Dutchsinse predicts False Flag and a personal message from EA Games.

Desktop Screenshot 2017.10.18 - 17.43.31.85 (2)

This is fresh news as of 18/10/17. Dutchsinse has accurately predicted a false flag by using a media fed code warning story.

http://www.facebook.com/adeptoerperfectus/

The base line to this is that FOXNEWS have been releasing news articles that indicate a hidden warning to Americas servellience networks. This particular article released online had been used a number of times and it had been observed that not long after, some form of attack would happen. The article was a regurgitated story on the classic “Bigfoot” so it’s likely that “mythical” stories are one amongst a large percentage of news catagories that are used. Personally, I think this false flag is an error made by the global AI system for simply repeating to much to be noticed. It also suggests that the work flow for NWO operations is being governed without intervention or at least is being left to run on autopilot. Sounds crazy but this is a major mistake, one to obvious to ignore.

What is interesting me is the nature of the attack. There is a possibility that the person who commited the killings was a targeted individual and was primed into commiting the act by manipulation. Data harvesting is watching a lot in real-time, so through predictive conditioning, it is possible that AI has been able to manufacture the situation quietly, manipulating the target and the victims in one go, while the news article acted as the warning as a stay clear alert.

https://www.yahoo.com/news/m/4e28221d-2352-36e3-bbfb-170e21bb6f15/ss_%27bigfoot%27-reportedly-sighted.html

Desktop Screenshot 2017.10.18 - 17.52.51.94 (2)

The shooting report can be found here:

https://www.yahoo.com/news/sheriffs-office-multiple-injuries-office-park-shooting-142727851.html

 

My personal targeting

I wanted to show my readers something that I encountered right after posting this blog last night.

I regularly play the online multi-player Star Wars Battlefront, a game which is rigged into AI intelligence. Online gaming harassment is something I haven’t covered in my blogs yet but recorded the session I played right after this blog. In the screenshot below shows the first moments of entering into a multi-player session.

 

Desktop Screenshot 2017.10.19 - 09.33.41.46 (2).png

In the chatroom top right, you will be able to observe a user called OmgItsObama and below that the watch play is anchored on a user called Hassi1210 or (Hassle) whom is the black stormtrooper.

It goes without saying that Barack Obama wanted to make a move on gun control laws. So this indirectly sends a message to me in the context of the article and it’s implications.

To quote the Foxnews article about Bigfoot (a monster that is paroded in Empire Strikes Back on the planet hoth):

“The legendary Bigfoot and other creatures like it have reportedly been spotted near a Northern California lake, according to a paranormal investigator. Jeffrey Gonzalez, a self-described paranormal expert, said he heard about the sighting from a local farmer who said he saw the creature and five others running on his ranch near Avocado Lake. “One of them, which was extremely tall, had a pig over its shoulder,” Gonzalez said in comments obtained by Fox 26, a Fox News affiliate. “And the five scattered and the one with the pig was running so fast it didn’t see an irrigation pipe and it tripped, with the pig flying over.” According to his Facebook page, Gonzalez is a talk show host and an investigator”

 

Desktop Screenshot 2017.10.19 - 09.33.41.46 (3)

 

This reflects the five others. In the incident, three were killed and two were injured according to the article. Decoded, it is implied that the attacker was employed to do this hit by the Government, where the five stars were the targets. The attackers name is Radee Labeeb Prince. The last bit of the message implies he was given a reward of somekind for what he did.

For those that don’t know, Star Wars Battlefront does not feature online voice chat nor does it offer a choice of server to connect to. This is done automatically. Any communication is done via the chatroom. This means that play interaction with the outside world can be very easily mimicked by AI and can be used as an extraction tool or for indirect harassment.

This game was plugged by operatives known to me before its release. I have studied the game since its release, and it is almost always used as a way of indirect communication.

Advertisements

Operatives and special projects

In this blog I wish to disclose some information about special operatives.

Where I grew up, people my own age were drafted in to special projects through the schooling systems in the 80’s. What this means is, there is a network that operates in the schooling systems today and has done so since the 80’s. As I have covered in a previous blog, children who are from families with intelligence backgrounds will be automatically involved in participating in community spying.

A person whom I am aquinated with introduced me to one of his work friends back in the late 90’s. A trait they both shared was a love for music. The person I meet had walls of copied Cassettes, CDs, DVDS and so on which easily constituted as a small library. This was at a time where illegal downloading online was much easier than it is today.

A lot of operatives I know have a deep obsession with music. I myself love music but in the respect I am talking about, I have learned quite a few things about why some operatives keep large collections of music, so large that it would be un-nessessary.

These types of operatives are involved in studying the psychological effects of music on targets and the general public. These experiments have been conducted for many years using many thousands of studies in various places around the world. Some have been conducted in public places such as places of business since the introduction of background music in …. but there also been many other experiments that have been conducted in places you would not expect.

Contrary to what people know, MK Ultra victims can live a relatively normal life by appearance yet are mentally controlled within an ever changing experiment. So it means that people whom might seem to be popular or in places of society that might indicate that they are in a position of power matters not. It is widely known that even celebrities can be programmed and why MK Ultra is talked about a lot in the film industry.

Operatives chosen for music studies will listen to anything. Ranging from the most extreme kinds of music you can find right back to the most primitive of music beginnings. Because a majority of music is interpretive, analysts have been used to observe the psychological influence of lyrics right down to the effects of sound, rhythm and so forth in order to develop protocols.

Music is used often in harassment operations under many different guises with the intent to influence the feelings within a target. Under some torture conditions, music has been used in ways to extract information. In organised harassment, it can range from external methods such as low bass rhythms emanating from cars that pass a house, to vocal linguistics. All these are developed using manipulation of the languages, auditory and visual phenomena which are practised by street theatre groups involved in harassment.

Music has an enormous influence over our lives that it can shape how we feel. It can make us feel sad, happy even angry. It is therefore why the music business is almost certainly dominated by a system designed to control nations through the use of advertising.

Some MK Ultras can be found in the music business and many do not know that they are victims.

This is such a closely knit operation operative musicians themselves can incorporate an MK Ultra into a band. This is a little bit like an Occult operation of incorporating the enemy into the system. Therefore, this is something commonly seen in more extreme forms of music.

A classic MK Ultra example seen in front of the whole world was that of Sid Barrett of Pink Floyd. Despite Sid once being the frontman of one of the biggest bands of all time, he was also subjected to LSD mind control to the point he eventually became mentally ill.

Pink Floyd are almost exclusively associated with LSD, most notably the 1974 album Dark Side Of The Moon as their origins were bred from the drug cultures of that time. After the departure of Barrett in the early 70’s, he was often referenced in lyrics written by the surviving band members.

MK Ultras are sometimes used as examples or foundations for their music and psychological studies, meaning there is nothing to stop them controlling them within the band itself.

This is very akin to the premise of the 1975 film The Wicker Man where the main character is drawn to a situation that has already been pre-planned, therefore running the maze. In the music industry, it does not matter what area of the stage they occupy, from singer to drummer, any member could be the subject of abuse control.

Therefore, where it is assumed that this kind of mind control abuse only happens in extreme types of music, when in fact it applies to every area, especially popular music which is far easier to advertise to the public.

A majority of the music industry that exists today is a fully fledged operation that now works in-co-operation with the mass media control network. It is why music psychologist that have submitted their work over many years have contributed towards predictive programming and Mind Coercion.

Mind Coercion is a phrase not often covered in information that exists about mass mind control but it is one aspect of digital persuasion that exists on the internet. It can be observed by anyone who uses technology, especially that which has control newsfeeds and so on. In fact, it is the part of organised harassment that is least understood and why those whom wake from programming become at risk of serious mental health problems because the actions of operatives co-exist also side the operations of the internet.

Music has the ability to penetrate some of our deepest emotions, especially sadness. Rhythm and beat also has the ability to regulate our heart rhythms and other functions. Therefore, being surround by a stimulus that can subconsciously trigger feeling and emotion can act as triggers, including memories and thought patterns.

It is these aspects that music psychologists concern themselves with, contributing to studies under controlled conditions.

Music identity exists as a baseline to sort types of people, right down to the way a person thinks. Therefore, those whom listen to one genre of music against many others is select to only certain perimeters of emotional expression or understanding.

For example, a person might harbour fears about certain genres of music, such as hard rock as it is sometimes associated with Occultism and adversity, therefore representing negative traits. Therefore , this is where there is much music politics and grouping. Someone whom is broad minded to music, with subjective criticism might be less influenced by mind control methods.

Music also allows the ability to express emotional and even religious expression. Singers and musicians use muscle memory for a majority of their practises and performances thus becoming rhythms that enter the very core of our beings.

Repetition of music is therefore something that was studied quite intensely under the MK Ultra projects. LSD was considered to be effective at de-programming learned behaviour as the experience can separate the mind from the confines of the perception of time and reality.

It is in this vulnerable state that operatives could take advantage of the core programming of a person much like scenes found in the Kubrick film A Clockwork Orange.

Victims are therefore treated much like meat as operatives have to be required to separate all emotional attachment from the target. The reason for this is so the operative can avoid the prospect that their own minds are also vulnerable to programming. It is why many operative refer to humans as being products of our environment.

Music and Algorithms

Algorithms designed to influence the natural world have been developed over many years. If comparative to Occult/Witchcraft practice, the psychology of manipulating human emotion is one that has been studied and utilized in a way to bring people together or in fact separate others.

One particular mathematician I had met basically came outright and stated that they had been developing algorithms in which they could make someone fall in love with them. But these algorithms have to be experienced themselves in a one to one nature as it is only their feelings which can be experience and measured against the nature of their equations.

This is quite important, because it means that many MK Ultras are in or have been in relationships with programmers for the primary purpose of data analysis. These individuals will even go to the lengths of marriage and have children together, even to the grave. This is far more likely of the generations from the 50’s and 60’s.

These individuals will likely have a secret relationship alongside the study, where a job can cover time away from the study. The reality denotes that the target is the subject of study and is therefore work. The operative will obviously develop emotional connections and a depersonalisation of the situation they are involved in controlling their target and perhaps a deep sense of isolation. This is due to the controlling nature they inflict, as an unnatural process, the agent needs to be pulled occasionally to be kept in focus.

They also know, that a one to one experience must be kept as real as possible in order to provide accurate enough data, one which have variables considering the relationship is only part of experiment. These false feelings therefore need to be rectified under comparative study of others in natural relationships. However, these experiments include other factors, situations which relate to friends, family, finance and so on.

Music will also be the feature of many relationships around the world. Therefore it is comparatively studied and used by many field agents especially in regards to manipulating the emotions and thoughts of their subjects.

Music exploits our most primal functions.

With the music industry, there are many different types of cults. In terms of controlling cults, there are a few and ones which incorporate programmers.

