 1/28 and 2/13/22 and Catherine Austin Fitts on “The Great Poisoning, Vaccines, Opioids, and Her Own Targeting as “Enemy of the State” (3/13/22):
“What we are experiencing is a coup. The current secret, central governance system is harvesting this planet for enormous amounts of resources. The Central Banking/Warfare System controls everything through people, one by one, person by person… Unbeknown to most of us, we have a Covert Social Credit System with three primary lines of control: 1) financial carrots and sticks, 2) surveillance and mind control, 3) covert ops, including covert physical intervention. The control system is phenomenally wasteful. They have AI and software. The more money the taxpayer pays for this system to operate, the more money “Mr. Global” makes. So there is no amount of money “they” won’t spend on the control grid…..
Since the mid 1990’s, we’re looking at a long-term poisoning (of the population). The Covid-19 injections have poisoned millions of people. During my litigation (against the government), I was poisoned eight times. This is a much, more common, covert tactic than I ever realized.
We’re talking about a global network of infrastructure where if somebody is not doing what they’re told, they can be literally poisoned. When this “enemy of the state” thing started for me it was just wild; people are breaking into your house, they are leaving dead rats on the doorstep, you are being followed in the car and when you are walking, they are approaching and threatening your family. It’s wild, just like the movie “Enemy of the State.”
I tried to hire three different private intelligence companies to help me with security. And they would say, no, it’s too dangerous. (But one of them, a biological warfare expert, did tell me that) they are going to drill holes in my walls and introduce biological warfare and so I should buy some birds (to use as “canaries in the coal mine”). Then a process started where I would literally have a flu or cold all the time. Whenever it started to get better, bam, it started again. It felt very junky and synthetic. It didn’t feel natural. Then I noticed that holes had been drilled in the wall and the birds were dying. So I sold my house and moved.
I thought it would be so much cheaper to just kill me. I estimated by the time it was over that they spent $45 million torturing me and trying to make me weak or fail. I finally realized it’s a HUGE business. Taxpayers pay for people to be surveilled, harassed, litigated against, and they can make a lot more money keeping me alive than just killing me.
They needed me to look like I failed. So weakening somebody is infinitely better than killing them. I think a lot of this biological warfare, including low-grade biological warfare and the non-lethal weaponry… all of this stuff is designed to target and weaken your enemy but not kill your enemy… This system pre-dates the signing of the U.S. Constitutional Convention (1787).”
Ryan Christian: “And now it seems the American people are the enemy.”
Catherine Austin Fitts: “Look- October, 1995: The (national) budget deal busted. And two things happened the next month. The predatory lending started with an uproar and FDA approved (highly addictive opioid) OxyContin; and the predatory lending and the pill mills hit and targeted the same neighborhoods. Here’s the thing: if you can’t get a financially responsible deal on the budget, you have only one other way of balancing the budget and that’s to bring down life expectancy.”
13) Dr. Eric T. Karlstrom (Emeritus Professor of Geography, and TI); From: Laws of God and Man (US, UN, and International Treaties) Violated by Organized Stalking Operations:
“The covert, extra-legal targeting (gangstalking-electronic torture) and use of innocent American civilians in nonconsensual biomedical experiments comprise high treason under the 14th Amendment, violate innumerable international, federal, state and local laws and treaties, and constitute “war crimes” and “crimes against humanity.” Perpetrators and collaborators at all levels of “the program” should be exposed as the most despicable criminals, cowards, and bullies in history and brought to justice posthaste. There is no statute of limitations for the crime of torture and violations of some pertinent laws carries the death penalty.
But what can extra-legally targeted citizens do when police, military, intelligence personnel, and the legal system, indeed, the very people we pay to protect and defend us, participate in and profit from our torture and terrorization?”
14) Linda Hunt (author of “Secret Agenda: The United States Government and Project Paperclip, 1945-1990, Nazi Scientists” (1990) In: Descent Into Hell: CIA MKULTRA’s Torture Doctors, Scientists, Spies, & Politicians: Hall of Shame Rogues Gallery with Dr. Eric Karlstrom on William Ramsey Investigates April 28, 2022
“Among the (thousands of) imported Nazi “scientists” (in Operation Paperclip) was the infamous Dr. Josef Mengele (aka “The Auschwitz Angel of Death”) and others who had done extensive experimentation on the Nazi death camp prisoners. The documentary record reveals that (CIA mind control Projects) BLUEBIRD, ARTICHOKE, MKULTRA were essentially a direct continuation of Nazi “research,” and indeed, much of it was initially carried out by the ex-Nazi “doctors” themselves. These and related programs were devised to control human behavior through psychedelic and hallucinogenic drugs (including LSD, mescaline and many others), electroshock, radiation, magnetic fields, sound waves, sleep deprivation, parapsychology, psychological/sociological/anthropological methods, harassment substances, paramilitary devices and materials, and many other methods. A special procedure, designated MKDELTA, was established to govern the use of MKULTRA techniques that would be used for harassment, discrediting or disabling purposes in other countries. Operation OFTEN attempted to harness the power of occultic forces.”
