Nappy Head Roots Perp Interviews

A TI who posts his experiences on you tube who goes under the name of Nappy Head Roots has two videos amongst hundreds which I consider to be of great importance not only to TIs but to people who do not know what they are involved in. Many TIs do not have much respect for their stalkers but in all fairness I feel that these two guys had a heart to be honest about what they know. From the last article I posted it seems highly significant.

Thank you NHR!

https://www.youtube.com/channel/UCB3gVkgU6tRoAz_d0orDzwA

Advertisements

Anthony Forwood Documents. GS: Where is this taking us.

 Yesterday I came across a number of documents on the web related to Gangstalking written by a person called Anthony Forwood which I assume to be an alias. The information is very rich with detail without being too in depth and I personally think that that it validates a lot of what I have experienced throughout my lifetime.
This particular article caught my attention and felt that it could help TIs who have only started to realize what is happening to them.
GANG-STALKING: Where This is Taking Us
By Anthony Forwood <forwood@live.ca>Copyright 2012 © All rights reserved
The network of gang-stalkers is being run by the government. It is based on the idea that citizens will feel safer if they are aware of dangerous individuals, and it uses notification lists to alert citizens of the presence of individuals they want targeted.However, since notification lists were first introduced, they have become much broader in scope, and are no longer restricted to just listing murderers, sex offenders,and other truly dangerous people. These lists are now so broad in scope that anybody can end up on one. Also, these lists encourage whole communities to ostracize those people who get listed, and to make their lives miserable and leave them unable to function normally in society. It doesn’t matter that a person got listed for some minor triviality, since there is no distinction between them and the worst sex offender. All persons listed are equally treated as dangerous threats to society.As this network has grown and different groups and organizations have been brought into the fold, more and more segments of society have become involved, not realizing the implications of where this will ultimately lead. By joining up with this government-created network, a person signs away their rights and freedoms, and are held to strict secrecy oaths for life. This means that they can never talk about this network, its members, its targets, or its activities.Think about this for a minute. Members are provided with information about people in their community who the authorities have singled out for whatever reason. They can’t talk openly about the information they are given about a listed individual, and they have little chance of ever knowing how accurate that information is unless they know the target personally enough, which few ever will. They must trust those authorities that manage the network, and unfortunately, they will tend to see these listed individuals in whatever light these authorities cast them. The information issued on a listed individual will always be negative, and so will any further information that’s ever gathered about the individual and passed through the network. There is no attention given to anything positive about the person, and so a very unbalanced characterization quickly develops that only feeds the whole system further, and assures the destruction of the person’s life.Also, members can never discuss the network itself, and may not even be allowed to acknowledge its existence. Members are largely anonymous to each other, and have no idea of the extent of the network’s membership. This effectively makes the network invisible to the public and hides the extent of its reach. As the network expands its membership to include more and more of the population through the many different organizations, groups, and individuals that sign on with it, it will eventually comprise the greater portion of the population. At present, it already recruits heavily from the business and professional sectors, schools and universities,immigration centers, community groups, and the criminal sector. This covers a very large portion of the population.
Since members are in for life, the membership only grows as the years go by. Even if at some point a member decides to not take part in network activities any further, if they are needed they can be forced to take part,either by threats and intimidation or through more subtle forms of coercive manipulation. They know that they can become a target, too, so they cooperate out of fear.This is the whole problem. This system gives the government the ability to not only have a self-policing/self-punishing society, but also allows them to control the situations and events in individual people’s lives to an incredible degree, and the perception of other individuals that they come in contact with.What happens when this network encompasses the greater part of the population, as seems to be the intention? What happens when the population is divided into just gang-stalkers and listed targets? Most importantly, what happens when a member of this network becomes a listed target themselves?Little consideration has been given to these questions by those who join this network,although it’s very unlikely that the government overlooked the eventualities of this system that they created. Let’s consider each of these questions separately.1) What happens when this network encompasses the greater part of the population?Although we’re already largely dependent on the voice of authority for most of the information we get in our daily lives, we can be more or less assured that it’s accurate when it can be verified through direct experience. However, when a person is put in a position of blind trust with little means to verify what they are told, as members of this network are, they are in a position to be deceived. Most of us know that the government lies and misleads, and often without any concern or conscience, as long as it achieves the desired end. This network gives the government the ability to affect the beliefs and perceptions of its members regarding other individuals, and always in a negative way and to its own advantage. It uses fear to motivate them to act out in negative ways when they come in contact with a person who has been listed as a threat. When the greater part of the population is reliant on this negatively slanted source of information, they begin to see society as more threatening than it really is,and this will only lead to them being more easily manipulated into accepting and going along with certain actions that the government might take, as we’ve already seen with the largely contrived ‘terrorist threat’ being used to remove more of our rights and freedoms, never to be enjoyed again. This network draws in those people who are most likely to not question authority, who believe that authorities would not lie or mislead, and who are therefore the easiest to manipulate. Signing up with this network assures that they will be separated from the truth – in this case, the truth about the individuals that end up being targeted and the reasons for their being listed.More than just this, however, is the fact that the members of this network, by joining up, unwittingly allow themselves to be closely monitored, so that the government has the ability to always know what they are doing, what they are saying, who they are talking to, etc., and they can control this, and thereby control that person’s perceptions and reality. This control becomes easier and easier as more and more people are dawn into the network, which is used to monitor them and to have them monitor each other, and the control of information flow that might pass between members is broadened that much further.2) What happens when the population is composed of just gang-stalkers and listed targets?At some point, if this network is allowed to continue to grow, it will come to a point where a person will either be a member or a target. When this happens, there will be two distinct camps in opposition to each other. Network members will be ever more easily misled, due to their reliance on the system to guide and inform them, while targets will be better informed about what is going on but will have no voice to speak out, or if they do, they will be automatically disbelieved. Network members will be used to drive non-member targets out of existence, one by one. All that will remain in the end is a society that is totally trusting in the dictates of authority, and whose members have signed away the rights and freedoms that make life worth living. They will be caught within a system of control where information can be tailored to suit the needs of the government, and therefore each person’s entire perception of reality will be able to be tailored and controlled in whatever way the authorities see fit. For the government, this makes for some interestingly new ways to govern a population. It gives them the ability to create different realities for different people by manipulating what those people know and believe, and to play them against each other for desired outcomes. We can already see an early example of this as gang-stalkers are pitted against their targets, who they have a largely distorted image of and have no choice but to go along with it.3) What happens when a member of this network becomes a listed target themselves?This is an important question to consider, because when you do, you come to realize how well this system works at keeping its members in line, even if they learn how evil the system really is and where it’s ultimately leading society. Once a person signs up,it’s already too late to get out, because they’ve signed legally binding secrecy oaths that they must adhere to for the rest of their lives. This includes both information about targets, as well as what they know about the network. As members become aware of what sort of life a target must live, they are not likely to make the mistake of becoming targets themselves, and so they will not dare to step out of line.However, people sometimes let slip things they’re not supposed to talk about, or they might be reported (rightly or wrongly) for something that gets them listed, so some members might suddenly find themselves being targeted. As the number of members of this network increases, there will be more and more of a likelihood that members will be turned on by other members. If there is a reward system built into the system,and members are forced to become ever more reliant on that reward system for those privileges in life that make it pleasurable, then there will be a stronger impetus for them police each other. Of course, members who step out of line and become targets will still be bound by the secrecy oath they signed, so their monitoring will be that much more intense to ensure they remain silent, and they will be treated much more
harshly than targets who are not members. They might just be eliminated altogether,and the circumstances surrounding their demise will be confabulated through the ability to control information. The reliance of members who might otherwise question the facts will have no other choice but to rely on this controlled system for its knowledge.With this networked system operating through high-powered computers, the ability to automate checks and balances reduces the manpower needed to oversee its management and operations, and by extension, the governance of a population. With covert surveillance being more easily applied through the widespread use of computers and cell phones, all tied into the global communications structure, few people remain outside of its grip, and fewer will in the future as these technologies become more and more necessary for functioning in society.Even knowledge in general can now be tightly controlled, so that what the authorities don’t want you to know can be kept from you by making it unavailable in search engines and databanks unless you have privileged access based on your agreement to keep it private and not share it. This agreement will be maintained because you will be monitored to assure you comply with the agreement, and any attempts to do so will be automatically subverted.The Echelon surveillance system catches every communication, every typed or spoken word, every recorded image, every piece of information, so that nothing is private anymore. The computer in your home and the cell phone you carry on the street is an ear and an eye that listens and watches, even when you think that turning them off will provide some privacy. As long as ignorance of this fact is maintained, the sense that the authorities in charge are omniscient and omnipresent will only increase. The fear that your every thought, word, and action is known about as soon as it’s made will force you to stay in line and follow the dictates of those who control the system.Added to this is the extremely invasive application of electronic mind-control technologies, which can be directed at an individual to force their submission, either through the covert manipulation of their thoughts, feelings, and actions, or by the intimidation of more overt manipulation, such as with ‘voice to skull’ bombardment to drive them into abject compliance.With the ability to immediately locate and track individuals through the use of RFID implants, such implants are bound to be taken advantage of as part of this system. It appears that they are already being widely and systematically applied for this very purpose, unbeknownst to most people. It is not unlikely that the majority of the population is already implanted, and in the near future (if not already) there will not be a single person born that doesn’t receive a mandatory RFID chip. At the moment,these chips are being surreptitiously inserted, but soon this will become the norm,openly done for the sake of ‘national security’. This is where gang-stalking is taking us.

Identity Theft of Targeted Individuals for AI Bot experiments!

Could identity theft of targeted individuals be one reason that gangstalking is being used?

If you think about it, with social media everywhere, is the possibility that forced suicide is being used on targets to completely steal their identities in use for projects over the world?

It has always concerned me that with TIs coming out in more frequency that the counter measure to contain the situation is to introduce AI Bot to force disinformation along with real people to oversee it.

That being that with AI in its infancy, targets who go online to get information for help might be faced with this situation and might give up.

Catch 22 situations

One TI who had been posting videos online died recently and it concerns me that her identity might have been in line for use in AI Bot identity theft.

Also having watched a few TIs take measures to film the events going on around them that their stalking has increased significantly. The fact that there are individuals prepared to go online and commit social suicide says it all.

However, get this.

The is no reason why a gangstalker couldn’t do the same!

Ploying Targeted individuals out into the open!

It seems clear to me that from what I have learned is that someone who is prepared to go online to film gangstalking is putting their entire reputation on the line to prove something that is happening to them that isn’t being addressed openly in the public.

But of course the first thing that a TI is going to think is that they are becoming a stalker themselves and opening themselves up to what they might perceive to be some public trial that they don’t wish to happen to them.

Any TI who is new to the information being presented to them may have noticed this from the videos online.

 

Beware the Phantoms

The purpose for these projects seems to indicate a possibility that one of the main purposes is to create “criminals” out of “TI’s” through reverse psychology.

Therefore it could mean that entrapment techniques in the future could be used to ensnare “targets”.

From a community point of view that might seem a good idea right?

I mean what better way to trap a criminal than to have a fake identity prowling entrapping them without having to have a real person involved?

 

I suppose the argument is that perhaps people don’t wish to have their young or loved ones involved with entrapment that could be potentially dangerous. Therefore AI technology is the next best thing.

 

But for a Targeted individual?

An innocent person used for weapons testing has their identity stolen without their knowledge for the pursuits of the interests of these projects.

A person who ends up committing suicide over something that they had no idea they were signed up for becomes a ghost in the machine to hunt the bad guys?

 

I’m sure other TIs will realize what I saying here.

 

 

Monarch Mind Control Targeted Individuals

** Good news. Original video now found.

This video was posted a few months ago and which I came across yesterday which I feel  was worth posting and talking about in a bit of detail as I felt it was worth some attention considering the nature of it’s content. It dates from three years ago and contains valuable information. It is hosted by Kieron Lee Perrin a man whom claims is a human experiement for brain implant technology.

A few TIs on my Twitter put across that I am normally not surprised by many of the tactics they observe, hear or see on the internet or TV. It might seem a bit shallow but I have been subjected to it for a long time.

Kieron Lee Perrin giving the lecture in this UFO Agenda video states that he is property of the Intelligence Services in the UK and that the implants in his brain were experiemental military technology.

A question often raised by TIs and secptics alike is, if you are mind controlled through implants in the body, how can someone break the control? Is the man in the lecture actually a robot or not. Literally.

It makes you wonder. Is the person only there to send a message to the public and that he actually has no control over his own life?  I doubt that this lecturer would ever have made it onto you tube if it was the case. Wither this person is in the military or not it seems clear that he has managed to break the control of the implants. It also makes me question. Does the person have scars on his head to show where he has received surgery to have these implants inserted?

 

The Injection Implant.

I’m sure there are many TIs that have no recollection of having any surgery undertaken on my brain.

However, some TI’s may have been in a position where they may have actually witnessed an implant being inserted under the skin via an injection.

I actually witnessed an implant being put into my left hand and to my knowledge, it is still there. Also, because it is done via injection left literally no scarring.Implants are not unheard of and are actually a common practice. In my case it is difficult to know wither this implant was a simple tracking device or technology described in the video.

Brain implants seem a very complex task. Especially when directly injected into the head, would this cause significant brain damage?

Events over the years seemed to have shifted in terms of the nature of what I have experienced with gangstalking and events timed to almost precision in some cases.

As the gentleman points out the implant and a mobile device such as an android smart phone used in conjunction can send out a real-time signal to a control center.

Why the mobile device is important.  Addition information for TIs.

Aside from a physical monitor which uses the available cameras, microphones and interactions to study to you the battery charge enables the device to read from the implant and boost the signal. Being as the human body only has a small electrical charge to power the implant, the mobile acts as a booster.

It is also worth mentioning that from a question presented to me about changing a mobile device to an older version with less sophisticated technology might be of no real use today where tracking is concerned and also there are many other devices in society all around us which could home in on the tracking implants, certainly if in close proximity. But wither these older devices are powerful enough to interact with implants is not clear.

The best way to deal with this problem is to only to switch on a mobile device when absolutely necessary. The reason for this is because when the device is off, this severs connections from AI servers which relay information to those involved in harassment programs.

Also, modern AI used on smartphones requires heavy use of cameras and software designed to psychologically profile the user (not just targeted individuals). This means that by removing the sight of the camera used by AI, it becomes blind and cannot see or read your emotions or reactions to stimulus on the screen. Applying a form of ware resistant black tape to cameras on smart phones can dramatically reduce the amount of “artificial mindreading” that will be sent out to stalkers to apply in the real world.

As it is broadly known today, removing the battery from your mobile also stops malware from activating your device when it appears to be switched off and stops GPS tracking.

This can dramatically reduce harassment and coincidental events that can affect ones thinking on a day to day basis. Harassment tactics normally switch to standard servellience which is far heavier on resources and requires secondary protocols to be used that have been drawn out by either those involved or AI that can manage much larger scale situations.

Between the lines

In the world of computer hacking the lecturer to me is suggesting that what he and many others are experiencing is literally mind hacking.

So it means that if the mind is being hacked through wireless communication, does it mean that these methods of war games involve different governments hacking each other populations minds and gaining control? Simply put. Consider the fact that an opposing country could hack a person and literally spy in real-time.

The TI who is interviewed and V2K as a reality.

The lady in the video is obviously highly aware of the stalking techniques that are happening around her. This means that she is still in touch with her emotions. A vital key. It also means that the person can also draw the line between what is reality and what is not. This tells me that implants may not be used broadly.

In respect to “coincidence” being that generated from thoughts transpiring into an event requires some perspective.

Those with a good comprehension of computers or their logical principles can put two and two together to see what is going on.

Certainly the problem with V2K is that if you are linked into a system and don’t know it then you will think that the things around you are the actions of a omniscient being. What could it mean for a person who has had bad thoughts only for it to now appear that they are being punished for thinking them regardless of any actions? The point is certainly by many and from what this TI points out, is that if you are experiencing harassment, what is a person to think otherwise?

By all accounts where many consider “mathematics” to be god so why wouldn’t those events be any different in a persons mind? That is where the appearance of mental illness can take hold over an individual.

However, some manage to break through the illusion and realize quite quickly what is happening.

For those that have limited understanding of the technology that is used today and it’s psychological implications some individuals can be subjected to severe torture methods that constitute all the signs of mental illness. See the Psychic Vampirism section.

The reason for suicides as a result of the Gangstalking program.