Some of you may have heard of the term Death Cult. It is one feature found in the industry that some celebrities commit to. Although the cult isn’t considered to be a “death cult” by its followers, the origins of the nature of what happens within one are very misconstrued by the same premise that music has. That is, the core of the cults believes are interpretative and therefore what one does under interpretation is primarily the desires and whats of that individual alone. This is stated in order to protect the code or religious teachings contained within in, especially if they challenge conventional laws of society.

Cults are often associated with celebrities ranging from Scientology to older sects that can span back to many centuries. Some modern cults are merely experiment, where older ones tend to be ones that have control over the smaller groups as their foundations/principles act as keys to modern elements such as technology and lifestyle.

In the music industry, these branch cults can be represented as one area of a larger cult. One band can actually symbolise a movement of a branch of the cult where it could be assumed to be by its followers to be completely separate of any other influence.

This is can facilitate what is known as a death cult. Higher order members which oversee the operation put in place methods to run the secret collective with the intention to use selected individuals for certain purposes. These cults can also trade of their members in certain ways to more socially accepted branches of religion for the purposes of money. The bottom line is, if an individuals moral compass is easily swayed, it will be identified and is why you will see many celebrities used for the purpose of making money, especially in the media. For those whom are not in the media limelight, cult members that become difficult to manage can be moved down “routes”

which is where some celebrities are exposed for criminal acts. If the target avoids the law, then they can be constructive passed on to the mental health systems or traded to a different religion eg Christianity.

Individuals dealt with this way do not necessarily have to be MK Ultras but members that have decided to choose a different path or go too far in what they are doing to be noticed, drawing unwanted attention. MK Ultras tend to be those that keep on the fringes of the cult. They do not participate in there ceremonies but could be assumed to be part of them purely by association.

That is what is known as scapegoating and it is more common than people realise. Through association, operatives can use unsuspecting individuals as part of objective operations. Teenage gangs are one example. By mere appearance, a group of individuals do not have to appear as stereotypical street thugs. They can employ tactics within the neighbourhood whilst being able to conduct an operation at the same time.

This is for a number of reasons. Keeping “unknowers” around allows for scapegoating. Should they ever face legal complications or risk of exposure, an “unknower” can be used to take the heat. They are almost always kept in the dark about some situations they get into. This literally means a person could be committing to indirect harassment and not know it. A “unknower” can be influenced into doing and saying things that contribute to the activity. Those whom are suggestible or at risk of peer pressure tactics are ones whom can end up in these sorts of situations. For outsiders, this is what can happen.

Within a cult, these methods will almost exclusively appear under Satanic Ritual Abuse. This is covered in the Gangstalking and the Occult Blogs.

MK Ultras in Film/Television

There are many examples of MK Ultra programs in media history, dating back to the 50’s.

Of my older readers, many UK folk will know of or have heard of Spike Milligan.

Spike Milligan was a British comedian whom was a much loved TV personality whom began his career starring alongside Peter Sellers and Harry Seacombe in BBC Radio’s The Goon Show. Milligan was known for suffering with Manic Depression, (commonly known as Bi-Polar disorder) for most of his adult years. Milligans co-stars Seacombe and Sellers had links with Christianity and Freemasonry.

Sellers is still considered one of Britain’s most loved comedians. He was also know for womanising and drug use in his private life. Seacombe however maintained a more conservative lifestyle in contrast. However, Milligans lifestyle was very heavily influence by his work, took prescription mediations to treat depression and was known for very extreme mood swings, violent outbursts and at times, threats to others close to him.

Considering Peter Sellers connection to Freemasonry, it would be no surprise if Milligan was being subjected to mind control methods by himself and those within the industry. If only subtly.

However, Seacombe whom was was very much a notable choir singer and Christian committed to religious TV program Highway in his later years (1983-1993). Although Seacombe was not known to be a Freemason, personal connections to me suggest otherwise.

If somewhat a nod to organised harassment “The Goon Show” was very much a mockery of the community organised spying harassment development projects of the 50’s and 60’s. Although primarily aimed at the criminal gangs (goon squads) it was well known that these individuals could be used by the Police as informants if caught. Therefore, Sellers would have been more than aware of what was happening at the time, informed under Freemasonry. Sellers was also noted for making many spoof spy movies and featuring in two of Stanley Kubrick movies Lolita and Dr. Strangelove. It is quite apt that Milligans could be so closely associated to someone whom worked with the director who would go on to make the film “A Clockwork Orange.”

Alongside growing up with music, stage and acting experience all three like many men of their time served in the military during the Second World War. Milligan particularly is most noted for writing many memoirs about his war time experiences and that about the Nazis.

In 1951, The first Goon Show episodes went to air around the same time that anti-psychotic medications were being discovered although the very first observations of anti-psychotic properties in trial medications were observed in tests conducted before the 20th century. At this point, MK Ultra was documented to have already started and likely that LSD and anti-psychotic were being experimented on before the first serious introductions into psychiatry in the 1960s.

The Goon show also specialised in Radio theatrics, which in the days before TV was a very distinct art of creating sound effects in order to create atmosphere without stage or screen. Much of this was widely studied against the in house audience and listeners around the nation. The Goon Show was very successful in the UK and if anything, one of Britain’s most pioneering comedy shows, crafting textbook radio entertainment.

Bi-polar is essentially the result of deep manipulation of the moral compass or parts of the primary ID within Freudian psychology.

Visual and Audio Triggers: Mandela Effect Debunked

Those that have grown up in the age of television while have been subjected to many images and sounds over many years almost certainly routed to one particular place whilst doing so. Today, this can be anywhere with the use of the internet.

Media programming of the MK Ultra era developed a method which today is being referred to as The Mandela Effect. This theory suggests that somehow, the fabric of space-time is being manipulated and people are remember things differently to the way they are told. Hence the Mandela Effect uses the example that some people believed that Nelson Mandela had died during the 80’s when he was in fact still alive.

This tactic is known as separated news events and was used on MK Ultras whom were primarily isolated or considered “unsuspecting” where a number were tested. They were by all means the first tests on fake news.

Either way, split programming was designed to implant the memory with a false belief whilst the rest would be told the truth. This presents many problems for those being experimented on especially under perceptions of intelligence.

In the early days of radio, some individuals could be experimented on through the use of frequency hacking. This basically meant broadcasting to localised radios in the area much like a walkie talkie accept onto commercial radio bands. This later went on to be exploited by pirate radio and TV stations.

Therefore, TV has had the ability to be able to introduce triggers to the nation. There can be for example, memory triggers implanted from very young age.

TV programs or advertising which only had very brief airing are examples of this. It was seen very often in the early 80’s. These memories can be stored deep in the mind. You tube introduced deprogramming on a massive scale because it was able to allow people to view things that they haven’t been able to find on TV for many years which had otherwise been put to the back of the mind.

Another example of split programming is used in films. Many know these as deleted scenes.

One very popular sci-fi film from the 80’s Return of the Jedi has a missing scene but was featured in CIA issued tests at some cinemas and video store outlets.

I have online found one person whom recalls the scene.

The missing scene is found at around … into the film where the Rebels arrive at the Death Star and begin advancing to attack it. At the point where Lando Calrissian notices that the deflector shield is operational he orders the fleet of X-Wing fighters to pull up. Here there is a missing scene where X-Wing fighters should be seen crashing into the deflector shield. If you watch closely on the currently available releases, you will be able to notice there is some editing, particularly in the music.

Strangely, in the film Independence Day released in 1996, there is a scene where this happens involving F-16 fighter jets crashing into the deflector shield of a large alien spaceship. Independence Day was also a 20th Century Fox film like the Star Wars movies.

The premise of this scene implanting is similar to subliminal advertising. What seems to happen to MK Ultra test subjects is that they can be shown films or TV that can include scenes which will be removed but copied and placed into other movies.

The mental effects are like looking at a photograph but with bits of the original picture missing. It causes a person to think deeply, trying to force a memory because the person remembers the photograph differently.

There are in fact many movies from the 80’s and early 90’s where these experiments were tested. They normally only involve very brief scenes and these copies were only found at video rental outlets and some national broadcasts.

Interestingly, Return of the Jedi was released on Blu-ray which featured extra deleted scenes. These scenes were in the rental versions but were correctly edited in. However, the crash at the death star cannot be found in these deleted scenes.

To someone believing this is a Mandela Effect is merely being fooled by media deception and it is amazing how much they have been able to get away with.

Symbolism of 9/11: The Hand of the Architect and the Pentagon

The first parts of this article will look at explaining what happened at 9/11 in terms of Architecture and then focus on some Masonic symbolism which to my knowledge appears to have been overlooked and not covered by anyone else. Some of this article references videos made by the America Institute of Architects (AIA): Truth for 9/11. It is in no way intended to plagiarise nor imitate AIA’s sterling work, only for the purpose to exemplify some of AIA findings for the intent of comparison and reference architectural science and theory.

Subjects contained within this article include:

  • The investigation for 9/11 truth by the AIA (American Institute of Architects)

  • 9/11 and its position as a Conspiracy theory

  • 9/11: The Inverse Kinematics of Architecture

  • Zero Resistance

  • Inverse Kinematics In the Demolition of 9/11 Explained.

  • What should have happened to WTC7

  • Symbolism of 9/11: The Hand of the Architect and the Pentagon

  • The Draftsmans Pencil

  • 9/11 Symbolised The New Era of Artificial Intelligence

  • Microchipping: The Digital Square and Compass

  • How does 9/11 relate to current events?

AIA: Architect and Engineers of America vs the 9/11 Conspiracy

In 2011, the well established firm Architects and Engineers of America “AIA” came to the forefront of the media proclaiming that all three World Trade Centre buildings were brought down in a highly co-ordinated controlled demolition during the events of Sept 11th 2001.

I’m sure that myself like many others who have long supported this theory, will feel a sense of duty is being for filed in the quest for truth now that real scientific data is being brought forward. Supporting a view that the events of 9/11 were different to the government version of things runs the risk of ruining ones reputation and the risk of being placed on a terror watchlist.

I have been fortunate to see the Twin Towers with my own eyes, just over a year before the attack happened and they were a magnificent sight. As a fondness of memory, the shear scale of these building was so enormous that even from a few blocks away, I had to have my head tilled right back, just in order to see the summits.

I am a person since the day it happened did not believe that 9/11 was a terrorist attack in the way we were led to believe but was an inside job that was used as an impetus for a war on the middle east.

I do not believe that holding these views is the reason I became targeted. I know that I was targeted already. It was perhaps was I was identified as having the potential and ability to question and rationalise situations such as 9/11 from early on.

As far as citizens are concerned, even if you were not targeted beforehand, just even researching the event increases a persons chances of being placed on a watchlist. The point of MK Ultra was finding a way of de-educating the populace, just for the purpose of events such as 9/11 and also identifying those with intelligence. Fortunately, due to the need for skilled workers, not every person can be dumbed down nor can they be cloaked from the truth for too long.