Webmaster Comment: We may legitimately speculate that the “special procedure” of MKDELTA combined with occult Operation OFTEN forms part of the basis for global “gangstalking/electronic torture” operations.
15) Dr. Alfred McCoy (professor, author of “A Question of Torture; CIA Interrogation From The Cold War To the War On Terror”) and Cheryl Welsh (lawyer, researcher, and TI)In: US Government/CIA/Pentagon Mind Control and Torture Of Innocent Civilians: Cheryl Welsh; 13 Articles:
“The history of CIA torture runs parallel to CIA neuroscience-based mind control research and also CIA nonlethal weapons research. This is important because mind control allegations (by victims/Targeted Individuals) include descriptions of techniques that sound like all three CIA programs. It is possible that the related cold war CIA ‘no touch’ torture, nonlethal weapons and neuroscience-based mind control programs have co-mingled for intelligence uses.
….Through covert trial and error, the CIA, in collaboration with university researchers, slowly identified three key behavioral components integral to its emerging techniques for psychological torture.
“Discovery #1: Sensory deprivation. In the early 1950s, Dr. Donald Hebb (McGill University) found that he could induce a state akin to psychosis in just 48 hours … after just two to three days of such isolation [sitting in a cubicle with goggles, gloves and ear muffs on] “the subject’s very identity had begun to disintegrate.
Discovery #2: Self-inflicted pain. Albert Biderman, Irving L. Janis, Harold Wolff, and Lawrence Hinkle, advised the agency about the role of self-inflicted pain in Communist interrogation. … During the 1950s as well, two eminent neurologists at Cornell Medical Center working for the CIA found that the KGB’s most devastating torture technique involved, not crude physical beatings, but simply forcing the victim to stand for days at a time, while the legs swelled, the skin erupted in suppurating lesions, the kidneys shut down, hallucinations began.
Discovery #3. Anyone can torture. Finally, a young Yale psychologist, Stanley Milgram, …conducted his famed “obedience (to authority)” experiments, asking ordinary New Haven citizens to torture on command and discovered that, in contravention of conventional wisdom, anyone could be trained to torture. …[Milgram] did controversial research under a government grant showing that almost any individual is capable of torture, a critical finding for the agency as it prepared to disseminate its method worldwide.
By the project’s end in the late 1960s, this torture research had involved three of the 100 most eminent psychologists of the 20th century: Hebb, Milgram, and Janis, as well as several presidents of the American Psychiatric Association and the American Psychological Association.
That notorious photo of a hooded Iraqi on a box, arms extended and wires to his hands, exposes this covert method. The hood is for sensory deprivation, and the arms are extended for self-inflicted pain. … Although seemingly less brutal than physical methods, no-touch torture leaves deep psychological scars on both victims and interrogators. One British journalist who observed this method’s use in Northern Ireland called sensory deprivation “the worst form of torture” because it “provokes more anxiety among the interrogatees than more traditional tortures, leaves no visible scars and, therefore, is harder to prove, and produces longer lasting effects.
McCoy explained how CIA ‘no touch’ torture changes its victims:
“Insights from the treatment of Chilean victims tortured under General Augusto Pinochet’s regime offer a point of entry into this complex question. Psychotherapist Otto Doerr-Zegers found that victims suffer “a mistrust bordering on paranoia, and a loss of interest that greatly surpasses anything observed in anxiety disorders.” The subject “does not only react to torture with a tiredness of days, weeks, or months, but remains a tired human being, relatively uninterested and unable to concentrate.”
“These findings led him to a revealing question: “What in torture makes possible a change of such nature that it appears similar to psychotic processes and to disorders of organic origin?
…. (Otto) Doerr-Zegers explained that techniques of torture work by creating deception, distrust, fear, disorientation, a “kind of total theater” that leaves the victim disoriented and “emotionally and psychological damaged.” The similarity of the explanation below to “street theater” found in mind control allegations is remarkable:
“As Doerr-Zegers describes it, the psychological component of torture becomes a kind of total theater, a constructed unreality of lies and inversion, in a plot that ends inexorably with the victim’s self-betrayal and destruction.