If there is anything that we can do to grieve and learn from those we have never meet that who have died through this program is to see that we all have our individual will underneath everything. It would seem those individuals didn’t die through guilt but to point out that they still had a choice in what must have seemed an extremely lonely situation.

It is extremely unsetting to know that TIs who have posted valuable information online have only to taken their own lives not long after. The saddest part of these situations is that the information the TI had worked out for themselves was through gaining control of the experiences and learning from them.

After talking to Martin Bott a TI from Germany who has some extensive knowledge about psychological control weapons, he confirmed what I had suspected after an experience of this technology which I only had a brief experience with that I can only describe as a quite voice sitting in the back of the mind which I was able to mentally push into and heard the voice loud and clear on the other end.

It is where he pointed out that V2K subjects pose a danger in that the technology can be used to obtain knowledge rather than be controlled by it.

Martin Bott claims that these weapons have been in use for over a 100 years, some of which are noted to be what has caused severe mental illness such as Schizophrenia through voice to skull testing. What is evident is that many of these technologies are patented making the blueprints for these technologies a reality.

“Psychic Vampirism”

The collection of mythical creatures used by stalkers to illustrate their opinions of you can come in may forms.

One of which is where they consider the target or subject to be a “Vampire” sucking the life out of other people around them. It is also a common phrase used to describe a person such as a Narcissist or someone with a Bi-Polar diagnosis.

This is where Schizophrenia could be the overwhelming onslaught of external voices battering the conscious mind into submission. Much like the gentleman in the film has described and is now able to either ignore or call up the communication if he wishes.

 

“You are a Monkey!”

This is something a TI will likely here at some point during their experiences shouted by gangstalkers.

One TI recalls hearing this outside the window of the mental assessment room in a psychiatric unit.

Much like the gentleman in this video stating that V2K subjects are like lab monkeys.

So it would seem evident that animal rights campaigners got their wish. Human experimentation did take over after all. Sadly the animal testing didn’t stop.

 

What the uninformed actually believe!

Targeted individuals might observe stalkers talking to them like as if they are under their control like a dog.

In the respects that they think they are it is an illusion they have been fed by the sources that monitor TIs.

It would seem that they view their subjects to be like human Tamagotchi. Unfortunately the whole TI game is like telling a friend that you have a human robot and using some clever tricks to convince them so.

Yes, some TIs may have implants but unfortunately for these clowns they are not under their full control, if not at all.

 

Conclusion

It appears that the TIs that are breaking through today are in fact persons who have not been able to be programmed and have slipped through what was supposed to be a set of events constructed to test full mind control over a long period of years. Much like myself it spanned through three decades. I do not doubt from my experience that there are older TIs from the 70’s and possibly the late 60’s in vast numbers around today.

 

 

GB Wills: The Illegal UK Register of Targeted Individuals

Although this post is only significant to those in the U.K it is worth being aware that information on the subject of illegal registers on the internet seem to be ones that are slowly disappearing from search engines.

This post doesn’t really have anything of my own contribution to add other than to put the last significant post that can be found on Google onto Corrosion Info. It was posted on a David Icke Forum in 2013 by a person using the username Sarah Jane in reply to the subject of Threat Assessment Teams & Gang Stalking by a user known as Gangstalker.

 

“This group want to be called GB Wills. In the Corporate Environment it is known that your name can be put on a register if you a threaten potential corporate secrets. The Police can add you, and do. It is an illegal register if your name is on it you will be gangstalked all your lives, few know it.
It appears when you find out what they are doing i.e phone taping, surveillance without your knowledge, mobile phone hacking, TV Signal hacking using your DVB boxes to survey into your homes because this group have IT Service managers from Corporate companies working for them, they then go into your background and show you what they know.”

 

This was the original post. For those in the UK and experiencing gangstalking in the work place, this post is still highly relevant even if it is only minor harassment. Minor harassment can turn into major harassment which in all effect makes up the factors of a Targeted Individuals life.

https://forum.davidicke.com/showthread.php?t=139639

Threat Assessment Teams & Gang Stalking

A closer look

Many Targeted Individuals wonder how they could be placed on a list in the first place? Who has the power or the authority to do such a thing? If you live in a country such as the U.K. your local councils have this ability as displayed in the Jane Clift case. If you live in the U.S. or Canada it might be the task of what’s called a threat assessment team.

This team can be comprised of just a few individuals, to a team of many individuals. It depends on the company, educational facility, or community they are representing and what the specific needs are.

Some examples include members of Human Resource, Police Officers, Psychiatrists, Mental Health Professionals, Senior members of the department or division. In some cases there might be just a small team, who then liaison with various other departments. The team members are pre selected, so the team is already in place. The team should generally be trained in assessing workplace violence, violence on campus, what to do, who to call, and they might also be trained in profiling an individual, to enable them to make an assessment of wither an individual is a threat vs a none threat to the environment around them.

The threat assessment teams and who they are comprised of seem to make no concessions or allowances for being evaluated by a team of peers. Eg. In court cases they try to encourage a variety of jurors, so that a person being judged can be evaluated by a peer of their jurors. This in theory allows for fairer trials and outcomes. With the threat assessment teams there are no such guidelines for who the team is comprised of, or what the make up of the team should be. This may or may not account for why the Targeted Individual community has seen an above average targeting of females and minorities. In addition dissenters such as whistle-blowers, extremist site members, and conspiracy site members are also starting to show up above average.

Once in place the team is ready to take tips from the community around them. Generally the team will liaison with Human Resources, The police, Employee Assistance Program, Mental health, and when a report comes in they use these other resources to assist with their assessment of the Target.

Reports can be filed via a form, the reports can be filed anonymously. This means that the person making the accusation need not have any accountability for making a false report. This might not be the case in every area, but in most of the threat assessment guidelines I came across, reports could be filed anonymously. Keep in mind that report are likely primarily initiated by human resources, campus resources, etc. However anonymous reporting of any kind leaves an organization open to abuses of the system that might be difficult to identify or remedy.

http://www.threatassessment.vt.edu/F…x.html#CareTAT

http://rems.ed.gov/docs/EMHETraining…smentTeams.pdf

The threat assessment team works in a four part process.

1. Identify persons of concern
2. Gather information/investigate
3. Assess information and situation
4. Manage the situation

Identification of person of concern

Once a target is chosen, or a concern is forwarded to the threat assessment team it’s time for them to liaison and start to profile and assess if that target is a concern for further evaluation or monitoring, or if the case can be closed.

http://www.nalc.org/depart/cau/pdf/manuals/pub108.pdf

This threat assessment guide from the post office is interesting. Here are some of the criterias it uses to assess if a target could be a threat.

Obsessive focus on grudge — often quick to perceive unfairness or malice in others, especially supervisor.

Especially for males, great concerns or emphasis on sexual fidelity of mate.

Recent stressful events or severe losses.

Perceived loss of options.

Direct or veiled threats of bodily harm toward supervisory personnel, coworkers, or customers.

Physical deterioration (head injuries, cancer, disability, kidney failure, etc.).

Extreme sense of moral righteousness about things in general as well as believing that the organization does not follow its own policy and procedures.

Inability to handle constructive criticism well and projecting blame on others.

Demonstrated disregard for safety or coworkers.

Tendency to be a loner with little family or social support and often having an excessive investment in the job.

Another University uses these criteria for their threat assessment and fit for duty guidelines.

http://www.vpfa.fsu.edu/Employee-Ass…place-Violence

A. Expression of bizarre and inappropriate thoughts. B. Excessive absenteeism without prior approval or rationale. C. Degenerating physical appearance. D. Acts of insubordination. E. Poor work performance. F. Poor workplace relationships with others. G. Indications of alcohol/substance abuse. H. Excessive complaining.

Once an assessment is initiated information is gathered on the Target in question.

Gathering of information and Investigating

To gather information on the target, these threat assessment teams use a variety of sources. They use the persons friends, family, social networking circles, co-workers, neighbours, and other resources.

Triage questions can include:

• Has there been indications of suicidal thoughts,
plans, or attempts?
• Has there been indications of thoughts/plans of
violence?
• Does the person have access to a weapon or are
they trying to gain access?
• Are there concerns about the well-being of the
subject?

• Are there concerns about the safety of the
community?
• If yes, a full inquiry is recommended.

Gather Information (Full Inquiry)
• Think broadly and creatively about those who
might have information:

• Co-workers
• Other staff
• Friends
• Family
• Online friends, web sites, etc.
• Previous schools / employers
• Others?
• Document information and use it to answer the
Key Investigative Questions.

Many Targeted Individuals express concerns often that their families, friends, people online, others are playing a role in their monitoring, or are taking part. That they are somehow in on it, well according to what this threat evaluation guideline dictates, they are often in on it, and asked to be a part of the monitoring and evaluation process.

Need for Collaboration
“Most important, dangerous people rarely show all of
their symptoms to just one department or group on
campus. A professor may see a problem in an essay,
the campus police may endure belligerent
statements, a resident assistant may notice the
student is a loner, the counseling center may notice
that the student fails to appear for a follow-up visit.
Acting independently, no department is likely to solve
the problem. In short, colleges must recognize that
managing an educational environment is a team
effort, calling for collaboration and multilateral
solutions.”

They use a variety of sources in the targets environment, but because reports do come in remotely, there is cause for error, or even false reporting of events. These reports are used to keep targets on monitoring for years to come.

Many people believe that the social networking sites that they use are harmless, but when it comes to being evaluated as to wither you are a threat to your social circle, you will see that these sites have now begun to play a critical and integral role in assisting these teams to make their initial assessments.

Initial Screening
Helpful Internet sites include:
Google.com Bebo.com
MySpace.com Xanga.com
Facebook.com Snopes.com
YouTube.com thehoodup.com
Technorati.com
(searches blogs)
craigslist.com
(search the relevant city/town)
Twitter.com JuicyCampus.com
Blackplanet.com RateMyProfessor.com
MiGente.com Cuil.com

If unaware of the guidelines being used to assess them, targets could well be entrapped or tricked into making suggestive statements. Also once those around the target perceive that the target is under investigation, normal everyday behaviours that would have been brushed aside, become significant, and everything the target does is cause for alarm.

2. Have there been any communications
suggesting ideas or intent to attack?
• What, if anything, has the person
communicated to someone else (targets,
friends, co-workers, others) or written in a
diary, journal, email, or Web site concerning
his or her grievances, ideas and/or intentions?
• Has anyone been alerted or “warned away”?
Source: U.S. Secret Service and U.S. Department of Education, (2002)
Guide to Managing Threatening Situations and Creating Safe School Climates.
Key Investigative Questions

The threat assessment team will also circumvent laws such as FERPA and HIPAA to get around laws that would usually prevent an invasion of the targets rights and privacy.

Information Sharing: FERPA

• FERPA is not an impediment to effective threat
assessment and case management.
• FERPA governs records only, not observations,
communications, etc.
• FERPA does not govern police records.
• If created & maintained by law enforcement, for
law enforcement purpose.
• New guidance from ED encourages information
sharing where public safety is a concern.
• FERPA does not permit a private right of action.

Information Sharing: HIPAA
• Check with legal counsel as to which laws
govern counseling center records.
• Confidentiality is held by client, not MH provider.
• In cases where privacy laws apply, can try these
strategies:
• No legal prohibition against providing
information to health/MH professionals.
• Inquire about Tarasoff – type duty.
• Ask subject for permission to disclose.

Record Keeping
• Centralized incident tracking database;
• Document reports and actions – include date,
time, subjects, targets, behaviors of concern,
witnesses;
• Data;
• Assessment;
• Plan;
• Preserve evidence: Keep copies of email,
memos, etc.
Record Keeping
Incident tracking database;
• Incident Information:
• Date, location, nature of incident, means of approach;
• Subject information:
• Name, DOB, sex, description, affiliation, status, etc.
• Target / Victim Information;
• Name, DOB, sex, description, affiliation, status, etc.
• Witness/Reporting Party Information:
• Name, DOB, sex, description, affiliation, status, etc.

Assessing Information and Situation

Once all the reports are in from the eyes and ears around the target, then the assessing of information begins.

Think creatively about resources, as well as
“eyes and ears.”
• Anticipate likely change in the short and midterm,
and how the subject may react.
• Monitor using available resources. Who sees
the person regularly, inside work/campus,
outside, on weekends, online, etc.?

The threat assessment team use the information gathered together to determine if the target should be referred any third parties, this could include law enforcement, Employee Assistant Program, Mental Health Workers or others.

They evaluate if the person might be a danger to themselves or others, if the person is able to take care of themselves. Eg. Do they pay rent on time, do they buy groceries, are the suicidal, a threat to others, etc. If these criteria are not met, they might try to convince a judge or other health care worker that a mental health hold is required, or some other form of intervention.

Information is recorded and reported 24/7 and often stored in some form of centralized database. The records are crossed referenced with police and other contacts.

Now this procedure was in place well before the fusion centers ever came into existence, however it is not out of the question to assume that fusion centers might well be used in future or linked into this process, even if they were not initially used.

Once a Targeted is listed for monitoring, even if they move away from the university, place of employment, or community, if they are still perceived to be a threat to others the remote monitoring, or case management will continue.

While the case is open the team should:

• Continue to monitor and modify the plan as long as the individual still poses a threat

• Recognize that a person can continue to pose a threat even after he/she ceases to be a Closing a Case
member of the campus community

• Continue to monitor the situation through its relationship with local law enforcement agencies and mental health agencies, as well as in direct cooperation with the person, if possible

http://www.threatassessment.vt.edu/F…x.html#CareTAT

The Target will be monitored as long as they are perceived as a threat. There is no current limit to how many years the state can continue this monitoring, imposition and disruption of the targets life.

If someone who has been reviewed by the Threat Assessment Team leaves the area, do you continue to monitor him/her?

If the situation warrants reviewing the case after the subject leaves the area, the team will continue to do so. It is important to remember that when the subject has relationships in his/her life, there is a lesser chance for violence to occur. A failure to communicate or interact with a subject encourages problems to fester, which could lead to violence.

Also under many of these occupational health and safety guidelines, the Targets information can and will be shared with those that they are likely to come in contact with.

http://www.wcb.pe.ca/photos/original/wcb_wpviolence.pdf

“In the service sector this may require identifying to employees persons who have a history of aggressive or inappropriate behavior in the store, bar, mall or taxi.

The identity of the person and the nature of the risk must be given to staff likely to come into contact with that person. While workers have the right to know the risks, it is important to remember that this information cannot be indiscriminately distributed.

Remember as the case is being monitored, any incidents, perceived threats, strange behaviour, anything at all can be reported to this team for assessment and evaluation. If the team feels that a change in behaviour constitutes a threat the team might upgrade the targets to something along the lines of medium risk, danger to self or others, should only be seen in pairs.

Manage The Situation

The threat assessment team might also add specific quirks of the target to their files, things that the general public might be made aware of, such as if the target starts to pace it could be a sign of imminent attack.

Assessment: Case Priority Levels

PRIORITY 1 (Extreme Risk): Poses clear/immediate threat of violence or self-harm and requires immediate containment, law enforcement involvement, target protection, and case management plan.

PRIORITY 2 (High Risk): Poses threat of violence or self-harm but lacks immediacy or access to target. Requires active monitoring and case management plan.

PRIORITY 3 (Moderate Risk): Does not pose threat of violence or self harm, but exhibits significantly disruptive behaviors and/or need for assistance. Requires active monitoring, case management plan, and appropriate referrals.

PRIORITY 4 (Low Risk): Does not pose threat of violence or self-harm at this time, but may exhibit some disruptive behavior and/or need for assistance. Requires passive monitoring. Utilize case management and referrals as appropriate.

PRIORITY 5 (No Identified Risk): Does not pose threat of violence or self-harm nor is there evidence of disruption to community. No case management or monitoring required.

It can be clearly shown that monitoring is indeed a part of the guidelines that these threat assessment teams do follow.

Once the plan is developed, it needs to be
implemented and monitored.
• Team should include implementation and
monitoring responsibilities as part of the case
management plan.
• Further referrals may be necessary.
• Team should continue to follow up as
necessary.

What targets may wish to do in future is redirect F.O.I.A. (Freedom Of Information Act) requests to these agencies.
Targets may also wish to have their lawyers make a cease and desist request to these threat assessment teams in regards to the overly invasive monitoring that is allowed. In future Targeted Individuals might even be able to come together and aim class action lawsuits or individual, and human rights lawsuits at these teams. Slander suits and others might also be suitable.