Where the events of 9/11 are concerned, to understand that a demolition team would have been needed to bring down the towers would only require some kind of knowledge or background in art and design. Therefore, if one has “creative potential” which is the case in art and design, these individuals will likely be increased in potential threat the more experience they develop especially if their career paths move into the fields of sciences. Therefore, capping knowledge within the education systems has been a progressive task.

Art and design is a very difficult business to make money and therefore it is a subject in the schooling system, that over the years has not really been treated with much seriousness, yet there is a lot of money to be made if you have the talent. A degree course in Architecture for example can take over 5 years to complete. As far as money is concerned, this is a very expensive branch of academia. Therefore, many talented individuals develop their own skills, in their own way.

Therefore, people with these sorts of traits tend to have the ability to rationalise, question and see things for what they are. Therefore, those who work in the fields science and architecture will be at the highest risk of targeting where 9/11 is concerned.

9/11 as a Conspiracy Theory

The 9/11 event is perhaps one of the most devastating events ever witnessed by the world. Because so many questions have gone unanswered for so long, the whole situation has been open to much speculation from many areas of opinion, science and what seems to be a surge in what we can class as the anti-conspiracy theory.

The most recent example of this is the Flat Earth theory. The Flat Earth Theory is actually one of many false flag operations introduced onto the internet with the intension to disrupt public belief systems (science/religion) using highly trained operatives, most of whom are highly trained public speakers and negotiators, posing as regular people. False flag operatives also feature on other conspiracy subjects, especially the more recent Gangstalking/Organised Harassment conspiracy videos.

The flood of False Flag conspiracy videos is due to the fact many people have cameras and audio on their phones today, so special operations have to work differently to the way they used to in order to deal with any potential incriminating evidence being captured by civilians. If anything, 9/11 is one reason why these operations. Considering mobile cameras with video/audio capabilities did not exist in 2001, many people were able to film very important bits of evidence with camcorders and have over-time been uploaded to internet video channels.

False flag information intends to mix with the less informed individuals in order to create and solidify the conspiracy theorist into the minds of the nation as some sort of mental illness. Therefore disinformation will spread to those whom have a more open minded attitude who will inadvertently help to compound the false idea.

There are many individuals I have observed in False Flag videos whom challenge those who hold the real world beliefs of mathematics and physics. The challengers are by nature very clever “speakers” who can put across very convincing arguments. They have a tendency to latch onto aspects of a subject which they know can be difficult to challenge and make it their main focus. This is normally portrayed with a mocking, arrogant demeanour which is clearly well practised.

Some of these aspects are quite commonly seen in Organised Harassment and it is part of a training program where members are taught how to be persuasive and control conversations. In fact, the tactics are also quite commonly seen in professional negotiators used by armed forces, police services and even emergency services. But these tactics are used almost exclusively used by public speakers such as politicians. In some secondary schools and universities, students may be invited to attend debating societies where many of the skills of public speaking can be learned.

Therefore, the people whom feature in these government sponsored propaganda videos are known as “Poker Face” artists, or Poker Face conspiracy theorists. They are required research well in advance before making a video or several which are intended to challenge other peoples videos.

9/11 has been the feature of many False Flag video campaigns which have branched out in attempt to sabotage the obvious by encouraging the absurd. Those whom are part of the “Truther Movements” are targeted often in order to promote false information, not because they intent to but simply because they question, they will run the risk of talking about these theorys to others whom will likely ridicule them, therefore increasing a stigma.

For example, one 9/11 video debates that the airplanes used to attack the World Trade Centre were not real but were holographic projections, yet the rest of the theory maintains that the buildings were then brought down by controlled demolition. It is these kinds of theories that do the most damage because wither the video was made by an individual or made as a false flag, they both encourage a negative idea against those whom can see the reality of what is happening.

This video of AIA Truth for 9/11 is a good example.

 

A history student seen on the left with glasses, attempts to use his academia to discredit everything Richard Gage is saying. This individual has many traits of a False Flag “Poker Face”. Unfortunately, these tactics don’t tend to work when those challenged have a scientific background. So, even in the face of the trolls, AIA seems to be in a strong position already to take on the challenge.

If 9/11 does go to independent investigation and proved to be a controlled demolition, the entire situation will be turned on its head. This will begin to ask more questions such as:

  • Who was responsible?

  • How were the buildings rigged to detonate so intricately without anyone noticing any explosives prior to the event?

  • The legitimacy of the aircraft used to crash into the buildings and wither they were actually taken over by terrorists at all.

  • Was there a demolition team stationed to oversee the event and where were they located?

  • Why the Twin Towers was considered to be expendable along with human lives of American Citizens.

These aspects are areas which reside in the more darker areas of the attacks, ones which are covered in various videos across you tube. It is an area I’m sure the AIA are very aware of and likely to risk some serious pressure as they pursue an avenue for an independent investigation.

Inverse Kinematics (of) Architecture: The Architect Code of 9/11

AIA’s involvement in 9/11 is now a very interesting because even though there are many conspiracy videos on the internet which blame 9/11 on the acts of secret societies, there is actually one very strong, irrefutable link between 9/11 and that of the Secret Society of Freemasonry. Architecture.

Freemasonry is of course a Secret Society whose foundations come from that of builders, craftsman and of draftsmen/architects. It has led me to believe that 9/11 was a very well constructed event, planned years in advance which was intended to symbolise the Grand Architect of the Universe and the birth of Artificial Intelligence.

Just recently, a technology company called Three Square Market which is based in Winsconsin announced that it has began a program where staff can volunteer to be microchipped with new tracking technology. Microchipping is something that has been around for few years. It is also something that has been reported to have been experimented with illegally by major tech companys on un-consenting civilians.

Some have heralded this technology as the “Mark of the Beast” emanating from the Bibles Book of revelations. Whilst I do not hold Christian belief, I do believe that the Bible is a form of codex or plan.

In 9/11, there is one event where the “microchip” is referenced very cleverly. This symbolism is found in the event at the Pentagon which is not part of the AIA investigation. This is covered later in the article.

Inverse Kinematics.

 

A workshop video featuring aspects of Kinematics

Amongst the wealth of information that can be found on the internet articles and videos about 9/11, the “coincidence” patterns were in fact, one of the first “conspiracies” to emerge not long after the attacks. Although there were rumours that 9/11 was an inside job, there were not any real video sites available in 2001 to demonstrate why this was. Until around the time you tube was launched on the 14 February 2005, these theories were confined to independent internet pages.

There have been many interpretation of the 9/11 events, right down to the significance to the numbers of the dates, planes involved and so on. All these suggest that the events of that day were planned well in advance.

This article is about how the links I have found to the date of the event suggest that 9/11 was a mass ritual event that is likely to be of Masonic origin, where architecture is their primal forte. In terms of symbolism I am currently preparing a secondary article which looks at other aspect to the events which involve Occult symbolism which in turn converge with principles found within sacred geometric architecture.

I stumbled across Inverse Kinematics by chance. This was through looking at the date of 9/11/01 and transposing it to letters. 9/11/01 transfers to I.K.A in the English alphabet and it just so happens that I.K brought up Inverse Kinematics in a google search.

What I debate I.K.A stands for is Inverse Kinematics (of) Architecture. This is fundamentally speaking, the computer architectural mathematics that was used by the demolition teams to pull the buildings down in a timed co-ordination, including the plane crashes.

Kinematics is branch of architecture which is broken into two sets. Forward and Inverse.

Inverse Kinematics deals with the mechanics of free falling projectiles under the influence of gravity. However, Forward Kinematics applies more to resistance forces needed to compensate for the pull of gravity. Simply put, it is the mechanics involved of lifting and dropping whilst maintaining integrity of a structure. For example, Kinematics are used when designing robotic arms in manufacturing industries, ones which have to deal with lifting and lowering objects that hold a large mass and require delicate handling. Therefore, Inverse Kinematics is used in controlled demolitions in order to plot the lowering of a building to the ground using timed removal of each supporting joint. The removal of these joints has to be almost instantaneous in order for the building to fall correctly. Any failure to do so means that the building could topple over causing immense destruction to anything surrounding it. The only way to remove these joints fast enough is to destroy them completely with explosives. It is not only the quickest way to level a building but also the safest providing the blast zone has been completely evacuated.

Zero resistance

Zero Resistance is a term drawn from Newtonian physics. In Kinematics, Zero resistance can be represented as an equation to account for the natural pull of gravity that acts on all objects with mass. In 1687, Newton published a book called the Philosophiae Naturalis Principia Mathematica in which he presented his theory of universal gravitation and three laws of motion. In architecture, these laws apply just as much then as they do today.

Watch any AIA you tube video and it is stated that both towers, including WT7 came down in a free fall manor with zero resistance.

Zero resistance happens when an object falls at the pace of which gravity is pulling it, without obstacle. In theory if we were to drop a feather and an apple from the same height, both objects should touch the floor at the same time.

However, nature does provide natural resistance in the form of the air particles around us, energy which is found of the form of Gasses, such as Oxygen. This means a feather and an apple dropped from the same height will not land at the same time. This is due to the resistant mass of air being spread out in the atmosphere. Therefore a feathers light resist mass has to compete with air particles as gravity draws it towards the ground.

Where heavy objects are concerned, the resistance of air is almost non-existent.

This famous feather and apple experiment was conducted on the last moon walk of Apollo 15 by Commander David Scott in 1971 to show that in a vacuum, zero resistance will allow all objects of any mass to drop to the ground at the same speed and time relative to the pull of gravity. Instead of an apple, a hammer was used in order to show that heavier objects will fall at the same rate as lighter objects.

It proved the laws of Newtonian gravity worked. The fact we were able to go to the moon and conduct this experiment is beautifully poetic.

Supporting weight is the key here. When Architects design buildings, one of their jobs is to consider resistance in order to keep the building upright and standing. One critical aspect is that of withstanding weather conditions. In terms of structure resistance, skyscrapers need to be able to resist the most extreme bad weather conditions such as gale force winds. Gale force winds exert huge amounts of force, forces which are far more in strength than that of one plane crash. Take into account, these buildings have to resist these conditions 24/7, year after year and they never fall.

Therefore, a building such as The Twin Towers had to act like a muscle, stretching, twisting to adapt to ever changing conditions.

This is exactly what Architects and engineers do when they build resistant to specification buildings, ones that can withstand plane crashes, earthquakes and other potential disasters such as spreading office fires. The Twin Towers were built to resist a plane impact to specification but no building will ever fall down in its entirety with zero resistance unless under controlled demolition.

Inverse Kinematics In the Demolition of 9/11 explained.

Although Newtonian physics is mentioned in the AIA Truth for 9/11 documentary, Inverse Kinematics isn’t referenced directly but is explained in the parts about controlled demolitions. In order for all of the buildings that fell on 9/11 to come down in the pancake effect that can be observed in the TV footage, Inverse Kinematics would be needed to calculate and balance the fall of tons and tons of free fall material in an ordered way.