“To make their artifice of false charges, fabricated news, and mock executions convincing, interrogators often become inspired thespians. The torture chamber itself thus has the theatricality of a set with special lighting, sound effects, props, and backdrop, all designed with a perverse stagecraft to evoke an aura of fear. Both stage and cell construct their own kind of temporality. While the play both expands and collapses time to carry the audience forward toward denouement, the prison distorts time to disorientate and then entrap the victim. As the torturer manipulates circumstances to “maximize confusion,” the victim feels “prior schemas of the self and the world … shattered” and becomes receptive to the “torturer’s construction of reality.”
Under the peculiar conditions of psychological torture, victims, isolated from others, form “emotional ties to their tormentors” that make them responsive to a perverse play in which they are both audience and actor, subject and object—in a script that often leaves them not just disoriented but emotionally and psychologically damaged, in some cases for the rest of their lives.
…… On Monday, September 17, 2001, President Bush issued a fourteen-page top secret directive to (DCIA) Tenet and the CIA, ordering the agency to hunt, capture, imprison, and interrogate suspects around the world. It set new limits on what the agency could do. It was the foundation for a system of secret prisons where CIA officers and contractors used techniques that included torture…. [The CIA] had participated in the torture of captured enemy (non)combatants (civilians) before, beginning in 1967, under the Phoenix program in Vietnam.”
16) Former DARPA (Defense Advanced Research Program Agency) Scientist in: Dr. Robert Duncan’s “Project: Soul Catcher; Secrets of Cyber and Cybernetic Warfare” (2010)
“We have been trying to concentrate evil as humans understand it to create weaponry that attacks the information systems of the brain and body. I didn’t know what we were fully doing at the time I served. I regret what I did.”
17) Richard Lighthouse (Ex-NASA engineer, TI, Advisory Board of targetedjustice.com) in: THE HORRORS OF CONTRACT STALKING AND SATELLITE TORTURE – WHO ARE RESPONSIBLE? (Richard Lighthouse; targetedjustice.com- April, 2019)
“We have a great deal of evidence that suggests that the CIA’s domestic headquarters in Denver runs the entire (targeted individual-gangstalking) program and provides the funding for it. On the gangstalking side, they provide the funding through the black budget that feeds into the Director of National Intelligence (DNI) and that money and funding and programs make their way to the Terrorist Screening Center at the FBI and to the Department of Homeland Security where the gangstalking operations are run. They also provide the billions of dollars that go into the sophisticated satellite systems that are operated out of Shriever Air Force Base. This is primarily a CIA program. On the political side, the Council of Foreign Relations (CFR.org). Their goal, unfortunately, is to get control of the United States and its population. It is closely related to the forming of the Federal Reserve in 1913 and the founding of the United Nations in 1945.”
18) Bobby Towers (author, musician, TI); From “Circle of Snakes: How To END Your Gang Stalking”
“In a report presented in 2012 to the House Permanent Select Committee on Intelligence, the Aspen Institute of Homeland Security Group advises: ‘We move away from a defensive position of protecting the country from foreign terror threats. Instead, we should focus on becoming a domestic security architecture concentrating on offensive measures on single adversaries.'”
19) Col. Richard Szafranski (RAND Corporation); In: Military Review, US Army Command and General Staff College, 1994; From: Gangstalking/Electronic Torture Is ¨Neocortical Warfare,¨ ¨Metaphysical Control,¨ US Military Doctrine, & High Treason (Perspectives of Military Strategist and 2 Targeted Individuals):
“The object of war is to subdue the hostile will of the enemy, make him comply with our will, i.e., to force or encourage him/it to make the choices we want him to make…. We believe ¨will¨ is brain centered, therefore we must enter the brain….
Neocortical warfare strives to control or shape the behavior of enemy organisms without destroying the organism. It does this by influencing, even to the point of regulating, the consciousness, perceptions, and will of the adversary´s leadership, which is the neocortical system (brain)…. NW seeks to penetrate adversaries¨ recurring and simultaneous cycles of observation, orientation, decision, and action.
(Regular, Irregular/Civilian, and Special) Forces could execute both violent and nonviolent operations. (Our nonlethal and lethal forces) will understand that… the enemy (“target”) is the ¨customer¨ and the enemy´s segmented society is the ¨workplace¨ of neocortical warfare. Since adversaries may abound, global reach will be an important requirement in the world that is emerging.”
20) Dr. James Giordano (Professor of Neuroscience, Georgetown University, and DARPA/U.S. Army/EU Human Brain Project Consultant) in “Brain Science from Bench to Battlefield: The Realities – and Risks – of Neuroweapons” lecture, August 29, 2017; From: Confessions of a High-Level Perp: Dr. James Giordano – Battlespace/Organized Stalking Applications of Neuroscience and Neuroweapons (2017 youtube lecture, my transcription and notes, and pdf) and Weaponizing Brain Science: Neuroweapons – Part 2 of 2:
“I refer to myself as a “neuroweaponologist… Neuroscience captures $175 billion dollars annual market space…. The brain is the next battlespace…. We are targeting the brain…. Like any race, the morbidity and mortality, going at this speed… is real.