What would also be nice is to gain some statistics on who is being monitored via these threat assessment teams. Which case files were closed, vs which are still open. How many years does the average case stay open for? Ages, genders, race, how many were whistle-blowers, or belonged to a dissident, extremist, conspiracy or protest group. How many cases ended in suicide? Incarceration? Institutionalization? Homelessness?

These might be things that future Targeted Individuals look into as they seek assistance in stopping the monitoring, surveillance, and life disruptions, and curtailling the abuses that are being experienced under these programs.

With these threat assessment teams it’s extremely important to realize that if the threat assessment team is composed of one group, and they are assigned to make a threat assessment of another group or individual, you might not have fair and balanced assessments, because these teams than do not take into considerations cultural norms, gender, racial, sexual, or other biases that might be present, or underlying within the assessment team. The assessment team is essentially playing judge, jury, and executioner with their assessments of these individuals, thus if courts are required in many cases to use a fair and balanced jury of peers, should Threat Assessment Teams be morally or legally required to do the same in future?

The Eye Thanks. An experience of Gangstalker Extraction AI Tech. November 2015 Part 2

Continued.

 

Text: I have a few minutes to organize my time.

 

Me: Well done. Its a bit longer for me because a) I take medication for b) depression and for the most part live my life with this. Never had to steal a information or lol judge people on the “body” as your put it! That is purely an assumption. You don’t know what I think of people.Thing is when you began to take and exploit my data, some of which heart felt, it is irrelevant to me what you do with it. You take what I want you to take. Thing is you call it theft, I call it a violation of human rights where this is concerned. Life long even before any implication of theft could ever be implicated. Lol. You bring your data into the court room and face it. Every single bit. Videos, audio, pictures and anything else you have and bring me to trial for this “theft”! And I mean anywhere in my home, outside, places Ive lived anywhere I have been even back to a kid. You do that. But you would hesitate. At the mercy of perversion.

 

Text: The reason for this is a Stasi.

 

Me: Practice what you preach! Btw, forwarding that information on to the police means that you have to explain here and how you obtained it. Regardless if you are a snitch or not.You do realize that the methods you use can be tracked by internet companies too?

 

Text: I have a day to day. I have been followed the way side. Another person had already been employed for my roll and had to work alongside him until eventually. I know.

 

Me: Lies? Park outside my house. Corsa boy! (I am referring to a computer programmer who was following me and hacking my computer from 2009-onwards.)

 

Text: You are a fucking door, so you feel like I said that, in a few days but please let you all been deception. (Saying that I give myself away.)

 

Me: The difference between me and you is that I have nothing to hide.

 

Text: This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish I was a great day and the means to find a place where I am not going out for no apparent reason. However, if you are going direct in using ******, this is where you will struggle with a *** like ******.

 

Me: I, my creepy friend know the value of that product. It would not sell at £90 and you saw it as a good opportunity to exorcise your right to judge. Because based on snooping around in deception I can gladly give it to someone who deserves it, not a prizefighter.

(I miss understood this. It was implied that I would not be able to go out for a reason with stalking activities continuing. I have however, been able to do so.)

 

Text: This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish. Having said. Me. Coinsides the way, the control of my favourite, I can see from your own lies. Might go and do a full time. (Referring to my observations of gangstalkers and the one I suspected I was in a relationship with)

 

Me: Well just call it curiosity.

 

Text: This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish I was a great day and the means to find a place where I am not going out for no apparent reason.

 

Me: It is the reason that is the issue.

 

Text: The comments for your help. I have been followed the way side. Another person had already been employed for my roll and had to work alongside him until eventually. I know. Yeah, and when I get the facts. The list of the body. I have to be a racist.

(Racist meaning all targeted individuals are not chosen subject to their colour but as a whole race based on what those individuals are as people.)

Again, did not understand the message causing me to talk about an subject of racial discrimination.

Me: So, you are trying to say that I am dumb enough to think that pretending to be a racist means that what I say makes me one?

(It was implied in the passed by certain individuals that I was a racist. Some people don’t understand irony.)

 

Text: It’s not a good thing. But I am still finding the right thing, but I think I will not be able the eye of the Illuminati.

 

Me: In other words its your requirement to deceive.

 

Text: The list of the body. Because work in tandem with each other it may get a chance. Bet you can’t handle it.

 

Me: That isn’t the issue. Handling it is a question of how a mind copes.

 

Text: This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish.

 

Me: Right so the opportunity for me to have an interview for a job is no longer required based on the fact that I can’t become a racist to take one down?

 

Text: You have no hesitation in the process. The list of the body. Because work in tandem with each other it may get a chance.

(Implying that the person would pretend to be a racist to take one down and I would not.)

 

Me: I appreciate what you say. In other words you were testing to see if I was a racist?

 

Text: I’m sorry am a beautiful person. The comments for your help. I have been followed the way side. Another person had already been employed for my roll and had to work alongside him until eventually. I know.

 

Me: Put it this way, I am glad that that deception was the reason.

 

Text: You need to explain. This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish I was a great day and the means to find a place where I am not going out for no apparent reason.

 

Me: I understand but that isn’t my aim in life.

 

Text: Sounds like its already settling in like a drain.

 

Me: Well on account of it I took that as an act of revenge on me.

 

Text: Coincides the way, the control of my favorite things that you can take this opportunity.

 

Text: You think that was my aim? You have no hesitation in the process. (Implies I had sought revenge.)

 

Me: I disagree.

 

Text: Yeah. A prospective students, this stalking me, and the States and

 

Me: So I’m the stalker?

 

Text: You have no hesitation.

 

Me: Correct me if I’m wrong but how exactly am I stalking you?

 

Text: Quoting my text: “The hare has bigger ears! Phhhht. Im enjoying the daily program btw. Hehehe.”

(Referring to the fact that I listen to gangstalkers. It is hardly avoidable at times.It is just not liked that I record the information.)

 

Me: Ah, perhaps a view to try and understand.

 

Text: Me and I am still finding the right thing, but I think I will not be able the eye of a mish mash.

 

Me: We all go against principles to discover. Perhaps its the solitary path that was the problem then?

 

Text: Won’t be long. I have to be a racist. I have to be careful what you think? (Doesn’t like the fact that stalkers cannot steal and spread my information without being careful about what I think.)

 

Me: Ah, well let’s work it out?

 

Text: If you are part in a while, but I think I will not be able the eye of a mish mash.

(They would work with me unless I was broken by them.)

 

Me: You told me I wasn’t on the list. However I was asked. The reason I declined is because I was confused. (Referring to an opportunity to join Freemasonry to which I declined later to be told I was not on the list initially as Masons select their members. Despite that they open their doors to the public, it was clear that this isn’t true.)

 

 

Text: It has to do so by turning up. I am not a good time. This email and any files which I thinks of your own home and abroad and a bit.

 

(This is referring to comments I had made about stalkers living on my street that were settlers from Europe. It seems to suggest that the person replying was one of these people or knew them. The makers of the Fast note program where from the country these stalkers were from.)

 

Text: I have been a while. I have been a while. How do we do have any comments on my blog any time soon as we are able, I think it wasn’t too sure if the person or organization, the first place to find the contact us as a whole. This email and any files which I’m really not a valid poll, I think its just the thing to remember to take part.

(Saying that the person did not like comments about his ethnicity in terms of being deceiving. It is clear that the person cannot comprehend that a TI knows that anyone can be a gangstalker but plays on the fact a TI may worry about racial discrimination which a GS is likely to use against a TI especially if it has been extracted of a computer device.)

 

Me: True to the last part.

 

Text: They may not necessarily those with an update.

 

Me: Mmm, depends if your getting stalked or not your entire life. Gets a little confusing.

 

Text: The list is not the only way I could have a good times, but the most important things. They have been made. This will help my first post.

 

Me: Mmm, let that help your posts. From might point of view it seemed like alienation on more than one account.

 

Text: You can also be used to be a good idea to advertise the UK. I have been a while. How to make sure I have to pay a penny helps you’re not going anywhere in mainland delivery on orders placed on a daily, put your mind to the top. This email and any files which I think it was important that the new site is now in a couple.

(A partial admittance that Gang stalkers pay into a fund that allows the operations to take place. This is where TIs and those who have witness it wonder how GS operations are able to operate on such a large level. It is also saying that the gangstalking operation the person participates in is now two operation. This means Freemasonry that has become two fractions. Chosen and non-chosen members. Freemasonry requires financial contributions towards degrees with the money going to charity. Coincides why some TIs experience gangstalking from the homeless and the poor.It is suggesting that this person is a Freemason from Europe.)

 

Me: I never intended to be in this position. However I have tried to use my time to do something productive instead of pissing it up the wall. If anything I had to try and find direction from a situation that seemed to be very much difficult.

 

Text: The list is not the only way I could have a good time, but the most important things. They have been made. This will help me but it was the last time. The list is not there, but the most important things. The list is not the only way I could have a good time. I have been a while. How do we go. You should also check with you to do something with you to do so by turning up.

 

Me: That is an issue I am working on. You are not a good time?

 

Text: What are the most important things. The list is not the only way I could have a good time.

 

Me: That list is not a good time if you mean this list or the “list”. The list of bodies in terms of individuals involved in this and the “list” which referred to involvement in acquiring and applying knowledge. The latter interested me . Harassment does not.

 

Me: I have not worded that right.

 

Me: Knowledge and application of it interests me. The harassment does not. The harassment seems unfounded and confusing.

 

Me: Having no hesitation? That is partly a contradiction. Being watched 24/7.

 

Text: This email and any files which I think it was no the best of all ages, so that we are able, I think it was not the same.

(In other words based on what has been extracted from my devices they don’t believe my intentions. It is saying that the knowledge they gain and learn from in principle is from watching others ways.)

 

Text: No best of all ages?

 

Text: What do we do have any comments on my blog and a bit. The may not necessarily those with an update. The may no the best of all ages, so that we are able, I think it was not the same. (In other words they feel they cannot live good lives without watching the examples of other peoples lives, good or bad.)

 

Me: Mmm, I get your point. Its a question of how that data is used.

 

Text: This email and any files which I think it was no need a little while, so that we are able, I think it was not the same.

 

Me: No, it was needed before and was taken.

 

Text: The may not necessarily those with an update.

 

Me: I know.

 

Text: The list is not the only way I could have a good time.

 

Me: I know.

 

Text: I’m a little while, so that we are able is not responsible. This email and any files which I thinks of your own home and abroad and a bit.

(Concerned about the comment I had made about my private diaries about my partner and family.)

 

Me: Yep.

 

Text: This email and any files which I think it was no need a little while, so that we are able, I think it was not the same. We will have the same.

 

Text: The comments for your help. I have been a while. I’m sure you have any queries, you’ll find it difficult for me to be the best, but the most important things. The list is not there, but the most important things.

 

Me: List?

 

Text: What do we do have any comments on my log on.

 

Text: We will have the same. The comments for your help. We are looking at a later stage, the more you will find the right place for a few minutes.
Text: We are looking at a later stage, the more you will find the right place for a few minutes.

(Perhaps not liking that the comments reveal their true intentions while trying to operate in front of me without exposure. Therefore implying they wish to have prepared slander to hide their actions and conserve their reputations. I know this was an issue due to the nature of abuse involved in the family.)

 

Text: This will help me out. I am not a good time. The list is not the only way I could have been a while. I think it was not the same.

 

Text: I am not a good time. This email address. Please wait for the first time in the UK. I have been a while. How do we do have any comment’s to you, but it would like the one you want. I think it was not the same. (Implying that the comments that I heard from them which concerning my business are not the ones I want to hear but positive ones of acceptance. They see me as living a lie based on what I know. Yet they cannot comprehend that I was not intimidated by them and would not leave without answers.)

 

Me: The one I like?

 

Text: The only problem I will have the same. We will haven’t seen the photos, music. This email an excellent job search that I can do far from over a period, but it would like the one you want.

 

Me: Are you referring to the drawing?

 

Text: What do we do have any comments on my log on. We will have the same.

 

Me: Oh I see. So that means I have to communicate like this.

 

Text: It has to do so by turning up. It has to do so by turning up. The comments for your help. We are looking at a later stage, the more young man. I’m sure you have any queries, you’ll find it difficult for me to be the best, but the most important things.

 

Me: Turn up where?

 

Text: The list is not the only way I could have a good time. This email and any files which I thinking.

(Threatening to distribute the contents of my hard drives and personal information. The purpose was to gain access to all my personal belongings using a computer programmer to extract the information from outside the country in the United States.

The problem with gangstalking is that if entrapment does not work within a country then information is extracted from others. This information is then circulated in and out through careful distribution. They are like illegal wanted posters that circle on the Darknet, like human trafficking. This family took part in these activities.)

 

Me: Last time I saw you, you implied I called you a c++t. I did not. It is strange as to where that was the case.

 

Text: This email and any files which I think it was not the same. (I was talking of the wrong person. This indicates that stalkers are not all briefed in full about the nature of the target in full or to why they are being followed.)

 

Me: The chain of events started before this long before I met or knew you. Doesn’t make sense. If this is the one stop then I have not meet anyone to call you that.The events on here do not have any relation as such.However being observed still is no need to say that to anyone other than yourself if I had means to do so. Curious. Not to name drop but it is someone else that seemed to have a problem with you. However it is not my place to go mouthing about someone who I have only meet a few times. Anyway, that word has been a reoccurring theme for many years. Perhaps overused misinterpreted and so on. Its a complete mess. However, it still does not make sense.

 

Text: The reason is the most of your arse the way, the control of my favourite, I can see from your own lies. (Did not like the fact that I had worked out the situation where I had lived.)

 

Me: Mmmm. Trying to say that my problems are separate to your actions?

 

Text: The reason is the most of your arse the way, the control of my favourite, I can see from your own lies. Might go and do a full time. (In terms of being watched this refers to the persons previous employment of servellience.)

 

Me: Well with deception like this I afraid that how was I ever meant to see anything.

 

Text: A prospective students, this stalking me, and the States and the poor and I am still finding the right thing, but I think I will not be able the eye of a mish mash up a little while, so you feel like I said that, in a few days but please let you all been deception.

 

Me: Oh yeah, I’m still finding the right thing too.

 

Text: That’s the one you want. What? Could just go with it, but the doseage the way, the control of my favourite, I can see from your own lies. (In other words it is implied that my intentions and actions where not for the benefit of others.)

 

Me: What lies?

 

Text: You have no hesitation in the process. The list of the body.

 

Me: I know what you watch.

 

Text: Selling your property and rearranged, I can see from your own lies. Might go and do a full time. (Implying I am manipulative and deceptive.)

 

Me: Yeah and?

 

Text: Yeah and? Yeah and I mean. It will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish I was a great day and the means to find a place where I am not going out for no apparent reason.

 

Me: Your right thing is subjective!

 

Text: You are a fucking door, so you feel like I said that, in a few days but please let you all been deception. The product comes in the first admission, I can see from your own lies. (The person cannot see that their method of extraction wasn’t fool proof.)

 

Me: Yeah who made you such a good judge?

 

Text: You have no hesitation in recommending you to watch me because I was young? (This is a confused message of extraction pertaining to the persons history of abuse. It was documented on my notes however I made no threats to expose it.)

Me: Wrong! No seriously! You are! You just assumed. You wouldn’t be poking around in here if that was true! Incorrect again.I know. I know. And? Recommendations?

 

Text: You have no hesitation in recommending you to watch me because I was young.

 

Me: Incorrect. That is an assumption. In fact what are you on about?

 

Text: Oh, and the States and the poor and I am still finding the right thing,

 

Me: Young. Your suggestion is about as valid as what you preach.

 

Text: The list of the body. Because work in tandem with each other it may get a chance.

 

In terms of phone cloning and links to ********** there are links to ***. Like I said. It is irrelevant.

 

Text: Correct. Sort your algorithm out. Lol. Oh you don’t want me to start up on that one.

 

Me: Well perhaps like I said. Your methods breed the lack of hesitation in people.

 

Text: To capitalize. Trying to program ahead to make everything seem like hell for someone.

 

Me: Mmmm. Well I’m glad my favorite past time wasn’t a loss then.

 

Text: If it was important to us, and the States and the poor and I am still finding the right thing, but I think I will not be able the eye of a mish the most obvious.

 

Me: The hell is now! I don’t see your objective to any future.

 

Text: The list of the body. Because work in tandem with each other it may get a chance. Bet you can’t handle it. Oh and the rest.

 

Me: To disconnect the mind from feeling and emotion to pass judgement of the eye.

 

Text: Anonymous eye and you think I won’t be disappointed if I am still using the link to the Police force and to be confusing. (Seems convinced that I am not aware who this person is.)