This specifically involves the severing the joints using explosives, timed so any resistant mass would be taken out of the equation. If timing was not correct, parts of the building could be left standing leaving a dangerous clean up operation in its wake. What we should also take into consideration is if something that is free falling hits another object in a specific direction then that objects energy will impact the other. That would also have to be managed in order to minimize surrounding damage.

This whole scenario can be compared to a retracting muscle, pulling something down. Every action interacting with the other in tandem. The energy or force used to do that is merely the power of gravity acting on the building as the supporting joints are destroyed in synchronization. In terms of equivalent energy needed to free the entire structure to hand its resistance over to gravity, the explosives required would have to be powerful enough to melt the resistive properties of the metal construct used in the skeleton of the building. This is why the AIA team were looking for evidence of explosive materials after the disaster in which they discovered Thermite. Thermite is a very powerful, high temperature burning explosive. Compared to the explosive nature of the initial plane crash, small explosions against the scale of the building would have been extremely difficult to notice but are observable in video evidence.

AIA’s first focus in their investigation is the WTC7 building. WTC 7 was not hit by a plane so this makes for a case study to compare it to that of a building demolition. In short, the fires in WTC 7 were confined to one level and were not hot enough to collapse an entire building in the way that they did. With computer simulation aligned against the original footage and the measured fall time approximated to 7 seconds. This has been observed to be the fall rate constituent with zero resistance.

The Twin Towers however were both hit in positions where any collapse would have occurred from the point of air plane collision. This means that any structure failure above the plane crash would be meet by the physical resistance of the building underneath. It is why many have wondered why the top part of the building didn’t slide, fall off the top or stop falling once the upper half had wasted its downward potential energy. This means the collapse would have stopped somewhere just under the area of the plane crash. In comparison, both the North and South towers took around 12 seconds to fall from top to bottom which is consistent with zero resistance free fall.

WTC7: Indications of a Demolition Operation Failure

It would seem that under the scenario of a controlled demolition, WTC 7 was the only event that day that did not go according to plan. No plane hit this building at all nor were there any fires inside it strong enough to melt steel, yet it was packed with demolition explosives.

There seems to be indications that the events of 9/11 did not go to plan and those reasons have to do with the nature of the demolition and the plane crashes.

It is possible that when the planes hit the Twin Towers, the buildings were meant to come down either straight away or just after the crash. Structural damage in the first tower caused by the plane crash might have severed connections within the demolition circuit or to a wireless receiver. It could explain why the second tower to be hit came down first and why WTC 7 was pulled without any evidence of a plane crash. WTC 7 was likely to have been setup to fall once the North Tower had produced enough cover from dust debris, hiding any evidence of a demolition pull.

Therefore the second tower might have been pulled first as a distraction in order for ground crews to restore connection to the first tower and WTC 7. It seems that whoever was in charge of the whole event decided that WTC 7 was too risky to be left standing, and was detonated to remove any trace of explosive material.

It has been debated by many that WTC 7 was the outpost for the demolition crew. Personally think that WTC 7 was not used as an outpost for the demolition crew but were located somewhere nearby, high up and out of the reach of the blast zone.

Symbolism of 9/11: The Hand of the Architect and the Pentagon

The World Trade centre was designed by Minoru Yamasaki and opened on April 4, 1973.

There seems to be symbolism within the events of 9/11 that the building fell under the hands of an architect(s) or draftsman and that the date it was meant to happen was planned many years in advance, possibly with the intention to be destroyed. Wither Minoru Yamasaki had integrated this into the planning of the building is debatable.

As pointed out, there are many aspects of 9/11 that seem to link but too coincidental to be chance. The most notable is that of multiple references of the number 11 (intended to represent the Twin Towers) and 911, which is the phone number of the American emergency services. Just researching 9/11 and Occult numerology can bring up many results in a Google search.

But from what I can deduce, this event seems to be one that has aspects of a Occult ritual that primarily revolves around architecture or at least the death of architectural construct that once represented the unity of two entities.

If you have read my blog posts about the Occult, then you many have learned about Sigils or Hyper-Sigils associated with Chaos Majick. Now because Sigils are primarily a design form, architecture holds functional purpose especially when thoughts become things. Except the mechanics of physics have boundaries, therefore become rules. So where architecture comes against the laws of physics, there is no room for exploitation of rules. Simply put, in architecture, you cannot design anything and expect it to work in any fashion you want. This applies throughout in the Occult, and it is why Freemasonry hold Architecture and Geometry to be so sacred.

I/K

The term 9/11 holds the first key. I/K. The more you look at this, the more revealing it can be. For example. The pillars of the I and the K. The letter I can be made into K once two lines are drawn in towards the central line making an arrow. It can also represent a force. In this case I can be compared to a plane hitting a tower.

The slash dividing the I and K is the problem and solution. It represents a draftsman pencil and a falling building. As the pencil rests in ones hand in is supported by the fingers and the shaft rests along the muscle and joint of the first knuckle, angling as the pencil touches the paper. It is meant to symbolise supporting structures.

Try this for yourself. Put a pen or pencil in your hand and observe the shape in which your fingers and thumb rest around it as if you were about to draw something.

The shape your hand is making holds a sacred geometry secret which represents two polygons. The Pentagon and the Hexagon. When holding a pen/pencil, all joints that form around in the shape of a pentagon if we to hold the pencil so that the first and second joints of the index finger are straight.

If we were to start drawing, our index finger would work around in a way that the joints will go in-between a five and six polygon shape. This makes the “joint”.

 

Architect Pentagon
pentagon_navy_command

The Pentagon was the final building to be hit, one which holds the mystery. It symbolizes the destruction of the towers under the hand of the architect. As many videos of the Pentagon attack show, there is no observable evidence of a plane hitting the building. In fact many eye witnesses stated at the time that it sounded or looked like a missile. The missile is meant to represent the pencil of the draftsman whom plotted the destruction of the building. But it is also meant to represent a message for the future. The Microchip Implant.

9/11 Was Intended To Symbolise The New Era of Artificial Intelligence: The Pentagon, Three Square Market and Microchip implant.

https://www.jsonline.com/story/tech/nation-now/2017/07/24/wisconsin-company-install-rice-sized-microchips-employees/503867001/

For those whom don’t know much about Targeted Individuals, many have had microchips inserted illegally for the purpose of human experimentation. Some of these individuals have had microchips implanted much like the ones that Three Square Market have been reported to have been offering their own employees under voluntary option.

As see in the structural damage of the Pentagon, the missile which penetrated the South West wing of the building is intended to represents the penetration of the chip into the muscle between that of the index finger and the thumb.

There are many different chips used on different targets, some so advanced they won’t be seen for some years to come. Therefore, the chips being used by Three Square Market are relatively primitive in comparison.

MK Ultras have Microchips inserted in a different position. This is located between the index finger and the second finger. This represents the Compass, where the chip between the thumb and index finger represents the Square. This makes the Square and Compass of the Masonic emblem.

From what I can gather the Compass represents microchips used in illegal/secret testing where the Square is for role out social post-experimentation.

 

sqcomp13

In this image of the Masonic emblem, the screw which binds the the Compass is the representative placement of the electronic microchip implant. It is also known as the “Screw” in relation to the term “Turn of the Screw”.

 As see in the structural damage of the Pentagon, the missile penetrated the South West wing of the building. This represents the penetration of the chip into the muscle between that of the index finger and the thumb.

If a person was to recieve a Microchip in both hands, then it would represent the Square and Compass. With a enough implants inserted, this would make up the human index, hence why they flank the index finger.

The Draftsmans Pencil.

A pencil can be cut in a few ways so that it can fit well into the hand. Considering the shape of our hands which can vary, some can be rounded, where some are cut in polygon shape. The Pentagon is also likely to represent the Architects hand and pencil, where the pencil has been worn down to the nub. Thus, this represents the workings of the pencil on the paper, worn to the nub and can be taken no further.The missile sent into the Pentagon is another metaphor/symbol of the draftsman.

If somewhat weird, the final plane crash United Airlines Flight 93 happened in “Pennsylvania”. In terms of linguistics, this needs no further explanation but it can be concluded that the play on words indicates that all aspects of the events reference architecture.

9/11: Draftsmans Pencils

This one I admit is a loose connection but worth consideration. In some Occult numerology, …. Numbers higher than 10 can be added together using each unit. This is normally done as a code to represent aspects of an event that is due to happen.

Therefore: 9/11 can be written as code:

9/1+1 makes 9/2

Because the 9 has not been altered, the two could be considered to be adjusted into a letter. That letter would be the second letter in the Alphabet “B”.

9/B

This can be referenced a 9B Draftsmans pencil. Draftsmans pencils range in a set from Hard (H) graphite to Soft (B). Most pencils used in schools and offices everywhere around the world tend to be HB pencils which are made with a balanced graphite of soft and hard.

In Art and Design, there is much Occult knowledge between the tools and symbols.

The 9B pencil features a soft graphite which on paper produces thinker darker lines that the polar opposite 9H pencil. The softness of this graphite when drawn on to paper is very easy to smudge, making B pencils useful for shading. This means that the hard pencils are used more for sharper, angular and lighter construct lines.

Therefore the quality of this 9B pencil is that of shade and blending or to hide cover.

 

There’s Something about Mary: Modern Stalking and Technology in film.

I am not a person whom likes to compare the TI experience to films, no-matter how true to life they can be but there is one film that stands out as a perfect example of how psychological manipulation can be achieved using standard electronic equipment.

The film ‘Theres something about Mary’ released in 1998 makes a major Faux Pas in terms of what is happening to targets today. It also personifies the entire problems of modern day hacking and survellience.

The film centres around two significant issues. Stalking and illegal survellience. By todays standards the equipment seen in the film is quite primative but observed to be exceptionally effective. The types of equipment seen in the film are real and is still used for spying by the intelligence services, police and private investigators. A majority of it can be legally purchased from the internet if one was so inclined.

Useless you have access to bug detectors or devices that can detect long range scanning equipment, then the techniques used by the investigator in the film are just as effective at psychologically manipulating a person today as they were then. Interestingily, the films central charater Mary (Cameron Diaz) and her roommate both have access to survellience equipment themselves, yet is still manipulated. Her stalker is always one step ahead. The irony the irony that another of Marys stalkers Tucker (Lee Evans) is the only person whom makes her aware of that the person she is dating Healy (Matt Dillon), isnt who he says he is.

‘There’s Something about Mary’ was released at a time before the arrival of social media, smart phones and the AI that can be found on them. More primative survellience can perhaps play a more important role than modern tech.

The most obvious is coincidence which can be observed when Mary mets Healy, the private eye sent to track her down by her childhood sweetheart Ted (Ben Stiller). Healy whom whom instantly falls in love with Mary uses survellience equipment in close proximity to her property to detail as much of her life as possible before introducing himself. Their first encounter sees Healy attempting to appeal to Marys personal interests and passions of which in reality, they are of polar opposites. This works at attracting Marys attention which was otherwise dismissed by her first impressions.