We are tracking neurological or brain signatures of key targeted individuals that are thought to represent whole groups. If I understand how his or her brain works and do this on a broad enough scale, I can develop patterns and I can use this in ways that informs my intelligence; this force multiplies and synergizes my human intelligence (HUMINT), my signals intelligence (SIGINT), and my communications intelligence (COMINT). NEURINT (Neuro intelligence) coupled with assessment and access gives me these capabilities”….
….”(Regarding the weaponization of neuroscience): That level of deep surveillance… examines the idea of what type of surveillance and its informational transfer and ultimately actionability, would obtain and entail. One of the things that we argued for very strongly is that the very least of what is necessary is a cooperative, collaborative “whole of government approach”. But although that is necessary, we argued that that is not sufficient.
What is really required in that type of deep surveillance that carries it through for the acquisition of information all the way to actionable entities that would then target certain things to be able to then mitigate our strategic competitors’ and/or adversaries’ (Webmaster: “targeted individuals”) efforts in this area would require more “a whole of nation approach.” Where now we have almost a seamless triangulation between government entities, research entities, and commercial entities that are then able to mobilize those resources in the deep surveillance that is necessary for acknowledging, addressing, and assessing relative risks that may become threats, quantifying the risk to threat index, and then identifying what aspects of those quantifiable risks are mitigable and/or preventable, and then engaging the resources that are necessary to do that.”
21) Dr. James Canton (CEO and Chairman of Global Inc. and Institute For Global Futures, advisor to Fortune 1000 companies, US military Joint Chiefs of Staff, and governments); From: Neuroweapons, “Dark Network Supply Chains,” “Man-Hunting Business” (aka GANGSTALKING) & “Hybrid Warfare;” Presentation By Dr. James Canton (Video, Transcription, and My Commentary)
“There are two parts of Neurotechology: The first is the “soft” or “nonlethal” dimension. This creates dysfunctionality and cognitive impairment, inability to make good decisions, dizziness, health effects. This is a weapons system to create cognitive impairment of individuals. The second is the “hard” dimension, which refers to killing people.
The issue of non-lethality (as per “nonlethal weapons”) is associated with neurotechnology. The American officials attacked in the embassies in Cuba and China (webmaster comment: referring to the so-called “Havana Syndrome”) were attacked to demonstrate a proof of concept, that is, to demonstrate an operational, deployed capability of soft, non-lethal neuroweapons that could and did “take them out of the game.”
Soft neurotech (these non-lethal weapons) have many possibilities in “hybrid conflicts”…. And these are now available.
I came up with the concept of “Dark Networks” when I was advising SOCOM (Special Operations Command) on this concept of “Bad Guy Hunting-Targeting”…..
In global Dark Networks, which have evolved, you’ve got mixtures of terrorists and sovereigns, a variety of actors, rogue states, radicals, non-states, criminals. You’ve got to have banking, logistics, you need to have things to trade that are not monetary, you need to have crypto-currencies, the ability to have monetary forms to support your operation that are not transferable or discoverable; you need to have a complete supply chain. Just like Wal-Mart has a supply chain, Dark Networks have supply chains. Their goal is to produce disruption and conflict. So if you are in the Bad-Guy Hunting Business, you’ve got to have a supply chain.”
22) Rahul Manchanda, Esq. (Professor and International Attorney); From: The Surreptitious Reincarnation of COINTELPRO with the COPS Gang-Stalking Program
“In 1994, Senator Joseph Biden wrote and then President Bill Clinton enacted the Violent Crime Control and Law Enforcement Act (“VCCLEA”) establishing the Office of Community Oriented Policing Services (“COPS”) within the US Department of Justice.
… Targets can be chosen for many reasons: (1) political views; (2) whistle-blowing; (3) political dissidence; (4) asserting rights at work; (5) making the wrong enemy; (6) too outspoken; (7) investigating something that the state does not want investigated; (8) signing a petition; (9) writing a letter; (10) being called “suspicious” by a civilian spy/snitch; or (11) being a religious/ethnic/racial minority.”
“Signature Reduction” (SIGREDUX) is “the largest undercover force the world has ever known: the one created by the Pentagon, with tens of thousands of soldiers, civilians and contractors operating under false names, on the ground and in cyberspace…. Special operations forces constitute over half the entire signature reduction force… Military intelligence specialists reportedly make up the second-largest part of the secret army…. The signature reduction effort engages some 130 private companies to administer the new clandestine world. Dozens of little known and secret government organizations support the program, doling out classified contracts and overseeing publicly unacknowledged operations. Altogether the companies pull in over $900 million annually to service the clandestine force.”