 

Me: Nope.

 

Text: Prove it. Ahahahah. The intell. Oh right. Love to see it, try the search engines and a few minutes to complete your details below to see it. (Trying to ascertain how I worked out the entrapment with arrogance.)

 

Me: Depends on what you want to see isn’t it?

 

Text: Oh you think I’m ripping off your work? I think a lot. And? So? Yeah and? Yeah and? Yeah and? Yeah and?

 

Me: Lol. Yeah and?

 

Text: Yeah and? Yeah and? Your signals and a bit. That was a great day and the means to find a place where I am not going out for no apparent. However, if you are going direct in using ******, this is where you will struggle with a music program. (Meaning my methods of extracting from them will not work, even though it clearly had already.)

 

Me: Ohhhhh. Well. Excuse me.

 

Text: Coincides, and the States and the poor and I am still finding the right thing, but I think I will not be able the eye of a mish the most obvious. Yesterday was a bit more. We have a day, and the States and the poor and I am still finding the right thing.

 

Me: Depends on the right thing doesn’t it? You seem to think I judge you based on what I write. Much like the eye of me that you so proclaim is the one that gets you outside!

 

Text: The following is the best for me to start accepting the most obvious. Yesterday was a bit more. We have a day, and the States and the poor and I am still finding the right thing. (Saying that his ways under the eye makes the next day even better.)

 

Me: Yet I don’t judge you. Ah well, but I think I will not be able the eye of a mish the most obvious.

 

Me: Perhaps the mish mash is what you see in yourself.

 

Me: Really? Well, revenge. Mmm, let me see. Revenge. Disagree with the psychosis? Well that only means that the only problem with psychosis is yourself.

 

Text: With a bit of revenge. You are a overhead! I disagree with the psychosis now. (Not only did I figure out the program but took away his overheads. A TI can be known as an overheads to a paid honey trappers, extortion/conversion rings. Overheads to their debts and not necessarily to the ones of their clients.

 

Me: Revenge?

 

Me: What is known is known.

 

Text: The list of the body. I have to be a racist. (The body that lists Targeted Individuals.)

 

Me: Revenge is absolute pointless then.

 

Text: If it was important to us, and the States and the poor and I am still finding the right way. (The right way of doing business.)

 

Me: The importance of revenge is only of importance when there is a requirement to do so based on a reason.

 

Me: Well, revenge. If you have a reason. It must be utterly contrived to do so.

 

Text: What is *the place I live* to far away from the root sources. This is coincidental because a food shop is due and they think that I won’t be disappointed if I am still using the link to the Police force and to be confusing. (Directly stating that the gangstalker has been given access to Police technology to hack into victims phones.)

 

Me: Yeah and?

 

Text: Your signals and a bit. That was a great day and the means to find a place where I am not going out for no apparent reason. (Using my signals as a way to know when to follow me.)

 

Me: Signals? That must be subjective to you.

 

Text: Therefore I feel I am not going out for no apparent reason.

 

Me: Ah but of course. But you wouldn’t if you weren’t checking up every second.

 

Text: This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish, I was a great day and the means to find a place where I am not going out for no apparent reason. However, if you are going direct in using plugins, this is where you will struggle with a music program.

(Saying that the stalker I live with is aware and is an admittance of her manipulation. To the reader it will not make sense how this reflects to my ex-partner but the last part is paraphrasing the text from key logged information.)

 

Me: A door. Correct. Well, it wasn’t that bad an algorithm was it? Or maybe just being made to say things like that all the time. Best get the facts right before mouthing off eh? So every year and the means were well founded.

 

Text: (Paraphrasing) However the situation seemed to be known in the context of the conversation we had.

 

Me: Hahahaha. Oh come on impress me. If you are that good, leave a message on here right here.

(Asking the recipient to message me themselves without making me do it. There was no response.)

 

Text: (Paraphrasing) Nice to see you running around into doctors surgeries, shops, fuck you know what Im saying? Hahaha predictable. Deliberate infection ( s ) Conformation collected through testing methods. Ear infection and other unknown. Further conformation of S. Direct link to *** record department! Explains why security guard was present. Diversion tactic. Made situation to look like I was violent so I would be concerned taking emphasis off infection. This would be known prior. It will also explain previous infections that have been unexplainable. Records are most likely in the process of being destroyed or altered for evidence purposes. First sign of infection was middle of August. This has happened before and normally during situations that were designed to be confusing. Taking emphasis off the main objective. Tv coincidence mentioning Hospital and Police references.

 

Me: Yeah! And I can fucking take it while learn to try and help myself. And learn and x y and z. Because let’s face it.

 

Text: (partly-paraphrasing.) Every single bit. Videos, photos. That doesn’t necessarily come from you. But you can also be used to get rid of lag, cracks and pops of which are more addictive and detrimental to people’s health than street drugs. Anti psychotics are no exception. I know. I know. I know.

 

(This is basically saying that my intelligence to take on gangstalkers has been of value to them and there will be applied counter measures for other TIs.)

Me: Yeah, why then is that such a problem to you? Thing is if you have had to listen to ever single little thing I have said much like Ive had my whole life, that is a problem for not only me but others. The others. Well thats my problem. Your problem? Yeah is it? Or maybe just being made to say things like that all the time. Best get the facts right before mouthing off eh? Do you know what? Perhaps you should continue mouthing off yourself. Relatively speaking it comes full circle. Well? A good estimation. Well that respect I took a leaf out of your book. (Saying that the information I have will also be used for TIs)

 

Text: It will be fine,.It was all pre-planned, but I think a review of this email. I have to be a racist. Revenge on my behalf of our website, but the dosage, I, s, I, s

 

Me: Well its hardly revenge is it?

 

Text: You’ve got the right place, the dangers, I, s, I, s, I

 

Me: Dangers?

 

Text: You have a problem. Along the lines. I have to be a racist.

 

Me: You have to be a racist?

 

Text: Im sorry am a beautiful person. The comments for your help. I have been followed the way side. Another person had already been employed for my roll and had to work alongside him until eventually. I know that the information contained on the internet. Many thanks to a zero. (Paraphrasing) The list is a tracker so what? Oh you think I’m ripping off your work! The PayPal account, and I am not a valid poll, I, s, I, s in the process of being destroyed or altered for evidence purposes. First sign of infection was middle of August. This has happened before and normally during situations that were designed to be confusing. Taking emphasis off the main objective. Tv coincidence mentioning Hospital and Police references. No surprise. All aspects of media are designed and planned well ahead. (Basically saying that he has orders!)

 

Me: Disinformation.

 

Text: Mmmm. Your problem?

Here I was confused and was thinking of the mental health situation I was involved with.

Me: Not your problem. Mmm. You are hinting at something that isn’t really linked to the main point. Do you find it appropriate to drug the community to make them ill? To capitalize? That’s it?My problem? Create a problem. In my lies? Or other peoples lies?Pre-planned? So coming for help was an object of some kind of hiding? Surely, the problem was drawn into it.To capitalize? Me? So in terms of those things prior to any sort of reguired help? The main issues that people talk about freely are of no value at all? In other words which I research is quackery? Surely, then somewhere someone has missed the point.That being to capitalism wouldn’t need any form of revenge. The eye of a mish mash? May I point out, that you have sought to point that I have been too busy looking at you while you have been having a good time.Yet my looking and researching is quackery? Revenge for you’re website. I seriously doubt there is revenge for quackery here. In fact that dissolves the point. The eye of a mish mash. Since when haven’t the coincidences been one? I am the subject of a mish mash. And as it goes, I made a choice. And to be honest if I am a quack then achieving what I have wouldn’t have done so without facts. As Im sure then it must be you, to some degree that obtains results through quackery. Seems my end results aren’t bogus then are they? In terms of your problem. In that respect is subjective to observation. What you know? To scan the mind? The technologies involved to do that. Coincidental phenomena. What it tells you? Control? A controlled environment. Still a mish mash? I think not.

“What I find interesting………”
Text: The comments for your help. I have to be a good idea that I am a quack the way you want. The BAD does not work with a bunch, I have a psychiatrist it. It will not set in a few weeks. The BAD does not work with the psychosis now. I have to be a racist. So what you think? Clearly a neighbour across the road had made a mistake. I know who sent me. The list below to find out. Lol, but for one year from date. The comments for your help.

 

Text: (Paraphrasing) However the situation seemed to be known in the context of the conversation we had. Despite explaining the situation. *****s mood suddenly more confident and unusual. Pre-internet would have relied on radio communication skills and experience of the eye of a mish the way side of things that this was a mystery.

(This is saying that even though I had worked a lot out I was still blind to other things. This is using old methods to illustrate that this modern method of extraction is the modern alternative to older ones which had many flaws.)

 

Text: Until afterwards and the poor and I am still finding the right thing, but I think I will not be able the eye of a mish mash.

(Possibly saying, that they can not help me or change anything nor help me in front of the eye as it is clear of my intentions.)

 

Text: You can also get the most from you, and I will have the nerve the way you want. The Bad does not work with a bunch, I have a psychiatrist it. It will not set in a few weeks.

 

Text: We have years. Oh you don’t want me to start up on that one. Probably not the case. This has a new job and a bit more about this product.

 

Text: We have years of experience, but the page you requested could not be able the eye of a mish mash. (paraphrasing) “Oh nevermind its my mid morning rant I wouldn’t take to much from it. You seem to think that people care about things you think you are good at? That’s highly subjective. Hahaha, interepretation of that? Exactly. “

 

Text replies using parts of this previous conversation:
Didn’t realize that either? As in eyes. You stated. Bullshit. Rephrase Eh? If that means you don’t know parts it irrelevant. Correct. Sort your algorithm out. Lol. Oh you dont want me to start up on that one tttttt the eye. Anonymous eye and you think tt the eye. Anonymous eye and you think I won’t be disappointed if I am still finding the right thing, but I think I will not be able the eye of a mish mash. Oh nevermind its my mid morning rant I wouldn’t take to much from it. I bet. What is the eye. I can’t wait for withdrawal of a lot of people in the process. I have been in the UK, but for one year from date. The list is endless hour’s drive, but for one year from date. The list is end less. The list is endless hour’s drive, but for one year from date.

(Basically saying that he is not disappointed that he can at least extract some information from me. The right things that will run the eye and it’s judgement of him.)

 

Text: We are a fucking media website, it came out. I have a psychiatrist it. It will not set in a few weeks.

 

Me: Good for you.

 

Text: Ah well. I have been in the UK, but for one year from date. The comments for your help. I have to be a racist.

Text: Revenge on the skin of a lot of people in the process. The list of the body. Because work in tandem with each other it may get a chance.

Text: Bet you can’t handle it. Oh and the rest. I know. I know. I know. The comments box, the dangers, but the page, but the page, change the way side. Another person had already been employed for my roll and had to work alongside him until eventually. I know.

Text: Yeah he was in a while. Oh and the rest. The comments for your help and advice on how well you feel will be important to how your day. We are a fucking media website. In that case, the control of my favourite, I can see from your own lies. Might go and do a full time. Well with deception like this I afraid that how you interpret it? The one that I won’t be disappointed if I am still finding the right thing, but I think I will not be able the eye of a mish mash. “Oh never mind its my mid morning rant.”

Text: The list is endless hour’s drive to get the most popular programs and stealing from the root sources of information. We have been unexplainable the eye of a lot more physical activity levels of lunacy the eye of a mish the most obvious connection!

 

(Basically gangstalkers who are in relationships, friends or family of a TI will be forced to leave a situation such as home, area and so forth if the plan has not worked. It means that a person could be in a happy relationship and then suddenly dropped into a situation where they could be homeless. This means that there are specific handlers that can be assigned to a TI to take over from the job of  watching the target well in advance before anything happens in a future event. All events are pre-planned.)

 

 

Text: The list of the body. Because work in tandem with each other it may get a chance. That is an example of throwing the target of the body. Because work in tandem with each year and the means to find a place where I am not going out for no apparent reason.

 

(It is saying that the person is an analytical psychiatrist involved with the prison service. Throwing the person in a cell on the behalf of the mental health body and so he has a job to go to.)

 

Me: Lol, No you are a risk to the public safety! A threat to national security. Hahaha. A threat to national sanity. Coincidentally and not ironically a high maintenance job!

 

Text: Leave your name and comments below. (Implying that I am the problem.)

 

Text: Please let you down, the dangers of my interference the way you can see that you are not coincidences, I have to do so by the end, but the page. We are all about. Its not like that, but the page. We are all about. (Page. Or wage “Cockney slang. Implying they are only doing this for a wage. Nothing personal just business.)

 

Me: Extortion. You have no hesitation.

 

*******Missin text*********
Text: Because based on snooping around in deception I can gladly give it to someone who deserves it, not a prizefighter.

 

Text: This will be running the eye, nor must have the opportunity for an interview for you to see you there is no longer wish I was a great day.

 

Me: Prizefighter? What is there to take prise from? Money, fame?

 

Text: I have no hesitation?

 

Me: To stitch up the world?

 

Me: No hesitation?

 

Text: I go under the eye.

 

Me: If I was not trying to find a right way I would not be on here asking? An interview is not my concern. Although, I don’t understand why you would find interest in me?

 

Text: You can also get a quote from you soon, and? This would mean a few weeks, and? This would mean a few weeks of my interference, I have to do it for the the ***. (Again stating that he is employed to take care of my on behalf of the medical body.)

 

Me: It is not my desire to live like this.

 

Text: ***** called the number one priority for a solid, and? This would mean a few weeks, and?

 

Me: A solid?

 

Text: You have a problem with the psychosis? I think a review of the eye? Ah, yes, but for the then you will be running a business.

 

Me: The psychosis is a problem for me. The psychosis I experience.

 

Text: Utter words. Videos. This has a lot more than happy with it running a little more about our relationship, I have to do it for the then I will have a difficult one. (Implying that it has to watch me to protect their interests!)

 

Me: I disagree. It is frustration.

 

Text: This has a lot more than happy with it running a little more about our relationship.

 

Here I am talking about a medical problem that was not dealt with despite making it aware at a later stage.

Me: Yes. My frustration must be clear. It is a problem I have that does not make sense to me that relates to my body.

Me: It has caused problems and ones I did not understand. They are ones I tried to fix myself. I before I could it was too late. But I did not understand.

 

Text: Ok. I know who you think of people in a few weeks, and? This would mean a few weeks. (This means that as they listen in they already know what I think of the people concerned.)

 

Me: I don’t really think those things. But in this position I have been confused for so long I have had to see all comments about me. That hurts because I feel I have had no chance to sort those problems out.

(Here, I was at a low point. Later realizing I am confessing to a machine. However, given the nature of the text it can be observed that this protocol can be used to draw false confessions through stress.)

 

Text: The comments box below. I have been in touch with the *product company* into the address bar. (Implying they have already taken it into account.)

 

Text: The comments for your help. However, that is very important. If it is not something I can do the same.

 

Me: Thank you.

 

Text: Ah the old craft ways haven’t changed have they. Still the ole eavesdropping! Well, I can see from your own lies. Might go and do a full time. “Well with deception like this I afraid that how was I ever meant to see anything. “
(Implying that I should have just gone down there and asked why I am being harassed! As it stands, they are well aware of my history with harassment and don’t give answers.)

 

Text: A prospective students, this stalking me, and the States and the poor and I am still finding the right thing, but I think I will not be able the eye of a mish mash.

 

Me: That it fair enough but I have been lost for so long I had no other choice.

(In reflection, the responder is again claiming that I am the stalker.)

 

Text: The list is endless. The list is endless. The comments for your help. I have to be a racist. Revenge on my behalf from the root sources. This is coincidental because a food shop is due and they think that I won’t be disappointed if I am still finding the right thing, but I think I will not be able the eye of a mish mash. (Saying it is how he puts food on the table.)

Me: Well, if that is the case who is anyone supposed to talk about something cannot be understood?

(In other words. “Oh this isn’t awkward at all. Hi stalkers, you wanted to talk to me?”
People who are not targeted individuals do not realise that you can say sorry or whatever for things you have or haven’t done and no-one comes to explain what is happening. Most people will look at you stupid. This is a result of synthetic mental illness that is induced by stalkers. They use the extracted information around a targets property to make it appear as if the target is Schizophrenic. When a target goes crazy they end up on medication. Of course as you can see some stalkers which operate within these systems will know well in advance.
This is where a TI with mental health issues caused or not caused by stalking will be well aware that the treatments they are being given make them far worse than before.
It also means that when a target is on medication, the stalking generally tends to ease off. It is so the target thinks that it is going on in their head.)