The second is that modern tech leaves a digital footprint which has the potential to be tracked thus leaves more of a chance of locating the source of hackers which could be all means have access to ones audio and camera at any given time, should the device be comprimised. In the film, it is mobiles and land lines that are tapped using long range scanners. Otherwise, the charaters do not have a real-time visual view through cameras which were not found on mobiles in 1998. Most mobile calls being monitored in the late 90’s were logged by telephone number by intelligence services and some TIs were used to test future systems separate to that of law enforcement. Those that would be involved would be classed a special-ops.

The third is that it is now common knowledge that internet companies extract our data. It is by all means legal should you agree to the terms and conditions. Proving if that information has been used illegally is exceptionally difficult considering that it could be anywhere in the world, but there is always the likelyhood that it can be traced through error. Considering hacking groups and whistleblowers are now commonplace, the threat to those which conduct illegal survellience is much higher. Therefore, non-internet connective devices are less likely to be traced and a sign that pre-internet technology has some major advantages in effective harassment campaigns.

 

Modern Stalking.

As I have maintained, the majority of tactics used by perpatrators within the community are not all state sponsored spies but are in fact just common criminals. However, they can sell this information on to intelligence agencies without realising it which adds to a complex problem of how many sources are active on one person at a time.

Individuals whom spy illegally are exceptional useful to intelligence agenices. They are people whom are marked in the system as criminals but are allowed to continue what they do because of what they do.

This does not mean that targets are not exposed to real-time observations by intelligence agencies but it more the fact they have to be distanced as far as possible from illegal activity that could comprimise operations that they undertake on everyone through digital extraction. This makes criminals in society far easier to manipulate than before and thus can be brought into the harassment programs.

Main operatives employed by intelligence agencies are ones that tend to reflect more real-time coincidences, that is information leaving your digital devices as quick as you could be having a phone conversation with someone you know. Secondary operatives (Criminals/vigilantes) are used as counter measures where illegal survellience is at threat of being exposed. These individuals are of course more at risk of imprisonment and blackmail simply because their activities were or are not state sponsored. However, they are used more often than intellience agencies because again, through law, these activities, if it ever went to court, could be blamed on citizen crime rather than the state.

In terms of the Syndicates which employs perpatrators is another aspect altogether and are normally intergrated inbetween law enforcement, state sponsored spies and controlled organised crime. These individuals work for companies concerned with deeper aspects of projects that involved artifical intelligence and development of weapons/drones/android/machine tech. They are not all computer specialists, but have been identified as possessing qualities that the company requires and not always to do with their moral backgrounds.

 

 

For my readers…..

Here is a list for my readers of the top ten most viewed blogs on this site since gangstalkinginfo wordpress started almost a year and a half ago. Thank you for your support and time.

Corrosioninfo: Most viewed Blog Posts

  1. The Divinity of Gold: Cern and other Wormholes.

  2. The Occult and Gangstalking Series. Part 1

  3. Occult and Gangstalking Series Part 2

  4. Deconstructing Gangstalking: What Gangstalking is, how is it conducted and scientific principles.

  5. GB Wills: The Illegal UK Register of Targeted Individuals

  6. Community Based Harassment: Targeted Individuals and the Legal System

  7. The Target

  8. In Response to Tamil Vendhan (Twitter conversation)

  9. The Eye Thanks. An experience of Gangstalker Extraction AI Tech. November 2015.

  10. Thoughts on Max Spiers

UK Codes of Vehicle Harassment

Over the years I have observed how perpetrators have incorporated a form of psychopathy into the representation of data that mirrors targets. Most harassment conducted in vehicles is designed to blend in with other traffic and considering how it is performed, it is difficult to spot but it is present around targets and others in frequency.

The most obvious signs of vehicle harassment is found in the the registration plate as it is the most attention drawing of a vehicle next to advertising.

Typically, a perpetrator needs to get the attention of the target and a number of options are used in order to do so. The first is a private plate which can be more direct with a message. Advertising can also be used.

Vehicle matching

Perpetrators use a tactic which involves using transport known to the target. These could be cars owned by family or friends even those owned by ex-partners or work colleagues and so on. Normally the pattern incorporates a few of these cars with reg plates that can reflect aspects of the targets life.

The most obvious reflection is that of the targets mode of transport but this can depend on the circumstance.

Colour matching

Colour matching is the tactic is one that is the most stigmatised in gangstalking. It is known as the “red car” tactic. There is already a description of this in a previous blog.

The types of reg plates used by operatives sometimes depend on the person and what they notice. What they notice is dependant on their circumstances, however, this does not mean operatives will not attempt to introduce new codes to gain the targets attention.

Common Harassment Reg Plates

Many of the plates mentioned are very common on our roads, some less so simply because of their implications.

Emergency Services:

999

911

Intelligence:

MI1 to MI9. MI5 most common.

Law Enforcement

DI or represented as 49: Detective Inspector

PC OR P3: Police officer

Public services.

GOV/70V/V07: Government

PIP: Personal Independence Payment

ESA: Employment Support Allowance

DWP: Department of Work and Pensions

CAB: Citizens Advice Bureau (Played upon a lot. It is also code for Taxi drivers or firms that provide information in exchange for money.)

UBR: Uber

Health Services and Mental Health References:

MH or MHS (mental health services)

ECT: Electro-convulsive Therapy

NHS: National Health Services

References to name of individuals/employees involved in care. Normally shortened to fit in the last three letter spaces of the reg plate. Commonly used after appointments or contact with health services.

WRD (Ward) Has used as a threat and injunction with a number of tactics. This one has been tested recently and has incorporated companies with the word ‘Ward’. One particular vehicle gained attention by undertaking on a motorway.

Drugs:

LSD: Most commonly used. This is sometimes used to gain the attention of the target to more specific details of what is around them. In regards to synthetically induced mental manipulation, the tactics deployed are carefully presented in a way to induce a variety of emotional states, sometimes subconsciously. These are normally done as a well co-ordinated effort of many pre-planned factors. To a target whom is not knowledgeable to the tactics, one can experience severe emotional states and assume they themselves are not well. These can also incorporate a wide variety of street theatre and orchestrated actions designed to cause the target to make mistakes.

In these situations, an attempt at causing a collision can be very much predicted in most situations. Most times out of all, these tactics are abandoned for a while so to avoid drawing to much attention to operatives.

XTC: Ecstasy. (Can also mean ex-stasi/former operative turned TI or retired.)

MED: Medication

Secret Societies/Religious/Occult Reference:

666: Commonly reported on plates and not always perp activity.

AC or 13: Aleister Crowley/ Witch Coven

OTO: Ordo Templi Orientis. An international fraternal and religious organization founded at the beginning of the 20th century by Carl Kellner and Theodor Reuss.

AA: A∴A∴ Thelema (Aleister Crowley)

33: Masonic degree

G: Freemasonry/Geometry. Normally seen as G*** ***

I (i): Eye or aye (acknowledgement). Can also represent the All Seeing Eye.

Body and Physical:

BCK (Back)
HED (Head)
TOE (Tow)
BLO (Blow)

PSH (PUSH)

Conspiracy:

911: September 11th Attacks 2001

TI: Targeted Individual. Very commonly represented as TI** *** on standard plates.

ATS: Above Top Secret (website)

JFK: John F Kennedy

CBH: Community Based Harassment

Internet and Technology:

AI/19: Artificial Intelligence

PC/ITL/AM: Personal Computer (not commonly used due to confliction)

HD/84: Hard drive/High Definition

ATT: AT&T. Can also act as a broad term for mobile networks.

Colour Orange: Previously used to represent the Orange mobile network in the United Kingdom. Now know as EE (55)

AOL: America online

NTL: Still used today to represent the internet provider Virgin Media.

BT: British Telecom

Media and Television

CNN:

BBC/223 or combination: British Broadcasting Co-operation

Offensive:

FKD
FKR
BS
KOX
C*** OCK

FKU

GFY

GKY

British Year Plate Uses:

C: See
V: Hand gesture
U: You

CU: See you or You See. UC will be CU and code will be back. For example

Examples:

CU91 MSI: Is MI9 you see.

Initials:

CU can be followed by initials of the target if in range.

CU11: AA
CU12: AB
CU13: AC

All the way to:

CU99: II

Otherwise initials from j to z are covered in the last three lettered spaces as well as A to I.

Sexual References:

69: Sexual reference or star sign of Pisces

71Y: Gay/Homosexual

FKG: Fucking

OS: Oral Sex

BJ: Blow-job

Hand signals and gestures.

Know or knows: Rubs nose.
Here or to hear: Touches ear
I: Touches eye.

Pyramid: Driver rests arms on wheel to meet hands in middle.

Misc:

 

 

Road maintenance:

Road maintenance signs can be used in a variety of ways, some quite creatively.

mobilelane

This method of harassment is normally used in an area where motorways are close to the target. This creative targeting is designed to make the target think about what the sign is implying.

The foremost is that the sign implies a warning to other operatives that the TI is ahead of them. However, this is only used as a confusion tactic and it is normally incorporated where a TI begins to analyse the systems of harassment. It is meant to take the targets mind of the real technology being used in order to control and manipulate traffic around the target and others.

Mobile works indicated by arrow.

Used on the inside lane when driver is passing. The reference here implied that illegal extraction of data mining and real-time surveillance works in terms of control.

In all, there are simply to many ways in which the combination of creative harassment can be used on targets to list. However, this list provides some of the basic codes that can be found.

 

 

 

Thoughts on Dr. Katherine Horton (stop007), Vice and Online Shilling techniques used against TIs.

Electroweak interactions and corruption psychopathy systems?

Behind every bit disinformation there is a purpose. Besides the obvious aspects of false information there is an area of modern conspiracy theory, one that can be also pigeon holed under “fake news” that has a purpose other than to make money or lead people away from the truth.

Dr. Katherine Horton (stop007) and her Associates

Dr Katherine Horton is an alleged TI whom is most noted for her you tube videos where she is seen sitting in front of aluminium foil sheeting. She also displays the use of a Faraday cage in order to block out frequencies that she claims the intelligence agencies using to bombard her with harmful radiation in order to slowly kill her rather than outright.

One of her videos shows her demonstrating an device which detects electromagnetic radiation within the  Faraday cage and most recently, methods of detecting implants with bug detecting devices.

The most interesting aspects about Dr Horton are her background.

Dr Horton states her professional work was geared towards psychology within human systems. The system in which she goes into the most detail is that of Psychopathy in organised corporate systems. She parallels this phenomena to that of individuals whom control in the pecking order of businesses and goes into great detail in order to explain how it works. She also compares this system to gangstalking/organised harassment.

Whilst this information has credibility, there is a major aspect of her background that seems to impose the assumption that she has exceptional knowledge about the technology being used against her.

A majority of surveillance technology and electronic arms are normally sold at specific expos around the world for the interests of law enforcement and the military. The …… expo held every year at Paris is the main event where tech companies come together in order to promote these types of technology.

This has no connection to CERN or Universities in or out of the UK other than research that is bought by outside sources for development. How Dr. Horton is able to portray her claims with credibility is more or less speculation through the use of deduction.