II. For an inkling of various aspects of “the program,” including what it might be like to be a Targeted Individual (Enemy of the State), check out these movies. We may speculate that these movies are essentially “predictive programming” designed to condition the public to accept and even participate in the new “Silent Holocaust:”
Organized Stalking (Gangstalking) Movies, Targeted Individuals, Mind Control, Electronic Harassment/Torture
1) Gaslight (1944) is a 1944 American psychological thriller film starring Charles Boyer, Ingrid Bergman, Joseph Cotten and Angela Lansbury. Adapted by John Van Druten, Walter Reisch, and John L. Balderston from Patrick Hamilton’s play Gas Light (1938), it follows a young woman (Bergman) whose husband slowly manipulates her into believing that she is descending into insanity. Gaslighting TIs in order to make them believe they are insane is a common psychological warfare tactic deployed in organized stalking/electronic harassment operations.
2) The Manchurian Candidate (1962) with Frank Sinatra and Laurence Harvey. This political thriller depicts the mind control programming of a sleeper assassin (aka “Manchurian Candidate”). When this picture came out in 1962, the year before the JFK assassination occurred, the intelligence-military community in America had already been conducting mind control research for decades and had developed and most probably deployed the techniques of RHIC (Radio Hypnotic Intra-Cerebral Control) and EDOM (Electronic Dissolution of Memory) according to Lincoln Lawrence (a pseudonym) in “Were We Controlled?: The Assassination of President Kennedy” (1967).* (*See below).
3) Lolita is an American 1962 black comedy-psychological drama film directed by Stanley Kubrick based on the eponymous 1955 novel by Vladimir Nabokov. The film follows a middle-aged literature lecturer played by James Mason who writes as “Humbert Humbert.” “Humbert” is stalked incessantly by “Quilty,” played by Peter Sellers. Of special interest is Quilty’s preternatural, malevolent obsession with destroying Humbert’s life. That’s the spirit of gangstalking…. malicious, obsessive, relentless, and creative. In my opinion, this film, and Peter Sellers in particular, depicts the demonic obsession that perps have with destroying the lives of their prey, the targeted individuals.
4) Brainstorm (1983) starring Christopher Walken and Natalie Wood (her last film) shows early military/corporate research into brain-computer interface technologies that allow individuals using wearables to see through the eyes, hear through ears, and experience life through the senses of others. Obviously, this technology holds tremendous potential for spies, thieves, military fighters, voyeurs, sadists, and radical gamers. One military tech confides to another in the film: “It sure beats dirty magazines.”
At 1:16:44 in the film, the protagonist (Walken) hacks into the Project Brainstorm computer program and reads: “Warning: These are full sensory tapes and can be extremely harmful to use. Tape Index: Coercive Imprinting Series- Fear States, Early Trauma Random, Early Trauma Selected, Dream States (Neg and Pos), Physical Pain Threshold Series, Negative Memory Retrieval, Psychotic Episode.” These topics suggest that even in the early 1980s brain-to-computer interface technology was used in combination with MKULTRA (torture) techniques.
https://archive.org/details/Brainstorm_1983
5) The Man With One Red Shoe (1985), a comedy starring Tom Hanks and Dabney Coleman, shows some of the intricate and diabolical CIA & NATO spying and targeting tactics being deployed against a randomly-selected and innocent civilian. The film shows many of aspects of the targeting program in a humorous way.
6) They Live (1988) starring Roddy Piper and directed by John Carpenter is a 1988 American science fiction action horror film based on the 1963 short story “Eight O’Clock in the Morning” by Ray Nelson. The film follows an unnamed drifter (Piper) who discovers through special sunglasses that the ruling class are aliens concealing their appearance and manipulating people to consume, breed, and conform to the status quo via subliminal messages in mass media (i.e., mind control). Piper, a former professional wrestler, described the film as more of a documentary than a movie….. Indeed, this film depicts the truth about how the world operates! I agree.
7) Surviving the Game (1994): A homeless man is hired as a survival guide for a group of wealthy businessmen on a hunting trip in the mountains, unaware that they are killers who hunt humans for sport. Indeed, the TI program is a recreational man-hunting game and business among other things.
8) The Game (1997) starring Michael Douglas is a dark psychological thriller that portrays how psychological warfare/organized stalking operations can destroy any citizen, in this case a billionaire financier played by Michael Douglas. The film does a particularly good job of depicting the coordinated antics of the perpetrators, who are paid actors associated with a private company. The film ends with this dark message: “Players wanted.”