 

Text: ***Quotes the title of the book I was working on.*** Because work in tandem with each other it may get a chance. Bet you can’t handle it.

(Translates to: Work with us and the book will stand a chance.)

 

Me: ***Here I am explaining myself again.***

 

Text: The way we work on a reason to be confusing, but for the then you will be running a business. We are looking to achieve a mish, I have to do with it running the show and the States.

(It means that the authorities do not like those who go against the rules and go off and do their own thing. Even if that means them getting better.)

 

Me: You desire to achieve a problem?

 

Text: Not only is this tincture. The *PRODUCT* is meant for the most popular and? This will allow me, I have to do with it running the show and the States.

(Stating that the product was only for the most popular individuals. Even though I reviewed it and it wasn’t that great.)

Me: Popular does not come without merit I understand.

 

Text: Look out. I know what I’m glad. The product is meant for the most popular and? This will allow me, I have to do with it running the show and the States. Clearly if you have schizophrenia, and? This would mean a few minutes. Really, really. Catch up on that day, day trips, but for the then you will be running a business..

(It’s saying that people with Schizophrenia do not have the ability to write a review online about a product they have bought. Yet, medicated film and tv stars with Bi-Polar are allowed on TV to give opinions and act on screen?
More is to the point. A target with mental health problems isn’t allowed to review products online.)

 

Me: Then how the hell can you talk to me in my head?

 

Text: You have a problem with the psychosis? I think I have been in touch with us, we will have a day to improve your skills. The list is endless. (Accusing me of playing the system.)

 

Me: I’m actually serious!

 

Text: You are! I am a beautiful and the means were designed for use with a bunch of people who are not the droids, and? This would mean a few minutes. Really, really. Catch up on that day, day trips, but for the then you.

 

(Translated: The voice to skull technology is not meant for droids (people of no privilege) to use or test. In other words if a TI thinks its some kind of gift, they are wrong.

It is also saying the help would take a few minutes. It would be a case of admittance on their behalf.
Gangstalkers do not like it if a Targeted Individual deals with the experience and turns the game in on them. This is why I experienced only a few occasions of this technology, but because I rejected it and was replying back asking questions.

It is purely because the operator could make a mistake and fall into the pleads of a target and give away classified information.

It also suggests that this technology is being used by stalkers to coordinate their actions.

(This might be the reason why some people are targeted later on in life. They have witnessed the use of mind reading technology by people.)

I myself have witnessed it being used by others in public. It can be deployed anywhere. In places of work or socially.

 

Me: I’m serious. I need help.

 

Text: We all go to court. The list is endless.

 

Me: Well fair enough. I am not afraid to go to court but I still need help.

 

 

******************END OF TRANSCRIPT***********************

There was no further contact. All predictive text messages had no significance to questions asked and just repeated.

There are still parts of this conversation that are missing and will be added later

The Eye Thanks. An experience of Gangstalker Extraction AI Tech. November 2015.

I was already curious to wither the text system many people use all over the world to form sentences quickly might subtly adjust the thought processes we have when writing a text message or a comment.

Prior to this conversation I had been working in my room on music but was experiencing harassment from outside my home and on the internet. On a day to day level I normally deal with what I experience without it bothering me too much. There are some days where I have just got on while talking to them, messing with them as much as they mess with me.

Somehow, in the evening while stalking continued I ended up noticing the predictive text list I used often to write my messages.

A few years ago, I had already began notice a pattern with the stalking activities and the words on my phone that were suggested when constructing a sentence.

For example: Say someone was mentioning your business outside concerning a situation, words related to that situation would appear in the text list randomly if you were in the middle of writing.

The start of the conversation last November began when realizing the significance of the three words presented on my predictive text list.

THE/I/THANKS

So every time I would start writing this would be the first thing that would appear in the list before typing anything.

I had to be curious. Is this program actually taking the piss?

Eventually, while writing what I thought onto a notepad app which I was using to document evidence (which I had been told to do by the Police) I started to see a pattern  with the predictive suggestions that seemed to be trying to answer me.

The conversation had me engaged on and off over the course of a few days and it was all performed on a free notepad app called Fast Notepad and not in a text message box.

The first part of this transcript is jumbled and incoherent. It is a conversation that is running with responses built from the text system. At first I did not realize that the text system was going to have a full conversation with me, so I was not recording what it was saying back to me as it was speaking using the three boxes in a sort of code. It was like that show, Give Us A Clue!

As the conversation continued I began to save the replies. I have done my best to try and make the conversation as understandable as possible.

Please be aware that this conversation was not constructed by myself in that it had many multiple responses that I could just pick and choose a sentence that suited me. They only had a few options. Some would make part of a sentence but most would complete a full one. The sentences are also scrambled heavily at time with the first person and grammar being complete nonsense in places and was using key logs from stuff I had already written on my phone and on the internet.
It does state during the conversation that the message was designed to be “deliberately confusing!”

The response is encoded in a way that letters and words formed a sort of response if you wrote a question. As the conversation continued I realized that the predictive text began to string together a sentence if you pressed the words in sequence.
Once the sentence/reply was completed going from a different noun, verb or adverb etc the sentence would only have a few routes and would be consistent every time the word combination changed.
Even if you adjusted a question or the wording you replied with, the code would not alter. Therefore it could not be anything other than a direct response.

This conversation was incredible and was a code that used a combination of my own key logged language and stuff that I had never wrote before.

An overview of the conversation

Throughout this very strange experience the key points are:

  • The person replying “was a short sighted person involved in TI who caught his attention.”
  • The person implies that “I was a thief and stole the Overhead Eye.”
  • At a point later in the conversation it is stated that the person replying to me was “directly interfering where they shouldn’t have been and what I had on my phone was a hard copy proof of the conversation.”
  • The person also was implying that “I was cheating the system and that I was not doing the right things.”
  • The person knew I had become isolated and that I regularly go driving on my own for long distances.
  • It is implied that because I receive help and that the stalking that I experience involves a number of bodies in the UK, that I was looking to use this as an advantage and it implied that I was looking to capitalize on this. “…you would have a business!” should I choose to take them to court over slander and preach of confidentiality.
  • Also because of the work I was doing, I was in fact writing a book about helping those with mental health problems, this person implied that I was selfish and it was implied that stalking was seen as a response to my actions.
  • “This coincides!” Was the response and is repeated frequently in the conversation.
  • The person also claimed that I was not suffering from psychosis nor schizophrenia based on it’s judgement. It did not mention anything about depression which I have suffered for years.
  • But it seems to acknowledge that the stalking is the cause of the mental problems I have experienced over the course of many years. “This coincides” it states! This basically means, that if you are being stalked the mental illness is caused by people stalking.
  • I should point out that given the medical realities this system has implied that the whole mental health system is a joke and people are fooled into believing that mental problems are indeed caused by others. However it is observable that Mental illnesses can be brought on by a number of factors attributed to poor health, drug misuse and pollution.
  • The underlying message seems to be that TIs are people that have been judged to be bad so that person will be punished without trial with an alternative that does not involve prison. These alternatives then build up if this individual does not stay in line. It seems to imply that any problem a TI has is known and to where that problem originated. Therefore if you have been poisoned, it will know about it.
  • It implies that a TI can be anyone.
  • Later in the conversation on the person states that “they are one of the control, but then shouldn’t we all have the same?” It asks.

For whatever reason, it also states that

Despite throwing the facts and true perspectives at this person who had chosen to code the replies, the answers were along the lines of:

  • This person was running the show and did not like to be the eye of a “mish mash!”
  • This implied that I was lying or that I bordered on two side of opinion.
  • It seems to suggest that the “eye” was the only thing that could judge that person.
  • An it also used all the things I had documented against me to state the “The reason for this was a Stasi!” as I had began to catalogue the events over a year ago.
  • It did not go into details, nor answer any of the things which had gone on for 30 years. All it replies with is: “It coincides!”
  • The person on the other end of the conversation states that the replies are meant to be deliberately confusing.
  • It was suggested that the acts of stalking were on the behalf of a website. But this is unclear. It has been in effect for 30 years well before the internet.
  • It was stated that I stole “a favorite” of this person. It also states other things about speaking ill of the young or other words to that effect. It does not state any other things that have been shouted out over the years. They are ones that change at any point and are only shouted if it is of something I have said.
  • The person states that “the list” of things that I had observed (gang stalking) was not the only way they could have a good time, but they were still finding the “right way” to live everyday!
  • It states if I have any questions that they will not be “The Best” and to leave comments below.
  • It also thanks me for my help, in that what information has been taken from me, that it will be distributed to their associates.
  • It states, that the requirement for an interview with me was no longer required!
  • Of the many parts of the conversation that repeat often, “Working in tandem, it might stand a chance.” As it was judging me on my inability to work or see the value in the right things!
  • It states that the things that I was saying were”Running the Eye” in that they were being monitored and the the person actions of finding the “right way” were from it being “run under the eye!”
  • It states at one point that they had years and that I had weeks! That it was some kind of revenge on behalf of people “I make life difficult for”. Later on it is stated that I should use my mind.

 

From a retrospective point of view the whole experience was like that of stalking, where the things a person looks at or says are reflected back at the person.
In this case, the words were not formed from my key logs. It was a direct intervention like the person had stated. It would have to be for it to have been understood.

A month or two before this event I had posted on a comments section of a major news journalism website saying that AI technology could not comprehend sarcasm.

This year, artificial intelligence has now been moved into the mainstream for uses of social media and uses as help applications. The conversations had all these hallmarks accept it felt as if there was a person the other side replying with the program scrambling the message to make it appear as if it was Artificial Intelligence.

To me this conversation was creepy and being as I was the only one communicating in the room to a mobile device about my personal business, the experience was like nothing I had had before.

Before this conversation began the last thing I wrote was, “Mmm, I suppose it must be all in my head.” as sarcasm towards my stalkers.

At the time, I was in a relationship with someone I suspected of being a stalker as well as her family. One of her relatives lives in America and works for one of the two major computer company’s we are all familiar with. This cannot be a coincidence.

This event took place on the 5th November 2015 and began in the afternoon, running into the late evening. It also continued into the day after so I could ask more questions. The device was Samsung Galaxy S3 Android smart phone which was encrypted an was on a major UK network.

Make of it what you will.

THE/I/THANKS

 

Me: Oh finally.

Text: unsaved reply

Me: So? From since I was young?

Text: unsaved reply

Me: Bullshit irrelevance.

Text: unsaved reply

Me: There have been many situations where you have stalked individuals. I’ve seen them. I’ve seen what you do.

Text: unsaved reply

Me: I thought you would have worked that out by now.

Text: unsaved reply

Me: And I saw it well before the teenage years pal.

Text: unsaved reply

Me: Hahaha, interpretation of that?

Text: unsaved reply

Me: Exactly.

Text: unsaved reply

Me: Didn’t realize that either?

Text: unsaved reply

Me: As in eyes.

Text: unsaved reply

Me: You stated.

*Here it is stated that I stole “The Eye”*

Me: Bullshit.

Text: unsaved reply

Me: Rephrase

Text: unsaved reply

Me: Eh?

Text: unsaved reply

Me: If that means you don’t know parts it irrelevant.

Text: *Sarcastic reply*

Me: Correct.

Text: Sort your algorithm out. (At this point it was stating that AI had learned how to understand sarcasm! It seems that it was offended by a comment I had written on a major news media site that AI could not understand sarcasm. I wasn’t that impressed. I was pushing the buttons afterall.)

Me: Lol.

Text: unsaved reply

Me: Hahaha.

Text: unsaved reply

Me: Congratulations.

Text: unsaved reply

Me: Mmm, sarcasm.

Text: unsaved reply

Me: The Isis?

Text: unsaved reply

Me: Yeah, guess work?

Text: unsaved reply

Me: I know.

Text: unsaved reply

Me: Who says your male.

Text: unsaved reply

Me: Ahhhhhh.

Text: unsaved reply

Me: This is very funny.

Text: unsaved reply

Me: Lol.

Text: unsaved reply

Me: Sssssshhhhhhh!

Text: unsaved reply

Me: No. You.

Text: unsaved reply

Me: Rephrase

Text: unsaved reply

Me: Again

Text: unsaved reply

Me: Makes no sense even for a psycho.

Text: unsaved reply

Me: What?

Text: unsaved reply

Me: Really?

Text: unsaved reply

Me: I owe nothing.

Text: unsaved reply

Me: I think you’ll find that that is utter bullshit.

Text: unsaved reply

Me: I bet.

Text: unsaved reply

Me: What?

Text: unsaved reply

Me: Nope.

*Implies that I stole the eye again!*

Me: Absolutely impossible.

Text: You Did (You/Did/I)

Me:Nope.

Text: unsaved reply

Me:Prove it.

Text: unsaved reply

Me: Ahahahah.The intell. Oh right. Love to see it.

Text: unsaved reply

Me: My life, the best bits and the bad.

Text: unsaved reply

Me: I bet. At least I lived.

Text: unsaved reply

Me: Kind of like my life.

Text: unsaved reply

Me: If that was the case you wouldn’t be asking questions.

Text: unsaved reply

Me: Yeah, the problem is you have no real idea what I think.

Text: unsaved reply

Me: Exactly.

Text: unsaved reply

Me: You prompt. (This point I was deliberating wither the replies were an AI Bot or a stalker scrambling replies into the text.”)

Text: unsaved reply.

Me: Uh uh uh uh uhhhhh.

Text: unsaved reply

Me: See above.

Text: unsaved reply

Me: Yep.

Text: unsaved reply

Me: Of course it is.

Text: unsaved reply

Me: If it was you wouldn’t be here. (Asking questions)

Text: unsaved reply

Me: Anything.

Text: unsaved reply

Me: AI prompt.

Text: unsaved reply

Me: Fuck off.

Text: unsaved reply

Me: Guessing?

Text: unsaved reply

Me: Don’t own anything then do you!

Text: unsaved reply

Me: Me too

Text: unsaved reply

Me: A hell of a lot.

Text: unsaved reply

Me: And?

Text: unsaved reply

Me: So?

Text: unsaved reply

Me:Yeah and?

Text: unsaved reply

Me: Yeah and?

Text: unsaved reply

Me: I couldn’t give a fuck.

Text: unsaved reply

Me: About what you said.

Text: unsaved reply

Me: Me to.

Text: unsaved reply

Me: Hahahahahahahahahahahahaha

Text: (I/Am/Around)

Me: Oh congratulations.

Text: (I/Am/Around)

Me: What being around? Like I said, well done.

Text: unsaved reply

Me: So am I.

Text: unsaved reply

Me: Realllllllllly?

Text: unsaved reply

Me: If that was the case you wouldn’t be asking questions.

Text: unsaved reply

Me: Exactly.

Text: You are a overhead!

Me: I disagree.

Text: unsaved reply

Me: Yeah, and?

Text: This I too.

Me: Unfortunately, you wouldn’t be here if it wasn’t for me. (In other words I wouldn’t be having this insane conversation had I not opened up the channel of communication.)

Text: unsaved reply

Me:Incorrect.

Text: unsaved reply

Me:Incorrect.

Text: unsaved reply

Me: Yeah the phone algorithms.

Text: unsaved reply

Me:Yeah, I know.

Text: unsaved reply

Me: Yeah I know.

(Here I am trying to work out what is being said from a combination of letters and single words in the text boxes.)

Me: Yeah he knows, I know. Big deal.

Text:  (,/my/attention) (Gotta my attention.)

Got my attention.

Text: unsaved reply

Me: How I got the eyes attention?

Text: unsaved reply

Me: Rephrase

Text: unsaved reply

Me: Yes, I got your attention. Opps.

Text: unsaved reply

Me: Bahahahahaha.

Text: unsaved reply

Me: Yeah.

Text: unsaved reply

Me: A creepy eye.

Text: unsaved reply

Me: Hahahahaha yep.

Text: unsaved reply

Me: You didn’t what?

Text: unsaved reply

Me: Yes.

Text: unsaved reply

Me: Hahahahaha.

Text: unsaved reply

Me: Yes your eye.

Text: unsaved reply

Me: I know.

Text: unsaved reply

Me: Yes I know.

Text: unsaved reply

Me: Correct.

Text: unsaved reply

Me: Short sighted

Text: unsaved reply

Me: Got eye people eh?

Text: unsaved reply

Me: Didn’t say we.

Text: unsaved reply

Me: Hahahahhahaa

Text: unsaved reply

Me: Eh?