Most whom follow my wordpress and twitter with interest know that I am an advocate of self deduction. Especially when it come to organised harassment, one which is exceptional difficult to prove, I have always held that TIs should test what is happening to them in order to derive logic from the situation.

It is interesting that before Dr. Horton was even know of, I had written about the aspect of scientific principles of experiment, how they relate to harassment techniques and how they reverse themselves when the tactics are mirrored back, thus cancelling themselves.

Detection of Implants

Unfortunately, the only true test of discovering if you have an implant is to have an MRI scan certainly for the purpose of evidence. Therefore advocating the use of a bug detection device in order to isolate implants comes with quite a price tag, especially when all you have to go by is a sound emitter. If a doctor is willing enough to take your claim seriously to issue a scan, then the legitimacy of the detection device shall be revealed in relation to where it is observed to be. Therefore it is advisable to avoid spending a lot of money on something that could otherwise be detected with something that can see inside your body and to avoid ridicule from others whom will almost instantly judge you to be mentally ill, despite the reality of modern technology.

The Power of Deduction

The process of deduction and elimination is one a TI should never shy away from. This can help you as a person to remove assumptions that maybe being pushed by persons on the internet with the intension to mislead you. You may not experience the same things as others. You may have no history of mental illness nor any symptoms of hearing voices or indications of technology harassment.

From experience, those whom are the most resistant to manipulation are either those whom do not use much technology or non-at all. It is because they are not linked into the system like others are. Those whom carry a mobile, especially a modern one with cameras are almost certainly helping the system of indirect surveillance (not aware that their phone is spying on others as well as themselves).

In fact, when raising the point about psychological manipulation induced by Googles deep mind technologies in conversation with Dr. Horton, she very much brushed of the prospect with no concern.

However, Dr. Horton has no hesitation in portraying more extreme forms of persecution under the perception that she is being slow killed by directed energy weapons deployed by the intelligence agencies. Despite being willing enough to go on the internet, she is not willing enough to gain a single piece of evidence of harassment from the outside world which by all accounts is what a majority of TIs show is the biggest threat to harassment operations. If anything this would help strengthen her case.

Fact vs Fiction

A majority of the time, Dr Horton sits in a Faraday cage whilst also engulfing herself in aluminium foil. It is claimed that this helps shield herself from directed energy weapons. This is laughable from a scientific point of view and not because of the stigma associated with mental illness.

The Faraday Cage was designed to block out electromagnetic radiation whilst aluminium is used as shielding in electrical wiring in order to block out interferece. Therefore, to a reasonable degree there is some legitimacy in the use of tin foil.

Unfortunately, a Faraday cage as well as tin-foil can only block out specific frequencies and those frequencies depend on the type of protective netting or type of foil used. Therefore, the other frequencies that are not being blocked will pass through the cage. Dr Horton actually demonstrates this contradiction within one of her videos where she uses a Geiger counter in order to detect the signals as they continue to pass through her shield.

If somewhat ironic, the tin foil hat stigma is more or less a mockery of its low effectiveness rather than it doesn’t work at all.

Dr. Horton claimed that if she did not have this shielding she would have been dead. Then what would be the point of making these videos? Shouldn’t all other TIs be dead? This is a very strange scenario.

Coincidence: Dr Horton and the Heirarchy System

Dr Hortons attitude of assumed authority is another reason which leads me to suspect elements of shilling techniques.

In her most recent video SOS 8 – Evidence Collection (Targeted Individuals) (Stop 007) she states that if a person claims they are being electronically harassed and does not look ill or gaunt then it is likely that they are a perpetrator. Before this, she points to her face and makes a fleeting comment about “symmetry” as if to make the term sound an important part of how direct energy weapons are making her look ill. What symmetry has to do with this is anyones guess but seems clear that Dr Horton does not pay much attention to her pseudo-science. Dr Horton herself does not look ill other than looking like she needs sleep. Otherwise, she looks healthy. For a majority of her videos she looks well enough to present broadcasts in great detail and some without the protection of her cage.

Dr Horton presents herself as a person whom has authority within the TI community with an assumed her position to state what makes a TI or not. This is helped along by the presence of apparent “whistle-blowers”.

Lockheed Martin

In one video, Dr Horton and her sources claimed that the company Lockheed Martin were the company responsible for illegally targeting and experimenting on civilians. Although there is some legitimacy in this, what was overlooked is the glaringly obvious link to one of the biggest names in space exploration, NASA. Lockheed Martin have been the primary contractor to NASA for many years, delivering some of the most complex technology available.

As I had I covered in some Tweets, I had stated that NASA were responsible for some targeted experiments. Targeting of individuals has some individual qualities that parallel space exploration. Those are:

  • Isolation

  • High levels of Stress

  • Radiation Exposure

  • The use of digital communication

  • Repetitive scenarios

  • Medication

All of these promote self developed problem solving skills, hyper awareness and resilience to extreme psychological conditions. Albeit these conditions do not replicate the physical conditions. However, what is interesting is the advancements in technology which suggest that future space exploration is going to include AI and AI interaction.

Other observations of Shilling

Considering Dr. Horton has produced very lengthy and detailed videos about psychopathy in corporate systems, I’m sure she would have been careful enough to avoid slipping into the trap of sounding a hypocrite when discussing the pecking order of systematic torture. As far as shilling is concerned the whole scenario of her angle of what it is to be targeted, is surrounded by very sloppy and lazy inaccuracies which only shows she is a victim of her own self organised hypocrisy.

To others around the world whom might be watching, especially individuals whom suspect they are targets, this information is not presenting empowerment to others. In fact is presenting the opposite that of self absorption and that of subtly gearing the viewer towards her point of view and encouraging the viewer to spend a lot of money of bug detection devices and the like. None of these things are cheap and in terms of financially ruining targets seems a fitting tactic of indirect extortion and time wasting.

Around the time Dr Horton appeared, I had been messaged a number of times by a person on Twitter whom had attacked me based on the grounds that I could not be a TI because I did not use a Faraday cage. This is perhaps the funniest trolling I have experienced. TIs are somehow expected to acquire a Faraday cage or at least go along with a shills idea of that direct energy weapons are the primary source of harassment. The person behind this account also had something to sell, a book which was apparently all about their TI experience.

Compared to other TIs, almost all of Dr Hortons videos are conducted from home. A majority of TIs whom report harassment tend to incorporating observations of real-time harassment that can be seen, involving perpetrators, some of which are approached and confronted.

Of two of the most startling videos can be found are those posted by Nappy Head Roots (California) and Andrea Damask (Romania). Although, I have reservations about the legitimacy of their accounts, there are hints of genuine Stasi-esq tactics, ones which are used on myself.

Dopplegangers and the Art of Discrediting.

Not so long back, I wrote an article about Dopplegangers and how they are sometimes used to mirror the target. In terms of my experience, Dr Katherine Horton is a doppleganger of a perpatrator I came into contact with between 2009-2012. This person was also highly educated. So, this was quite a surprise indeed and more so because Dr. Horton had arrived on the scene not long after I wrote the article.

It would seem that perpatrators are working on highly creative ways of trying to discredit their own techniques by in fact using their own tactics in their own videos.

In terms of TI information, there seemed to be a bit of a race to force feedback the information I was drafting in wordpress. Bits of information I wrote seemed to be appearing in a different context elsewhere on the internet, be it facebook, the news or even in some advertising. The psychology of this was most fasinating. It was if there was a collabatorive effort to put me off writing the article and that the use of TI shilling was an indication that I should give up. I found this quite amusing and proved to me that this technology cannot read minds like it is assumed to. I was able to ignore these tactics and produce other information to counter what was happening.

CERN and Bio-Chemistry

Having talked briefly with Dr Horton on Twitter, I questioned what work she conducted at CERN. As most know, CERN is not a university as such. It is primarily geared towards particle physics by smashing atoms in order to understand their structure. To my knowledge, CERN does not have a department of Psychology.

 This may sound a bizarre concept but the bio-physical relationship of thought might be deeply connected to aspects of “telepathy”, a subject which is of great concern not only within the TI community but the whole world in term of technological advancement.

What does this mean?

Scientists have been attempting to understand and explain the origin of the “soul”  for sometime. So far the methods of attempting a gateway to the other side have involved the use of electronic scanning technology to isolate thoughts within the mind. This can also be labelled as “mind hacking.” I shall go on to explain how this relates to the gangstalking program.

Whilst under observation, visual and audible stimulus is used in order to prompt the brain to respond. In order to extract thoughts, the brain needs to be scanned in a way that neural pathways can be mapped. This means that one solitary memory can be isolated down to one neural pathway thus, this pathway can be activated under prompted command. The only way to see if it has been activated is through scanning the brain. So this neural pathway will light up like a beacon in the same place.

The problem for scientists is identifying areas of the brain which involve thought processes, that is, what you are thinking against what you remember. That again involves stimulus. It is also why the gangstalking program is likened to an extraction program akin to that of torture. The response you give will activate neural pathways which may allow an insight into your mind. This is where the trick of “mind reading” can be identified.

Normally, a concerted effort undertaken by Gangstalkers is usually issued out under the disguise of “organised harassment” or local community law enforcement.

It is however issued under experiment from CERN that links into supercomputers of the western world that are in charge of real-time observations of society. You could think of this as CERN represents the data crunching and project management of external operations. Once this information is processed, the slave computers are updated with new algorithms and projects.

Within the organic world of our minds is the quantum world and in terms of bio-physics, this is where things get weirder. Because we are made up of quanta, neurons and every single connection in our minds is linked to the infinitesimally small including quarks.

It is this realm of physics that scientists are most interested in. Therefore the influence of thoughts are just as important within the quantum world as they are in the larger world. This means that scientists are likely to be studying the link to thought patterns and quantum exchange.

How does this relate to Dr. Katherine Horton?

This again maybe extremely bizarre, but Dr. Horton might actually be a scientist whom is directly interacting and data analysing her subjects (human experiments) for the purpose of studying social interaction within the TI community. Therefore is could be true that she is whom she says she is except the point is to study and map the data across the web of those whom are targeted whilst using herself as a gineau pig.

Therefore to ease the blow, Dr Horton incorporates half truths and real aspects of gangstalking in order to draw in a number of responses for study.

Whilst I speculate this, if anything the stop007 project is one TIs should be highly cautious of in terms of the nature of the background of Dr. Horton.

TIs responses on the internet will like everything else be studied and will be used in ways to discredit individuals in the most calculated of ways. If you can appreciate that recently, more Tis are beginning to speak out, then a counter operation can be expected.

My Twitter account is rarely directed trolled and if it is, it is normally done discretely via private messaging. Over nearly a year and a half I have noticed patterns which suggest that there are efforts underway to dupe and extract information off of Tis.

Of one notable operation was that of the media agency Vice whom had been data analysing Twitter from around February to the point their report on targeted individuals was released. The Vice article about Tis contained some very interesting research that mirrored some very brief things I had mentioned amongst the majority of other TI information.