9) Enemy of The State (1998) starring Will Smith, Gene Hackman, and Jon Voight shows an intense, overwhelming NSA-military attack on a lawyer (played by Will Smith) who witnesses a murder committed by the corrupt head of the NSA (National Security Agency). In the film, the US military-spy complex unleashes all its technologies and personnel available against this innocent civilian, now designated “enemy of the state” in order to cover up the murder.
strong>10) The Truman Show is a 1998 American psychological comedy-drama film directed by Peter Weir and written by Niccol. Jim Carrey stars as Truman Burbank, a man who grew up living an ordinary life that— unbeknownst to him— takes place on a large set populated by actors for a reality television show about him. The only person in the film who genuinely cares for Truman warns him: “everyone is pretending.” The film gives a good depiction of what it is like to be a TI, where one is effectively imprisoned in a fake world comprised of scripted set-ups (street theater), lies, spies, and psy-ops performed nearly continuously by paid “surveillance role players” aka “fake people-spies.” Everyone except Truman is “in on it” and is making a living by acting their parts. Truman, the only real character in the drama, is completely fooled until the end of the film when he risks his life to escape the fake world in which he is confined.
11) The Skulls (2000) The Skulls is a 2000 American thriller film directed by Rob Cohen and starring Joshua Jackson, Paul Walker and Leslie Bibb. Its plot is based upon some of the ‘conspiracy theories’ surrounding Yale University’s Skull and Bones student society. I include this film because when the young hero Luke, played by Joshua Jackson, runs afoul of the powerful Skull and Bones leadership, he is forced to fight for his life.
12) Minority Report (2002) starring Tom Cruise is an American science fiction action film loosely based on the 1956 novella “The Minority Report” by Philip K. Dick. The film is set in Washington, D.C., and Northern Virginia in the year 2054, where Precrime, a specialized police department, apprehends criminals by use of foreknowledge provided by three psychics called “precogs”. In fact, precrime has been a primary focus of all police forces for decades. Thus, in reality, 1) “pre-crime,” or pre-emptive warfare against individuals, is used as the justification for targeting innocent blacklisted “enemies of the state,” and 2) in this process, neuroweapons can not only extract and identify thoughts remotely but can also insert thoughts in someone’s mind, thereby justifying their inclusion on enemies lists. In fact, reading others’ thoughts and overwriting them electronically is a component of the military’s information warfare.
13) Control Factor (2003 TV movie) Directed by Nelson McCormick, with Adam Baldwin, Elizabeth Berkley, Tony Todd, and Conrad Dunn. An average everyman discovers he’s the unwitting target of an ultra secret domestic black-op centering on mind control. After a mysterious, disheveled man nearly kills him, insurance salesman Lance Bishop hears a voice in his head urging him to murder his wife. When he discovers he has become part of a government mind-control project, he and others similarly being experimented on fight back. This film provides an excellent depiction of some of the mind control technologies deployed in the TI (targeted individual) program, an experimental black operation or SAP (Special Access Project).
14) The Lives of Others (2006) From the Trailer: “Before the fall of the Berlin Wall, East Germany’s (“Stasi”) secret police monitored the population. Webmaster: The communist East German government enlisted from 1/6 to 1/3 of the population to spy, harrass and destroy the lives of their neighbors in a “scientific” process termed “Zersetzung” (German for “decomposition”). Jewish former Stasi-chief, Markus Wolfe, helped design and found the Department of Homeland Security, initiated the year following the Sept. 11, 2001 false-flag, synthetic, government sponsored terror attacks.
15) The Whistleblower (2010): From a review of “The Hidden Evil: The Financial Elite’s Covert War Against the Civilian Population” by Mark M. Rich on amazon.com: “In the movie The Whistleblower there are scenes showing gang stalking. A female UN police officer is trying to rescue some Eastern European girls who are forced to work as sex slaves at a bar. But corrupt UN police officers use gang stalking and intimidation tactics to stop her.” As the film indicates, all police are “in on it.”
16) Inception (2010); Inception is a science fiction action film written and directed by Christopher Nolan. The film stars Leonardo DiCaprio as a professional thief who steals information by infiltrating the subconscious of his targets. As noted, reading thoughts and stealing ideas through the remote application of (RF frequency) neuroweapons is an aspect of the DoD’s “information warfare.”
17) Seeking Justice (2011) (also known as Justice, and formerly titled The Hungry Rabbit Jumps). This action thriller film starring Nicolas Cage depicts a highly secretive and well-coordinated vigilante group eager to dispense “justice” on its own. In this sense, the film depicts a network of stalking perpetrators who operate outside of the law. What shadowy vigilante groups are perpetrators of these crimes in real life? There are many such, including Masons, Jews, Mormons, 7th Day Adventists, Jehovah’s Witnesses, Neighborhood Watch, CERT groups, etc.