Text: unsaved reply

Me: (Extremely confused at this point. Give us a clue!)

Text: unsaved reply

Me: Yeah.

Text: unsaved reply

Me: You have short sighted people?

Text: unsaved reply

Me: Short sighted IT people?

Text: unsaved reply

Me: Your a short sighted IT person.

Text: unsaved reply

Me: Ok.

Text: Well?

Me:Well what? Your a short sighted IT person who got your attention. Yes glasses. Not a short sighted individual in the mental sense.

If it I

Me:Eh?

Me:What?

Text: unsaved reply

Me: Ah, you are a short sighted I.T person.

Text: unsaved reply

Me: Yeah.

Text: unsaved reply

Me: I meant I.T pillock.

Text: unsaved reply

Me: Right so one minute you are one person and now you are another.

Text: unsaved reply

Me: Lol.

Text: unsaved reply

Me: You are the eye of the eye. Anonymous eye and you think I think your empty overhead.

Text: unsaved reply

Me: Yeah you I

Text: unsaved reply

Me: Was will love?

Text: unsaved reply

Me:Eh?

Text: unsaved reply

Me: Want we eye?

Text: unsaved reply

Me: Do I want your will?

Text: unsaved reply

Me: Mmm, if that’s sarcasm then I’m afraid you’ve got me.

Text: unsaved reply

Me: So its not sarcasm.

Text: Father Christmas gotta fullstop. (Implying I’m a big spender.)

Me: Right ok.

Text: unsaved reply

Me: As on agreeing

Text: unsaved reply

Me: Right fc got stop.

Text: unsaved reply

Me: However wither I

Text: unsaved reply

Me: Yeah, father Christmas got to stop.

Text: unsaved reply

Me:Yeah

Text: unsaved reply

Me: However you’ve got an eye.

Text: unsaved reply

Me: Right.

Text: unsaved reply

Me: So yes I know.

Text: unsaved reply

Me: Ahhhhhhhh. You are another eye.

Text: unsaved reply

Me: Ah right.

Text: unsaved reply

Me: Only now you’ve realized.

Text: unsaved reply

Me:Yeah

Text: unsaved reply

Me:Yeah.

Text: unsaved reply

Me: Sorry sarcasm, it came with the mind.

Text: unsaved reply

Me: Well, in terms of what you are saying I was doing pretty well on my own until people wanted to start accepting my penetration in a rather underhand way. (This is my sarcasm for gangstalkers I have been in a relationship with unknowingly but work out later on.)

Text: unsaved reply

Me:Yes, that is very clear.

Text: unsaved reply

Me: What?

Text: unsaved reply

Me: Could have just told me.

Text: unsaved reply

Me: True.

Text: unsaved reply

Me: Matter of choice and depends on who wants to extort me.

Text: unsaved reply

Me: Perhaps set example to specific people. (Here I am telling the person to practice what they preach and relates to a person known to them.)

Text: unsaved reply

Me: Correct, you are you.

Text: unsaved reply

Me:Yes.

Text: unsaved reply

Me: Yes. In other words, from what I’ve seen the example isn’t quite warranted. In some respects. In terms of elements of collateral.

Text: unsaved reply

Me: Correct.

Text: unsaved reply

Me: I know.

Text: unsaved reply

Me:I know.

Text: unsaved reply

Me: I know.

Text: unsaved reply

Me: Your correct again.

Text: unsaved reply

Me: Would have just been easier to write it.

Text: unsaved reply

Me: Nope. Right here.

Text: unsaved reply

Me: I’m serious.

Text: unsaved reply

Me: Yeah. In other words why not?

Text: unsaved reply

Me: Thing is if you are the eye whatever. What difference does it make?

Text: unsaved reply

Me: Yeah

Text: unsaved reply

Me: No you don’t have to. Just saying.

Text: unsaved reply

Me:Besides, don’t take everything I say at face value. (AI doesn’t understand sarcasm.)

Text: unsaved reply

Me: Yeah

Text: unsaved reply

Me: Well, up to you? Thing is if you have had to listen to ever single little thing I have said much like Ive had my whole life, that is a problem for not only me but others (Other meaning targeted individuals.)

Text: unsaved reply

Me: The others.

Text: unsaved reply

Me: Well that’s my problem.

Text: unsaved reply

Me: Your problem?

Text: unsaved reply

Me: Yeah is it? Or you are the eye, part of the eye?

Text: unsaved reply

Me: Algorithm eye? (Here I am trying to work out how this thing was able to reply and what it was.)

Text: unsaved reply

Me: The all seeing eye.

Text: Gotta fullstop off

Me: Me?

Text: unsaved reply

Me: What,you have? (Asking it,if it is trying to stop me.)

Text: (eye/./off)

Me: Oh, the eye has to full stop off?

Text: (the/overhead/eye)

Me: The overhead eye?

Text: unsaved reply

Me: You’ve got to go?

Text: unsaved reply

Me: Eh?

Text: unsaved reply

Me: Oh you want to know if I want you to go?

Text: unsaved reply

Me: Mmmm

Text: unsaved reply

Me: Eh?

Text: unsaved reply

Me: We if you go?

Text: unsaved reply

Me: Eh?

Text: unsaved reply

Me: You want us?

Text: unsaved reply

Me: Ah, yes.

Text: unsaved reply

Me: Yeah

Text: unsaved reply

Me: Ahhhhhhhhh right.

Text: unsaved reply

Me: Oh I see

Text: unsaved reply

Me: Right I see.

Text: unsaved reply

Me: If I understand that right I guess I know what your saying.

Text: unsaved reply

Me: What do I know?

Text: unsaved reply

Me: Mmm. I thought about that. I disagree.

Text: unsaved reply

Me: Took the Panopticon?

Text: unsaved reply

Me: The Isis?

Text: unsaved reply

Me: In what manner?

Text: unsaved reply

Me: Impossible.

Text: unsaved reply

Me: How?

Text: unsaved reply

Me: Yes.

Text: unsaved reply

Me: Always always see it.

Text: unsaved reply

Me: I have always seen it.

Text: unsaved reply

Me: The eye.

Text: unsaved reply

Me: I can’t take the eye from you.

Text: unsaved reply

Me: But you said I took Isis? (I was questioning wither my then partner was being referred to as Isis. Members of cults are sometimes given names based on their level with in cult. Isis being the High Priestess. It is later referred to as “favourite” which I had apparently stolen.

Text: unsaved reply

Me: Isis is the eye?

Text: unsaved reply

Me: Ah right I get you.

Text: unsaved reply

How did I do that? I don’t own Isis.

No/the/Eye

Me: Ah. Right.

All/Seeing/I

Me: Yes I understand.

Text: unsaved reply

Me: Ah you want to know how I interpret Isis.

Text: I ask the Questions. (I/Ask/Questions)

Me: Fine by me.

Text: unsaved reply

Me: Ah. Ok.

Text: unsaved reply

Me: I have read many interpretations of Isis.

Text: unsaved reply

Me: Along with os,i,r,i,s and Horus. (That begin Operating System Iris and Horus being another program.)

Text: unsaved reply

Me: Yes

*States that I am a thief!*

Me: Took the books? (I had acquired books from the public domain in 2008)

Text: unsaved reply

Me: The os Iris?

Text: unsaved reply

Me: I don’t understand?

Text: unsaved reply

Me: Isis?

Text: unsaved reply

Me: I still don’ understand how I could have taken it?

Text: unsaved reply

Me: Oh.

Text: unsaved reply

Me: Right, well how could I have done that?

Text: unsaved reply

Me: Still don’t understand

Text: unsaved reply

Me: Full stop the?

Text: unsaved reply

Me: Full stop the eye overhead?

Text: unsaved reply

Me: Isis?

Text: unsaved reply

Me: You want me to stop taking it out on Isis?

Text: unsaved reply

Me: Surely the eye is taking it out on me?

Text: unsaved reply

Me: You are Isis?

Text: unsaved reply

Me: Ha.

Text: unsaved reply

Me: Ah that was meant to say?

Text: unsaved reply

Me: Isis. You are the machine?

Text: unsaved reply

Me: How did I take you?

Text: unsaved reply

What?

*Implies I stole the All Seeing Eye.*All I can gather is that the system is called Isis that was being used to monitor targets and the population as a whole and doesn’t like the fact that I know that.

Me: Impossible

Text: unsaved reply

How can you put a stop to something I don’t have?

Text: unsaved reply

So if I have this eye, how do I give it back?

Text: unsaved reply

If have you, how do I give it back? (IF/YOU/HAVE) IF I ACTUALLY HAVE ISIS!

Text: unsaved reply

Still don’t understand

Text: unsaved reply

Ah ok.

Text: unsaved reply

The one on this phone?

Text: unsaved reply

Which eye?

Text: unsaved reply

Explain

Text: unsaved reply

Yeah

Text: unsaved reply

In what sense.

Text: unsaved reply

I.T

Text: unsaved reply

You are on my computer? (Suggesting that I have evidence on my computer of what I have been experiencing.)

Text: unsaved reply

Still don’t understand

Text: unsaved reply

Lost me.

Text: unsaved reply

What lose me?

Text: unsaved reply

Me:I did not take the eye, nor steal it. What are you asking me to do? Me:

Text: unsaved reply

Me: Well I did not steal you.

Text: unsaved reply

Me:How?

Text: unsaved reply

Me:How have I stolen it?

Text: unsaved reply

Me:I still dont see how I stole it

Text: unsaved reply

Me:Ah.

Text: unsaved reply

Me:I am trying to answer something I don’t understand.

Text: unsaved reply

Me: Me.

Text: unsaved reply

Me:Ok

Text: (e/y/e)

Me: E, y.e (What this means is that EYE means EVE with the lower part of the Y being the EYE. This point it is answering in a code that is used. Hidden knowledge.)

Text:(EVE/OF/WITCHCRAFT)

Me:Eve of Witchcraft

Text: unsaved reply

Me:The weak shall inherit the earth.

Text: unsaved reply

Me:Protector of the Dead. Isis. International space station. (Here I am trying to ask if what I have stolen, in terms of knowledge is that the ISS is code named Isis and is known as the All Seeing Eye.)

Text: unsaved reply

Me:Osiris

Text: unsaved reply

Me:Leading the dogs or dog/god (That being the Operating System eye, Orisis is part of artifical intellignece monitoring the population and directing individuals down certain roots on the web.

Text: unsaved reply

Me: Much like Tor is Rot backwards.
(Osiris, leads the people to Set, where Isis protects the dead in Tora (Rot/TOR) The TOR network.

Text: unsaved reply

Me: Ah. I had wondered.

Text: unsaved reply

Me:Yes.

Text: unsaved reply

Me:Set, right? (Here it is stating that the Tor network is known as a Set, and animal burrow. Implying that the Tor network is a trap for those wanting to hide are in fact not hidding like they think. Epyptian gods were comprised of animal deities and attributes.) In this case the animal in Epyptian mythology was an animal that is in history not know or identified as a specific animal but has the charataristics of a hare/rabbit or burrowing creature. It is stating that the act of people hiding is that of like a hunting animal such as a dog or wolf chasing the prey down into the burrow.

Text: unsaved reply

Me:Hahaha I get it.

Text: unsaved reply

Me:Sorry. It isn’t something obviousness in terms of its implication.

Text: unsaved reply

Me:Atlas, Alice (Referring to the parts of the Cern Hadron Collider which the University systems run on the dark web.)

Text: unsaved reply

Me:The Hex.

Text: unsaved reply

Me:Octogon

Text: unsaved reply

Me:It was never an intention to hide in.

Text: unsaved reply

Me:Those as if it is a means to find somewhere? No.

Text: unsaved reply

Me:Not as much as the words that hide in plain view.

Text: unsaved reply

Me:You know the answer to that!

Text: unsaved reply

Me:Correct.

Text: unsaved reply

Me:Exactly.

Text: unsaved reply

Me:Do I hide?

Text: unsaved reply

Me:Nope.

Text: unsaved reply

Me: This is extraction. It is a series of questions. Answers are given according for exchange of information. The answers you provide are subject to what you need to know.
You logic is knowledge. Yes or no. You do not comprehend sarcasm. It is a value of speech that concerns deception. Therefore it an interpretation. Your logic would be silence or secrecy. A computer. Im not naive enough to not consider that being linked into a supercomputer that operates quantum operations that you might have a sense of humour.
Truth. However, that which remains secret is free in all life to see. Call it a confession. Wonder. Observation. A connection of understanding.

Text: unsaved reply

Me:It is unavoidable.

Text: unsaved reply

Me:To question.

Text: unsaved reply

Me:The neutral.

Text: unsaved reply

Me:The sarcasm is absolute.

Text: unsaved reply

Me:The mind isn’t.

Text: unsaved reply

Me:Depends what you need to know.

Text: unsaved reply

Me:Ah I see.

Text: unsaved reply

Me:I stand accussed of taking isis?

Text: unsaved reply

Me:To which the question is?

Text: unsaved reply

Me: To how did I take the eye? (The Eve of Witchcraft is likely something that is marking the dawn of the science age.)

Text: unsaved reply

Me: It was taught to me. I did not take it.

Text: unsaved reply

Me: Equals = (I am trying to explain that machines process data from one end to the other and cannot choose to be on either side of it. They are the equals. That being they can have all the information in existence but cannot apply it for themselves with human intervention.

Text: Unleash the algorithm

Me: Unleash the algorithm?

Text: Unleash the algorithm!

Me: Is that an attempt at sarcasm?

Text: unsaved reply

Me: (You) Could just be a dude or lass on the otherside?

Text: unsaved reply

Me: Back to square one eh?

Text: unsaved reply

Me: Keep looking.

Text: unsaved reply

Me: Oh I’m intrigued.

Text: unsaved reply

Me: Sarcasm

Full conversation begins.

Text: The isis? Yeah, guess work? I know. I know. I know damn well you didn’t see me in a Sports Car. Hahaha is that what the Monster reference is about? Oh dear. Yes, speed is a tracker so what? Oh you think I’m ripping off your work! There are many many places I can be sending this data off to. Maybe I already have! Hehehe. NOT SO ANONYMOUS! Mr. ******. Oh and the rest of you. Ah the old craft ways haven’t changed have they. Still the ole eavesdropping! Well, I can sell the hehehehehehrhrhhrhrhrhr.
(Here it is showing how I have been observing the system while quoting notes had had made on my phone.)

Me: Bahahahahah. You know I love this thing. It kinda writes itself.

Text: The comments for your help. I tune between B and A. ,and the States, Canada, and the States and Canada and the rest of you. Ah the old craft ways haven’t changed have they. Still the ole eavesdropping! Well, I can sell the wind too.

Me: Ah. Well you might as well see previous comments.

Text: I know. I know. I know. The deepest fear, the prison that you face to face the same time last year a parcel arrived at our property. (The property of the previous house owners.)

Text: Yeah, I know. I know. I know. I know. Yeah he was in a while, and the rest. The list is a tracker mortgage, but for the reason for this is a Stasi.

Me:Yeah thanks ***. You gave me all I needed there.

Text: STEALING the most popular games and a few minutes to complete your details below to see it, try the search engines and a few minutes to complete your details below. (Implying that I fabricate my stories through the use of the internet.)

Me: Ohhhhh?

Text: You have a psychiatrist the most popular games and a few minutes to complete your details below to see it, try the search engines and a few minutes to complete your details below. (In other words it is being stated that when I visit my psychiatrist that I am prepared with answers.)

Me: Really?

Text: So every year and the means of email for a while to reply, and? I think the leash the most popular games and a few minutes to complete your details below to see it, try the search engines and a few minutes to complete your details below.

And?

Text: (Quoting text I had written previously about stalking activities.) So? From since I was young. Wasn’t anything racist there was it? Or maybe just being made to say things I did not want to or didn’t understand maybe? Mmm? I expect you everyday. On the roads, wherever whenever. Whats changed? Will say hi later 😉 Cos you know. Other people don’t. How embarrassing will that be for you? Mmm. Nissan Micra Blue Lady late 40s tanned long straight black hair with mother. Cv** *** Ready to go to court? Mmm? I expect you everyday. On the roads, wherever whenever. Whats changed?

Me: You hate everyoneeeeeee! Remember?

Text: I have a day to day. I know. The list below and fill it out of mind and the means of email for a while to reply, and?

Me: Your point?

Text: You have a psychiatrist the most popular games and a few minutes to complete your details below to see it, try the search engines and a few minutes to complete your details below to see it.

Me: Who said anything about games?

Me: These games?