The Vice online video documentary which followed, featured Dr. Katherine Horton in the opening credits (to no surprise), most likely because the stigma of the tin foil hat joke.

As a matter of bias an editorial psychology, this was a classic case of planting a seed from the start and obviously a video I myself was never going to take seriously. Having blogged about Kerion Lee Perrin (whom was featured in the documentary) the year before having found one of his videos online, I was unsure to his credibility. Yes, tracking devices can be used and I do not doubt for a moment that the technology available to insert implants that can read our responses exists.

However, I personally have loose ties to Vice as one of their headquarters was located not far from a place that I worked as well as the local newspaper whom along with neighbouring organisations, actively participate in the program. My personal relationships at the time also had a lot of ties to these organisations and experienced very high levels of systematic harassment. Considering that a person assioiated with program has been coincidential mirrored as a doppleganger, I’d say that this has been a long planned event and it has gone exceptionally wrong.

As much as Keiron Lee Perrin has some startling information, I am of the opinion he is a shill and in fact anyone who has anything to do with Vice.

Vice it seems have been asked to take on a big challenge. That is to work out a way to discredit the targeted individual community simply because us, the targets are simply causing to many problems.

Who is mind controlled?

Many TIs do not realise that despite what they are subjected to, they are not mind controlled, regardless of if implants are used. They are in fact resisting it. Otherwise they would not be talking about it. What they are observing is a mind control program around them that is not working.

The only logical reason for this is very easy to point out.

Shills attempt to draw attention away from harassment operations on civilians, ones which many TIs know is what intelligence agencies do not want you filming for evidence.

Dr Hortons seems to be driven towards a message that TIs should isolate themselves rather than empowering themselves in order to live their lives.

From my point of view I hope to be wrong about Dr. Horton but I am afraid that the signs of a hierarchy developing within the TI community alongside shills might look to destroy the information people bring to the world via the internet.

However, with the realities of surveillance laws and hacking, none of these shills seem likely to succeed. Not all people are stupid enough to believe the bullshit. The fact the media had to develop a very disparaging documentary to ridicule something that is deeply intertwined with the medias own reporting on related subjects, only goes to show how far they prepared to go to keep this under lock and key.

Paranoid Schizophrenic or not. We are all being watched.

 

 

 

Neural Isolation and Electronic Stimulation Triggering: Controling Your Mind Against Invasive Tech.

This blog gives advice to those that are experiencing un-usual thought patterns. What I mean by this is when you begin to experience feelings, thoughts or even voices that are not part of you.

The complexity of neural triggering comes down to the state of high tech electronic devices that have been scientifical designed with the purpose to distrupt brain patterns.

The premise of this technology is more simple in principle than many assume but in sciencific experiment the way they have gone about gaining access to the human mind has the use of practical methods of ‘problem solving incorporating psychology with technology.

In 2009-2010 BBC Horizon featured a programme called The Secret You which hinted at this technology. One machine featured in this program was able to predict the answers of a test subject 8 seconds before the person replied to yes or no answers. This experiment was conducted in a laboratory using a high powered brain scanning machine developed by the Company Siemens which coincidently design and make mobile phones.

Also in the program, Scientists were able to identify areas of the brain which stored memories through neural stimulation. This involved using a cap with electronic sensors placed on a subjects head so to observe brain activity. The subject would be shown various pictures , mostly ones found in the media and from history where each one would produce a response in the mind thus isolating a part of the brain where the thought would reside. For example, if you were shown a picture of a celebrity, the machine would be able to detect if you had certain feelings such as sexual desires, admiration, distaste and so on for this person based on the neural connections formed in the brain.

At the time of airing on tv, the program covers technology which would be quite primitive against todays claims of high tech neural weaponry.

Dealing with a problem such as distorted thinking involves understanding how the mind works first before dealing with the consideration that your own mind might be interfered with outside sources. We also must consider that if you as a person use or abuse alcohol and drugs that this is not the best thing you can be taking to establish if you are being electronically manipulated and also goes against your crediblity.

Reading on psychology and simple mind/emotional coping techniques are a good place to start. Despite the information regarding the mental health services, the recent intergration of “mindfulness “ and encouragement of meditative techniques are in fact highly useful. They are in fact the main techniques that will help you establish control over your own mind. However, it is advised that the use of psychiatic medications should also be stopped, especially neuroleptic mediations that induce severe drowsiness.

Neural “triggering” is something that you can not so much observe but “experience” unless your are of course the scientist on the other side whom is observing.

The problems is isolating the “triggered” thought which in essence is not a clear “voice”, but is simply a machine simulating parts of the brain with small electronic pulses.

The act of controlling someone elses thoughts is like that of a series of collisions or creating links in a chain, one impacting the other that create a “train of thought”, such as the expression, one precedes the other.

The predictability of ones thoughts and actions with todays modern technology has been made easier for scientists given the amount of data that is collected on us every second.

However, neural stimultation is a level too far.

Meditation Methods: The Monkey Mind.

Meditation is an exceptionally great tool for controlling thoughts. In fact it is a highly important tool for inner emotional and spiritual development.

The monkey mind is a part of our consciousness that most of us dont pay attention to. It is also known as the subconscious mind, a state of awareness that sits between the awakened and sleep state or the concious and unconcious mind.

The subconcious monkey mind as it dubbed, is used to described the chaotic nature the mind has at deciphering the environment. This may seem a strange concept to some and perhaps a bit extreme to call the mind “chaotic”. However, in states of meditation the monkey mind can make its precence known when using methods to quieten in the mind.

In relaxed states , the monkey mind is far easier to experience as your concentration pulls from reality in to a state of conditioning. For example, close your eyes and try to focus on your own breathing for a minute or two. Do you find after a while your thoughts wander? That is your monkey mind fighting sgainst your own will to quieten as it slowly turns off from the world around.

Taming the monkey mind enables clearer thinking, thus meditation serves as a great way to develop a state of no thought, which resides in the sub-conciousness mind.

This feeling can be described as the point of falling asleep or awakening. However I find that ill defined.

Controlling the subconcious mind and making use out of it is what makes our minds special. For when in a state of calm and control we can use a place of no thought to introduce new thoughts or control one thought at a time.

Dealing with intrusive thoughts that are suspect of electronic harassment.

Dealing with intrusive thoughts can be difficult. In this respect we are talking about a symptom that is respectfully like borderline schizophrenia. The experience of voices or thoughts that feel alien to us.

It is a fact that all of us have a state of monkey mind which can run off at its own will. That can include voices and thoughts. This could be be simply recalling memories from the day or from the past. Therefore, they will include your perceptions and point of view of events.

In terms of Schizophrenia, the good news is that ALL of us hear voices or to put it another way, all of us can hear a voice in our heads when it comes to memory recall.

What can be worrying is when these voices are out of control. Certainly for some with Schizophrenia may describe their experiences differently especially when they maybe frightening to that person. However, the development of ones inner knowledge must also be understood to be that of darkness and light, good and bad. Therefore enlightenment is not always a happy experience

However, the use of meditation is a universal gift of humanity and can therefore allow us to control these thoughts if given the right knowledge to do so and also to control negative emotions.

If you want to know how important the sub-concious mind is to you then it is worth knowing that it is part of a persons awareness that is targeted by cults, organised religion and almost indisputably an area identified with mind control in organised harassment.

Identifying intrusive thoughts

In a controlled semi-concious state it is possible to hear neural triggering.

Having tested this numerous times it is clear to me that neural stimulation is actively having effect on the monkey mind.

What I have deduced is that the experiment is about pinging the brain for activity and then observing what it was that was pinged throught the use of cahrged particles in the air.

Therefore sometimes what you may hear or feel was the result of an electronic pulse aimmed at a specific part of the brain which has been stimulated.

You might be able to identify these thoughts, voices or sounds differently to the ones you hear around you. They will not be distinct or clear but can be random. That being that the voice or sound will not be a full sentence but more like short phrases.

Stimulating the brain only requires small electric charge but must be strong enough to penetrate bone and flesh. Alongside this, if the machine being used to conduct signals is behinf walls or some distance away then it will also have to penetrate walls and so on.The other thing we must consider is the size of neurons and nerves contained in the brain and how vastly complicated it would be to isolate specific ones when confined in a place with no apparent electronic machinery.

The other perception is that triggered thoughts are being created by the brain itself. That is that the monkey mind is constantly making sense of reality and therefore thoughts can be unhinged, this firing off neurons that hold a specific feeling or visual/audiable memory. However, this is something that can be produced by repetition and pattern. Certainly when it comes to computer applications the introduction of icons and patterned information in the simplest unassuming of forms can unfortunately be a programming you can not immediately detect without careful observation. In fact it could take a few years until you see daily patterns.

The human body holds a charge of that equivalent to that of 12v battery and therefore the directed electric charge required in the air must be of greater value to have an significant effect. If the monitoring is in realtime then there must also be equipment present in proximity to measure the electrical activity in the brain. This could be perceieved as a form of radar, xray scan etc but it could also be percieved as radio waves that most of our communication devices connect to such as wi-fi. Considering the nature of these technologies are able to penetrate thick walls then the ability to pass through the human body would present no real obstacle. It would mean that we would essentially sit in a form of ether that we can pass through being as the atomic structures in all matter including our selves are almost transparent on an atomic scale. To compare, a typical hydrogen atom comprised of one nucleus and electron are divded by a gap that on a real scale would be the equivalent to a few miles. If we were to compare this to the atomic structures contained in the bodies of living things then this makes us almost like a sponge that can absorb water. Therefore our bodies can pass through a network of waves or web of electrically charged air.

Wifi devices such as internet hubs and mobile phones both use this ether type of frequency transmission.

Scientific principle.

Because we are all studied to a broad extent the main flaw or gap in these systems is scientific boundaries. Also for the sake of scientific principle each person around a targeted person or subject must be divided. This is where ip addresses or identification number have been a consideration for people across the world. Alongside the concepts of microchipping and implants, the need for advanced surgury might be of no requirement. The web ether we pass through is already here.

This is not to say implants will not be used and that the claims of implants used on targeted individuals are a hoax. The fact that people know there is a problem and are talking abouy it openly means that we are not completely under control.

Gangstalking Techniques: Transport and Social manipulation.

Having looked at some of the coded methods used in psychological manipulation on transport, this blog looks at how it is incorporated into real-time operations,

How perps are able to reflect coincidence effectively in realtime.

The nature of how perps use the tactic of indirect language/sound on transport is a curious subject making its way into TI communities. It is also a looking glass into how effective this tech is and how it relates to mass mind manipulation.

Transport Gaslighting.

For a majority of the planned events, most are used in co ordination with street perps using street theatre. Transport used in operations generally tend to use fixed plates and certain advertising that is paid for by the government to be used in specific areas at certain times. Therefore this does not require complicated technology, only a presence.

Technologies used in Real-time.