18) All Jason Bourne movies, particularly The Bourne Legacy (2012) depict some of the high-tech military weapons equipment and military operations used to target and take out civilians. The Bourne Legacy brilliantly depicts the use of synthetic biological “enhancements” now available to super soldiers and others.
19) The Hunger Games (2012) is a series of dystopian novels/movies written by American author Suzanne Collins. The films do a good job of depicting electronic warfare technologies as well as depicting scenarios by which victims (targets) are pitted against each other in to-the-death ritualistic murders.
20) Hyperfutura (2013) shows nonconsensual biomedical and neuro experimentation on an individual who has been blacklisted as disposable by the authorities. This portrays the DHS/FBI’s blacklisting of innocent civilians by anonymously placing them, without their their knowledge, on the Terrorist Screening Data Base (TSDB). Those who are targeted are used as nonconsensual human experimentees for neuroweapons, biomedical engineering, synthetic biology, transhumanism, and a host of other black projects or Special Access Projects (SAPs).
21) The Spark (2018) “Targeted Individuals” movie with Stephen Shellenberger and Dr. John Hall is a genuine T.I. movie from 2018 with Stephen Shellenberger (a T.I), produced with the well-known T.I. activist, Dr. John Hall; watch it here: https://vimeo.com/ondemand/thespark/2..
Trailer: https://m.youtube.com/watch?v=gUwGpdO… https://m.youtube.com/watch?v=gUwGpdO…
“It’s in the movies because it’s ‘”Predictive Programming'”! What is predictive programming? They (Freemasons and the elites) hide references in the popular media before the atrocity takes place; when the event occurs, the public has softened up, and therefore passively accepts it rather than offering resistance or opposition.”
* From #2 (The Manchurian Candidate): From an Amazon.com review of “Were We Controlled? The Assassination of President Kennedy” by Lincoln Lawrence (1967):
The Link Between Mind Control Experiments for the Purpose of Assassination.
April 14, 2013
“Lincoln Lawrence” has provided extensive research into successful studies in mind control between 1937 and 1967, when his book was written. His research is written with emphasis on “the Rumor” that these techniques were used on Lee Harvey Oswald and Jack Ruby to make them pawns in the assassination of President Kennedy. Not only does his presentation make more sense than any scenario presented regarding the Kennedy assassination, but what is fascinating is the successful research Lawrence presents is all before MKULTRA, the CIA’s unethical experiments on mind control, was ever exposed (1975-7 in the Church Senate hearings). In their top-secret MKULTRA and Macy Conferences projects, the CIA was using unwitting American citizens in hopes of creating “Manchurian Candidates” just as depicted by Lawrence, but this was all hidden even from the Executive Branch and Congress, until 1977, long after Lincoln Lawrence published “Were We Controlled?”
Another list, including 32 movies, some of which are the same but most of which are different is here:
Gang Stalking and Mind Control in the Movies
https://letterboxd.com/pd187/list/gangstalking/
This link features the following 32 movies, most of which are psychological and/or sci-fi horror films….. come to think of it, much like the “gangstalking electronic torture” program itself. The Satanic and cult aspects are strongly represented here along with themes of mind control, Scientology, torture voyeurism, and artificially-induced schizophrenia. Dates of release of the movies spans the period between 1943 and 2021 and indicate the TI program extends back at least as far as the first half of the 20th century.
1) Rosemary’s Baby (1968)
2) The Truman Show (1998)
3) Society (1989)
4) The Game (1997)
5) Mother! (2017)
6) Messiah of Evil (1973)
7) Dead and Buried (1981)
8) Naked Lunch (1991)
9) The Wicker Man (1973)
10) Hot Fuzz (2007)
11) Eyes Wide Shut (1999)
12) Videodrome (1983)
13) The Conversation (2000)
14) Halloween III (1982)
15) April Fool’s Day (1986)
16) They Live (1988)
17) Seconds (1966)
18) The Man With One Red Shoe (1985)
19) The Stuff (1985)
20) Dark City (1998)
21) Jacob’s Ladder (1990)
22) Carnival of Souls (1962 and 1998)
23) Stuart Bliss (1998)
24) Matrix Resurrections (2003 and 2021)
25) Simulation of Paranoid Schizophrenia (2013)
26) L. Ron Hubbard: An Introduction to Scientology (1966)
27) The 7th Victim (1943)
28) Angel Heart (1987)
29) Star Whackers (2011)
30) Control Factor (2003)
31) Ministry of Fear (1944)
32) Clean, Shaven (1993)
III. Conclusions:
The U.S. government, military, and intelligence agencies in partnership with private and civilian sector profiteers are deploying a radical authoritarian, covert police state weapons system against innocent American citizens and millions of other citizens around the world. Indeed, the myriad technologies and programs the American empire has utilized to subjugate foreign nations and peoples are now being turned against the American people. Over the past century, the physical and social sciences have been weaponized such that, today, even the American people are now weaponized against anyone who stands against corruption and universal tyranny.