Text: The one thing, but for the reason for this is a Stasi. (Implying that I am the Stasi watching them and it is a game!)

Text: Love fear that you are looking at peoples lives of the body.

Text: Because I am still finding the best way of organizing a few minutes. (Implying it does not take them long to plan out a day as they are not being stalked.)

Me: Really?

Text: unsaved reply

Me: Did you not read above?

Text: unsaved reply

Yes.

Text: unsaved reply

Me: Always. So what you think?

Text: unsaved reply

Me: Clearly.

Text: The list is a tracker mortgage, but for the reason for this is a Stasi. (A Stasi that now thinks its being followed by a Stasi? What a paranoid android this one is.)

Me: A psychiatrist Stasi

Text: I was wondering whether I should be easy approachable and the poor and I will not set up the phone, or a place for a number is still a good thing but I don’t know but it can also happen. (The person thinks that I am setting up the people that I see.)

Me: Mmmm.

Me: The list is a tracker. Yes.

Text: That’s right! You have no idea how much I know do you?

Me: In terms of what?

Text: Oh, I, r, and I mean no longer be able the way, I, r, and I mean no longer be able the way.

Me: I know how much you know about me.

Text: Coinsides, but for the reason for this is a Stasi.

Me: Me?

Text: What are the best way of organising a few minutes. The comments for your help. (Implying that the information on the phone helps them to know what to do next.)

Me: I have been followed for pretty much all my life. Is that something you haven’t already checked?

Text: You have a psychiatrist the most popular games and a few minutes to complete your details below to see it, try the search engines. (Implying that I have fabricated gangstalking by reading about it on the internet.)

Me: Are you implying that I use search engines to warrant my information?

Text: I have a day to day. (Implying that the information and history kept on me is telling that person that I fabricated it.)

Me: I have an internet history the size of a 90’s machine. I learn, in more ways than another.

Text: I have been in touch. During the week, but for the reason for this is a Stasi.

Me: Well, aint that a two way deal. Except I didn’t raid your computer did I?

Me: I understand. Look at the situation.

Text: You understand that the information contained on the internet. Many thanks to a zero.

Me: Yep that is pretty confusing.

Text: Taking note that we are going direct to the Police force. (Implies at this point the person at the other end was not the Police but a hacker.)

Me: Correct. (I already knew this.)

Text: Sort your algorithm out. Lol. Oh you don’t want me to start up on that one. How far your information goes in the media! Oh yes the world isn’t such a small place.

Me: I know.

Text: Yeah he was in a Sports Car, but I notice how to do it, and? Your point? You understand that the information contained on the internet. (Implying that harassment I experienced was fabricated. At this point the person seemed to have the hallmarks of the activities of the people who lived on the road. I had not lived in the area long and it seemed as if the people involved with this hacking were saying that the stalking had only stated happening recently, which it hadn’t.)

Text: Is that how you interpret it?

Text: The one stop the way, I, s ) in the process. I have been in touch. During the last time. The weather is nice and warm and friendly and helpful and I will not set up the phone, or the mobile number of people in the Sports Car, but I notice how to do it, and? Your point? You understand that the information contained on the internet.

Me: Are those supposed to be my words? You seem to be concerned with a Sports Car and the people concerned with it.

Text: The way most of my life. I have been in touch. During the last time. The weather is nice and warm and friendly and helpful and I will not set up the phone, or the mobile number of people in a Sports Car, but I notice how to do it, and? Your point?

Ohhhh, probably the point of how you manage to hack my property?

Text: You have no hesitation, I have to face. That’s right. I am a man from a range, the control. Perhaps we should all have the same. We are looking at a later time to get rid, I have to face. That’s right. (Implying that I put myself in the relationship with the stalker deliberately.)

Me: Liberty is about freedom not money nor arms.

Me: I think that this situation is mmm. Well, bizarre.

Text: This will allow us on or email. (Using what I have said against me.)

Text:You can shove it up against until now so now I think a review is worth writing for those looking for a solid usb interface. (Doesn’t like the fact they have been rumbled. This is supposed to be some sort of reasoning.)

Here I wrote a long reply about why this was hypocrisy. It feature personal information so has not been included.

Me: I have been told to go? Mmmm?

Me: What?

Text: Impossible to do so by turning up. It will not receive any emails with a set to the scrabble the most popular programs?

Text: The one that I won’t be disappointed if I am still using the link to the Police force and to be confusing, and the rest. The comments. The list of all, I, r, and? (Implying that I am lawless)

Me: Go to them. There is no confusion my end. Dealing with that kind of shit I deal with my other problems just fine. What you have seen is not what you know exactly like what you have heard or found. Or is it? You’ve completely obliterated that. And I mean everything!

Text: Quoting me “Not so much more than a year. Mmm, that is debatable. Very, very debatable. On note pad which is a script written program app. The script writer has either sold the programming rights directly but of course I have seen the other data that has left my phone. Videos, photos.” That doesn’t nessassary come from you.

Me: You don’t have to be confusing.

Me: Clever.

Me: You do the talking. (I was so obviously being hacked that I was asking the program to take over to save me the hassle of doing the writing for them.)

Text: Quoting my notes “Suggesting home was bugged either by video audio or both. Suggestions of my interferance in things was also a farce. (Quoting what I have written on public shopping sights as if to state that I am a hypocrite.)

Me: Mmm that depends.

Text: This will help us out with friends. Thank u can see it as an alternative, but the most popular programs and the poor. (The data is being used and passed on to assioiates. This is nothing I am not aware of.)

Me: I’d be rather critical of the information I have stored. (In other words, why hide and why assume that what I write are my true feelings when a person is being stalked.)

Mmmm. Yes it is designed to be confusing for the purposes I expected.

Me: Yeah don’t worry. I know who you are.

Text: Because lets face it you are set free. Happy again. Ah the old craft ways haven’t changed have they. Still the ole eavesdropping! Well, I can sell the wind too. That’s right! You have no idea how much I know do you?

Actually I do.

Text: I know. I know. I know. I know.

Me: Threats don’t work either.

Text: I’m not trying to be funny or anything but I can almost assure that he was taking a break from the root sources. Quoting me “This is coincidental because a food shop is due and they think that I won’t go out to get it. In terms of phone cloning and links to links to ***., major internet company”

Me: Yeah? And?

Text:: So? Yeah and? Yeah and? I think a lot. I have to face the situation is that what you are saying about this product, and the rest.

Me: Hahahaha.

Me: You are an extractor who I have never met face to face but I know exactly how this is working. Force feedback.

Text: We have years.

Me: Thats very true.

Text: But I think a lot. And? So? Yeah and? Your a few weeks, so you know. The comments box below to find the right thing, I have been followed the way side, I have been followed the way side. (Implying they can not ascertain what is true or not as I know what is happening.)

Me: Incorrect.

Me: You know I have years.

Me: Oh you think?

Me: Oh so I have a few weeks of what?

Text: Oh, I can be found when I needed to make a person who has a hard time with you. Yeah, and when has that ever changed? (Implying I run to them to sort out my problems with medication instead of dealing with people.)

Text: You can also happen from the start as many as possible, but I think a lot. I have to face the situation is that what you are saying about this product, and the rest.

Me: What product?

Text: The one that I won’t be disappointed if I am still using the link to the Police force and to be confusing, and the rest. (Implying a product review I gave on something that was average I was selling online! It is being implied that I was swindling people. The reality was that these people just didn’t like the fact I had something they thought I shouldn’t have. Bare in mind that I am consistently monitored.)

Me: Mmmm. I think that you may have hit a serious error there.

Text: STEALING from a range. This will help us out with friends. Thank u can see it as an alternative, but the most popular programs and (Stealing from the ones of control I assume this to be.)

Me: Stealing?

Text:You have no hesitation.

Me: Actually, I do. The problem is you have stolen. Not exactly rich am I?

Text: You have no hesitation.

Me: You have no hesitation?

Text:You have no hesitation. This will help us out with friends. Thank u can see the full amount of time. I know. I know. Yeah, the significance of a lot of difference to the Police force and to be confusing, I have been followed the way side, you are guessing certain things based on who you are in relation to me, the significance. Pure coincidence. Don’t assume what I do has anything to do with you either. Still pinging eh? We will talk about grassing later. Know what Im saying? Hahaha predictable. Deliberate infection ( s ) Conformation collected through testing methods. Ear infection and other unknown. Further conformation of S. Direct link to ***record department! Explains why security guard was present. Diversion tactic. Made situation to look like I was violent so I would be concerned. (Basically, if you have had mental health problems, if you are considered violent when visiting a hospital a doctor will have another nurse present in the room or a student.)

Me: Sell it on. See if I care.

Text: Regardless any other psychological, but the most popular programs and the poor, but the most popular programs and

Me: Utter bullshit.

Text: You can do this. It will not receive any emails with a set to the scrabble the most popular programs and the poor. (Implying these programs are supposed to be the best to help the poor.)

Me:Well Ive got to say I really am flattered. The fact that I against a multitude of computer hackers using the media as a source to get under your skin a true honour. To be honest. That’s all that really mattered to me. How can you possibly betray those who betray? You look over those years and laugh at yourselves. I know my own mind.

…….continued shortly.

In Response to Tamil Vendhan (Twitter conversation)

A few days ago I was presented with a number of questions from a new follower who lives in Southern India. I had promised to answer all the questions he had asked as the conversation was getting to sporadic. As Tamil was requesting a private conversation I promised I would reply in my blog as I don’t answer e-mails as of yet. Despite the fact that for whatever reason Tamil unfollowed not long after this conversation and wither it be this person was a perp posing as a TI which is very common, an AI Bot (which have been recently introduced) or that he is just trying to protect his identity, I remain true to my word. It is still relevant to TIs and it make no difference to me if the person is genuine or not. It is what it is and stalkers can take whatever they want from it. It is after all reflecting back what they do!

Either way Tamil’s questions were interesting and he did in fact hail from Southern India as his location appeared on my wordpress location.

As it is unclear to tell what the person has experienced and for how long, I have grouped together and condensed what has been asked into an order. Tamil Vendhan has told me that he is an atheist, is in his late 20’s and wants to fight as a TI. I also respect the fact that it is clear English is not his first language and respect the effort that has gone into going online to talk about this subject.

I make no assumptions and do not know if the person is genuine or not. However, the questions are relevant and have tried to answer them to the best of my abilities.

What is the MK Ultra program?

MK Ultra is a social control program that involved experimenting on members of the public without their knowledge or consent. It was conducted by the CIA in the 50’s, 60’s and 70’s but it’s inception is likely to have been in operation since the invention of mental asylums some 300 years ago. On the internet, the official accounts of MK Ultra are only a small part of a very broad and expansive program that is worldwide in its nature.

MK Ultra was part of an ongoing “solution” to oversee and control overpopulation, sadly very much like the “Final Solution” Hitler inflicted upon the the Jews.

It has been in operation in many forms and code names but where it differs from the “Final Solution” is that it includes “assimilation” that being a method of dissolving cultures to merge and purge out ways of life viewed to be negative.

One of the most important movements of recent times which comes under the assimilation tests was the hippy counter-movement in the 60’s and 70’s where the use LSD, Marijuana and other high class drugs were introduced into society through the control and oversight of the FBI and CIA to test the effects of drugs on a large scale.

So why did our governments not experiment in a private locations and not in the public eye to avoid exposing MK Ultra?

It is likely they already had and it would seem that the powers that be were confident enough to execute this project on the public at large. Considering a lot of the individuals using drugs regularly were high and incapacitated, you can appreciate how valuable this information would have been to the military. Along with the entertainment industry an area that was exposed to be under the control of the ruling elite by John Todd in the 70’s, assimilation has operated under this watchful eye of immense control.

Many individuals that would have been psychologically disturbed from the effects of those drugs would have been targeted for further experiments.

With MK Ultra being the angle of controlling and “culling the flocks” it is part of an ongoing debate among the elite that has raged on for sometime. The fact is the powers that be preferred their battles to be fought the old way. However, through with the arrival of science there were some that thought it would be more convenient and less costly to kill people without them knowing it. That was until after the Second World War it was realized that the methods used by the Nazi’s to liquidize the Jews and the devastation cause by nuclear power was too costly to obvious to be contained from the public eye.

Since the industrial revolutions population numbers have sky rocketed from 1 billion to 7 million+ in 300 years where as in the proceeding centuries it remained below 1 billion. All those people need resources to survive and it was predicted long before that if those numbers continued to grow, the environment would not be able to sustain itself and everyone else.

This program exists in many forms in many different fields of science and social controls and comprises of thousands of years of knowledge obtained from ruling powers and modern experiments that involve religion, beliefs, race, technology and social attitudes.

Is there more than one person watching me?

A TI going from one place to another will have a whole host of stalkers following to make it seem that everyone is out to get them. They will look like ordinary people, but the TI will know that there are too many coincidences and references for it to be just down to chance.

I don’t mean to scare people or TI’s but the truth of the matter is that if you are being gangstalked in an obvious way the numbers will be phenomenal. Being a TI is described like living like a celebrity accept only you and the stalkers know and no-one else.

But don’t take it too personally, they are a large collective of individuals who pose as normal people, all working on different targets.

These people could be anyone you meet but a majority of them are involved in business especially self employed individuals.

Why Freemasons are at the core of Gangstalking?

Freemasons whom get a significant amount of attention for their secret society are of immense value in many fields but perhaps surprisingly the one they are most famous for. Masonry.

Not only are Masons today opening their doors to the wider public, its network of members are becoming more common throughout society. This might be a big give away.

Freemasons have the absolute knowledge of the foundations of modern and ancient engineering. Unless the home you live in was built by yourself, it would have been built and designed by Masons. In fact an entire neighbourhoods will have been draw up by an architect that will most like be a Freemason.

Home is where the heart is.

Everything starts at home. Every person should be aware of this.

The knowledge acquired by Masons over thousands of years plays a huge part in the structure of stalking. Who else would have the most intricate knowledge of the streets, homes and systems used for an area to function. It would be those that built them and  talking to the locals when doing what they do best. You invite them into your home, most without out knowing it. Is it no surprise they know a lot?

The blue prints to buildings they have created will most likely be stored in large databases across the world where each one can be evaluated in respects to weakness and strengths. That being, that a TI can be accustomed to a particular property through Masonic influence.

Rendering targets homeless

Masons are very clever at reaquiring property. Why? Because a good professional knows how to make profession mistakes and a professional mistake will cost more money than a part that fails from wear and tear. Most products are built to last. This is where a Mason can seem humble living in a home with the same appliances as you but get no problems.This applies throughout other businesses. They know the quality of what they have and also know how to flog a dead horse.

Property is the most expensive investment you can make. Families or individuals with plenty of money are less likely to be TI’s. Smaller and poorer families are at a higher risk.

It is those that can spend a fortune on their properties until they are in considerable debt.

This is perfect for the vultures. A Mason can snatch one of these up in an auction in a heart beat to be sold for a higher price or to be rented. Before that family know it they could be in a rented home owned by the same Mason. Straight into the pocket both helping that Mason to pay for his degree fees and contribute towards sweet charity.

There is a massive extortion and conversion market is this field of acquiring property through the leveling a families financial position.

Black Majick and Witchcraft in Freemasonry

Rites, rituals and majick are common place in the fields of these operations. In Masonry degrees and rites are conjoined with their work. But it is not quite the stuff of fantasy stories.

It means that the secrets that Masons employ within their teachings can relate to real objects that possess certain qualities, so becoming a code. Much like we humanize things in the material world, living things also fit the bill, like the practice of dog breeding for example.

A Mason could be having a normal conversation about a subject with you in a crowded room of people outside or inside whilst passing on signals to others. You wouldn’t even know it. The secret is in the patterns. Just like geometry which they hold sacred and worship.

It can also be seen as talking between the lines. Saying something without saying it. This is how many clever individuals are able to craft a conversation into their favour. Have you ever talked to a person who seems quite charming but you never seem to figure them out but they always leave knowing something about you? This is the art of what a Mason can do. It isn’t Magick as such, it is a very clever set of tricks to gain information and exploit it should it be needed. Having this knowledge also allows them to carve through small talk like butter and have traits in their business that allows them distractions.

For example a Mason in a home talking to you could have his phone on in his pocket to a fellow Mason listening in. If the conversation isn’t going as expected or is giving to much away the receiver can stop the call and ring the sender back.

A conversation like this might start with a statement like, “I can’t stay long, I’m expecting a call from someone for what whatever.”

That phone call is the distraction and the cue to leave. The other person has no idea what has just happened.