One specific technology used on certain vehicles that exists isn’t to far removed from fiction. It is found in the film Goldfinger on the famous Aston Martin used by James Bond.

The DB9 uses a turn style number plate system which can interchange three different number plates within a barrel. Albeit a primitive design needing an extension to house the interchanger, it is not something we see on modern car designs.

The deceptive principles of this tech are not that difficult to achieve today considering the vast leaps in technology and it is likely to have been around for sometime when prototypes were being developed and tested. Certain perp issue plates are electronic display devices that can change to adapt to changing situations using the data file on the target. These plates are linked into an onboard computer that connects wirelessly to the mainframe computer. Naturally these plates cannot be changed on the roads in front of the public and normally have to be done out of sight using perps from outside the area.

Otherwise, local perps use a broad range of plates that are used for sensitization techniques. Generally they are non-specific. Examples of these are plates that incorporate 666, 999, 911, MI5, MI6 etc.

For more directed attention to the target the plates used can be changed if needed but if a target is a resident to one area these plates are not often changed but make up a series of aspects suited to the targets life.

A change of plate can sometimes be an issued order from perp controllers. A perp is either given money to buy a new car, ordered a new custom plate or is given a new car directly.

However as some targets know, the reflection of personal information can at times be too accurate to be possible using co-ordinated operations. Some of these events are planned well in advance and are practised on the roads before a target even goes near an area.

Therefore, electronic plates are sometimes used to fill the gaps. They will look exactly like standard plates, almost unidentifiable. They can be detached where some will be wireless and others with a small wire connection linking straight into the cars computer.

These vehicles will normally be introduced onto routes from quiet lay-bys, usually estimating the ETA of the target and adapting as necessary. In specific areas, perps need transport in numbers in order to subtlety manipulate traffic situations in order to get perps into position. This of course means controlling the speed of unassuming drivers. With the use of intelligence, civilians using predictable routes can also be shadowed to draw attention to plates and advertising if needed.

Civilians using registered plates sit on a database that is analysed in real-time on our roads using onboard mobile devices. If these devices are off or not present, then traffic cameras and satellite act as the eye to fill in what it can’t track.

How manipulative and accurate is this technology?

Staggering. Even to those unaware, traffic can be manipulated to very high efficiency around one or multiple targets. It can also control movement to isolate targets from those they know or bring them together if needed.

However this requires deep study of the targets actions, reactions and movements.

In terms of transport manipulation, this still categories under social manipulation where mobile devices can be used as prompts to control and time a multitude of individuals at any given time. This includes distancing Ti away from each other or introducing individuals that are subject to study.

Psychological control usually emanates from mobile devices depending on the nature of what the target is looking at during the day, through to the conversations they have. The subject matter or suggestion is usually a subconscious trigger where as previous events of the targets day to day lives are used as diversions or to other purpose.

Engineered coincidence.

Transport is also used by perps to highlight coincidence to targets whom are stationary, usually when at home. The “Newsfeed”, a function found in Facebook which generates random articles is one example of a linked process in the harassment program, as well as the functions in apps and programs.

If a target is to flick through their newsfeed, a series of co-ordinated events can be used to highlight sensitivity to specific articles. The program will select an article to show in the newsfeed while streaming downwards, one which has not been shown. A perp transport, normally one which is doing a circuit with others will travel past the house of the target. The program will then synchronize with the perp car computer to time its actions with sometimes distinct accuracy.

Sometimes perps need transport close to the targets address in order to arrive at the passing point in time.

Facebook is essentially the public view of the target against the information data harvested from search engines, advertised back at the user. This is exactly the same why community harassment works. It mimics the actions of internet social networking and data mining.

Organised Harassment: Transport

Update: I tweeted this post on the morning of 5/07/17

GGS

The morning of 5/7/17 I had decided to drive to a location I am familiar with. I has a small car park and is frequented by friendly types. The journey there was like any other I take. Plenty of perps and a vast variety of reflective tactics.

Considering the time frame, this was done in two hours since the post. These two car were not present on my arrival but were when returning. In the second picture the car was parked next to mine whilst the other was directly opposite.

 

 

Main Article

Road activity has increased since the arrival of smartphones as most have GPS technology, there are many reasons why a person could assume that being a driver today is harder than it used to be in some respects. True it is, but what is it actually like to be stalked on the road in real-time be it busy or quiet? How can a person notice the difference and how could it be possible to navigate or concentrate while all this happens?

The first thing I can say is that for the person who is not a TI, the frequency of this activity is not purely confined to harassments operatives, in fact they use human error as cover.

The frequency of traffic of millions of people can give a clear outline of peoples ability to deal with what is a stressful activity for many. That being that yes accidents happen but a majority of the time, traffic is able to flow each day without fail. That is millions and millions of people that are able to look after each others safety everyday.

This blog will include some insight to some highly sophisticated technology that is being used 24/7 and in real-time on targets and other people of interest at large. When you see it, it cannot be unseen, especially when a highly coordinated operation is in full swing.

You may have read about how targets can be sensitized to stimulus such as noise, colours, words, signs, in fact anything that the stalkers want you to be focused on.

On the roads drawing your attention to details is one aspect that is used often, therefore if you are a driver, stalking tactics used can be highly dangerous as many of them are designed to cause accidents. The operation is designed in such a way to avert blame away from the perpetrators but is also used to relay messages.

Car Licence Number Plates

Drivers in the western world have been able to use private number plates instead of the legal Reg plate that comes with their vehicle for many years now. It is a common thing and is often used for advertising.

Private plates allow a vehicle owner to customise a short message into their plate. It typically incorporates up to three words but the average is around two at most. The least that can be used is one letter and one word.

As legal requirement, a private plate is not allowed to spell out a word, it must incorporate number.

For example, if we were to make a plate with the sentence, “Word Up” then this plate would need to incorporate numbers such as Wor4 UP so that there is not a direct message applied to the plate.

TOP GEAR

TopGear-Rex

A few years ago, the presenters of Top Gear caused international outrage during filming of an episode in Argentina.

http://www.dailymail.co.uk/news/article-3100892/Controversial-Gear-number-plate-WASN-T-reference-Falklands-War-rules-BBC-Trust-rejects-complaints-Argentina-prank.html

http://www.telegraph.co.uk/news/bbc/11636284/BBC-clears-Top-Gear-over-Falklands-number-plate-cover-up.html

The plate H982 FKL seen in the episode is code for HI (19)82 FKL(Falklands) and is what is considered to cause the most offence, as it is a reference to the Falklands War which Great Britain was involved in. The licence number H982 FKL is a legitimate British plate which dates to the late 80’s where the first letter of the licence number would change from year to year. From 1980 to the late 90’s this ranged from the letters A/B/C/D/E/F/G/H/J/K/L/M/N/P/R/S/T/U/V/W.

The second car with Plate N269 KNG or N(B)(F)(I) KNG is less obvious but references the following:

  • NB: To note the matter at hand

  • 69: A sexual position which involves simultaneous oral sex known in the Karma Sutra as Congress of the Crow. Perhaps ironic, the matter at hand involves no hands implicating the sexual position.

  • KNG: Normally short for King and can also apply to the last syllable of fuc(king) which in respect to the preceding numbers seems intentional.

In order, the message could imply “Take note of a hands free fucking”. This could reference the “Exocet” missiles Argentina fired at HMS Sheffield, sinking the ship

The third car EKH 646J presented a bit of difficultly to decipher but it seems to reference the number of Argentinian casualties 649 with the second car implying to invert the last 6 in (646).

Taken from Wiki, the expression:

Ekh (expression)

Ekh (Russian: Эх) is a spoken interjection in Russian and certain other Slavic languages. Ekh-ma (Эх-ма) is closely related.[1]

It is typically spoken by itself or at the beginning of a sentence, and can be used to express wonder, feeling sorry for something, reproach, pride at a just-accomplished feat, and other strong feelings.

“Эх, как важно развернулся! Фу ты, какая пышная фигура!” (“Ekh, how splendidly he’s getting on! Phew, what a magnificent figure!“) – Taras Bulba by Nikolai Gogol

In all, the message that seemed to be wanting to get across was that against 258 British deaths the Argentinians suffered far worse. The argument presented is that the plate H982 FKL was pure coincidence and that the presenters had no idea they were driving around with cars that were causing offence. It is well known that there has been history between the presenters and the BBC and it is probable that this was a tactic deployed to sabotage their careers. It is also debatable that the event was staged.

If one licence plate can cause such offence, imagine what an entire sequence can do to someone.

From experience, a car that was sold to me has reference to the government and a major world event. It was deliberate and the car was chosen for the purpose of sending a message. The way it is designed also made me question wither the car is used to relay the message to other targets should they have been sensitized to this system.

Further information

http://www.walesonline.co.uk/news/wales-news/revealed-censored-car-number-plates-9316676

Coded Sentence Generator

This is a program used within a co-ordinated planning system that involves databases of many factors.

The whole idea is to attempt to relay a message across to a target without raising any suspicion in densely populated areas. This is the tactic used in organised harassment and it requires the use of data harvesting in real-time and a co-ordinated effort to relay information as soon as possible to the target.

This system is not confined to transport alone and incorporates many avenues which can find its way into the eyes of the target. If the message can be sent directly, frequently and where the target has no other option than to view the message, then this can act as part of the “coincidence” that targets experience when harassed.

If one is able to observe the operation as a whole and document it, one will notice patterns. Where operatives are used, consistences like a car which is use to relay a particular code can stand out. Therefore this is easier to evidence against that of e-mail and advertising which is being used as “coincidental” harassment,

An operative will be assigned one or a number of transports for use in harassment or maybe required to modify their current plates with private or issued plates. There are operatives in most areas of a country where cities tend to use different systems to those that are densely populated. It takes into account the way of life and the nature of the environments.

One of the most covered aspects of numerical and alphabetical coding is modern acronyms. Some targets report the frequent use of three numbered emergency codes such as 911, 999. In terms of intelligence, MI 5 is a commonly reported acronym incorporated into Reg Plates along with all number variants MI1, MI2 Etc.

In America (but not confined to), plates will include FBI, CIA and variants of PD, police departments. The list of Acronyms that can be used is endless simply because the harassment system can incorporate anything that it wishes to construct a “theme” around a target.

It does this through an artificial intelligence system that is already operative 24/7. It is much like a hive that is ordered but to create the “theme” specific members of the hive will be called upon “on demand.” This brings the un-ordered theme into an ordered sequence of events.

The AI system gathers enough intelligence on the target to pre-plan events. Considering how quick the system is, the plan is delivered by text message or though more sophisticated means where their is more participation required.

Particularly in street theatre, perpetrators many have to learn mannerisms, ways of dressing, coping the actions in videos or anything that is personal to the target.

This can be delivered by instructional video typically a cloud server that is access (read only) and will not be stored on the perpetrators phone for evidence purposes.

In respects to individual targeting, the events are always observed, studied and researched, looking at reactions, reaction times and other aspects of interest.