In effect, this officially-denied program is a purge of individuals with the intelligence and integrity to defend our Constitutionally-guaranteed freedoms and Republic. So-called “dissidents” (“truth-tellers”) are secretly and extra-judicially placed on government/Department of Homeland Security Terrorism Watchlists, No Fly Lists, Main Core Enemies Lists, etc. and then relentlessly attacked by all elements of society in what is referred to as “hybrid/unconventional/electronic/psychological/cyber/neuro warfare.”
Meanwhile, millions of other Americans from all walks of life are bribed, coerced, and/or duped into participating in the harassment and torture of those who have been secretly watchlisted as “potential terrorist threats.” These are the gangstalking perpetrators, “gangbangers,” “surveillance role players,” “first responders,” “counter-terrorism specialists,” trackers, spotters, collaborators, etc. that comprise the mobile death squads coordinated and supervised by retired ex-military, ex-police, psychological operations groups, and special forces operatives. In concert and using modern supercomputer, satellite, and electronic technologies, these groups and individuals are coordinated to execute the innumerable covert psychological and electronic attacks designed to “Deny, Deceive, Disrupt, Degrade, and ultimately Destroy” the lives of “targeted individuals. (The “5 Ds” above come from Britains GCHQ, their equivalent of our NSA)”
(See: The “5 Ds:” Gang Stalking Terms and Objectives Made Easy: I. “D,” “I,” and “A” Words; II. Types of People in the New War (GISTAPO-666) in my gangstalkingmindcontrolcults.com website.)
These soft-kill, slow-kill, silent-kill operations deploy so-called “non-lethal weapons,” including directed energy weapons and neuroweapons, that have been developed since the 1930s. The Soviet communist rulers deployed these weapons against American diplomats from the 1950s onward and also used them to repress millions of their “political dissidents” as well. The Soviet term for this kind of warfare against civilians is “psychotronic warfare, ” a combination of psychological and electronic warfare.
R.J. Rummel, professor of political science, estimates that 262 million unarmed civilians were killed by their own governments during the 20th century. This is over six times the number of war combatants killed during all wars during the same period. The practice of murder of citizens by governments is termed “democide.” The greatest numbers of casualties occurred under communist regimes, with some sixty-six million Russians and over 100 million Chinese civilians murdered by communist Soviet and Chinese regimes.
The Global Government Gangstalking Genocide Gestapo-Gulag (G6, my term) system of citizen torture, repression, and elimination described in this paper is officially-denied: It persists under conditions of government and media perfidy and military, intelligence, corporate, and citizen vigilante complicity. Nonetheless, it comprises highest treason against the U.S. Constitution and the American people.
In a classic Orwellian inversion of reality (read the book, 1984), the true “terrorists” today are the government agencies and their corporate and civilian collaborators and “useful idiots,” while the real “freedom fighters” are the TIs themselves. We fight to defend national and individual sovereignties and the sovereignty and dignity of our bodies, minds, and spirits- as well as yours@!.
Ultimately, this is a spiritual war of good vs. evil. Please be aware of the truth and the facts and choose to be on the right side of history.
IV. Final Quotes Regarding the Gangstalking Program and Perpetrators
1) Dr. Holly Hector (co-author of “Exposing and Confronting Satan & Associates” and Christian counselor)
“Freemasons shed the blood; the Illuminati (Deep State elite cabal) get the power. They work hand in glove with ritual blood sacrifice, sex trafficking, abortion, etc. The more blood and torture, the more power they get.”
2) Revelation 13:7:
“And the beast was allowed to wage war against God’s holy people and to conquer them. And he was given authority to rule over every tribe and people and language and nation.”
3) John 8:44:
“Ye are of your father the devil, and the lusts of your father ye will do. He was a murderer from the beginning, and abode not in the truth, because there is no truth in him. When he speaketh a lie, he speaketh of his own: for he is a liar, and the father of it.”
4) Romans 1:28
“And even as they did not like to retain God in their knowledge, God gave them over to a reprobate mind, to do those things which are not convenient.”
5) Thessalonians 2: 8-12
“And then shall that Wicked be revealed, whom the Lord shall consume with the spirit of his mouth, and shall destroy with the brightness of his coming. Even him, whose coming is after the working of Satan with all power and signs and lying wonders, And with all deceivableness of unrighteousness in them that perish; because they received not the love of the truth, that they might be saved. And for this cause God shall send them strong delusion, that they should believe a lie: That they all might be damned who believed not the truth, but had pleasure in unrighteousness.”