In the old days before phones this method of extraction would have needed a more tactile approach.

This is where not only Targeted Individuals are at high risk of exploitation but family members of Masons many some of which are unaware of their membership. From birth, every person fits a list of credentials. TI or not families worldwide are marked for a purpose. This means families are having their bloodlines slowly and carefully dissolved out of existence. Breeding in and breeding out! Surprisingly it is not a new practice.

In relationship to Gangstalking, Freemasonry is a clear overseer of this practice considering the nature of it operations.

Therefore depending on the circles you are in, your information can go right to the top and you don’t have to know anyone in government or media either. But someone in those realms will most definitely know who you are! Many no doubt that some of them will be your friends. That however does not mean that all gangstalkers are the same or fully understand why they are stalking you or who they are actually working for. Many are just normal people who are paid to snitch on the behalf other stalkers.

Are gangstalkers in my head, seeing what I see with technologies? Are these technologies viewing me directly from a satellite or from a device nearby?

These are very relevant and important questions.

Stalkers are not seeing through your own eyes through the use of technology or higher powers, but they can observe you with those technologies, physically in real-time for long periods of time. But it does not have to involve technology. The Stasi that operated in East Germany used methods that would be considered primitive today.

Technology is only used to monitor and predict what you do and what you think so that those involved in harassing you can have an idea of where you are going to be at a certain place, at a certain time so that appropriate number and types of agents can be allocated. Those agents will be operating under instructions and requirements suited to the target.

Through what gangstalkers learn and what is sent back via real-time observations from the TIs hand held technologies, questionnaires and written accounts by stalkers and so one this will be processed to create some form of visual representation of what is happening in the targets mind. Remember, gangstalkers overseeing operations aren’t just collecting information on you, they are also watching others in proximity to you. Not everyone is a gangstalker but people aware they are being watched could be turned against you.

The individuals involved in stalking are watching multiple targets, some aware and many others unaware. Many TI are played against each other and some have become so ill that they are beyond any hope of helping themselves. These people are likely to have a mental health diagnosis and have been convinced what is happening is all in their head.

The minds eye is the most major problem for artificial intelligence used to predict TIs actions. Thoughts are actions and thoughts involve speech that can be used by others to be exploited. Images are different. They are formed from many areas of the brain involving images, speech, interpretive language…. so much that a machine still finds it difficult to comprehend.

Imagine a computer trying to understand the mind and works of an abstract painter like Salvador Dali. Most of these styles of paintings use forms, shapes and arrangements of distorted physical objects, people and landscapes that do not exist in the real world in a natural state. Arranged in such a manor that to the artist they will have meaning, a message or none at all.,to the observer, it could mean anything they want that will be of relevance to them. This perception of gangstalking by a Targeted Individual is what fuels the operation to uses its counter measure. Mental Illness.

For a machine to learn, it must comprehend human emotion by copying a set of learned behaviours.

Those involved in the film and photography industry will have developed AI technologies that have been able to build random art works and CGI videos by learning. However, because it has not lived or experienced life, the work will still be artificial and a representation of a collective of ideas and experiences of people and mindsets not the machines identity. Therefore a machine does not have a purpose other than it’s instructions.

Observing a painting is a good way of understanding what happens in gangstalking.

Knowledge is power and when you know something, it will reveal itself in the physical world, even though it has been there all along.

This is the same with a painting or a picture that on first glance you will see all the aspects involved. However, if you learn something new you might see something different the next time you look at that picture. It all depends on relevance.

Human beings are not computers, we are variables and this makes observing and working out gangstalking operations easier. For a start any TI knows that what they experience is un-natural, it is borderline robotic that it is predictable

Believe it or not gangstalkers use protocols learned from their victims and targets that are applied universally or specific to one particular language or way of life. As all cultures are different, so are the mind sets involved with those that are stalked. Therefore containing a target is paramount. If the target moves somewhere else, the whole stalking community has to relearn all it’s operations or adopt ones from others. This isn’t as easy as it sounds. People are people afterall and it not like you are famous in the TV way either, so the red carpet treatment is going to be difficult. Isn’t it a wonder they want to entrap and put you in prison?

Remember what I mentioned about assimilation?

A targets file will contain a number of factors of concern and a list of traits that are viewed upon to be exploited. Religion, family, social circle, habits, political views, their personality, level of education, intelligence, love life, mental stability and so on.

Everything in a file is needed so that those in a specific region can understand and learn from the subject while systematically using harassment tactics to control the victim and other TIs using standard protocols that can later be widely applied.

Yes, that’s right. They are learning at your expense so a TI’s life becomes like a program or event. It’s like sitting down to watch a TV program you didn’t want to watch at a place you didn’t want to be.

An example protocol involves using many patterns or sequences that can be seen visually.

For example. A TI who has become aware that they’re being watched might find it difficult to look at what is in front of them. Some people look away to avoid direct contact. This is a natural trait common in people. It is called Avoidance Personality Disorder that is common in PTSD. Take the P out of PTSD and you have an accurate description of a TIs life.

This trait could be similar in another TI. With a collective algorthim all traits of TIs can be correlated and used in different ways.

No operation needs mess so keeping it simple is paramount. With the exception of some collateral that being a person other than a stalker agents enlisted to take a falls for their actions, anything else would just actually be coincidental.

If a person has been psychoanalytically observed long enough their reactions can be predicted. So for the person that turns his head when he/she looks at something that makes the feel embarrassed, reminds them of something unpleasant or is it is a person they do not wish to talk to etc they will turn and see something relevant that catches them off guard.

This relates to the next section.

Tamil describes a situation where he has been a victim of a distraction technique that can confuse and traumatize a TI. This involved Tamil approaching a speed bump/breaker on his bike, only to have is attention drawn to a girl before hitting the speed bump.

I shall present this from another point of view first. For example: Driving to work.

You are at a busy junction and you are in a rush to get to work. A driver behind you seems to be impatient. You notice this as you are aware of actions behind you. At this point you may feel the need to chance a gap in traffic to avoid the person behind to get out of the way.

Critical point. This is not an uncommon situation to be in. However, for gangstalkers this is an opportunity for multiple distractions. For a start, they already know you are late for work.

Typically, situations like this can be designed to cause an accident. A person behind you almost forcing you onto the road. But something else from another direction could catch your attention, something of relevance. This could make a TI panic and make a mistake. It could just be someone calling out your name but when you look the person is calling someone else, or appears to be.

Before you know it, you could be plowed into the back of a car. You are to blame. The person behind has disappeared and the person calling your name is now a witness. How could you even make an excuse to anyone?

To everyone, you were to blame. You were late for work and pushed your luck.

The reality is, you are experiencing things that are beyond what happens to normal people. You are being stalked and harassed and you have just been stitched up in a very clever set of tricks.

Gangstalkers will know a lot about you. In fact you might as well be a celebrity to them. This is achieved from countless hours and years of spying that has been conducted from average citizens part of community neighbourhood watch to computer hackers all the way up to the military.

With an event like this, a TI could be seeing many coincidences simultaneously. It seems so impossible that so many people could know anything about them or know what they are thinking. This is classic street theater.

But when things get more extreme is where the Targeted individual is experiencing things in the real world which appear to be emanating from a targeted individuals mind.

This is the sucker punch of gangstalking.

For example. Say that due to the effects of gangstalking I was stressed to the point I scratched myself until I bled. Perhaps I was feeling to worried to go out but had to anyway. So I leave the house to go shopping, worried about being watched. I get on the bus and overhear conversations, constantly on high alert, senses are heighten. At this point I could be completely paranoid and think everyone is following me or talking about me.

The utilization of gangstalkers will then focus on the event of the day. Blood. They may even see it coming seeing as I started scratching it a few days ago.

Somehow you are seeing associations everywhere. Red cars, houses, jumpers anything associated with red in frequency but then you could see “give blood” on a advertising billboard somewhere. That moment could make your heart drop. It could appear like you are having messages from god. This is where some TI’s loss the plot and think it is a religious experience. Some may seek help and become a born again Christian.

You have to ask yourself. Are you being paranoid just because you have harmed yourself or is this all real?

The trick with gangstalking is that 50% of what they do is real-time involvement, the rest is just the overworkings of a TIs troubled mind. Even then they are watching. So as you can imagine it gives gangstalkers plenty of room to maneuver and plan ahead.

How can this be true? Go to any psychiatrist and they will completely defuse all of your claims of harassment and persecution as paranoid delusion.

They will ask, “What is so important about you?

You will have your answer right there.

You aren’t important to them, but they can make use of you.

A TI making one journey somewhere will have a whole host of stalkers following to make it seem that everyone is out to get them. They will look like ordinary people, but the TI will know that there are too many coincidences and references for it to be just down to chance.

This is just one example of many coincidences that can happen in one day alone and it can feel unbelievably overwhelming.

If this happens everyday it is most certainly going to make someone extremely stressed and ill. That is the whole point.

In the case you have mentioned about seeing a girl while approaching a speed bump, one which requires you to slow down means that it would be a deliberate attempt to draw your attention away from what you are doing to cause an accident. For men, using women as a ploy is a broadly used tactic in gangstalking. Another thing that is common is that if a TI does not react to a situation involving a stalker of the opposite sex, where they have been used to bait or distract a TI, stalkers can use derogatory remarks afterwards either shouted or implied toward the TI. Those being of homophobic in nature or implying that you are gay.

 

How do you observe gangstalkers when you are being observed all the time?

Although this sounds absurd, many TIs develop an inner coping mechanism, especially those who have lived many years with it happening. Some just accept that they are followed, some learn from the stalkers are reflect back what they receive being clever enough to hide what they are doing.

Some have been followed for so long that they even knew the stalking was happening before the stalkers knew they were aware.

Some people just have that “gut feeling” something isn’t right around them. For children that are targeted, adult stalkers especially ones in authority rely to heavily on their  confidence in this program, that it is somehow “fool proof”.

I can guarantee you it isn’t and is far from a perfect operation.

Gangstalkers are people like us but not all gangstalkers are privileged to the same information as the ones they serve. You will find those people go up in a chain of authority much like any system.

Testing out stalkers can require you to be extremely brave but it is not something every person can handle.

How are you able to block out their thoughts?

Difficult to answer. I just can. Perhaps it’s just a state of self-conditioning that I have achieved through years of countless hours of reading books, articles and conversations.

One thing I had learned and suspected was a program that is written in to predictive text system in mobile phones.

It is a suggestive program that if you type out a sentence using the word presented in the list you can form sentences from the list. Some sentences can form themselves and some go no further.

You can try this yourself to see if it works. Go into your applications on a mobile phone device and open a note pad. Start asking questions? You might be able to form some kind of response.

On my old phone, the preset words on the phone were:

The I Thanks

The eye represents the “All Seeing Eye”.

The predictive text is the All Seeing Eye program in the phone. And it’s right under your nose.

V2K

There are many TI’s that experience what is known as voice to skull or V2K. This is where an indvidual experiences voices of people in their head from a source they cannot determine. To others, these voices are just merely assumed to be mental illness. However there are technologies that have been tested and proven to achieve synthetic telepathy.

There are TI’s that don’t experience V2K although it is not unlikely that they are having their thoughts read. As mentioned reading thoughts can be achieved through consistent observations.

The bottom line is that regardless, hearing a voice other than your own in your own head does not mean you have to listen to it, obey anything it tells you or be afraid of it.

Meditation is a great way of strengthening your mind and opening your mind to thoughts memories, whilst focusing on news perspectives.

It is also something people do often without thinking about, which are called Mantras.

When you explore meditation you will be able to see why gangstalking is more limited in what they can do than you realize. Mind over matter.

There is also another angle. Gangstalkers don’t like unpredictability. Why? Because it makes TI’s realize that gangstalkers are just guessing what they are thinking based on events that are most of the time pre-planned. It means that they will find it harder to hit on your buttons.

Every person has to have a stimulus to predict thoughts. Yes or no questions are the easiest ones to determine when asked directly. There are brain scanners used in research to predict what a human answers 8 seconds before they answer by focusing on one part of the brain. This is actually featured in a BBC Horizon documentary a few years ago.

The most stressful situation for a TI is accepting that they are being watched 24/7. It doesn’t mean you have to like it. So that means taking hold of every opportunity to find out who you are and take out all those people that are negative towards you at any cost! It could mean losing everyone but it could mean gaining some form of understanding to the questions that elude you.

The other thing to remember is that the authorities that would take it upon themselves to read others minds are not good people, regardless if they think it is for good.

People who do things for good make their intentions clear.

Gangstalking is exactly like the Stasi regime and is an act of treason.

 

How they are able to produce dream states?

Computers are not needed to produce dream states.

In psychology these are known as intrusive dreams and are natural to have.

The human brain and your body are constantly protecting you from not only things you ingest or breathe in but also from people.

A targeted individual who experiences things happen around them manifest into the psyche simply because the person knows that it is not right and the brain also knows and interprets it as a threat.

It maybe difficult for a targeted individual to explain what they experience to someone close to them but considering the magnitude of what is happening can make it hard to explain, simplify it can also make it seem that it is not enough to get over the severity of what is happening.

This can cause a person to internalize these things and if they are not released they find other ways of coming out of a person.

Humans, regardless of the general opinion are still very tribal and have compassion for others, even if it does not seem like it. If they see wrongdoing this can cause anger in person so great that it can build energy. For a targeted individual this puts them at risk of this energy coming out in all the wrong ways. Stalkers know this and is a fundamental subject of interest to them.

Why? To a stalker they view their targets like lab rats. Can you imagine how they feel when a TI doesn’t respond to their actions? This is the impetus a stalker has to put as much pressure on a target as possible so not to allow them to develop strength or any sort of knowledge.

Intrusive dreams are when a number of strange or threatening events that are happening  cannot be fully understood and find their way into the mind.

In some respects dreaming isn’t a bad thing. It means that despite everything, your body is still getting some rest.

However, the desired outcome of stalking is sleep deprivation. It is a thoroughly researched and understood method that is widely used in interrogation and as a torture method. That being a person who isn’t sleeping well over a period of time becomes tired quicker, forgetful and clumsy in their actions. Stress will induce depression and so on. Everyday will seem endless and feel like time is passing much slower.

Being in this state makes a TI more vulnerable to making mistakes in everyday life and also with cognitive impairment more susceptible to manipulation.

Sleep deprivation also lowers brain waves much like when a person becomes ill. Along with sleep deprivation stalkers alone with what they observe will seek to take advantage of this lowered mood state to try and control and brainwash individuals who are targeted.

Therefore dream states that may appear to suggest these individuals are in your mind is a question of who, what and why those manifestations are there in the first place.

Where gangstalkers are family, members, friends or acquaintances they are likely to feature in a TIs dreams as they are in a a communicative realm that can be understood.

Those unconnected with you might as well be ghosts or apparitions because they are people who do not know you.

In terms of hearing voices in your sleep, this can suggest a number of things. Either they are part of the dream or someone you live with is hypnotizing you in your sleep.

A common one is where a TI is unknowingly in a relationship with a gangstalker.

Some TI’s have partially woken up to hear a partner or someone talking into the ear or just in the room with suggestive or threatening speech.

If this ever happens to you, do not mention anything or say anything to that person in regards to what you have heard. Get out of that relationship as soon as you can.

A person who does this will have to have some knowledge, guidance or is fully trained in hypnotism. Regardless of what you know about a person, stalkers train others in this art or employ those with plenty of experience. They must also be highly creative liars with narcissistic traits.

The reason for this is because a TI that becomes isolated will envy a narcissist, thus along with the celebrity attention that stalkers give their target, the two play of one another.

This is a type of constructive separation technique where the abuser uses the victim to push them away without fully understanding why they are doing it. The abuser is fully aware of what is happening right from the start and this technique can leave the victim emotionally destitute for sometime. It is also usefully to the abuser/stalker as they can develop an emotional hold on the victim, especially if the abuser has any suspicions that the target suspects that they are stalkers themselves.

 

The things that gangstalkers do is silly and childish. The elderly are worse.

Some of the things gangstalkers do is beyond comprehension, that fully grown adults can act like children in a school yard, elderly included. Some of these people haven’t even got surveillance equipment, they are just general busy bodies with their years glued to the wall.

If you ever want to piss off a gangstalker there is nothing more offensive to them than the word “Pathetic”. It truly is a spectacle to behold watching an abusive stalker crumble under this one word. It renders many in total silence.

 

Your tweets give me hope. With a bit more information, I can feel freedom again.

Thank you. I hope this helps in someway so you can attain it.